Results 21 to 30 of about 3,806,576 (332)

The Republic of Macedonia and Balkans during the refugee crisis [PDF]

open access: yesBezbednosni Dijalozi, 2017
At a time of mutual tolerance and shortening the procedures for free movement of people and maximum respect of human rights, we face the challenge of the refugee crisis, where contrary to the above, we must build a fence in order to protect the ...
Nikola Kiskoski
doaj   +1 more source

Contradictions of Collective Security Model: Modern Historiography on the Evolution of the Versailles System of International Relations in the 1930s

open access: yesVestnik MGIMO-Universiteta, 2022
The article attempts to find out the reasons for the failure of the collective security system in Europe, developed to counter German revisionism in the second half of the 1920s – early 1930s. Research literature tends to consider collective security not
A. A. Vershinin
doaj   +1 more source

The Dynamics of Nigeria’s Policy for Africa in the Post-Colonial Period [PDF]

open access: yesУченые записки Института Африки Российской академии наук, 2021
All heads of state of independent Nigeria have left their mark on the formation of national foreign policy, including the policy for Africa, and brought their vision to the development of this sphere, although the greatest contribution to the formation ...
KOSTELYANETS Sergey Valerianovich   +1 more
doaj   +1 more source

Ensuring information security within the CSTO framework as a regional response to the IT related challenges and threats [PDF]

open access: yesИзвестия Саратовского университета. Новая серия: Cоциология. Политология
The rapid development of information technology leads to qualitative and quantitative increase in new challenges and threats related to the information domain. Their transboundary nature predetermines the ongoing expansion of international cooperation in
Golub, Kirill Yu.
doaj   +1 more source

Expanding the UN’s Collective Security System

open access: yesPolitikon, 2020
The United Nations’ 60th anniversary has prompted discussion and debate as to how best to improve this weakened organization. These discussions have included the adoption of two new doctrines to the existing collective security system.
Andrea Charron
doaj   +1 more source

European regional security system : Prospects of further development [PDF]

open access: yesВојно дело, 2017
The transnational and asymmetric character of contemporary challenges, risks and threats to security have led to the fact that security is indivisible nowadays.
Gerzić Čedomir
doaj   +1 more source

Collective security treaty organization between illusion and anti-NATO [PDF]

open access: yesВојно дело, 2015
The new security paradigm of the modern world, created in 1990s, led to a security organization of a number of countries of the former Soviet bloc. Also evolving, at varying pace, was the contractual relationship of collective security, which, due to the
Mladenović Miroslav   +2 more
doaj   +1 more source

Device-independent security of quantum cryptography against collective attacks [PDF]

open access: yes, 2007
We present the optimal collective attack on a Quantum Key Distribution (QKD) protocol in the "device-independent" security scenario, where no assumptions are made about the way the QKD devices work or on what quantum system they operate.
Acin, Antonio   +5 more
core   +3 more sources

Mutual trust without a strong collective identity? Examining the Shanghai cooperation organization as a nascent security community

open access: yesAsian Security, 2021
It has long been assumed that security communities form in the international system based on at least two criteria, having a strong collective identity and mutual trust among their members.
James MacHaffie
semanticscholar   +1 more source

The market for protection and the origin of the state [PDF]

open access: yes, 2012
We examine a stark setting in which security or protection can be provided by self-governing groups or by for-profit entrepreneurs (kings, kleptocrats, or mafia dons).
Konrad, Kai A., Skaperdas, Stergios
core   +1 more source

Home - About - Disclaimer - Privacy