Results 1 to 10 of about 2,430,883 (250)
Role-theoretic discourse analysis of German security policy: a case of German parliamentary debate on the mission in Afghanistan [PDF]
This article combines linguistic discourse analysis with role theory to create a role-theoretic discourse analysis framework for German security policy. To illustrate this, we employ topos analysis on 30 plenary minutes of parliamentary debates regarding
Xiaoshan Ni
doaj +2 more sources
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and ...
Ribeiro, Carlos +3 more
openaire +5 more sources
Reinvigorating Cooperative Security In A Polarised World [PDF]
European security is at a critical juncture that could spin into conflict if left unattended. Deteriorating levels of mutual trust, eroding arms control frameworks, belligerent rhetoric, heightened transnational threats, and the danger of accidents and ...
Greminger Thomas, Washington Rose
doaj +1 more source
Control of Platform Monopolization in the Digital Economy: The Implication of Open Innovation
This study aims to develop scientifically sound proposals and recommendations for implementing the principles and characteristics of digital monopolies and determine the patterns and relationships of individual products.
Sergey Silvestrov +3 more
doaj +3 more sources
Oyo and Kaduna States Maize Farmers’ Perception of Selected Agricultural Policies in Nigeria
This study examined the awareness and perception of agricultural policies by maize farmers in Oyo and Kaduna States of Nigeria. A multistage sampling procedure was used to select 424 respondents: 210 farmers from Oyo and 214 farmers from Kaduna, from ...
Olusegun Oyelami +6 more
doaj +4 more sources
Framed field experiments (experimental games) are widely used to assess factors affecting cooperation in management of the commons. However, there is relatively little attention to how details of the games affect experimental results. This paper presents
Wei Zhang +10 more
doaj +1 more source
Securing the Commons in India: Mapping Polycentric Governance
Common pool land and water resources in India play vital, but often overlooked, roles in livelihoods and ecosystem services. These resources are subject to the authority of various government departments and are often managed in ways that result in ...
Ruth Meinzen-Dick +6 more
doaj +1 more source
State capture and security intelligence agencies in Serbia [PDF]
Security intelligence agencies play a central role in state capture. Due to the very nature of how they are organised and operate, security intelligence agencies first become targets of these processes, before becoming their principal agents.
Petrović Predrag
doaj +1 more source
Achilles steel?: Investigating corrosive capital in the Smederevo Železara privatization [PDF]
The term "corrosive capital" has become a popular phrase in Serbia and across the Western Balkans used to describe opaque and scandalous foreign investments that are believed to enable state capture.
Ben Reade
doaj +1 more source
A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo +3 more
core +2 more sources

