Results 141 to 150 of about 3,117,544 (197)
Some of the next articles are maybe not open access.
2010
AbstractThis article explores developments in the UK security state, concentrating on the intelligence and security services, together with the Whitehall machinery that connects these agencies with the core executive. It also addresses related aspects of security policing or ‘high policing’.
openaire +1 more source
AbstractThis article explores developments in the UK security state, concentrating on the intelligence and security services, together with the Whitehall machinery that connects these agencies with the core executive. It also addresses related aspects of security policing or ‘high policing’.
openaire +1 more source
Security Forum
The objective of the article is to present the state security system and indicate research and adaptation directions undertaken by scientists that shape the changing security conditions. It is claimed that the internal and external environment of the state security system is characterized by constant variability, which is of fundamental importance in ...
Łępicki, Jacek, Łępicki, Jacek
openaire +1 more source
The objective of the article is to present the state security system and indicate research and adaptation directions undertaken by scientists that shape the changing security conditions. It is claimed that the internal and external environment of the state security system is characterized by constant variability, which is of fundamental importance in ...
Łępicki, Jacek, Łępicki, Jacek
openaire +1 more source
From State Security to Human Security
SSRN Electronic Journal, 2007Today, many individuals are victims, not of foreign military aggression and nuclear war, but of violence committed against them by their own state. Moreover, the security of individuals is threatened, not by military forces, but by criminals and terrorists, the forces of nature, disease, and poverty.
openaire +2 more sources
This chapter attempts to explore the interaction between national sovereignty and private security companies, taking Myanmar and Cambodia as examples. After the end of the cold war, some countries are still in the process of State-building. To ensure domestic and international security, the authorities decided to take their security off the border and ...
Meng Yang, Yuhong Li
openaire +1 more source
Meng Yang, Yuhong Li
openaire +1 more source
Secure States versus Secure Executions
2013Several points of view exist about security policies among which two main approaches can be distinguished: policies can be defined by some properties over states of a system or by some properties over exe- cutions of a system. While enforcing a policy specified by some properties over states is rather easy, designing enforcement mechanisms to ensure ...
Jaume, Mathieu +3 more
openaire +2 more sources
2017
The impact of Edward Snowden’s leaks underscore profound unresolved ethical and policy issues relating to post 9/11 electronically enabled intelligence collection in liberal democracies. In this chapter, six different ‘impacts’ are used as a frame to assess the future of whistle blowers post Snowden and the role technology will play in both the ...
openaire +1 more source
The impact of Edward Snowden’s leaks underscore profound unresolved ethical and policy issues relating to post 9/11 electronically enabled intelligence collection in liberal democracies. In this chapter, six different ‘impacts’ are used as a frame to assess the future of whistle blowers post Snowden and the role technology will play in both the ...
openaire +1 more source
The rumen microbiome: balancing food security and environmental impacts
Nature Reviews Microbiology, 2021Itzhak Mizrahi +2 more
exaly
2012
China's Security State describes the creation, evolution, and development of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party's history. Xuezhi Guo investigates patterns of leadership politics from the vantage point of security and intelligence organization and ...
openaire +1 more source
China's Security State describes the creation, evolution, and development of Chinese security and intelligence agencies as well as their role in influencing Chinese Communist Party politics throughout the party's history. Xuezhi Guo investigates patterns of leadership politics from the vantage point of security and intelligence organization and ...
openaire +1 more source
Security and Privacy for 6G: A Survey on Prospective Technologies and Challenges
IEEE Communications Surveys and Tutorials, 2021Van-Linh Nguyen +2 more
exaly

