security organizations
Recently Published Documents


TOTAL DOCUMENTS

114
(FIVE YEARS 54)

H-INDEX

6
(FIVE YEARS 1)

2021 ◽  
Vol 11 (4) ◽  
pp. 33-66
Author(s):  
Ahmet Çırakoğlu ◽  
Hüdayi Sayın

Public security was unable to achieve any systematic order until the start of urbanization. With the formation of modern cities, the need to ensure the security of people and their living spaces were met primarily by city administrators and then by regular internal security organizations. This article discusses Iran’s security system as it existed in the pre-modern period and the internal security strategies that transformed in line with the modern understanding of the state. The concept of internal security in Iran has gone through the following four main phases: (1) military methods that had been applied by the senior administrators of the states that had ruled the region before the Qajar Dynasty, (2) the first professionalization that saw the Nazmiyya Organization established in the Qajar Dynasty through efforts to separate policing from military service, (3) the re-militarization of internal security services and focus on intelligence activities during the Pahlavi Dynasty that had been established after the Rıza Han coup, and (4) the ideological appearance of the police organization accompanied by the theo-political orientation that emerged after the 1979 Revolution. This text discusses these four phases in detail.


Author(s):  
Nor Hapiza Mohd Ariffin ◽  
Ruhaila Maskat

A proactive cyber security plan to safeguard confidential information and privacy still lacks initiatives to avoid frequent harmful attacks. Cybersecurity professionals must possess ethical competence and prove worthy of overseeing valuable information for efficient decision‐making since ethical competence is fundamental for daily practice. There is a need to define what it means to be ethically competent in the era of IR4.0. The previous competence models still lack consideration of both artificial intelligence (AI) and emotional intelligence (EI) skills. AI brings new opportunities to cyber security organizations that focus on AI skills related to cognitive Intelligence or intelligent quotient (IQ). EI, which refers to emotional quotient (EQ), is a good predictor of ethical competence as it can perceive and express emotions precisely to facilitate thought to understand and manage emotions. However, practically, most cyber security organizations focused on AI skills and disregarded EI skills' roles. This research proposes a cyber artemotional model that blends AI skills and EI skills for cyber security employees. This research would benefit cyber security organizations with cyber artemotional model as employees ethical competence assessment, and it is in line with the demand of IR4.0.


Author(s):  
Mansour Ahmed Alwadai, Maadi Muhammad Al Madhab Mansour Ahmed Alwadai, Maadi Muhammad Al Madhab

This study aims to identify the reality of the organizational culture in the General Directorate of Public Security and its relationship to the job satisfaction of civil employees working in this directorate, in order to gain a deeper understanding of the role of the organizational culture prevailing in security organizations in influencing the level of job satisfaction of the civil employees working in them, and those who are not subject to the military service regulations Rather, they work according to the civil service system, with the aim of reaching recommendations that contribute to achieving job satisfaction for those employees so that they contribute to raising the efficiency and effectiveness of security organizations. The descriptive-survey approach was used as a methodology to conduct this study, and the questionnaire was used as a tool for the study, as the study was applied to a sample of civil employees in the General Directorate in Riyadh, whose number reached (120), and a number of results were reached, the most important of which are (low level of job satisfaction among employees Civilians working in public security, and the existence of a direct statistically significant relationship at the level (0.01) between organizational culture and job satisfaction of civil employees working in security sectors). The study recommended the necessity to reconsider granting civil servants working in the security sectors salaries, incentives and allowances commensurate with their duties, and that is comparable to what is granted to their fellow military personnel who carry out the same tasks, which contributes to increasing the level of their loyalty and affiliation with the security sectors in which they work. Developing the career path for civil employees working in the security sectors, in line with their job capabilities, educational levels and job grades, as well as working to increase the awareness of leaders in the security sectors of the importance of organizational culture in creating a positive organizational climate that encourages creativity and productivity and enhances levels of loyalty, belonging and organizational commitment and increases of the motivation of the employees.


2021 ◽  
Vol 17 (1) ◽  
pp. 118-127
Author(s):  
Robert Călinoiu ◽  
Dănuț Chiriac

Globalization and technological developments brought to societies huge benefits, but also new security challenges. State or private entities, having access to new, advanced technologies, and benefiting of the rapid and free movement, developed methods and strategies to harm their perceived enemies. National security, considered alone or in conjunction with those of the allied states or within the security organizations is challenged lately by hostile acts performed by various entities, aimed at weakening societies, value systems, beliefs or even the simply well-being of the citizens. Intelligence services, as part of the national / organizational security systems are called to discover, perform early warning, monitor, and counter such aggressive actions, even if a clearly attribution of the perpetrator is difficult. Our endeavour is to draw a picture of the current preoccupations in the field, presenting also three cases where the uncertainty of the transgressors has been eliminated without any shadow of doubt.


2021 ◽  
Vol 17 (1) ◽  
pp. 153-158
Author(s):  
Dragoș-Mihai Păunescu

Last two decades technological advances in artificial intelligence, autonomous systems, telecommunications or space assets, brought new threats for the international security and have fundamentally changed the nature of warfare. Coercive cyber aggressions between opponents have enough potential to affect the digital economy and national security services without escalate into traditional conflicts. Cyber threats to Western security organizations are becoming more frequent, complex, and destructive. NATO’s strategic competitors such as Russia and China seek to shape cyberspace through state action in order to gain an asymmetric military advantage. By adapting its posture in the cyber domain, refining doctrine and developing new capabilities, NATO aims to deter cyber aggressions against its interest and to coordinate better the defense of its member states.


Author(s):  
V. I. Zubkov

The article is devoted to the problem of professional selection of personnel in private security organizations. This problem is relevant, since a significant (and even excessive) number of employees are engaged in security activities in the Russian economy, and their professionalism is a subject of discussion both among managers and personnel officers, and among ordinary people. The article briefly examines the system of professional selection and substantiates the stages of the research carried out by the author in accordance with the order of one of the security fiLms management, which provides physical protection of sensitive facilities. The article briefly examines the system of professional selection and substantiates the stages of the research carried out by the author in accordance with the order of the management of one of the security firms, which provides physical protection of sensitive facilities. An expert-stating method of constructing a psychogram is described. It provides for: expert assessment of personnel to determine successful and unsuccessful employees; selection of methods and techniques of psychodiagnostics and testing of successful and unsuccessful employees; identification of statistically significant differences in test results between successful and unsuccessful employees and determination of professionally important qualities. Difficulties and limitations in the implementation of these research procedures are analyzed in detail. As a result of the study, a psychological portrait of a successful security guard is presented, carrying out physical protection of sensitive objects. This portrait includes a general description of the factors of success, as well as a description of specific professionally important qualities.


2021 ◽  
Vol 17 (4) ◽  
pp. 40-62
Author(s):  
Mohammed Saeed A Alqahtani ◽  
Eila Erfani

IT infrastructure and systems are made up of technical and social systems that work together to ensure that organization's goals and objectives are met. Security controls and measures are developed and used to protect an organization's data and information systems. To improve cyber security, organizations focus most of their efforts on incorporating new technological approaches in products and processes, leaving out the most important and vulnerable factor. So this study intends to provide some practical implications to the technology developers and policymakers while identifying the factors that affect cyber security compliance in an organization or home environment for general users, HR, IT administrators, engineers, and others. It explored the Unified Theory of Acceptance and Use of Technology 2 (UTAUT2) model and assessed the effect of its factors on cyber security compliance in organizations.


Author(s):  
Ravi Kiran Mallidi ◽  
Manmohan Sharma ◽  
Jagjit Singh

Legacy Digital Transformation is modernizing or migrating systems from non-digital or older digital technology to newer digital technologies. Digitalization is essential for information reading, processing, transforming, and storing. Social media, Cloud, and analytics are the major technologies in today's digital world. Digitalization (business process) and Digital Transformation (the effect) are the core elements of newer global policies and processes. Recent COVID pandemic situation, Organizations are willing to digitalize their environment without losing business. Digital technologies help to improve their capabilities to transform processes that intern promote new business models. Applications cannot remain static and should modernize to meet the evolving business and technology needs. Business needs time to market, Agility, and reduce technical debt. Technology needs consist of APIs, better Security, Portability, Scalability, Cloud support, Deployment, Automation, and Integration. This paper elaborates different transformation/modernization approaches for Legacy systems written in very long or End of Life (EOL) systems to newer digital technologies to serve the business needs. EOL impacts application production, supportability, compliance, and security. Organizations spend money and resources on Digital Transformation for considering Investment versus Return on Investment, Agility of the System, and improved business processes. Migration and Modernization are critical for any Legacy Digital Transformation. Management takes decisions to proceed with Digital Transformation for considering Total Cost Ownership (TCO) and Return on Investment (ROI) of the program. The paper also includes a TCO-ROI calculator for Transformation from Legacy / Monolithic to new architectures like Microservices.


2021 ◽  
Vol 27 (2) ◽  
pp. 1-28
Author(s):  
د. محمود عبد المجيد عساف ◽  
د. علاء محمد الغماري

This study aimed to identify the assessment degree of a sample of media and security people regarding the role of the community protection project in Palestine, which is being implemented by the National Commission forStrengthening Values and Behaviors in the community, in relation to some variables (gender, work type and years of experience). The study also attempted to propose a set of recommendations that might contribute to activating the role of community protection. To achieve this, the descriptive analytical method was followed and a questionnaire of 31 items was used to collect data from a sample of 118 participants. The study findingsrevealed that the degree assessment of the role of community protection in supporting home front requirements was high at a relative weight of (81%).The first dimension (communication with the occupying forces) received the highest degree, whereas (building national affiliation) received the lowest degree. There were no statistically significant differences (<0.05) among theparticipants attributed to years of experience and gender. On the other hand, there were differences attributed to work type in favor of security people. The study stressed the need to support security organizations in their pursuit to raise security awareness by encouraging the culture of media and security climate that supports home front. It was also recommended that project activities should be well-planned and all requirements should be made available to make the project sustainable.


Sign in / Sign up

Export Citation Format

Share Document