Results 1 to 10 of about 2,430,883 (250)

Role-theoretic discourse analysis of German security policy: a case of German parliamentary debate on the mission in Afghanistan [PDF]

open access: yesFrontiers in Psychology, 2023
This article combines linguistic discourse analysis with role theory to create a role-theoretic discourse analysis framework for German security policy. To illustrate this, we employ topos analysis on 30 plenary minutes of parliamentary debates regarding
Xiaoshan Ni
doaj   +2 more sources

Security Policy Consistency

open access: yes, 2000
With the advent of wide security platforms able to express simultaneously all the policies comprising an organization's global security policy, the problem of inconsistencies within security policies become harder and more relevant. We have defined a tool based on the CHR language which is able to detect several types of inconsistencies within and ...
Ribeiro, Carlos   +3 more
openaire   +5 more sources

Reinvigorating Cooperative Security In A Polarised World [PDF]

open access: yesСовременная Европа, 2022
European security is at a critical juncture that could spin into conflict if left unattended. Deteriorating levels of mutual trust, eroding arms control frameworks, belligerent rhetoric, heightened transnational threats, and the danger of accidents and ...
Greminger Thomas, Washington Rose
doaj   +1 more source

Control of Platform Monopolization in the Digital Economy: The Implication of Open Innovation

open access: yesJournal of Open Innovation: Technology, Market and Complexity, 2022
This study aims to develop scientifically sound proposals and recommendations for implementing the principles and characteristics of digital monopolies and determine the patterns and relationships of individual products.
Sergey Silvestrov   +3 more
doaj   +3 more sources

Oyo and Kaduna States Maize Farmers’ Perception of Selected Agricultural Policies in Nigeria

open access: yesJournal of Agricultural Extension, 2023
This study examined the awareness and perception of agricultural policies by maize farmers in Oyo and Kaduna States of Nigeria. A multistage sampling procedure was used to select 424 respondents: 210 farmers from Oyo and 214 farmers from Kaduna, from ...
Olusegun Oyelami   +6 more
doaj   +4 more sources

How Do Game Design, Gender, and Players’ Backgrounds Affect Behavior in Framed Field Experiments? Evidence from Community Forestry in India

open access: yesInternational Journal of the Commons, 2022
Framed field experiments (experimental games) are widely used to assess factors affecting cooperation in management of the commons. However, there is relatively little attention to how details of the games affect experimental results. This paper presents
Wei Zhang   +10 more
doaj   +1 more source

Securing the Commons in India: Mapping Polycentric Governance

open access: yesInternational Journal of the Commons, 2021
Common pool land and water resources in India play vital, but often overlooked, roles in livelihoods and ecosystem services. These resources are subject to the authority of various government departments and are often managed in ways that result in ...
Ruth Meinzen-Dick   +6 more
doaj   +1 more source

State capture and security intelligence agencies in Serbia [PDF]

open access: yesJournal of Regional Security, 2021
Security intelligence agencies play a central role in state capture. Due to the very nature of how they are organised and operate, security intelligence agencies first become targets of these processes, before becoming their principal agents.
Petrović Predrag
doaj   +1 more source

Achilles steel?: Investigating corrosive capital in the Smederevo Železara privatization [PDF]

open access: yesJournal of Regional Security, 2023
The term "corrosive capital" has become a popular phrase in Serbia and across the Western Balkans used to describe opaque and scandalous foreign investments that are believed to enable state capture.
Ben Reade
doaj   +1 more source

A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC [PDF]

open access: yes, 2020
Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing,
Kim, Jin-Woo   +3 more
core   +2 more sources

Home - About - Disclaimer - Privacy