Search

Search Constraints

Begin New Search You searched for: Topic Security Remove constraint Topic: Security Political Geography Global Focus Remove constraint Political Geography: Global Focus Content Type Journal Article Remove constraint Content Type: Journal Article

Search Results

1. Navigating R2P Between Norm and Practice

2. The East Mediterranean Gas Forum: Convergence of Regional and Energy Security Concerns

3. Las políticas de seguridad y defensa como valor público y bien común

4. Derecho humano a la seguridad:Prevención del Extremismo Violentocon Vasili Grossman

5. Seguridad y defensa,de bienes públicos puros aun enfoquede bienes comunes

6. Grayzone Aggression: The Need for Deterrence by Denia

7. Outer Space, Information Warfare, and the Truth

8. Cyber-Nuclear Weapons: Impact on the Modern Warfare Landscape

9. PART I: The Singleton Paradox On the Future of Human-Machine Teaming and Potential Disruption of War Itself

10. Leadership in police work applied to critical contexts: An integrative review and scientific mapping using VOSviewer and Google Trends tools

11. Environmental Security in the Anthropocene

12. Desradicalizacióny desvinculación:aspectos formales y teóricos

13. Anxiety, Ambivalence and Sublimation: ontological in/security and the world risk society

14. Selected Problems of Security Control in Civil Aviation Based on Own Empirical Research

15. The Role of Material Stocks in the National Security System

16. PLAN E: A Grand Strategy for the Twenty-first Century Era of Entangled Security and Hyperthreats

17. Proposed method for building an anti-drone system for the protection of facilities important for state security

18. Intelligent terrorism as a security threat to critical infrastructure

19. Preparing critical infrastructure for the future: Lessons learnt from the Covid-19 pandemic

20. Abstraction-decomposition space for critical infrastructure systems: A framework for infrastructure planning and resilience policies

21. High power wireless power transfer for the future of the battlefield challenges

22. Unmanned Aerial Vehicle - a Lethal Weapon of Tomorrow for Terrorists

23. Introducción a “Recursos desiguales: retos de la seguridad en la encrucijada de la sostenibilidad”

24. De la Agenda para la Paz a Nuestra Agenda Común: la “sostenibilidad” de la paz

25. Cybersecurity Politics – Conceptualization of the Idea

26. Mass Migration as a Hybrid Threat? – A Legal Perspective

27. Public Security and Public Order – Conceptual and Institutional Scope

28. Cybercrime on the Example of Selected Botnets

29. Multilateralism and the Superpower

30. Research Perspectives and Boundaries of Thought: Security, Peace, Conflict, and the Anthropocene

31. An Introduction to ‘Peace, Conflicts and Security in the Anthropocene: Ruptures and Limits’

32. Climate-Migration: A Security Analysis within the Context of Green Theory

33. "Is the Internet Trying to Kill Us?" And other Technology Security Unknowns In the New Roaring Twenties

34. The Climate-Security Century: Three Climate Hotspots

35. Pandemic Preparedness: A Conversation with Dr. Jennifer Nuzzo (Interviewed by Dana Hatic)

36. Post-Covid Security Landscape: A Conversation with Raffaelo Pantucci

37. Grievance in Space and Time: The State, Militias, and the Irredentist Temptation

38. Journal of Advanced Military Studies: Political Warfare and Propaganda

39. Intrastate cultural and socio-political influences and the realisation of national security: A two-level correlational analysis

40. Modelling computer networks for further security research

41. Paving the way to the Security Council: NGOs’ activism on women’s and children’s issues

42. The Enduring Relevance of Naval Power: Reflections on Defence, Security and Power Projection of Sea Frontier

43. Prioritization of Multilaterialsm Agreements on Export Control of Defense Products and Sensitive Technologies by Hierarchical Analysis Process

44. Security Studies in International Relations: Evolution, Approaches and Contemporary Challenges

45. Who Feels Climate Anxiety?

46. Securitising Covid-19? The Politics of Global Health and the Limits of the Copenhagen School

47. Naming Terror: Impact of Proscription on Negotiations with Non-State Armed Groups

48. Counter Terrorist Trends and Analyses (CTTA) – Volume 12 Issue 03: COVID-19 and Terrorism

49. The Influence of Diplomacy on Controversies: A Comparative Study Between Diplomatic Mediation and Armed Conflict

50. Space Defense in Europe. Policy and Security Aspects

51. Entre políticos y criminales: corrupción política en Colombia 2013-2018 (Between Politicians and Criminals: Political Corruption in Colombia 2013-2018)

52. Cybersecurity: State Attack and Response Strategies

53. Secure Communities A Conversation with Carrie Conway

54. The New Institutionalism: A tool for analysing defence and security institutions

55. Assessment of the effectiveness of the security features of personal wireless networks

56. Testing the efficiency of laser technology to destroy the rogue drones

57. Countering terrorism in the shadows: The role of private security and military companies

58. Compulsory military service as a social integrator

59. The future of energy security of states

60. Coronavirus and the Future of Globalization

61. Migrations and Security. The Problematic Circularity ‘Philosophy, Law and Politics’

62. No Such Thing as a Perfect Partner: The Challenges of “By, With, and Through”

63. Elite Incentives and Power Dynamics in Fragile States

64. Critical infrastructure in the shaping of national security

65. Components of defence strategies in society’s information environment: a case study based on the grounded theory

66. Near-Earth Objects (NEO) and other current space threats

67. World Oil Security on a Precipice

68. Re-thinking Biological Arms Control for the 21st Century

69. Technology and Tensions in the Global Commons

70. How Much Does a “Privacy” Weigh?

71. A Healthier Way for the Security Community to Partner with Tech Companies

72. Nuclear Weapons with 21st Century Technology: A Conversation with John Borrie

73. Differences between Third World Security Approaches and Postcolonial Security Approaches: State, Culture and Modernity

74. Rethinking International Security: Feminist Critiques in International Relations

75. Manufacturers and Security Providers: A Conceptual Essay

76. The Influence of strategic culture on shaping security policy

77. The impact of crime on security in tourism

78. Modern aspects of the development of security in air transport under the conditions of air terrorism

79. Combating destabilising forces in modern operations. Research report

80. Preparing for future security challenges with practitioner research

81. “Autonomisation” of security and defence systems

82. Climate Change: Conflict and Cooperation (Full Issue)

83. The Thirty Years Climate Warning: Climate Change, Security, and the Responsibility to Prepare

84. Threat Multiplier: The Growing Security Implications of Climate Change: A Conversation with Sherri Goodman

85. From Energy to Climate Security: The EU’s Evolving Views

86. Human Trafficking and Climate Change: Understanding the Disastrous Relationship

87. Navy Classification: Proposal for a Comparative Methodology

88. Killing Norms Softly: US Targeted Killing, Quasi-secrecy and the Assassination Ban

89. Defence infrastructure - an attempt at identification

90. Unmanned Aerial Vehicles in the protection of the elements of a country’s critical infrastructure – selected directions of development

91. Students’ opinions about the subject of Security Education in upper secondary schools

92. Strengthening defence research as part of higher military education for future security challenges

93. The subjective dimension of Security Education

94. Security Education in dangerous times

95. The threat of cyber attacks in urban conurbations

96. Defence diplomacy – an important tool for the implementation of foreign policy and security of the state

97. Open source intelligence (OSINT) as an element of military recon

98. Below the Threshold: Gray Warfare and the Erosion of U.S. Influence: A Conversation with Hal Brands

99. Is it Possible to Ensure Development without Security and Security without Development? Transformation of Security-Development Relationship and its Conceptualization with Different Approaches

100. Toward Practical Cyber Counter Deception