Information, Innovation and the Boogeyman

Author(s):  
Trevor Fowler ◽  
Kevin Quigley

Governments around the Western world are becoming increasingly concerned about cyber security. This paper uses the Hood et al. Risk Regulation Regime (2001) framework to describe Public Safety Canada's Cyber Security Strategy and analyze the social and economic pressures that will influence the manner in which the strategy will be operationalized. This paper recommends that government: takes a balanced approach to securing its own systems, recognizing the costs of an overly precautionary stance; continues to work and exchange information on cyber security with owners and operators of critical infrastructure while at the same time recognizing the market context in which they operate, which constrains this exchange; and helps Canadians to be secure online with enhanced public education programs that have a longer-term view and recognize people's desire for flexibility and convenience in the technology they use. The research in this paper is drawn from academic literature, media analysis and semi-structured interviews.

Author(s):  
Trevor Fowler ◽  
Kevin Quigley

Governments around the Western world are becoming increasingly concerned about cyber security. This paper uses the Hood et al. Risk Regulation Regime (2001) framework to describe Public Safety Canada's Cyber Security Strategy and analyze the social and economic pressures that will influence the manner in which the strategy will be operationalized. This paper recommends that government: takes a balanced approach to securing its own systems, recognizing the costs of an overly precautionary stance; continues to work and exchange information on cyber security with owners and operators of critical infrastructure while at the same time recognizing the market context in which they operate, which constrains this exchange; and helps Canadians to be secure online with enhanced public education programs that have a longer-term view and recognize people's desire for flexibility and convenience in the technology they use. The research in this paper is drawn from academic literature, media analysis and semi-structured interviews.


2021 ◽  
Vol 8 (1) ◽  
Author(s):  
Delisia Matthews ◽  
Qiana Cryer-Coupet ◽  
Nimet Degirmencioglu

AbstractWhile the popularity of athletic footwear or “sneakers” has been widely assessed within academic literature, few studies to date have examined the influence of a specific sneaker subculture called “Sneakerheads”. Moreover, the brand preferences and brand identities that may exist within the Sneakerhead subculture have not been extensively examined. To address this gap in the research, semi-structured interviews were conducted with 12 male, self-identified Sneakerheads. The main goal of the research was to explore the Sneakerhead culture, while gaining an understanding of brand preferences, practices, and group identity factors. The Social Identity Theory was employed as the theoretical framework for this research. Qualitative analysis of the interviews revealed the following three topical areas: (1) Back in the Day, (2) All About the Jumpman, and (3) For Members Only. Findings regarding the unique culture of Sneakerheads indicate a clear sense of group identity as it relates to motivations, behaviors, and brand identity within the Sneakerhead community. Moreover, the findings of this study further define the lifestyle of a Sneakerhead and shed light on their unique behaviors and practices within the culture.


2021 ◽  
Vol 2 ◽  
pp. 31-46
Author(s):  
Zsofia Maurer

Forms of dancing meditation have been popular choices for self-development in the Western world, yet they continue to be under-represented in the academic literature on mindfulness and transformative practices. The present study explored the lived experience and transformative potential of 5 Rhythms, a dancing meditation practice developed by Gabrielle Roth (1998). Anderson’s (1998) qualitative research method, intuitive inquiry, was applied in order to engage both intellect and intuition, enabling the researcher to tap her own embodied knowing of 5 Rhythms practice. The research progressed through 5 hermeneutical cycles, allowing a process of reappraisal, transforming the researcher’s original understanding of 5 Rhythms through in-depth engagement with nine participants, all of whom were 5 Rhythms dancers. Following semi-structured interviews and transcription, a Thematic Content Analysis yielded eight core themes. Overall, the findings suggested a number of processes and conditions that facilitated and accompanied psycho-spiritual transformation in 5 Rhythms dancing, including embodiment, interconnection with others, self and the world, mindful presence, self-compassion, freedom, spirituality, creativity, and the interplay of opposing forces such as surrender and control. Implications and recommendations for future research are discussed at the end.


2013 ◽  
Vol 3 (3) ◽  
pp. 1-18 ◽  
Author(s):  
Martti Lehto

Threats in cyberspace can be classified in many ways. This is evident when you look at cyber security on a multinational level. One of the most common models is a threefold classification based on motivational factors. Most nations use this model as a foundation when creating a strategy to handle cyber security threats as it pertains to them. This paper will use the five level model: cyber activism, cybercrime, cyber espionage, cyber terrorism and cyber warfare. The National Cyber Security Strategy defines articulates the overall aim and objectives of the nation's cyber security policy and sets out the strategic priorities that the national government will pursue to achieve these objectives. The Cyber Security Strategy also describes the key objectives that will be undertaken through a comprehensive body of work across the nation to achieve these strategic priorities. Cyberspace underpins almost every facet of the national functions vital to society and provides critical support for areas like critical infrastructure, economy, public safety, and national security. National governments aim at making a substantial contribution to secure cyberspace and they have different focus areas in the cyber ecosystem. In this context the level of cyber security reached is the sum of all national and international measures taken to protect all activities in the cyber ecosystem. This paper will analyze the cyber security threats, vulnerabilities and cyber weaponry and the cyber security objectives of the Cyber Security Strategies made by Australia, Canada, Czech Republic, Estonia, Finland, Germany, the Netherlands, the United Kingdom and the United States.


2021 ◽  
pp. 121-128
Author(s):  
S. CIAPA

The article considers the legal and organizational aspects of ensuring the protection of the critical information infrastructure from cyberattacks. Attention is drawn to the positive experience of the United States in ensuring the resilience of the objects of critical infrastructure. The provisions of the new Cyber Security Strategy of Ukraine are analyzed, one of the priorities of which is to improve the regulatory framework for cyber security of critical information infrastructure. The shortcomings of the previous Cyber Security Strategy of Ukraine (2016) are noted. Contains a detailed analysis of legislation and initiatives on providing cybersecurity. General requirements for cyber protection of critical infrastructure objects are considered. Based on the analysis of the current legislation on cyber security of Ukraine, ways to improve the legal and organizational support for the protection of the critical information infrastructure from cyber attacks are proposed.


2019 ◽  
Vol 12 (2) ◽  
pp. 53-80
Author(s):  
Sari Hanafi

This study investigates the preachers and their Friday sermons in Lebanon, raising the following questions: What are the profiles of preachers in Lebanon and their academic qualifications? What are the topics evoked in their sermons? In instances where they diagnosis and analyze the political and the social, what kind of arguments are used to persuade their audiences? What kind of contact do they have with the social sciences? It draws on forty-two semi-structured interviews with preachers and content analysis of 210 preachers’ Friday sermons, all conducted between 2012 and 2015 among Sunni and Shia mosques. Drawing from Max Weber’s typology, the analysis of Friday sermons shows that most of the preachers represent both the saint and the traditional, but rarely the scholar. While they are dealing extensively with political and social phenomena, rarely do they have knowledge of social science


2020 ◽  

This book explores some of the risks associated with sustainable peace in Colombia. The book intentionally steers away from the emphasis on the drug trade as the main resource fueling Colombian conflicts and violence, a topic that has dominated scholarly attention. Instead, it focuses on the links that have been configured over decades of armed conflict between legal resources (such as bananas, coffee, coal, flowers, gold, ferronickel, emeralds, and oil), conflict dynamics, and crime in several regions of Colombia. The book thus contributes to a growing trend in the academic literature focusing on the subnational level of armed conflict behavior. It also illustrates how the social and economic context of these resources can operate as deterrents or as drivers of violence. The book thus provides important lessons for policymakers and scholars alike: Just as resources have been linked to outbreaks and transformations of violence, peacebuilding too needs to take into account their impacts, legacies, and potential


Author(s):  
Anne Roosipõld ◽  
Krista Loogma ◽  
Mare Kurvits ◽  
Kristina Murtazin

In recent years, providing higher education in the form of work-based learning has become more important in the higher education (HE) policy and practice almost in all EU countries. Work-based learning (WBL) in HE should support the development of competences of self-guided learners and adjust the university education better to the needs of the workplace. The study is based on two pilot projects of WBL in HE in Estonia: Tourism and Restaurant Management professional HE programme and the master’s programme in Business Information Technology. The model of integrative pedagogy, based on the social-constructivist learning theory, is taken as a theoretical foundation for the study. A qualitative study based on semi-structured interviews with the target groups. The data analysis used a horizontal analysis to find cross-cutting themes and identify patterns of actions and connections. It appears, that the challenge for HE is to create better cooperation among stakeholders; the challenge for workplaces is connected with better involvement of students; the challenge for students is to take more initiative and responsibility in communication with workplaces.


Sign in / Sign up

Export Citation Format

Share Document