Results 31 to 40 of about 2,430,883 (250)
Violent non-state actors' patterns of power: The case of Hezbollah [PDF]
Conventional International Relations emphasises the role of states as the primary actors, with control being the ultimate form of power. However, in today's interconnected and intricate global landscape, non-state actors, particularly violent non-state ...
Jaber Boushra
doaj +1 more source
The Hong Kong Pro-democracy Movement: Challenges and Divisions in the Past Decade [PDF]
This article is an attempt to examine the challenges to Hong Kong’s pro-democracy movement and the movement’s internal divisions in the past decade or so.
Joseph Yu-shek Cheng
doaj
Directed Security Policies: A Stateful Network Implementation
Large systems are commonly internetworked. A security policy describes the communication relationship between the networked entities. The security policy defines rules, for example that A can connect to B, which results in a directed graph. However, this
Carle, Georg +2 more
core +2 more sources
Objectives Continuing medical education (CME) and work commitment are important for rural healthcare workers (RHWs) and rural medical work. The significant association between continuing education and work commitment has been reported in many studies ...
Jinlin Liu, Ying Mao
doaj +1 more source
Securing Java with Local Policies. [PDF]
We propose an extension to the security model of Java, that allows for specifying, analysing and enforcing history-based usage policies. Policies are defined by usage automata, that recognize the forbidden execution histories. Programmers can sandbox an untrusted piece of code with a policy, which is enforced at run-time through its local scope.
M. Bartoletti +4 more
openaire +7 more sources
Determinants of Profitability Among Agricultural Equipment Fabricators in Oyo State, Nigeria
The study examined enterprise profitability among agricultural equipment fabricators. It was conducted in Oyo State, Nigeria using a multistage sampling procedure to select the 48 respondents from whom data were collected using a structured questionnaire.
Oyelami, Benjamin Olusegun +8 more
doaj +1 more source
Security Policy Alignment: A Formal Approach [PDF]
Security policy alignment concerns the matching of security policies specified at different levels in socio-technical systems, and delegated to different agents, technical and human. For example, the policy that sales data should not leave an organization is refined into policies on door locks, firewalls and employee behavior, and this refinement ...
Pieters, W., Dimkov, T. and Pavlovic, D.
openaire +1 more source
When the world was engulfed by a COVID-19 pandemic crisis, various activities could not be carried out normally. Activities may continue from home during a crisis by the use of a smartphone through the internet, because almost all people have their own ...
Heru Susanto +5 more
doaj +1 more source
Securing EU neighborhood - an ideational approach to EU-neighborhood relations [PDF]
This paper analyses the interrelationship between internal and external security discourses in the field of European Union's neighbourhood policy. The European Union can be observed to actively use security concepts developed in the internal policy-field
Dib, Laura
core
The article is dedicated to the comprehensive analysis of the role of the Japan Self-Defense Forces (JSDF) in Japanese state and society. The authors trace the transformation of legal status and security posture of the self-defense forces throughout the ...
A. A. Kireeva, V. V. Nelidov
doaj +1 more source

