Results 11 to 20 of about 1,730,729 (295)
Energy security: The impact of environmental policies on energy security [PDF]
Extreme climatic events, global warming, biodiversity loss, ozone depletion, water, air and soil pollution, major accidents have made the issues of environmental change in the environment and the impact on environmental insecurity has become the center ...
Vitošević Jovana +2 more
doaj +1 more source
On Security Policy Migrations [PDF]
There has been over the past decade a rapid change towards computational environments that are comprised of large and diverse sets of devices, many of them mobile, which can connect in flexible and context-dependent ways. Examples range from networks where we can have communications between powerful cloud centers, to the myriad of simple sensor devices
Lobo, Jorge +2 more
openaire +1 more source
Enabling Virtual AAA Management in SDN-Based IoT Networks †
The increase of Software Defined Networks (SDN) and Network Function Virtualization (NFV) technologies is bringing many security management benefits that can be exploited at the edge of Internet of Things (IoT) networks to deal with cyber-threats.
Alejandro Molina Zarca +5 more
doaj +1 more source
Cet article interroge les projets menés au nom de la réforme et de la démocratisation de la police en Tunisie post-révolution. La période suivant le départ de Ben Ali a effectivement connu une série de réajustements au sein des forces de sécurité ...
Audrey Pluta
doaj +1 more source
Governmentality, populism criminal and punitive practices in Argentina
This article addresses the characteristics assumed by current punitivism, particularly in Argentina, and the implementation of measures, strategies and political discourses of the new neoliberal penalty from the perspective of the concept of ...
Florencia Beltrame
doaj +1 more source
Security Management Policies and Work Accidents
Research purpose. The aim of the research is to demonstrate the impacts of an absence of organizational policies and strategies in the field of work security on enterprise competitiveness.
Monteiro Nuno, Anunciação Pedro
doaj +1 more source
The European Union's 'Comprehensive Approach' in Chad: securitisation and/or compartmentalisation? [PDF]
The European Union (EU) aims for a comprehensive approach to security in developing countries. As a result, attempts have been made to enhance the nexus between the EU's security policy and other policy areas, particularly development, humanitarian ...
Del Biondo, Karen, Orbie, Jan
core +1 more source
Limits of a competitive authoritarianism in security policies: interpreting Türkiye’s approach towards the EU [PDF]
Middle powers are often states that support and follow democratic principles, demonstrating such atonement in the domestic and foreign policies. However, states that want to emerge in modern multipolarity prefer a more centralised approach ...
Lavezzo Edoardo
doaj +1 more source
Addressing food and nutrition security in South Africa: A review of policy responses since 2002 [PDF]
Since 2002, a range of South African policies have attempted to address the disproportionate burden of food and nutrition insecurity on the population. Yet malnutrition among the poor has worsened.
Boatemaa, S., Drimie, S., Pereira, L.
core +1 more source
System intrusions violate the security of a system. In order to maintain it, it is necessary to decrease the chances of intrusions occurring or by detecting them as soon as they ensue in order to respond to them in a timely manner.
Cyntia Vargas Martínez +1 more
doaj +1 more source

