In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to sub...In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to subdue inflation,despite their already high levels of debt;the bulk commodities market is experiencing volatility,leading to global turbulence and change;trade protectionism is at the forefront of major-power rivalry in political and economic spheres;and regional security crises are compounding international tensions.Behind those flashpoints are contradictions that obstruct world peace and progress,including development imbalances,governance gaps,and structural tensions in global security.In the face of uncertainties,it is crucial for China to seize strategic opportunities and transform crises into favorable situations.China has launched the Global Development Initiative(GDI)and the Global Security Initiative(GSI)to contribute to global prosperity and security.The two initiatives demonstrate China’s commitment to addressing global deficits in peace,development,security,and governance.展开更多
With the rapid development of lnternet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy...With the rapid development of lnternet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy has become a hot issue. One of the most popular research fields for solving the data security and data privacy is within the scope of big data governance and security, In this paper, we introduce the basic concepts of data governance and security. Then, all the state-of-the-art open source frameworks for data governance and security, including Apache Falcon, Apache Atlas, Apache Ranger, Apache Sentry and Kerberos, are detailed and discussed with descriptions of their implementation principles and possible applications.展开更多
After the Cold War ended, former traditional security threats withered while non-traditional ones sprouted. More recently as both traditional and non-traditional security threats bloom, concern spreads over whether in...After the Cold War ended, former traditional security threats withered while non-traditional ones sprouted. More recently as both traditional and non-traditional security threats bloom, concern spreads over whether international security governance can be effective. Worse still, major Western countries' zeal for global governance has cooled,while they turn from being advocates of global governance to obstacles,making the future dimmer.展开更多
The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republi...The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald展开更多
To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussio...To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection.展开更多
We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In...We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system.展开更多
Science and policy have been interlinked for decades and perform essential nexus conditions in the governing aspects of environmental scenarios.This review paper examines the present challenges in the science–policy ...Science and policy have been interlinked for decades and perform essential nexus conditions in the governing aspects of environmental scenarios.This review paper examines the present challenges in the science–policy interface in terms of water governance in the Caspian Sea and identifies effective conditions that may be used in the current context to enhance the mechanism.The evaluation of the science–policy link in the water policy of the Caspian Sea reveals a gap between knowledge producer and governance system,impeding the translation of scientific information into action.Complicated and context-dependent solutions make it challenging to establish effective science–policy processes in the Caspian Sea water governance settings.Establishing a common governing authority,implementing water and resource management regulations,and protecting the natural environment through legal frameworks are crucial steps to address these concerns and ensure sustainable development.Collaboration among coastal states is essential in environmental,economic,and social aspects of regional development.However,the lack of a comprehensive approach,coherent activities,and effective utilization of national and regional power has hindered efforts to halt the environmental degradation of the Caspian Sea.Local governments need to recognize their responsibility to protect and utilize the Caspian Sea for present and future generations,considering both environmental and human security.The interlinkage of the Caspian Sea water governance with the Organization for Economic Co-operation and Development(OECD)water governance principles offers a framework for policymakers to assess gaps and make necessary amendments to existing mechanisms.Effective science–policy interaction,engagement of diverse stakeholders,institutionalizing agreements,and addressing collective action issues are critical for successful water governance.展开更多
With the development of economy and the progress of society,people’s living standards are gradually improving,and the requirements for housing are also gradually improving.The development of the real estate industry ...With the development of economy and the progress of society,people’s living standards are gradually improving,and the requirements for housing are also gradually improving.The development of the real estate industry provides conditions for people’s modern life,and its development meets the needs of China’s socialist development.In such a social background,the future planning of the real estate industry is gradually clear,promoting the steady rise of the real estate economy,which is an important development prospect of the current real estate industry.In this paper,through the analysis of real estate economic security and government control,aiming at the existing problems,put forward some effective measures to promote the advantages of real estate development and the combination of government macro-control to stabilize the healthy development of the real estate industry.展开更多
Land tenure security is pertinent to achieving the sustainable development agenda in cities where land is needed and useful for development purposes.Sufficient empirical research has been done to prove the importance ...Land tenure security is pertinent to achieving the sustainable development agenda in cities where land is needed and useful for development purposes.Sufficient empirical research has been done to prove the importance of tenure security for investment,resilience,conservation,food security,as well as health and well-being,but it has not been clarified if and how land tenure security could adequately influence place loyalty and satisfaction with the residential environment,as it is clear that place loyalty and satisfaction are pertinent to inclusive development.Using the case of Ibadan City,the study examined how different dimensions of tenure security could determine residents’place loyalty and satisfaction.The study employed a survey cross-sectional research design to distribute 514 structured questionnaires to household heads across 4 sampled peri-urban local government areas while 452 were retrieved for analysis.Hierarchical regression analysis model was employed to understand the association between tenure security dimensions and satisfaction(as model I)and loyalty(as model II).For model I,F=8.640,P=0.000,R=0.555,and R^(2)=0.308 were obtained;while for model II,F=9.157,P=0.001,R=0.415,and R^(2)=0.173 were acquired.This thus means that residents’place loyalty and satisfaction can partly be explained by tenure security.In particular,respondents with no eviction experience,recognized property rights,and invulnerable to eviction have higher odds of being satisfied and loyal.Therefore,we recommend protection,improvement,and upgrading of land tenure security as one of the means to promote place loyalty and satisfaction,which is essential to achieving inclusive and sustainable development.展开更多
Japan's economic security strategy has a long history.However,Japan has significantly accelerated its economic security strategy in recent years,especially since the Kishida government came into power.At present,J...Japan's economic security strategy has a long history.However,Japan has significantly accelerated its economic security strategy in recent years,especially since the Kishida government came into power.At present,Japan is gradually forming a comprehensive economic security strategy that has clear strategic objectives,sound institutional settings,enhanced economic control,and closer external cooperation.The Japanese government is accelerating its economic and security strategy because of the changing international environment and Japan's own strategic considerations.Japan hopes to achievemany strategic goals such as improved economy and security through its economic and security strategy,but its strategic effect needs to be verified due to the constraints of many factors.展开更多
The paper is devoted to the corporate governance intelligence system investigation as the part of the complex stakeholder-related approach to the corporate strategic intelligence system (CSIS). The special attention...The paper is devoted to the corporate governance intelligence system investigation as the part of the complex stakeholder-related approach to the corporate strategic intelligence system (CSIS). The special attention is given to the minority shareholders activism in the system of corporate governance. Some existing methods of abusing minority shareholders rights, made by joint-stock companies executives, are generalized. The recommendations for minority shareholder's rights protection are given. The necessity for the implementation of the stakeholders-oriented approach for the CSIS creation on the base of companies' security principles is substantiated.展开更多
The Russia–Ukraine crisis has hit hard the grain production and exports of both countries,weakening their positions on global food markets.Moreover,the crisis has resulted in a shortage of fertilizer supply and a sha...The Russia–Ukraine crisis has hit hard the grain production and exports of both countries,weakening their positions on global food markets.Moreover,the crisis has resulted in a shortage of fertilizer supply and a sharp increase in fertilizer prices.Consequently,global food production is declining,prices are hitting record highs,and market structures are shifting.Overall,global food insecurity is worsening,which,on top of several other factors,could become permanent as an aftermath of the Russia–Ukraine crisis.Therefore,food insecurity has become a topical issue in global governance.Spiking food prices and the ensuing political turbulence in vulnerable countries have altered the balance of strength between developed and developing countries,aggravating the existing imbalance between them.Furthermore,major food-producing countries are using food as a weapon to increase their influence in a fresh round of strategic competition,adding more uncertainties to the once-in-a-century changes shaping the world today.展开更多
The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The i...The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures.展开更多
Security in international relations has been at a crossroads,especially after the end of the Cold War.National security has not been the only framework of security;human security has also occupied an important positio...Security in international relations has been at a crossroads,especially after the end of the Cold War.National security has not been the only framework of security;human security has also occupied an important position.This“paradigm shift”of security occurred due to changes in the global security environment,such as the emergence of insecurity caused by poverty and ethnic conflict.It is obvious that national security based on a sovereign state and military forces are not enough to prevent war-fighting or to resolve its basic causes,so human security has attracted considerable attention,which complements national security.Human security needs the protection of communities in which people can find their identities and lead a peaceful life.For example,in Europe,a French riot by immigrant young people in 2005 indicated a lack of human security,where the shortage of protection of communities of immigrants under politics by the French government made the situation very serious.We present a new framework,“cultural security”,which complements human security in that the former protects communities based on each culture.It is ideal that all three dimensions of security work well as,if national security lacks,it may cause civil war or a failed state;if human security(in the narrow sense,focused on only individuals)lacks,it may lead to reinforced authoritarianism or a despotic regime;and if cultural security lacks,a civic nation would be developed but social life may be instable.展开更多
基金supported by the key project of the National Social Science Fund of China(NSSFC):“Study on China-Russia Strategic Partnership for the New Era”(Grant No.20AGJ012).
文摘In the post-pandemic era,the global economic and security landscapes are fraught with complexities and uncertainties.Among them,four risk flashpoints merit attention:Certain countries are raising interest rates to subdue inflation,despite their already high levels of debt;the bulk commodities market is experiencing volatility,leading to global turbulence and change;trade protectionism is at the forefront of major-power rivalry in political and economic spheres;and regional security crises are compounding international tensions.Behind those flashpoints are contradictions that obstruct world peace and progress,including development imbalances,governance gaps,and structural tensions in global security.In the face of uncertainties,it is crucial for China to seize strategic opportunities and transform crises into favorable situations.China has launched the Global Development Initiative(GDI)and the Global Security Initiative(GSI)to contribute to global prosperity and security.The two initiatives demonstrate China’s commitment to addressing global deficits in peace,development,security,and governance.
文摘With the rapid development of lnternet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy has become a hot issue. One of the most popular research fields for solving the data security and data privacy is within the scope of big data governance and security, In this paper, we introduce the basic concepts of data governance and security. Then, all the state-of-the-art open source frameworks for data governance and security, including Apache Falcon, Apache Atlas, Apache Ranger, Apache Sentry and Kerberos, are detailed and discussed with descriptions of their implementation principles and possible applications.
文摘After the Cold War ended, former traditional security threats withered while non-traditional ones sprouted. More recently as both traditional and non-traditional security threats bloom, concern spreads over whether international security governance can be effective. Worse still, major Western countries' zeal for global governance has cooled,while they turn from being advocates of global governance to obstacles,making the future dimmer.
文摘The US Asia-Pacific strategy is witnessing and will continue to witness new developments along with the evolution of its domestic politics as well as of the regional situation in Asia Pacific,particularly with Republican candidate Donald
基金the phased achievement of the major research project of the National Social Science Fund of China(Project Approval No.21VGQ010)supported by the 2021 Central University Basic Scientific Research Project of Lanzhou University(Project Approval No.21lzujbkyjd002).
文摘To cope with the challenges of CoViD-19,europe has adopted relevant measures of a data-based approach to governance,on which scholars have huge differences,and the related researches are conducive to further discussion on the differences.By sorting out the challenges posed by the pandemic to public security and data protection in europe,we can summarize the“european Solution”of the data-based approach to governance,including legislation,instruments,supervision,international cooperation,and continuity.The“Solution”has curbed the spread of the pandemic to a certain extent.However,due to the influence of the traditional values of the EU,the“Solution”is too idealistic in the balance between public security and data protection,which intensifies the dilemma and causes many problems,such as ambiguous legislation,inadequate effectiveness and security of instruments,an arduous endeavor in inter national cooperation,and imperfect regulations on digital green certificates.Therefore,in a major public health crisis,there is still a long way to go in exploring a balance between public security and data protection.
文摘We introduce the general AC( atlribure certificate), the role specificationAC and the rolt assignment AC We discuss the rolt-based PMI(Privilege Management Infrastructure)architecture. The role-based PMT(Public-Kty In-frastructure) secure model forE-govcrnment isresearehed by combining the role-bastd PMI with PKI architeclure (Public Key Infrastructure). Themodel has advantages of flexibility, convenience, less storage space and less network consumptionetc. We are going to ust iht secure modelin the E-govern-ment system.
基金supported by University of Galway,Galway,Ireland.
文摘Science and policy have been interlinked for decades and perform essential nexus conditions in the governing aspects of environmental scenarios.This review paper examines the present challenges in the science–policy interface in terms of water governance in the Caspian Sea and identifies effective conditions that may be used in the current context to enhance the mechanism.The evaluation of the science–policy link in the water policy of the Caspian Sea reveals a gap between knowledge producer and governance system,impeding the translation of scientific information into action.Complicated and context-dependent solutions make it challenging to establish effective science–policy processes in the Caspian Sea water governance settings.Establishing a common governing authority,implementing water and resource management regulations,and protecting the natural environment through legal frameworks are crucial steps to address these concerns and ensure sustainable development.Collaboration among coastal states is essential in environmental,economic,and social aspects of regional development.However,the lack of a comprehensive approach,coherent activities,and effective utilization of national and regional power has hindered efforts to halt the environmental degradation of the Caspian Sea.Local governments need to recognize their responsibility to protect and utilize the Caspian Sea for present and future generations,considering both environmental and human security.The interlinkage of the Caspian Sea water governance with the Organization for Economic Co-operation and Development(OECD)water governance principles offers a framework for policymakers to assess gaps and make necessary amendments to existing mechanisms.Effective science–policy interaction,engagement of diverse stakeholders,institutionalizing agreements,and addressing collective action issues are critical for successful water governance.
文摘With the development of economy and the progress of society,people’s living standards are gradually improving,and the requirements for housing are also gradually improving.The development of the real estate industry provides conditions for people’s modern life,and its development meets the needs of China’s socialist development.In such a social background,the future planning of the real estate industry is gradually clear,promoting the steady rise of the real estate economy,which is an important development prospect of the current real estate industry.In this paper,through the analysis of real estate economic security and government control,aiming at the existing problems,put forward some effective measures to promote the advantages of real estate development and the combination of government macro-control to stabilize the healthy development of the real estate industry.
基金financially supported by the Pan African University Research Grant of 2022 by the African Union。
文摘Land tenure security is pertinent to achieving the sustainable development agenda in cities where land is needed and useful for development purposes.Sufficient empirical research has been done to prove the importance of tenure security for investment,resilience,conservation,food security,as well as health and well-being,but it has not been clarified if and how land tenure security could adequately influence place loyalty and satisfaction with the residential environment,as it is clear that place loyalty and satisfaction are pertinent to inclusive development.Using the case of Ibadan City,the study examined how different dimensions of tenure security could determine residents’place loyalty and satisfaction.The study employed a survey cross-sectional research design to distribute 514 structured questionnaires to household heads across 4 sampled peri-urban local government areas while 452 were retrieved for analysis.Hierarchical regression analysis model was employed to understand the association between tenure security dimensions and satisfaction(as model I)and loyalty(as model II).For model I,F=8.640,P=0.000,R=0.555,and R^(2)=0.308 were obtained;while for model II,F=9.157,P=0.001,R=0.415,and R^(2)=0.173 were acquired.This thus means that residents’place loyalty and satisfaction can partly be explained by tenure security.In particular,respondents with no eviction experience,recognized property rights,and invulnerable to eviction have higher odds of being satisfied and loyal.Therefore,we recommend protection,improvement,and upgrading of land tenure security as one of the means to promote place loyalty and satisfaction,which is essential to achieving inclusive and sustainable development.
基金a phased achievement of the “Important Countries and Regions” Major Research Project of the National Social Science Foundation of China (Grant No. 20VGQ004)
文摘Japan's economic security strategy has a long history.However,Japan has significantly accelerated its economic security strategy in recent years,especially since the Kishida government came into power.At present,Japan is gradually forming a comprehensive economic security strategy that has clear strategic objectives,sound institutional settings,enhanced economic control,and closer external cooperation.The Japanese government is accelerating its economic and security strategy because of the changing international environment and Japan's own strategic considerations.Japan hopes to achievemany strategic goals such as improved economy and security through its economic and security strategy,but its strategic effect needs to be verified due to the constraints of many factors.
文摘The paper is devoted to the corporate governance intelligence system investigation as the part of the complex stakeholder-related approach to the corporate strategic intelligence system (CSIS). The special attention is given to the minority shareholders activism in the system of corporate governance. Some existing methods of abusing minority shareholders rights, made by joint-stock companies executives, are generalized. The recommendations for minority shareholder's rights protection are given. The necessity for the implementation of the stakeholders-oriented approach for the CSIS creation on the base of companies' security principles is substantiated.
文摘The Russia–Ukraine crisis has hit hard the grain production and exports of both countries,weakening their positions on global food markets.Moreover,the crisis has resulted in a shortage of fertilizer supply and a sharp increase in fertilizer prices.Consequently,global food production is declining,prices are hitting record highs,and market structures are shifting.Overall,global food insecurity is worsening,which,on top of several other factors,could become permanent as an aftermath of the Russia–Ukraine crisis.Therefore,food insecurity has become a topical issue in global governance.Spiking food prices and the ensuing political turbulence in vulnerable countries have altered the balance of strength between developed and developing countries,aggravating the existing imbalance between them.Furthermore,major food-producing countries are using food as a weapon to increase their influence in a fresh round of strategic competition,adding more uncertainties to the once-in-a-century changes shaping the world today.
文摘The purpose of this research is to investigate the decision-making process for cybersecurity investments in organizations through development and utilization of a digital cybersecurity risk management framework. The initial article, Optimum Spending on Cybersecurity Measures is published on Emerald Insight at: </span><a href="https://www.emerald.com/insight/1750-6166.htm"><span style="font-size:12px;font-family:Verdana;">https://www.emerald.com/insight/1750-6166.htm</span></a><span style="font-size:12px;font-family:Verdana;">, contains the detailed literature review, and the data results from Phase I and Phase II of this research </span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"> <span style="font-family:Verdana;font-size:12px;">REF _Ref61862658 \r \h</span> <span style="font-family:Verdana;font-size:12px;">\* MERGEFORMAT </span></span><span style="font-size:12px;font-family:Verdana;">[1]</span><span style="font-size:10pt;font-family:""></span><span times="" new="" roman","serif";"="" style="font-size: 10pt;"></span><span style="font-size:12px;font-family:Verdana;">. This article will highlight the research completed in the area of organizational decision-making on cybersecurity spend. In leveraging the review of additional studies, this research utilizes a regression framework and case study methodology to demonstrate that effective risk-based decisions are necessary when implementing cybersecurity controls. Through regression analysis, the effectiveness of current implemented cybersecurity measures in organizations </span><span style="font-size:12px;font-family:Verdana;">is</span><span style="font-size:12px;font-family:Verdana;"> explored when connecting a dependent variable with several independent variables. The focus of this article is on the strategic decisions made by organizations when implementing cybersecurity measures. This research belongs to the area of risk management, and various models within the field of 1) information security</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) strategic management</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 3) organizational decision-making to determine optimum spending on cybersecurity measures for risk taking organizations. This research resulted in the develop</span><span style="font-size:12px;font-family:Verdana;">ment</span><span style="font-size:10pt;font-family:""><span style="font-family:Verdana;font-size:12px;"> of a cyber risk investment model and a digital cybersecurity risk man</span><span style="font-family:Verdana;font-size:12px;">agement framework. Using a case study methodology, this model an</span><span style="font-family:Verdana;font-size:12px;">d framework w</span></span><span style="font-size:12px;font-family:Verdana;">ere</span><span style="font-size:12px;font-family:Verdana;"> leveraged to evaluate and implement cybersecurity measures. The case study methodology provides an in-depth view of a risk-taking organization’s risk mitigation strategy within the bounds of the educational environment focusing on five areas identified within a digital cyber risk model: 1) technology landscape and application portfolio</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) data centric focus</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) risk management practices</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) cost-benefit analysis for cybersecurity measures</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) strategic development. The outcome of this research provides greater insight into how an organization makes decisions when implementing cybersecurity controls. This research shows that most organizations are diligently implementing security measures to effectively monitor and detect cyber security attacks</span><span style="font-size:12px;font-family:Verdana;">,</span><span style="font-size:12px;font-family:Verdana;"> specifically showing that risk taking organizations implemented cybersecurity measures to meet compliance and audit obligations with an annual spend of $3.18 million. It also indicated that 23.6% of risk-taking organizations incurred more than 6 cybersecurity breaches with an average dollar loss of $3.5 million. In addition, the impact of a cybersecurity breach on risk taking organizations is as follows: 1) data loss</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 2) brand/reputational impact</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 3) financial loss fines</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> 4) increase oversight by regulators/internal audit</span><span style="font-size:12px;font-family:Verdana;">;</span><span style="font-size:12px;font-family:Verdana;"> and 5) customer/client impact. The implication this research has on practice is extensive, as it focuses on a broad range of areas to include risk, funding and type and impact of cyber security breaches encountered. The survey study clearly demonstrated the need to develop and utilize a digital cybersecurity risk management framework to integrate current industry frameworks within the risk management practice to include continuous compliance management. This type of framework would provide a balanced approach to managing the gap between a risk-taking organization and a risk averse organization when implementing cybersecurity measures.
文摘Security in international relations has been at a crossroads,especially after the end of the Cold War.National security has not been the only framework of security;human security has also occupied an important position.This“paradigm shift”of security occurred due to changes in the global security environment,such as the emergence of insecurity caused by poverty and ethnic conflict.It is obvious that national security based on a sovereign state and military forces are not enough to prevent war-fighting or to resolve its basic causes,so human security has attracted considerable attention,which complements national security.Human security needs the protection of communities in which people can find their identities and lead a peaceful life.For example,in Europe,a French riot by immigrant young people in 2005 indicated a lack of human security,where the shortage of protection of communities of immigrants under politics by the French government made the situation very serious.We present a new framework,“cultural security”,which complements human security in that the former protects communities based on each culture.It is ideal that all three dimensions of security work well as,if national security lacks,it may cause civil war or a failed state;if human security(in the narrow sense,focused on only individuals)lacks,it may lead to reinforced authoritarianism or a despotic regime;and if cultural security lacks,a civic nation would be developed but social life may be instable.