Results 41 to 50 of about 251,419 (115)

The human security dimension of China’s Belt and Road Initiative [PDF]

open access: yes, 2017
Despite the geopolitical calculations associated with China’s Belt and Road Initiative, and how this will allow Beijing greater influence in transregional relations, the human security dimension goes to the heart of China’s wider regional strategy.
Dellios, Rosita, Ferguson, R. James
core   +1 more source

Global Risks 2012, Seventh Edition [PDF]

open access: yes, 2012
The World Economic Forum's Global Risks 2012 report is based on a survey of 469 experts from industry, government, academia and civil society that examines 50 global risks across five categories.

core  

Regional Initiatives in Support of Surveillance in East Africa: The East Africa Integrated Disease Surveillance Network (EAIDSNet) Experience. [PDF]

open access: yes, 2013
The East African Integrated Disease Surveillance Network (EAIDSNet) was formed in response to a growing frequency of cross-border malaria outbreaks in the 1990s and a growing recognition that fragmented disease interventions, coupled with weak laboratory
Bond KC   +14 more
core   +1 more source

The financial security management model in second-tier banks

open access: yesЭкономика: стратегия и практика, 2020
With the growing socio-economic threats associated with the risk of involving second-tier banks in the legalization of illegal income, it is necessary to create an effective financial monitoring system to reduce this risk.
A. Z. Nurmagambetova   +2 more
doaj  

Information security, data breaches, and protecting cardholder information: facing up to the challenges [PDF]

open access: yes
On September 13 and 14, 2006, the Payment Cards Center of the Federal Reserve Bank of Philadelphia and the Electronic Funds Transfer Association (EFTA) hosted a conference entitled “Information Security, Data Breaches, and Protecting Cardholder ...
Ann Kjos, James C. McGrath
core  

Climate Change, Migration, and Conflict: Addressing Complex Crisis Scenarios in the 21st Century [PDF]

open access: yes, 2012
Outlines how climate change, migration, and conflict intersect in Africa, Asia, and the Americas and implications for national, human, and environmental security.
Laura Conley, Michael Werz
core  

Exploring the Relationship Between Military Spending & Human Rights Performance in South Asia [PDF]

open access: yes, 2008
The relationship between military spending and human rights is one of the most prominent issues in political economy. Yet, the linkage between the two is empirically underdeveloped.
Pathmalal, K. K. Shakya Lahiru   +1 more
core  

Chinese Wall Security Policy [PDF]

open access: yes, 2009
This project establishes a Chinese wall security policy model in the environment of cloud computing. In 1988 Brewer and Nash proposed a very nice commercial security policy in British financial world.
Gupta, Varun
core   +1 more source

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

open access: yes, 2017
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register ...
Alex Gontmakher   +21 more
core   +1 more source

U.S. Surveillance of Citizens: The Prevention of Domestic Terrorism [PDF]

open access: yes, 2019
The United States drastically increased the powers given to the federal government following the terrorist attacks of September 11, 2001, as the sheer number of casualties and shock that struck the nation called for an immediate response.
Rogers, David
core   +1 more source

Home - About - Disclaimer - Privacy