Results 81 to 90 of about 402,352 (211)
Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core +1 more source
The article discusses various aspects of the security in the Arctic in the context of the key actors information policy in the Arctic region. Based on the analysis, the author comes to the conclusion that one of the goals of the “information war” against
Nina V. Shevchuk
doaj
ASEAN and the non-traditional regional security agenda [PDF]
Without a doubt, the whole area of non-traditional security – whether it be threats, issues or challenges (the three are more or less used interchangeably in ASEAN statements and documents on the subject) – has come to occupy a prominent place on the ...
Rolls, Mark G.
core +1 more source
ENVIRONMENTAL AND MAN-MADE THREATS IN THE ZONE OF MILITARY CONFLICT IN EASTERN UKRAINE
The influence of the military conflict in Eastern Ukraine on the increase of environmental and man-made threats is analyzed. The contemporary threats to the national security of Ukraine in the field of environmental and manmade security which are ...
Serhii Ivaniuta
doaj
India-New Zealand track two dialogue: geopolitical trends in the Asia Pacific including maritime security [PDF]
Geo-political trends point to the decline of the Post - Cold War order in the Asia Pacific region. Introduction For several decades Asia Pacific geopolitics has been dominated by the strategic primacy of the United States. That is changing.
Paul Sinclair
core
United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century [PDF]
The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the
Rogozhin, Vladimir
core
In the article the author examines the theoretical foundations of evaluation of the effectiveness of the state mechanism of response to the threats to the military security.
A. O. Pelykh
doaj
Racing to War: Arms Competitions, Military Spending, and the Tendency of Nations to Engage in Armed Conflict [PDF]
An essay exploring the relationship between arms acquisition, military spending, and the tendency of nations to engage in ...
Potter, Thomas S.
core +1 more source
The security implications of geoengineering:blame,imposed agreement and the security of critical infrastructure [PDF]
The prospect of solar geoengineering in response to climate change (on the basis of its supposedly significantly lower cost and/or more rapid impact on global temperature than carbon reduction strategies) raises a number of security concerns that have ...
Cairns, Rose, Nightingale, Paul
core

