Results 21 to 30 of about 922,046 (159)

Security governance and the private military industry in Europe and North America [PDF]

open access: yes, 2005
Even before Iraq the growing use of private military contractors has been widely discussed in the academic and public literature. However, the reasons for this proliferation of private military companies and its implications are frequently generalized ...
Adams Thomas K.   +28 more
core   +1 more source

Military or non-military security [PDF]

open access: yesBezbednosni Dijalozi, 2012
There is no dilemma that the military symbolizes the power and the capacity of the state to ensure the security of its boundaries, but also to influence the security in wider frameworks.
Goran Vasilevski
doaj  

Security: Collective good or commodity? [PDF]

open access: yes, 2008
This is the author's accepted manuscript. The final published article is available from the link below. Copyright @ 2008 Sage.The state monopoly on the legitimate use of violence in Europe and North America has been central to the development of security
Briggs, Rachel   +43 more
core   +2 more sources

Military Security of Poland – From Theory to Practice

open access: yesPolish Political Science Yearbook, 2021
National and international security remains a fascinating area of scientific research. Studies of phenomena and processes in military security suggest that we are witnessing great and intense changes. In their analyses of the modern security environment,
Grzegorz Sobolewski
doaj   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Transverse and left colon volvulus in a child with cerebral palsy: a case report

open access: yesJournal of Pediatric Surgery Case Reports
Introduction: Colonic volvulus is an uncommon cause of intestinal obstruction in children, with sigmoid volvulus being the most frequently reported type.
Younis Al-Mufargi   +5 more
doaj   +1 more source

Threats and ensuring information security in crisis management systems

open access: yesNowoczesne Systemy Zarządzania, 2019
Constantly progressing technical and technological development has allowed the creation of IT tools, the use of which will positively affect the actions taken by decision-makers.
Michał Jurek, Marcin Staruch
doaj   +1 more source

Cognitive Resilience: Assessing Critical Factors in Military Personnel

open access: yesObrana a Strategie
The paper investigates factors associated with armed forces personnel's resilience in the face of hybrid interference targeted primarily against the cognitive domain. Building on the established conceptualisation of resilience as comprising institutional
Dominika Kosárová   +2 more
doaj   +1 more source

Multi-Layer IoT Security Framework for Ambient Intelligence Environments

open access: yesSensors, 2019
Ambient intelligence is a new paradigm in the Internet of Things (IoT) world that brings smartness to living environments to make them more sensitive; adaptive; and personalized to human needs.
Ion Bica   +3 more
doaj   +1 more source

Finnish Defence Intelligence Agency - an Actor in National Security?

open access: yesJournal of Strategic Security, 2020
One disparate feature between Finnish civilian and military intelligence is their express relationship to national security. The Finnish Security and Intelligence Service prominently declares to be an expert in national security whereas no corresponding ...
Mikael Lohse
doaj   +1 more source

Home - About - Disclaimer - Privacy