As the significant concerns of security have shifted, there has always been a fundamental reconsideration of the framework of state security. As stated by Ullman (1983), threat to national security is an issue that threatens to disgrace the quality of life as well as significantly threatens to narrow the range of policy choices that are available. Sachs (2003) took a similar line of thought when he commented that a threat to national security may be earthquakes, wars or floods whether deliberately or not deliberately inflicted by an internal or external agent Brauch (2011) argued that the concept of security can be derived to mean insurance from eminent risks.
From the perspective of security as prevention of threats to technical and social uncertainties, it is clear that security does not depict conditions free of dangers. Rather, an insurance against risks. Given the shift of focus from protection against underlying dangers towards insurance within the context of intangible risks, security has become a general societal idea of value (Brauch, 2011) Security denotes what individuals or institutions make it what it is to be. Brauch (2011) argued that security determine the absence of threats to certain values in abstract sense.
To this end, Brauch (2011) pointed out that from the perspective of social constructivist, security is interpreted as an outcome of processes of political and social interaction, where social norms and values or cultural identities are important. Basing on this perspective, security is regarded as being inter-subjective or denoting what actors make it to be. Security can also be defined within the concept of computer security. In this sense, security is derived to mean protection of or prevention against threats of unauthorised access to information or alteration or destruction of information.
This can further be restated to imply that security is the ability of the system to protect information resources and computer system with respect to integrity and confidentiality. The underlying concept in this regards is that computer security aims to sustain confidentiality, integrity and authentication. Littlewood and Strigini (n.d.) pointed out that security in Information Technology consists of several attributes, including availability and confidence, and defence against multiple threats such as accidental faults.
Similar to other fields of dependability, diverse security attributes can create conflicting demands on designers or web developers (Kay 2004). A newer concept is “home security, which has been observed to denote the need of safety of individuals in the areas of basic needs – such as having access to protection from violence or domestic partners, clean water and food, economic exploitation and energy and environmental security. While such a concept may be essential for indicating a range of human needs that need to be satisfied, it still does not appeal to the traditional perceptions of security (Sperling, 1995).
In any case, this shows a shift on what security denotes, as it is not restricted to the use of physical violence, as it also included the political and economic aspects that relate to use of some form of force or threatening peaceful human existence. Shared dimensions From the analysis, it is clear that the different concepts of security share the aspects of protecting valuables, such as food, homes and property, countries, people, information technology and health, from threats or fears. The valuables are associated with the wellbeing or peace of mind of human existence.
This evidences that although security is defined in various ways, it has always aimed to depict the threats and fears that threaten human existence and co-existence within the ecosystem. Clearly, protection from threats and fears are the underlying meanings in the multi-dimensional concepts of security. Achieving Security Theoretically From the social constructivist perspective, security can be attained once the perceived fears of security, risks, vulnerabilities, threats and challenges are mitigated and overcome (Jichen et al., n.d.).
Read More