Search

Search Constraints

Begin New Search You searched for: Topic Security Remove constraint Topic: Security Political Geography Global Focus Remove constraint Political Geography: Global Focus Content Type Journal Article Remove constraint Content Type: Journal Article Publication Year within 10 Years Remove constraint Publication Year: within 10 Years

Search Results

1. Navigating R2P Between Norm and Practice

2. The East Mediterranean Gas Forum: Convergence of Regional and Energy Security Concerns

3. Las políticas de seguridad y defensa como valor público y bien común

4. Derecho humano a la seguridad:Prevención del Extremismo Violentocon Vasili Grossman

5. Seguridad y defensa,de bienes públicos puros aun enfoquede bienes comunes

6. Grayzone Aggression: The Need for Deterrence by Denia

7. Outer Space, Information Warfare, and the Truth

8. Cyber-Nuclear Weapons: Impact on the Modern Warfare Landscape

9. PART I: The Singleton Paradox On the Future of Human-Machine Teaming and Potential Disruption of War Itself

10. Leadership in police work applied to critical contexts: An integrative review and scientific mapping using VOSviewer and Google Trends tools

11. Introducción a “Recursos desiguales: retos de la seguridad en la encrucijada de la sostenibilidad”

12. De la Agenda para la Paz a Nuestra Agenda Común: la “sostenibilidad” de la paz

13. Unmanned Aerial Vehicle - a Lethal Weapon of Tomorrow for Terrorists

14. Anxiety, Ambivalence and Sublimation: ontological in/security and the world risk society

15. Environmental Security in the Anthropocene

16. Desradicalizacióny desvinculación:aspectos formales y teóricos

17. Selected Problems of Security Control in Civil Aviation Based on Own Empirical Research

18. The Role of Material Stocks in the National Security System

19. PLAN E: A Grand Strategy for the Twenty-first Century Era of Entangled Security and Hyperthreats

20. Proposed method for building an anti-drone system for the protection of facilities important for state security

21. Intelligent terrorism as a security threat to critical infrastructure

22. Preparing critical infrastructure for the future: Lessons learnt from the Covid-19 pandemic

23. Abstraction-decomposition space for critical infrastructure systems: A framework for infrastructure planning and resilience policies

24. High power wireless power transfer for the future of the battlefield challenges

25. Climate-Migration: A Security Analysis within the Context of Green Theory

26. "Is the Internet Trying to Kill Us?" And other Technology Security Unknowns In the New Roaring Twenties

27. The Climate-Security Century: Three Climate Hotspots

28. Pandemic Preparedness: A Conversation with Dr. Jennifer Nuzzo (Interviewed by Dana Hatic)

29. Post-Covid Security Landscape: A Conversation with Raffaelo Pantucci

30. Grievance in Space and Time: The State, Militias, and the Irredentist Temptation

31. Journal of Advanced Military Studies: Political Warfare and Propaganda

32. Intrastate cultural and socio-political influences and the realisation of national security: A two-level correlational analysis

33. Modelling computer networks for further security research

34. Paving the way to the Security Council: NGOs’ activism on women’s and children’s issues

35. The Enduring Relevance of Naval Power: Reflections on Defence, Security and Power Projection of Sea Frontier

36. Prioritization of Multilaterialsm Agreements on Export Control of Defense Products and Sensitive Technologies by Hierarchical Analysis Process

37. Security Studies in International Relations: Evolution, Approaches and Contemporary Challenges

38. Who Feels Climate Anxiety?

39. Cybersecurity Politics – Conceptualization of the Idea

40. Mass Migration as a Hybrid Threat? – A Legal Perspective

41. Public Security and Public Order – Conceptual and Institutional Scope

42. Cybercrime on the Example of Selected Botnets

43. Multilateralism and the Superpower

44. Research Perspectives and Boundaries of Thought: Security, Peace, Conflict, and the Anthropocene

45. An Introduction to ‘Peace, Conflicts and Security in the Anthropocene: Ruptures and Limits’

46. Securitising Covid-19? The Politics of Global Health and the Limits of the Copenhagen School

47. Naming Terror: Impact of Proscription on Negotiations with Non-State Armed Groups

48. The Influence of Diplomacy on Controversies: A Comparative Study Between Diplomatic Mediation and Armed Conflict

49. Counter Terrorist Trends and Analyses (CTTA) – Volume 12 Issue 03: COVID-19 and Terrorism

50. Cybersecurity: State Attack and Response Strategies

51. Secure Communities A Conversation with Carrie Conway

52. The New Institutionalism: A tool for analysing defence and security institutions

53. Assessment of the effectiveness of the security features of personal wireless networks

54. Testing the efficiency of laser technology to destroy the rogue drones

55. Countering terrorism in the shadows: The role of private security and military companies

56. Compulsory military service as a social integrator

57. The future of energy security of states

58. Coronavirus and the Future of Globalization

59. Migrations and Security. The Problematic Circularity ‘Philosophy, Law and Politics’

60. No Such Thing as a Perfect Partner: The Challenges of “By, With, and Through”

61. Elite Incentives and Power Dynamics in Fragile States

62. World Oil Security on a Precipice

63. Space Defense in Europe. Policy and Security Aspects

64. Entre políticos y criminales: corrupción política en Colombia 2013-2018 (Between Politicians and Criminals: Political Corruption in Colombia 2013-2018)

65. Critical infrastructure in the shaping of national security

66. Components of defence strategies in society’s information environment: a case study based on the grounded theory

67. Near-Earth Objects (NEO) and other current space threats

68. Re-thinking Biological Arms Control for the 21st Century

69. Technology and Tensions in the Global Commons

70. How Much Does a “Privacy” Weigh?

71. A Healthier Way for the Security Community to Partner with Tech Companies

72. Nuclear Weapons with 21st Century Technology: A Conversation with John Borrie

73. Differences between Third World Security Approaches and Postcolonial Security Approaches: State, Culture and Modernity

74. Rethinking International Security: Feminist Critiques in International Relations

75. Manufacturers and Security Providers: A Conceptual Essay

76. The Influence of strategic culture on shaping security policy

77. The impact of crime on security in tourism

78. Modern aspects of the development of security in air transport under the conditions of air terrorism

79. Combating destabilising forces in modern operations. Research report

80. Preparing for future security challenges with practitioner research

81. “Autonomisation” of security and defence systems

82. Climate Change: Conflict and Cooperation (Full Issue)

83. The Thirty Years Climate Warning: Climate Change, Security, and the Responsibility to Prepare

84. Threat Multiplier: The Growing Security Implications of Climate Change: A Conversation with Sherri Goodman

85. From Energy to Climate Security: The EU’s Evolving Views

86. Human Trafficking and Climate Change: Understanding the Disastrous Relationship

87. Navy Classification: Proposal for a Comparative Methodology

88. Killing Norms Softly: US Targeted Killing, Quasi-secrecy and the Assassination Ban

89. Defence infrastructure - an attempt at identification

90. Unmanned Aerial Vehicles in the protection of the elements of a country’s critical infrastructure – selected directions of development

91. Students’ opinions about the subject of Security Education in upper secondary schools

92. Strengthening defence research as part of higher military education for future security challenges

93. The subjective dimension of Security Education

94. Security Education in dangerous times

95. The threat of cyber attacks in urban conurbations

96. Defence diplomacy – an important tool for the implementation of foreign policy and security of the state

97. Open source intelligence (OSINT) as an element of military recon

98. Below the Threshold: Gray Warfare and the Erosion of U.S. Influence: A Conversation with Hal Brands

99. Is it Possible to Ensure Development without Security and Security without Development? Transformation of Security-Development Relationship and its Conceptualization with Different Approaches

100. Toward Practical Cyber Counter Deception