Search results for "Critical security studies"

showing 5 items of 5 documents

Introduction to Emerging Risks and Systemic Concerns in Information Security Research and Applications Minitrack

2013

Critical security studiesCloud computing securityKnowledge managementCertified Information Security Managerbusiness.industryStandard of Good PracticeInformation securityComputer securitycomputer.software_genreSecurity information and event managementInformation security managementSecurity managementBusinesscomputer2013 46th Hawaii International Conference on System Sciences
researchProduct

How “African” Is the African Peace and Security Architecture? Conceptual and Practical Constraints of Regional Security Cooperation in Africa

2012

ABSTRACT With the creation of the African Peace and Security Architecture in 2004, African states were aiming to assume the primary responsibility for peace and security on the continent and establish a structure to assemble the necessary financial and military means. However, despite the constant evocation of “African ownership,” it is non-African actors that call the tune and can define and drive African security. Based on a detailed juxtaposition of rhetoric and empirical evidence, this paper argues that significant conceptual and practical problems constrain the “Africanization” of African security and that it appears increasingly unlikely that the continent's states will be able to ach…

Critical security studiesPolitical economyPolitical sciencePolitical Science and International RelationsConflict resolutionInternational securityAfricanizationEnterprise information security architectureEmpirical evidenceSecurity studiesSafety ResearchPeacekeepingAfrican Security
researchProduct

IS Security Policy Violations

2012

Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory RCT-a prominent criminological theory not yet applied in IS-which explains, in terms of a utilitarian calculation, an individual's decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insig…

IS security policiesCritical security studiesStrategy and ManagementRational choice theoryIS security complianceCommitdeterrence theoryComputer Science ApplicationsTest (assessment)IS securityHuman-Computer InteractionEmpirical researchInformation security standardsrational choice theoryEconomicsIs securitySanctionsPositive economicsSocial psychologyJournal of Organizational and End User Computing
researchProduct

Securitizing images: The female body and the war in Afghanistan

2012

Referring to the recent ‘visual turn’ in Critical Security Studies, the aim of this article is threefold. First, by taking the concept of visual securitization one step further, we intend to theorize the image as an iconic act understood as an act of showing and seeing. This turn to the performativity of the visual directs our attention to the securitizing power of images. Second, this article addresses the methodological challenges of analysing images and introduces an iconological approach. Iconology enables the systematic interpretation of images as images by also taking their social embeddedness into account. In the third part of this article we apply this theoretical and methodologica…

Power (social and political)Critical security studiesAfghanSociology and Political ScienceEmbeddednessAestheticsInterpretation (philosophy)Political Science and International RelationsPerformativityIconologyHeadlineSociologySocial scienceEuropean Journal of International Relations
researchProduct

Beyond the notion of security community: What role for the African regional organizations in peace and security?

2005

African regional organizations' increasing activity in security policy is usually approached through the concept of ‘security community’, which can only partially clarify their difficult situation. A multi-level governance model is suggested as a more useful approach in a situation where economic cooperation is weak, member states' principles of governance diverge, and they themselves might be part of security problems. A security community is not a necessary condition for a regional organization to play a role in the field of security. Through new intra-regional and cross-level relationships with the international community and civil society, regional organizations can become important sec…

Regional organizationCritical security studiesNational securitybusiness.industryPolitical scienceGeography Planning and DevelopmentEconomic securityInternational securitySecurity communityPublic administrationSecurity studiesbusinessCorporate securityThe Round Table
researchProduct