Home About us Contact | |||
Security Management (security + management)
Selected AbstractsTwo-Level Security Management and the Prospects for New Democracies: A Simulation AnalysisINTERNATIONAL STUDIES QUARTERLY, Issue 3 2000Marc V. Simon Most new democracies face serious internal, ethnic/separatist conflicts; in addition, some face international threats. The literature on the growth of democracy in the global system and its impact on world politics does not fully account for the dual threats all states must address in managing their security. Based on theoretical work by Starr (1994) which describes the "common logic" of conflict processes in war and revolution, we outline a model of how states respond to security threats from both external and internal sources. Using computer simulation, we analyze the model and evaluate the relative importance for state security of factors such as system size, numbers of democracies in the system, extraction/allocation strategy pursued by new democracies, and government legitimacy level. Our results show that new democracies thrive in systems that are predominantly democratic. Also, ally support can provide crucial resources for new democracies facing internal threats. Finally, "endangered" democracies can recover security by attempting to buy off domestic threats rather than deter them, and by improving legitimacy. [source] The assessment of the impacts of the security management in a competitive environmentEUROPEAN TRANSACTIONS ON ELECTRICAL POWER, Issue 5 2009Ettore Bompard Abstract Security management is of the utmost importance in power system and many efforts have been made on this issue since a reliable supply of electricity is crucial to the modern societies. The traditional approach adopted in Europe is based on the "n,,,1" steady-state security that is efficient, although restrictive, and can continue to play an important role also in the new competitive context. In this paper, three alternative market-based models for security consideration are introduced, according to preventive and corrective control approaches. The models are presented and analyzed in terms of their economic impacts on the market throughout a set of useful indexes that allows for a ranking of the advantages got from the re-enforcement of the lines. Moreover, the positive impacts of the phase-shifter (PS) installation for the security and congestion management are quantified and indexes are derived to assess their optimal location. The different models and the exploitation of the proposed indexes are illustrated with reference to a 34-bus test system. Copyright © 2008 John Wiley & Sons, Ltd. [source] Security management of mutually trusted domains through cooperation of defensive technologiesINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 3 2009Shang-Juh Kao A number of defensive technologies have been proposed for the prevention of security threats. However, these defensive technologies are implemented independently without cooperation among various network domains. In this paper, different administrative networks are leagued to form a federative network environment called a trusted domain. From the perspective of a network manager, there is a need to integrate diverse technologies into an effective defensive system among mutually trusted domains. An imperative task for security management is to put in place a shared defensive mechanism, or protective shield, for multiple domains. A cooperative approach to provide such a shared defensive system is presented with integration of both intra-domain and inter-domain defensive mechanisms. The simulation results show that, through sharing the defensive information, the firewall system can successfully detect and filter the repeated intrusions. Copyright © 2008 John Wiley & Sons, Ltd. [source] Anatomy of an Ambush: Security Risks Facing International Humanitarian AssistanceDISASTERS, Issue 1 2005Frederick M. Burkle Jr. MD The 2003 war with Iraq has generated security concerns that present unique challenges to the practice of providing international humanitarian assistance during war and conflict. Objective research studies on security management are lacking. However, case studies have proven to be an important education and training tool to advance situational awareness of security risks. These challenges are illustrated by an analysis of the events surrounding the first ambush of, and assassination attempt on, a senior US aid official in Baghdad. Before deployment to conflict areas, especially those characterised by insurgent activity, humanitarian providers must realistically assess the threats to life and to the mission. They must obtain pre-deployment situational awareness education, security training and optimal protective equipment and vehicles. [source] The assessment of the impacts of the security management in a competitive environmentEUROPEAN TRANSACTIONS ON ELECTRICAL POWER, Issue 5 2009Ettore Bompard Abstract Security management is of the utmost importance in power system and many efforts have been made on this issue since a reliable supply of electricity is crucial to the modern societies. The traditional approach adopted in Europe is based on the "n,,,1" steady-state security that is efficient, although restrictive, and can continue to play an important role also in the new competitive context. In this paper, three alternative market-based models for security consideration are introduced, according to preventive and corrective control approaches. The models are presented and analyzed in terms of their economic impacts on the market throughout a set of useful indexes that allows for a ranking of the advantages got from the re-enforcement of the lines. Moreover, the positive impacts of the phase-shifter (PS) installation for the security and congestion management are quantified and indexes are derived to assess their optimal location. The different models and the exploitation of the proposed indexes are illustrated with reference to a 34-bus test system. Copyright © 2008 John Wiley & Sons, Ltd. [source] Security management of mutually trusted domains through cooperation of defensive technologiesINTERNATIONAL JOURNAL OF NETWORK MANAGEMENT, Issue 3 2009Shang-Juh Kao A number of defensive technologies have been proposed for the prevention of security threats. However, these defensive technologies are implemented independently without cooperation among various network domains. In this paper, different administrative networks are leagued to form a federative network environment called a trusted domain. From the perspective of a network manager, there is a need to integrate diverse technologies into an effective defensive system among mutually trusted domains. An imperative task for security management is to put in place a shared defensive mechanism, or protective shield, for multiple domains. A cooperative approach to provide such a shared defensive system is presented with integration of both intra-domain and inter-domain defensive mechanisms. The simulation results show that, through sharing the defensive information, the firewall system can successfully detect and filter the repeated intrusions. Copyright © 2008 John Wiley & Sons, Ltd. [source] Guilty Bodies, Productive Bodies, Destructive Bodies: Crossing the Biometric BordersINTERNATIONAL POLITICAL SOCIOLOGY, Issue 2 2007CHARLOTTE EPSTEIN This article examines the forms of power brought into play by the deployment of biometrics under the lenses of Foucault's notions of discipline and biopower. These developments are then analyzed from the perspective of governmentality, highlighting how the broader spread of biometrics throughout the social fabric owes not merely to the convergence of public and private surveillance, but rather to a deeper logic of power under the governmental state, orchestrated by the security function, which ultimately strengthens the state. It is associated with the rise of a new governmentality discourse, which operates on a binary logic of productive/destructive, and where, in fact, the very distinctions between private and public, guilty, and innocent,classic categories of sovereignty,find decreasing currency. However, biometric borders reveal a complicated game of renegotiations between sovereignty and governmentality, whereby sovereignty is colonized by governmentality on the one hand, but still functions as a counterweight to it on the other. Furthermore, they bring out a particular function of the "destructive body" for the governmental state: it is both the key figure ruling the whole design of security management, and the blind spot, the inconceivable, for a form of power geared toward producing productive bodies. [source] The role of organizational cultures in information-systems security management: A goal-setting perspectiveJOURNAL OF LEADERSHIP STUDIES, Issue 1 2008Ioannis V. Koskosas The aim of this research is to investigate the role of strong organizational cultures in setting information-systems security goals. In doing so, we explore and discuss the concept of culture within three financial organizations with different social and organizational structures, and seek to demonstrate the importance of having a cohesive culture in efficiently setting information-security goals. The relationship between goal setting, culture strength, and performance is also discussed, as there have been studies that indirectly indicate that such a relationship may exist. The contribution of this work to interpretive information-systems research consists of its study of culture and goal setting in a security-management context, and its grounding within an interpretive epistemology. In addition, this research promotes an interdisciplinary and interorganizational theory to foster dialogue that transcends industry-specific contexts and explores different organizational practices that can improve leadership's role in human life. [source] The need for integration of drought monitoring tools for proactive food security management in sub-Saharan AfricaNATURAL RESOURCES FORUM, Issue 4 2008Tsegaye Tadesse Abstract Reducing the impact of drought and famine remains a challenge in sub-Saharan Africa despite ongoing drought relief assistance in recent decades. This is because drought and famine are primarily addressed through a crisis management approach when a disaster occurs, rather than stressing preparedness and risk management. Moreover, drought planning and food security efforts have been hampered by a lack of integrated drought monitoring tools, inadequate early warning systems (EWS), and insufficient information flow within and between levels of government in many sub-Saharan countries. The integration of existing drought monitoring tools for sub-Saharan Africa is essential for improving food security systems to reduce the impacts of drought and famine on society in this region. A proactive approach emphasizing integration requires the collective use of multiple tools, which can be used to detect trends in food availability and provide early indicators at local, national, and regional scales on the likely occurrence of food crises. In addition, improving the ability to monitor and disseminate critical drought-related information using available modern technologies (e.g., satellites, computers, and modern communication techniques) may help trigger timely and appropriate preventive responses and, ultimately, contribute to food security and sustainable development in sub-Saharan Africa. [source] |