Results 71 to 80 of about 3,117,544 (197)

STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION

open access: yesJurnal Pertahanan: Media Informasi tentang Kajian dan Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity, 2019
In the current security concept, there are some changes to the current security object. This is due to the increasingly broad understanding of security objects. This study examines the emergence of cyber issues as a new threat to state security.
Miftah Farid, Ajeng Ayu Adhisty
doaj   +1 more source

Kultura fizyczna w garnizonie Siedlce w latach 1922-1939

open access: yesRadzyński Rocznik Humanistyczny, 2018
In the years 1918-1939 sport in the Polish Army played a very important role. The independent Republic, in order to preserve its independence, had to have a strong and efficient army, so in the physical state, the state authorities saw the safety of the ...
Paweł Borek
doaj  

Szkolenie funkcjonariuszy służb granicznych jako istotny instrument rozwoju zawodowego i bezpieczeństwa państwa

open access: yesNowoczesne Systemy Zarządzania, 2017
Focus article covers important issue on training for border services officers as an important instrument of their professional development affecting the security of our Member States.
Kazimierz PIOTRKOWSKI
doaj   +1 more source

Modernisation of the armoured component of the Russian Federation's ground forces in the years 2015–2018. An outline of the subject

open access: yesHumanities and Social Sciences, 2019
In the world that began to be shaped almost ten years after the collapse of the Soviet Union, after a relatively short period of almost total hegemony of the United States, the direction of change led to a clear formation of a new polycentric ...
Leszek Pawlikowicz, Krzysztof Surowiec
doaj   +1 more source

Chevron Meets Youngstown: National Security and the Administrative State [PDF]

open access: yes, 2013
The past several years have witnessed a burst of scholarship at the intersection of national security and administrative law. Many supporters of this approach endorse a heightened, “super-strong” brand of Chevron deference to presidential decisionmaking ...
Landau, Joseph
core   +1 more source

Who Bears Responsibility for the Provision of Security: The State or You? [PDF]

open access: yes
When defining the absence of a threat as an economic good, it is necessary to define this good using the standard economic typology: is security a private, public, club or common good?
Hella Engerer, Olaf J. de Groot
core  

THE DEVELOPMENT OF THE LEGAL FRAMEWORK FOR ENSURING STATE SECURITY IN RUSSIA: A RETROSPECTIVE ANALYSIS

open access: yesПравовое государство: теория и практика
In modern conditions, ensuring state security of the Russian Federation has become particularly relevant. An important prerequisite for raising its level is proper legal regulation of relations in this area.
STEPANOV Mikhail Mikhailovich
doaj   +1 more source

The Activity of Mercenaries in the State of Mali – a Negative Factor on Regional and International Security

open access: yesEIRP Proceedings, 2022
The activity of mercenaries is an illegal act that most states of the world have known with regret. In recent times, military clashes on the continent of Africa have not been an exception in the sense of not knowing what they represent and how ...
Igor Soroceanu
doaj  

Who's (Still) Above the Social Security Payroll Tax Cap? [PDF]

open access: yes, 2011
The Social Security payroll tax cap is the earnings level above which no further Social Security taxes are collected. The cap is currently at $110,100, though legislation has been introduced in Congress to apply the Social Security payroll tax to ...
Janelle Jones, John Schmitt, Nicole Woo
core   +1 more source

FOREIGN DISCOURSE AS A TOOL OF STATE STRATEGIC COMMUNICATION: CONCEPTUAL FOUNDATION

open access: yesІнтегровані комунікації
An in-depth analysis of international broadcasting as one of the primary instruments of state strategic communications in the context of global digitalization and information warfare is conducted in the article.
Maryna Skazhennyk
doaj   +1 more source

Home - About - Disclaimer - Privacy