scholarly journals Beyond the security paradox: Ten criteria for a socially informed security policy

2017 ◽  
Vol 27 (6) ◽  
pp. 638-654 ◽  
Author(s):  
Vincenzo Pavone ◽  
Kirstie Ball ◽  
Sara Degli Esposti ◽  
Sally Dibb ◽  
Elvira Santiago-Gómez

This article investigates the normative and procedural criteria adopted by European citizens to assess the acceptability of surveillance-oriented security technologies. It draws on qualitative data gathered at 12 citizen summits in nine European countries. The analysis identifies 10 criteria, generated by citizens themselves, for a socially informed security policy. These criteria not only reveal the conditions, purposes and operation rules that would make current European security policies and technologies more consistent with citizens’ priorities. They also cast light on an interesting paradox: although people feel safe in their daily lives, they believe security could, and should, be improved.

2021 ◽  
Author(s):  
Elisa Orrù

This book examines the current dynamic and momentous development of European security policy. In doing so, it provides an important and original contribution to both practical philosophy and to the fields of security studies and European studies. Using concrete analyses and by offering possible solutions to certain problems, the book develops an approach that is embedded in reality and which, at the same time, insists on theory and normativity. It focuses on the characteristics of new security technologies and ways in which security is understood as well as their influence on the ‘Copernican Revolution’ of the modern age, through which individuals and the protection of their fundamental rights have become the focus of political legitimation.


Author(s):  
Stefan Tibuleac

This article analyzes the most current security issues for the Republic of Moldova that are part of the regional security context of Eastern Europe –the region that can be considered the epicenter of international tensions through which the„geopolitical line of fracture”passes. The geographical position of the Republic of Moldova makes this state particularly sensitive to any negative trends in theregion. Growing of international tensions creates security threats and complicates economic development. From a historical point of view, Moldova has repeatedly fallen victim by the confrontation of the great powers. Therefore, the Republic of Moldova has a vital interest in preventing a new conflict in Eastern Europe. This article is based on a number of assumptions made by changes in the European security environment, such as the „shift of weight” to the East, strategic uncertainty, increasing the role of non-state actors, the situation in eastern Ukraine, etc. Based on these assumptions, this article makes an attempt to outline the potential role of the Republic of Moldova in the Eastern European security system, taking into account the desideratum for integration of the republic into the European Union. Other relevant factors will be taken into account for shaping the role of the Republic of Moldova in the European security system, namely: the security deficit; the impact of NATO and EU security policy; the rebirth of the project to create a regional defense alliance, etc. This article will largely take into account the military aspects of security. Keywords: Republic of Moldova, national security, Eastern Europe, NATO, Intermarium, defence, threats, risks, challenges


2019 ◽  
Vol 27 (02) ◽  
pp. 260-274
Author(s):  
Marek Górka

Due to attacks carried out by terrorist organisations, most European countries have placed this phenomenon at the forefront of their priorities in the field of security policy. The fight against terrorism has sparked a heated debate about the significance of security and civil liberties. The law on anti-terrorist operations of 2 July 2016 triggered the debate in Poland as well. This article attempts to answer the question of whether it is possible to maintain a balance between freedom and security. Therefore, the contemporary challenge that many governments face is not effective terrorist attack prevention, but rather an effective anti-terrorism policy whose provisions will not pose a greater threat to democracy than terrorists themselves.


2007 ◽  
Vol 13 (2) ◽  
pp. 507-514
Author(s):  
Ivan Vuković

In this paper we researched European Union starting with the Agreement from Maastrich from year 1992, even though the European Union has a long traditional history and its origin is founded on regulations of economical integrations in Europe beginning from the 1950’s through the Roman treaty from year 1957 and the forming of the European Union Committee in year 1965. Further we follow her expansion and introduction of the European economic and monetary policy, to last, the joining perspective of Croatia. According to the Agreement from Maastrich, European Union lies on three posts: 1) Legal-political and regulative post, 2) Economical post, where the forming of European economical and monetary policy is in the first plan, especially the introducing of Euro as the unique European currency, 3) Post of Mutual foreign security policy within European Union. In that context we need to highlight the research conducted here and in European Union, including the world, regarding development of European Union and its economical, legal, political and cultural, as well as foreign diplomatic results, which are all perspectives of European Union. All the scientists and researches which were involved in exploring the development of EU with its modern tendencies and development perspective, agree that extraordinary results are achieved regards to economical, legal, political, foreign-security and diplomatic views, even tough many repercussions exist in progress of some particular members and within the EU as a whole. The biggest controversy arises in the perspective and expanding of European Union regarding ratification of the Constitution of EU from particular country members, but especially after the referendum was refused from two European countries, France and Netherlands. According to some estimates, the Constitution of EU would have difficulty to be adopted in Switzerland and some other Scandinavian countries, but also in Great Britain and other very developed countries. However the European Community and European Union were developing and expanding towards third European countries, regardless of Constitutional non-existence, where we can assume that if and when the Constitution of EU will be ratified, the EU will further develop as one of the most modern communities. This will enable economical development, especially development of European business, unique European market and free trade of goods and services, market of financial capital and labour market in free movement of labour. Being that EU has become one of the most largest dominating markets in the world, it offers a possibility to all new members to divide labour by using modern knowledge and high technology which insure economical, social and political prosperity. This results to forming a society of European countries which will guarantee all rights and freedom of development for all nations and ethnic groups. As well as, all European countries with somewhat less sovereignty, but in international relations will be stronger and significant, not only in sense of economics, but also in politics and military diplomatic relations. Therefore, Croatia has no choice and perspective if she does not join the European Union till year 2010, but until than it needs to create its strategy of economical and scientific-technological development, including demographic development, which will insure equal progress of Croatia as an equal member of European Union.


2019 ◽  
Vol 34 (1) ◽  
pp. 123-134
Author(s):  
Kalana Malimage ◽  
Nirmalee Raddatz ◽  
Brad S. Trinkle ◽  
Robert E. Crossler ◽  
Rebecca Baaske

ABSTRACT This study examines the impact of deterrence and inertia on information security policy changes. Corporations recognize the need to prioritize information security, which sometimes involves designing and implementing new security measures or policies. Using an online survey, we investigate the effect of deterrent sanctions and inertia on respondents' intentions to comply with modifications to company information security policies. We find that certainty and celerity associated with deterrent sanctions increase compliance intentions, while inertia decreases respondents' compliance intentions related to modified information security policies. Therefore, organizations must work to overcome employees' reluctance to change in order to improve compliance with security policy modifications. They may also consider implementing certain and timely sanctions for noncompliance.


Author(s):  
Aroon Manoharan ◽  
Marc Fudge

This chapter highlights the research findings of a longitudinal study of online privacy and security practices among global municipalities conducted in 2005 and 2007. As cities worldwide implement sophisticated e-government platforms to increasingly provide services online, many barriers still inhibit the adoption of such strategies by the citizen users, and one such factor is the availability of a comprehensive privacy policy. The survey examines cities throughout the world based upon their population size, the total number of individuals using the Internet, and the percentage of individuals using the Internet. Specifically, we examined if the website has a privacy or security policy, does the website utilize digital signatures and if the website has a policy addressing the use of cookies to track users. Overall, results indicate that cities are increasingly emphasizing on privacy and security policies with major improvements in 2007, along with significant changes in the top ranking cities in when compared to the 2005 study.


2011 ◽  
pp. 2352-2364
Author(s):  
Yvette Ghormley

The number and severity of attacks on computer and information systems in the last two decades has steadily risen and mandates the use of security policies by organizations to protect digital as well as physical assets. Although the adoption and implementation of such policies still falls far short, progress is being made. Issues of management commitment, flexibility, structural informality, training, and compliance are among the obstacles that currently hinder greater and more comprehensive coverage for businesses. As security awareness and security-conscious cultures continue to grow, it is likely that research into better methodologies will increase with concomitant efficiency of security policy creation and implementation. However, attacks are becoming increasingly more sophisticated. While the human element is often the weakest link in security, much can be done to mitigate this problem provided security policies are kept focused and properly disseminated, and training and enforcement are applied.


2015 ◽  
pp. 994-1017
Author(s):  
Ioanna Dionysiou ◽  
Angelika Kokkinaki ◽  
Skevi Magirou ◽  
Theodosios Iacovou

This chapter presents the findings of an investigation on current security practices in Cypriot organizations, including enterprises and public sector divisions. In order to gain knowledge on the deployed security technologies by organizations, a survey was conducted and concluded in late 2010. The survey primarily examined compliance of enterprise current security policies and procedures with ISO 27001 security guidelines. A research analysis has been performed and identified that security mechanisms and the management of information technology (IT) resources may be improved on a number of aspects. Based on the research findings, an assessment of the viability of ISO 27001 in Cyprus is given as well as recommendations on the further deployment of ISO 27001.


Author(s):  
Joseph Kizza ◽  
Florence Migga Kizza

In the last chapter, we discussed the basics of network security. Among the issues that we briefly touched on are the techniques and best practices that are currently being used by many security personnel in a variety of networks that make up the communication infrastructure. In this chapter, we are going to start with what is considered to be the most basic of all security techniques—security.policy. We will discuss several issues about security policy, like what constitutes a good policy and how to formulate, develop, write implement, and maintain a security policy.


Sign in / Sign up

Export Citation Format

Share Document