Results for 'cloud security policies'

991 found
Order:
  1. Offline privacy preserving proxy re-encryption in mobile cloud computing.Yaping Lin & Voundi Koe Arthur Sandor - 2019 - Pervasive and Mobile Computing 59.
    This paper addresses the always online behavior of the data owner in proxy re- encryption schemes for re-encryption keys issuing. We extend and adapt multi-authority ciphertext policy attribute based encryption techniques to type-based proxy re-encryption to build our solution. As a result, user authentication and user authorization are moved to the cloud server which does not require further interaction with the data owner, data owner and data users identities are hidden from the cloud server, and re-encryption keys are (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  13
    (1 other version)The Politics of Local Security Policy. Ideas for a Sociological Analysis.D’Albergo Ernesto - 2017 - Governare la Paura. Journal of Interdisciplinary Studies 10 (1).
    The article proposes some ideas for a sociological analysis of security policies, with specific regard to urban contexts and focusing especially on the intersection between policy and politics. The main questions concern the way in which security has been studied as a public good construed as a collective problem and an object of political action, as well as how to develop further perspectives and conceptual tools within this approach. Some other questions are also asked and provisionally answered, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  8
    Implementing Social Security Policy in Vietnam: Case Study of Ho Chi Minh City.Dinh Trung Thanh, Nguyen Thi My Huong, Duong Van Dan, Nguyen Thi Diep, Nguyen Thi Hai Yen & Ton Nu Hai Yen - forthcoming - Evolutionary Studies in Imaginative Culture:1460-1472.
    Social security is one of the important guidelines and policies of our Party and State that has been thoroughly grasped and guaranteed to be implemented during the country's development periods. In recent years, despite facing many difficulties and challenges, social security work in Vietnam has continued to achieve many positive results, policies have continuously improved, the material and spiritual life of people has improved. People are cared for better and better with the goal of "leaving no (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  19
    Cloud Security: LKM and Optimal Fuzzy System for Intrusion Detection in Cloud Environment.S. S. Sujatha & S. Immaculate Shyla - 2019 - Journal of Intelligent Systems 29 (1):1626-1642.
    In cloud security, intrusion detection system (IDS) is one of the challenging research areas. In a cloud environment, security incidents such as denial of service, scanning, malware code injection, virus, worm, and password cracking are getting usual. These attacks surely affect the company and may develop a financial loss if not distinguished in time. Therefore, securing the cloud from these types of attack is very much needed. To discover the problem, this paper suggests a novel (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  5.  35
    Russia’s Foreign Security Policy in the Twenty-First Century: Putin, Medvedev and Beyond.Richard Sakwa - 2014 - The European Legacy 19 (4):522-523.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  6.  9
    National security policy in Switzerland.Оливер Бакрески - 2019 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 72:231-256.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  2
    Clothing the Naked Soldier: Virtuous Conduct on the Augmented Reality Battlefield.Strategy Anna Feuer School of Global Policy, Usaanna Feuer is an Assistant Teaching Professor at the School of Global Policy Ca, Focusing on Insurgency San Diegoher Research is in International Security, Defense Technology Counterinsurgency, the Environment War & at the School of Oriental Politics at Oxford - 2024 - Journal of Military Ethics 23 (3):264-276.
    The U.S. military is developing augmented reality (AR) capabilities for use on the battlefield as a means of achieving greater situational awareness. The superimposition of digital data—designed to expand surveillance, enhance geospatial understanding, and facilitate target identification—onto a live view of the battlefield has important implications for virtuous conduct in war: Can the soldier exercise practical wisdom while integrated into a system of militarized legibility? Adopting a virtue ethics perspective, I argue that AR disrupts the soldier’s immersion in the scene (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  8.  7
    National security policy in Switzerland.Oliver Bakreski - 2019 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 72:245-256.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  4
    National security policy of Italy.Oliver Bakreski - 2020 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 73:235-246.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  10.  26
    Agriculture development and food security policy in eritrea - an analysis.Ravinder Rena - unknown
    The main economic activity of the people of Eritrea is agriculture: crop production and livestock herding. Agriculture mainly comprises mixed farming and some commercial concessions. Most agriculture is rain-fed. The main rain-fed crops are sorghum, millet and sesame, and the main irrigated crops are all horticultural crops like bananas, onions and tomatoes and cotton. The major livestock production constraints are disease, water and feed shortages and agricultural expansion especially in the river frontages. The agricultural sector employs eighty percent of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  11.  32
    Jurisdiction of the European Court of Justice over Issues Relating to the Common Foreign and Security Policy under the Lisbon Treaty.Loreta Saltinyte - 2010 - Jurisprudencija: Mokslo darbu žurnalas 119 (1):261-279.
    Although the Lisbon Treaty maintained the general exclusion of Common Foreign and Security Policy (CFSP) matters from ECJ jurisdiction, it introduced a number of changes into this area, including an explicit statement that the Court is competent to review the legality of the Council decisions imposing restraining measures on persons. The article analyzes the nature and origin of those changes and considers the legal implications for the level of the protection of fundamental rights in the European Union. For this (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  12.  24
    British Security Policy, 1934–1938. Studies of the Decision Process in Security and Foreign Policy. [REVIEW]Michael Geyer - 1978 - Philosophy and History 11 (2):220-221.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  17
    4. Privacy and Security Policy: The Historical Situation.Gregory J. Walters - 2001 - In Human Rights in an Information Age a Philosophical Analysis. University of Toronto Press. pp. 117-149.
    Direct download  
     
    Export citation  
     
    Bookmark  
  14. The Impact of Social Security on the Security Policy of the Republic of North Macedonia.Marjan Gjurovski & Sibela Alimovska - 2023 - Religious dialogue and cooperation 4 (4):85-100.
    The concept of national security belongs to the so-called old, traditional approachesto security. Its focus is on the survival of the sovereign state, which is its territorialintegrity and political independence (sovereignty) protected by diplomatic, intelligenceand military capacities, which is ability to repel military aggression or respond successfully.It is therefore justifiably called the concept of state security. In the real socialist countries,state security meant the state of protection of the state from political crime, as wellas the (...) of the (socialist, communist) regime. Therefore, national or state securitywas in principle divided into so-called external (security from armed aggression) and internal(security of the regime and the state from the internal enemy).The primary bearers of the fight against all occurrences of security threats, as well as thefunctioning of the security function of the state, are the institutions, organizations andsecurity services. The intelligence and security services as an integral part of the securityand intelligence system work to detect, prevent and suppress any occurrence of securitythreats to a particular country or social union. Through the establishment and organizationof a security system or security-intelligence system, the state strives to achieve itsvital interests, to preserve its sovereignty, territorial integrity, constitutional order and thefreedoms and rights of its citizens, in order to achieve the strategic goals of the state -membership in NATO and the European Union, which will bring even greater regional andcontinental security and stability. The focus of the modern concept of national security isthe security of the state, society and the individual. Our country must strive for internalreforms, in terms of restoring the criteria of the rule of law, freedom of the media, controlover the executive branch, which have long been considered unfulfilled. (shrink)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  55
    Japan's Parliamentary Confrontation on the Post-Cold War National Security Policies.Tomohito Shinoda - 2009 - Japanese Journal of Political Science 10 (3):267-287.
    In the fall 2007 Diet session, the largest opposition Democratic Party of Japan (DPJ) showed strong opposition against the government's proposal to continue the Self-Defense Forces (SDF) refueling operations to support maritime inspections in the Indian Ocean. In order to evaluate this parliamentary confrontation, the article compares the handling of this issue with the six past major post-Cold War national security policies. The DPJ constantly presented its own legislative proposals in order to participate in Diet deliberation. DPJ's counter (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  16.  36
    How Norms Die: Torture and Assassination in American Security Policy.Christopher Kutz - 2014 - Ethics and International Affairs 28 (4):425-449.
    A large and impressive literature has arisen over the past fifteen years concerning the emergence, transfer, and sustenance of political norms in international life. The presumption of this literature has been, for the most part, that the winds of normative change blow in a progressive direction, toward greater or more stringent normative control of individual or state behavior. Constructivist accounts detail a spiral of mutual normative reinforcement as actors and institutions discover the advantages of normative self- and other evaluation. There (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  17.  15
    The Federal Trade Commission and Electronic Commerce Security Policy: A Viable Solution?Thomas A. Hemphill - 2001 - Business and Society Review 106 (2):161-169.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  6
    Small States and the Development of Their External Security and Defense Policy From the Aspect of Security Management.Leta Bargjieva Miovska - 2024 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 77 (1):457-486.
    Foreign security and defense policy is an interdependent component of securitymanagement. According to the neo-classical definition of security management in thefield of external security-defense policy, it includes a series of practices, strategies andprinciples aimed at protecting assets, information and resources from various threatsand risks through the development of civil and military skills. From the perspective ofthe realist theory, the nature of the international structure is defined by its organizingprinciple, that is, the balance and distribution of power between (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  19.  11
    Common Foreign, Security, and Defense Policy.Ramses A. Wessel - 2015 - In Dennis Patterson, A Companion to European Union Law and International Law. Wiley-Blackwell. pp. 394–412.
    The Common Foreign and Security Policy (CFSP) objectives are an integral part of the overall objectives of the European Union and the policy area has developed from a purely intergovernmental form of cooperation in the days of the European political cooperation to an area in which the member states have increasingly accepted new forms of institutionalization. CFSP decisions are taken by the General Affairs Council, consisting of the ministers for foreign affairs of the member states. In spite of the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  20.  10
    Conditions of Poland’s foreign and security policy within the EU and NATO environment.Anna Antczak- Barzan - 2014 - Journal for Perspectives of Economic Political and Social Integration 20 (1-2):135-152.
    The article is an attempt to answer the question about the state of Poland’s security after the first decade of the twenty-first century, what are its determinants, what kind of challenges Poland faces and which of them may turn into a threat and which into an opportunity, or what Polish potential is and which of its components determine its position on the international arena. It is achieved through a detailed analysis of actions undertaken by Poland in the international arena (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  21. Security and Policy Based Management-ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies.Kuong-Ho Liu Chen & Tzong-Jye Dow Liu - 2006 - In O. Stock & M. Schaerf, Lecture Notes In Computer Science. Springer Verlag. pp. 197-208.
     
    Export citation  
     
    Bookmark  
  22. Writing Security: United States Foreign Policy and the Politics of Identity.David Campbell - 1992 - U of Minnesota Press.
    Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in the study (...)
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  23.  43
    Review of Edward Shils: The Torment of Secrecy the Background and Consequences of American Security Policies; Morton Grodzins: The Loyal and the Disloyal[REVIEW]Webb S. Fiser - 1956 - Ethics 66 (4):295-297.
  24.  69
    Crossing the Olentangy River: The Figure of the Earth and the Military-Industrial-Academic-Complex, 1947–1972.John Cloud - 2000 - Studies in History and Philosophy of Science Part B: Studies in History and Philosophy of Modern Physics 31 (3):371-404.
    This paper explores the history of a unique assemblage of researchers in the geodetic and allied sciences organised at Ohio State University (OSU) in 1947 at the beginning of the Cold War. From about 1950 to 1970, the OSU geodetic sciences group was the most significant group of geodetic researchers in the world. Funded almost entirely by military and intelligence agencies, they pioneered the technologies, organised the research initiatives, ordered the data sets, and trained the generation of geodesists who eventually (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  25.  12
    Human Security and Non-Citizens: Law, Policy and International Affairs by Alice Edwards and Carla Ferstman, eds.: Cambridge: Cambridge University Press, 2010.Bronwen Manby - 2015 - Human Rights Review 16 (2):189-191.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  27
    A crisis that changed the banking scenario in India: exploring the role of ethics in business.Sushma Nayak & Jyoti Chandiramani - 2022 - Asian Journal of Business Ethics 11 (1):7-32.
    Digital business has marked an era of transformation, but also an unprecedented growth of cyber threats. While digital explosion witnessed by the banking sector since the COVID-19 pandemic has been significant, the level and frequency of cybercrimes have gone up as well. Cybercrime officials attribute it to remote working—people using home computers or laptops with vulnerable online security than office systems; malicious actors relentlessly developing their tactics to find new ways to break into enterprise networks and grasping defence evasion; (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  27.  20
    Harm Reduction Policies Where Drugs Constitute a Security Issue.Monica Andrea Narvaez-Chicaiza - 2020 - Health Care Analysis 28 (4):382-390.
    There is strong evidence suggesting that harm reduction policies are able to reduce the adverse health and social consequences of drug use. However, in this article I will compare two different countries to demonstrate that some social aspects lead to the adoption or rejection of harm reduction policies. In this case, countries where drugs are seen as a security concern are less likely to adopt these harm reduction policies. For that purpose, I will compare Colombia and (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  38
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  29.  20
    The Beginnings of West German Security Policy 1945–1956. Vol. 1. [REVIEW]Michael Salewski - 1984 - Philosophy and History 17 (1):76-78.
  30.  27
    Foucauldian security and the threat to democratic policy-making.Richard Togman - 2021 - Critical Review of International Social and Political Philosophy 24 (2):230-252.
    The exercise of power has radically changed in the modern era and is creating new challenges for democracy and democratic policy-making. Michel Foucault has introduced a whole new vocabulary to the understanding of governance which is critical to conceptualizing both the changing nature of power and its implications for democracy. Foucault articulates three fundamental ways in which the state has sought to maintain control of, act upon and maximize its capabilities through those under its charge: sovereign, discipline and security (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  31.  1
    Balancing risks and benefits: public perceptions of AI through traditional surveys and social media analysis.Daniel Kouloukoui, Nathalie de Marcellis-Warin & Thierry Warin - forthcoming - AI and Society:1-24.
    The rapid evolution of Artificial Intelligence (AI) has broadened discussions about its social and technological implications. The purpose of this study is to examine the perception of risks and benefits associated with AI, focusing on privacy, cybersecurity, trust in government management, and online device acceptance over time. We used an integrative approach that combined questionnaires and data analysis from X via Natural Language Processing (NLP). The traditional survey had 1013 participants in 2018 and 1000 in 2021, while X’s analysis examined (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  32.  51
    Women Peace and Security: Adrift in Policy and Practice.Laura Davis - 2019 - Feminist Legal Studies 27 (1):95-107.
    This comment reflects on how the Women, Peace and Security agenda has been translated into policy and put into practice by the European Union and the Democratic Republic of Congo. Although the WPS agenda has enabled many gains by women peacebuilders, this comment identifies important challenges from these two very different contexts. First, situating WPS policy areas within a broader feminist political economy analysis demonstrates how little influence the WPS agenda has across government. Second, the WPS agenda is being (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  33.  80
    Values, public policy, and community food security.David L. Pelletier, Vivica Kraak, Christine McCullum & Ulla Uusitalo - 2000 - Agriculture and Human Values 17 (1):75-93.
    Values and beliefs regarding communityfood security were investigated among participants in2–3 day participatory planning events related to thelocal food system in six rural counties from oneregion of upstate New York. The results of Qmethodology reveal three distinct viewpoints: a) theSocial Justice viewpoint, which is primarily concernedwith hunger and the potential harm caused by welfarereform; b) the Pragmatist viewpoint, which values thecontributions agriculture makes to local communitiesand is not concerned about environmental or socialexternalities of the dominant food system; and c) (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  34.  7
    Social security in the Balkans volume 2, an overview of social policy in the Republics of North Macedonia and Montenegro.Paul Morton PhD - 2024 - Journal of Critical Realism 23 (4):467-472.
    Volume 23, Issue 4, August 2024, Page 467-472.
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  35.  13
    Security Issue In The Mediterranean And The Policy Of Great Powers.Mehmet Sait Di̇lek - 2012 - Journal of Turkish Studies 7:1519-1540.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  58
    Integrating food security into public health and provincial government departments in British Columbia, Canada.Barbara Seed, Tim Lang, Martin Caraher & Aleck Ostry - 2013 - Agriculture and Human Values 30 (3):457-470.
    Food security policy, programs, and infrastructure have been incorporated into Public Health and other areas of the Provincial Government in British Columbia, including the adoption of food security as a Public Health Core Program. A policy analysis of the integration into Public Health is completed by merging findings from 48 key informant interviews conducted with government, civil society, and food supply chain representatives involved in the initiatives along with relevant documents and participant/direct observations. The paper then examines the (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Secure and sustainable? Examining the rhetoric and potential realities of UK food and agriculture policy.T. MacMillan & E. Dowler - forthcoming - Journal of Agricultural and Environmental Ethics.
     
    Export citation  
     
    Bookmark  
  38.  29
    Security, Equality, and the Clash of Ideas: Sweden's Evolving Anti-Trafficking Policy. [REVIEW]Gregg Bucken-Knapp, Johan Karlsson Schaffer & Karin Persson Strömbäck - 2012 - Human Rights Review 13 (2):167-185.
    Seeking to explain the emergence of anti-trafficking initiatives, scholars have explored two sets of ideas—national security and gender equality—thought to shape policy. In this study, we examine whether such ideational influence accounts for Sweden's evolving anti-trafficking policy over the past decade. As powerful domestic ideas about gender inequality informed the adoption of an abolitionist prostitution policy in the 1990s, one would expect similar ideas to influence domestic responses to the related issue of cross-border trafficking.However, our case study shows that (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  39.  26
    Private Military and Security Companies: Ethics, Policies and Civil-Military Relations.Andrew Alexandra, Deane-Peter Baker & Marina Caparini (eds.) - 2008 - Routledge.
    Over the past twenty years, Private Military and Security Companies (PMSCs) have become significant elements of national security arrangements, assuming many of the functions that have traditionally been undertaken by state armies. Given the centrality of control over the use of coercive force to the functioning and identity of the modern state, and to international order, these developments clearly are of great practical and conceptual interest. This edited volume provides an interdisciplinary overview of PMSCs: what they are, why (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  23
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  41.  8
    Social security in the Balkans volume 2, an overview of social policy in the Republics of North Macedonia and Montenegro. [REVIEW]Paul Morton PhD - 2024 - Journal of Critical Realism 23 (4):467-472.
    This book is of interest to critical realists because its writers show how the neoliberal reforms in the Balkans, related to the provision of social security, demonstrate a complex combination of d...
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  16
    Construction of Social Security Fund Cloud Audit Platform Based on Fuzzy Data Mining Algorithm.Yangting Huai & Qianxiao Zhang - 2021 - Complexity 2021:1-11.
    Guided by the theories of system theory, synergetic theory, and other disciplines and based on fuzzy data mining algorithm, this article constructs a three-tier social security fund cloud audit platform. Firstly, the article systematically expounds the current situation of social security fund and social security fund audit, such as the technical basis of cloud computing and data mining. Combined with the actual work, the necessity and feasibility of building a cloud audit platform for social (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  52
    Printing Insecurity? The Security Implications of 3D-Printing of Weapons.Gerald Walther - 2015 - Science and Engineering Ethics 21 (6):1435-1445.
    In 2013, the first gun printed out of plastic by a 3D-printer was successfully fired in the US. This event caused a major media hype about the dangers of being able to print a gun. Law enforcement agencies worldwide were concerned about this development and the potentially huge security implications of these functional plastic guns. As a result, politicians called for a ban of these weapons and a control of 3D-printing technology. This paper reviews the security implications of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  44.  38
    European Security. The European Powers in Soviet Foreign Policy 1966 to 1972. [REVIEW]Dieter Boden - 1975 - Philosophy and History 8 (2):303-305.
  45.  17
    Security as a political concept.Isaac Taylor - 2024 - Inquiry: An Interdisciplinary Journal of Philosophy:1-27.
    Many governmental policies are justified by the need to protect national security. But the concept of security is often underspecified in this context. If nothing else, security involves freedom from (significant) risks of harm. But should we expand our conception of security to include other elements? This paper argues that, in answering this question, we need to consider the role that security plays in politics. It defends a conception of security that locates its (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  46.  66
    Inclusion or Exclusion? Local Ownership and Security Sector Reform.Timothy Donais - 2009 - Studies in Social Justice 3 (1):117-131.
    This paper explores the dynamics of security sector reform (SSR), a term used to refer to efforts made to reform the security structures of states emerging from conflict or authoritarianism. While "local ownership" is increasingly viewed as a necessary element of any sustainable SSR strategy, there remains a significant gap between international policy and practice in this area. In practice, the SSR agenda continues to be driven largely by international actors, with minimal input, let alone ownership, on the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  47.  30
    Contextualizing Security Innovation: Responsible Research and Innovation at the Smart Border?Frederik C. Huettenrauch & Nina Klimburg-Witjes - 2021 - Science and Engineering Ethics 27 (1):1-19.
    Current European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  91
    Timescapes of security: Clocks, clouds, and the complexity of security governance.Emilian Kavalski - 2009 - World Futures 65 (7):527 – 551.
    This article pulls together the disjointed complexification of security studies. Such analytical overview suggests that the perspective of “timescapes” allows for exploring the complexity that shapes meanings and practices of security and its governance. In this respect, it is the imperative to change that suggests the significance of complexity thinking to security studies—that is, it is alone in taking the discontinuities of global life seriously. Security, in this regard, is not merely about the clockwork of survival, (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  49.  43
    New approaches to security and defense policy.Hans-Georg Knoche - 1990 - World Futures 29 (3):197-198.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  50. Human Experiments and National Security: The Need to Clarify Policy.Jonathan D. Moreno - 2003 - Cambridge Quarterly of Healthcare Ethics 12 (2):192-195.
    On September 4, 2001, press reports indicated that the Defense Intelligence Agency of the U.S. Department of Defense planned to reproduce a strain of anthrax virus suspected of being held in Russian laboratories. According to the same reports, the Central Intelligence Agency, under the auspices of Project Clear Vision, is engaged in building replicas of bomblets believed to have been developed by the former Soviet Union. These small bombs were designed to disperse biological agents, including anthrax. Government attorneys were said (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 991