11 resultados para Security Policy
em Aston University Research Archive
Resumo:
Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.
Resumo:
The protection of cyberspace has become one of the highest security priorities of governments worldwide. The EU is not an exception in this context, given its rapidly developing cyber security policy. Since the 1990s, we could observe the creation of three broad areas of policy interest: cyber-crime, critical information infrastructures and cyber-defence. One of the main trends transversal to these areas is the importance that the private sector has come to assume within them. In particular in the area of critical information infrastructure protection, the private sector is seen as a key stakeholder, given that it currently operates most infrastructures in this area. As a result of this operative capacity, the private sector has come to be understood as the expert in network and information systems security, whose knowledge is crucial for the regulation of the field. Adopting a Regulatory Capitalism framework, complemented by insights from Network Governance, we can identify the shifting role of the private sector in this field from one of a victim in need of protection in the first phase, to a commercial actor bearing responsibility for ensuring network resilience in the second, to an active policy shaper in the third, participating in the regulation of NIS by providing technical expertise. By drawing insights from the above-mentioned frameworks, we can better understand how private actors are involved in shaping regulatory responses, as well as why they have been incorporated into these regulatory networks.
Resumo:
The Politics of the New Germany takes a new approach to understanding politics in the post-unification Federal Republic. Assuming only elementary knowledge, it focuses on debates and issues in order to help students understand both the workings of Germany's key institutions and some of the key policy challenges facing German politicians. Written in a straightforward style by four experts, each of the chapters draws on a rich variety of real-world examples. Packed with boxed summaries of key points, a guide to further reading and a range of seminar questions for discussion at the end of each chapter, this book highlights both the challenges and opportunities facing policy-makers in such areas as foreign affairs, economic policy, immigration, identity politics and institutional reforms. The book also takes a bird's-eye view of the big debates that define German politics over time, regardless of which party happens to be in power. It pinpoints three key themes that have characterised German politics over the last sixty years; reconciliation, consensus and transformation. Table of Contents: Introduction 1. Germany and the Burden of History 2. Germany’s Post-War Development, 1945-1989 3. Towards German Unity? 4. A Blockaded System of Government? 5. The Party System and Electoral Behaviour: The Path to Stable Instability? 6. Economic Management: The End of the German Model? 7. Citizenship and Demographics: A Country of Immigration? 8. The Reform of the Welfare State? 9. Germany and the European Union: A European Germany or a German Europe? 10. Foreign and Security Policy: A New Role for the Twenty-First Century? 11. Conclusion
Resumo:
The role of the European Union in global politics has been of growing interest over the past decade. The EU is a key player in global institutions such as the World Trade Organization (WTO) and NATO. It continues to construct an emerging identity and project its values and interests throughout contemporary international relations. The capacity of the EU to both formulate and realise its goals, however, remains contested. Some scholars claim the EU’s `soft power’ attitude rivals that of the USA’s `hard power’ approach to international relations. Others view the EU as insufficiently able to produce a co-ordinated position to project upon global politics. Regardless of the position taken within this debate, the EU’s relationship with its external partners has an increasingly important impact upon economic, political and security concerns on an international level. Trade negotiations, military interventions, democracy promotion, international development and responses to the global economic crisis have all witnessed the EU playing a central role. This has seen the EU become both a major force in contemporary institutions of global governance and a template for supranational governance that might influence other attempts to construct regional and global institutions. This volume brings together a collection of leading EU scholars to provide a state-of-the-art overview covering these and other debates relating to the EU’s role in contemporary global governance. The Handbook is divided into four main sections: Part I: European studies and global governance – provides an overview and critical assessment of the leading theoretical approaches through which the EU’s role in global governance has been addressed within the literature. Part II: Institutions – examines the role played by the key EU institutions in pursuing a role for the EU in contemporary international relations. Part III: Policy and issue areas – explores developments within particular policy sectors, assessing the different impact that the EU has had in different issue areas, including foreign and security policy, environmental policy, common commercial policy, the Common Agricultural Policy, development policy, accession policy, the Neighbourhood Policy and conflict transformation. Part IV: The global multilevel governance complex and the EU – focuses on the relationship between the EU and the institutions, regions and countries with which it forms a global multilevel governance complex, including chapters on the EU’s relationship with the WTO, United Nations, East Asia, Africa and the USA.
Resumo:
Based on extensive quantitative and qualitative analyses of a corpus of American presidential speeches that includes all inaugural addresses and State of the Union messages from 1789 to 2008, as well as major foreign and security policy speeches after 1945, this research monograph analyzes the various forms and functions of intertextual references found in the discourse of American presidents. Working within an original, interdisciplinary theoretical framework established by theories of intertextuality, discourse analysis, and presidential studies, the book discusses five different types of presidential intertextuality, all of which contribute jointly to creating a set of carefully manipulated and politically powerful images of both the American nation and the American presidency. The book is intended for scholars and students in political and presidential studies, communications, American cultural studies, and linguistics, as well as anyone interested in the American presidency in general.
Resumo:
Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.
Resumo:
In recent years, the European Union has come to view cyber security, and in particular, cyber crime as one of the most relevant challenges to the completion of its Area of Freedom, Security and Justice. Given European societies’ increased reliance on borderless and decentralized information technologies, this sector of activity has been identified as an easy target for actors such as organised criminals, hacktivists or terrorist networks. Such analysis has been accompanied by EU calls to step up the fight against unlawful online activities, namely through increased cooperation among law enforcement authorities (both national and extra- communitarian), the approximation of legislations, and public- private partnerships. Although EU initiatives in this field have, so far, been characterized by a lack of interconnection and an integrated strategy, there has been, since the mid- 2000s, an attempt to develop a more cohesive and coordinated policy. An important part of this policy is connected to the activities of Europol, which have come to assume a central role in the coordination of intelligence gathering and analysis of cyber crime. The European Cybercrime Center (EC3), which will become operational within Europol in January 2013, is regarded, in particular, as a focal point of the EU’s fight against this phenomenon. Bearing this background in mind, the present article wishes to understand the role of Europol in the development of a European policy to counter the illegal use of the internet. The article proposes to reach this objective by analyzing, through the theoretical lenses of experimental governance, the evolution of this agency’s activities in the area of cyber crime and cyber security, its positioning as an expert in the field, and the consequences for the way this policy is currently developing and is expected to develop in the near future.
Resumo:
With automotive plants being closed in Australia and western Europe, this article reflects on the employment status of ex-MG Rover (MGR) workers following the closure of the Longbridge plant in 2005. In particular, it draws on Standing's typology of labour market insecurity and uses a mixed-methods approach including an analysis of a longitudinal survey of some 200 ex-MGR workers, and in-depth interviews with ex-workers and policy-makers. While the policy response to the closure saw significant successes in terms of the great majority of workers successfully adjusting into re-employment, and with positive findings in terms of re-training and education, the paper finds significant challenges in terms of security of employment, income, job quality and representation at work years after closure. In particular, the paper posits that the general lack of attention to employment security at the macrolevel effectively undermined elements of a positive policy response over the longer run. This in turn suggests longer-term policy measures are required to address aspects of precariousness at work.
Resumo:
This article examines how the governance of justice and internal security in Scotland could be affected by the outcome of the Scottish independence referendum in September 2014. The article argues that it is currently impossible to equate a specific result in the referendum with a given outcome for the governance of justice and internal security in Scotland. This is because of the complexities of the current arrangements in that policy area and the existence of several changes that presently affect them and are outside the control of the government and of the people of Scotland. This article also identifies an important paradox. In the policy domain of justice and internal security, a ‘no’ vote could, in a specific set of circumstances, actually lead to more changes than a victory of the ‘yes’ camp.
Resumo:
Despite being frequently misrepresented as outdated or old fashioned (IMechE, 2009, p1), engineering is increasingly called upon to deal with some of societies biggest challenges including those associated with climate, infrastructure and security. In order to meet such challenges there needs to be a supply of engineering talent able to turn its collective mind to what is required. Yet at a time when demands for engineers able to provide innovative solutions to contemporary problems is possibly at its highest, the profession is plagued by shortages and an inability to attract young people (DIUS, 2008; RAE 2008; NSF, 2009). Although the current situation appears critical, potential future shortages of engineers means that unless action is taken urgently, matters will get worse during the next 20 to 30 years. For higher education, the challenge is how to change young peoples perceptions of engineering in such a manner that it is seen as a worthwhile and rewarding career. This paper considers this challenge, looking in detail at why young people fail to view engineering positively. A theoretical framework outlining the various real-life barriers and drivers is proposed. A critical analysis of current policy and practice suggests that in order to promote engineering as a profession that young people want to enter, both pedagogic and policy grounded solutions need to be found. By bringing together pedagogy and policy within an engineering framework the paper adds to current debates in engineering education whilst providing a distinctive look at what seems to be a recurring problem. © 2009 Authors.