Academic literature on the topic 'Collective Security. eng'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Collective Security. eng.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Collective Security. eng"

1

Türsan, Huri. "La sécurité collective : chimère, éphémère ou mutante ?" Res Publica 36, no. 1 (1994): 67–84. http://dx.doi.org/10.21825/rp.v36i1.18754.

Full text
Abstract:
The joint international action against Iraq and the search for a new security doctrine following the end of the Cold War, led, in the early '90s, to a revival of the notion of collective security embodied in several international agreements. This notion is based on the assumption of responding collectively to international aggression. However, the international guagmires of recent years and especially the case of former Yugoslavia where international organizations have played the role of alibi to agression, has once more, dealt a major blow to the illusion of the implementation of the principl
APA, Harvard, Vancouver, ISO, and other styles
2

Snyman, Dirk, and Hennie Kruger. "The application of behavioural thresholds to analyse collective behaviour in information security." Information & Computer Security 25, no. 2 (2017): 152–64. http://dx.doi.org/10.1108/ics-03-2017-0015.

Full text
Abstract:
Purpose The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns. Design/methodology/approach Generic behavioural threshold analysis is presented and then applied in the domain of information security by collecting data on the behavioural thresholds of individuals in a group setting and how the individuals influence each other when it comes to security behaviour. Findings Initial experimental results show that behavioural threshold analysis is feasible in the context of informat
APA, Harvard, Vancouver, ISO, and other styles
3

Cîrdei, Ionuţ Alin. "The End of Oil and Its Impact on National and Collective Security." Land Forces Academy Review 25, no. 1 (2020): 1–7. http://dx.doi.org/10.2478/raft-2020-0001.

Full text
Abstract:
AbstractToday’s society is heavily dependent on fossil energy resources and especially on oil, which is the basis of the entire transport system and beyond. The need for energy resources will increase with the passage of time, in the context in which the population of the world grows, and the fulfillment of its basic needs implies an increasing consumption of energy. The fossil energy resources are in finite quantity, and their depletion is a matter of time, even if the moment when they will disappear is quite remote, due to the discovery of new deposits, the improvement of extraction technolo
APA, Harvard, Vancouver, ISO, and other styles
4

Brigden, Cathy. "Unions and Collective Bargaining in 2009." Journal of Industrial Relations 52, no. 3 (2010): 321–34. http://dx.doi.org/10.1177/0022185610365634.

Full text
Abstract:
With the global financial crisis posing an ongoing threat to job security, more positive experiences of trade unions were often overshadowed in 2009. The passage and commencement of the Fair Work Act finally brought Work Choices to an end, or so it seemed until leadership change in the federal Liberal Party revived debate over individual contracts at the end of the year. The still difficult relationship between the unions and the Rudd federal government was in evidence throughout the year, and was underlined at the ACTU Congress. The return of Telstra and the major banks to the bargaining tabl
APA, Harvard, Vancouver, ISO, and other styles
5

Froelicher, David, Patricia Egger, João Sá Sousa, et al. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.

Full text
Abstract:
Abstract Current solutions for privacy-preserving data sharing among multiple parties either depend on a centralized authority that must be trusted and provides only weakest-link security (e.g., the entity that manages private/secret cryptographic keys), or leverage on decentralized but impractical approaches (e.g., secure multi-party computation). When the data to be shared are of a sensitive nature and the number of data providers is high, these solutions are not appropriate. Therefore, we present UnLynx, a new decentralized system for efficient privacy-preserving data sharing. We consider m
APA, Harvard, Vancouver, ISO, and other styles
6

Canca, Hakan Selim. "Defeating terrorism, piracy and armed robbery against ships in a collective maritime security system." International Journal of Human Sciences./ Uluslararası İnsan Bilimleri Dergisi 11, no. 1 (2014): 1282–300. http://dx.doi.org/10.14687/ijhs.v11i1.2951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Braeken, An, Pardeep Kumar, and Andrew Martin. "Efficient and Privacy-Preserving Data Aggregation and Dynamic Billing in Smart Grid Metering Networks." Energies 11, no. 8 (2018): 2085. http://dx.doi.org/10.3390/en11082085.

Full text
Abstract:
The smart grid enables convenient data collection between smart meters and operation centers via data concentrators. However, it presents security and privacy issues for the customer. For instance, a malicious data concentrator cannot only use consumption data for malicious purposes but also can reveal life patterns of the customers. Recently, several methods in different groups (e.g., secure data aggregation, etc.) have been proposed to collect the consumption usage in a privacy-preserving manner. Nevertheless, most of the schemes either introduce computational complexities in data aggregatio
APA, Harvard, Vancouver, ISO, and other styles
8

Mitchener-Nissen, Timothy. "Failure to collectively assess security surveillance technologies will inevitably lead to an absolute surveillance society." Surveillance & Society 12, no. 1 (2013): 73–88. http://dx.doi.org/10.24908/ss.v12i1.4364.

Full text
Abstract:
When assessing any security technology which impacts upon privacy, whether this constitutes a new technology or the novel application of existing technologies, we should do so by examining the combined effect of all security interventions currently employed within a society. This contrasts with the prevailing system whereby the impact of a new security technology is predominantly assessed on an individual basis by a subjective balancing of the security benefits of that technology against any reductions in concomitant rights, such as privacy and liberty. I contend that by continuing to focus on
APA, Harvard, Vancouver, ISO, and other styles
9

Moner, Ramon Alos. "Employment regulation in collective bargaining in Spain." Transfer: European Review of Labour and Research 7, no. 4 (2001): 674–81. http://dx.doi.org/10.1177/102425890100700410.

Full text
Abstract:
Concern surrounding employment issues such as job creation, job security and job quality has led to these issues being included in the collective bargaining process in Spain. Nevertheless, there are a number of matters which should receive greater attention from the social partners in future. Of particular importance is the need to co-ordinate collective bargaining in order to make it more flexible, i.e. more adaptable, whilst at the same time providing a stable framework in order to avoid the problems associated with the fragmentation of employment conditions. This article looks at the evolut
APA, Harvard, Vancouver, ISO, and other styles
10

Flynn, Gregory, and Henry Farrell. "Piecing Together the Democratic Peace: The CSCE, Norms, and the “Construction” of Security in Post–Cold War Europe." International Organization 53, no. 3 (1999): 505–35. http://dx.doi.org/10.1162/002081899550977.

Full text
Abstract:
The end of the Cold War has profoundly transformed Europe's security situation. Although traditional security issues remain important, the most immediate threats to security since 1989 have originated not from relations between states, but from instability and conflict within states that has threatened to spill over into the interstate arena. States' efforts to shape and control this new security environment have resulted in a unique hybrid arrangement containing elements of traditional alliances, great power concerts, state and community building, and collective security.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Collective Security. eng"

1

Dall, Evedove Leonardo Ulian. "O conceito de segurança da Organização do Tratado do Atlântico Norte (OTAN) e a intervenção dos Balcãs (1999) /." São Paulo : [s.n.], 2009. http://hdl.handle.net/11449/96014.

Full text
Abstract:
Orientador: Suzeley Kalil Mathias<br>Banca: Héctor Luís Saint-Pierre<br>Banca: Flávio Rocha de Oliveira<br>O Programa de Pós-Graduação em Relações Internacionais é instituído em parceria com a Unesp/Unicamp/PUC-SP, em projeto subsidiado pela CAPES, intitulado "Programa San Tiago Dantas".<br>Resumo: Neste trabalho, avaliamos se a intervenção da OTAN no Kosovo corresponde a uma nova concepção de segurança desenvolvido pela Organização, conforme defendem seus países-membros em documentos oficiais da década de 1990. A Organização do Tratado do Atlântico Norte (OTAN) constituiu-se, desde sua fundaç
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Collective Security. eng"

1

Blokker, Niels. Reconfiguring the Un System of Collective Security. Edited by Marc Weller. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780199673049.003.0009.

Full text
Abstract:
This chapter examines pacific settlement and collective security as the primary instruments of the United Nations for promoting and underwriting international security. It begins by focusing on the development of newer approaches to UN-centred collective security in the new millennium in response to increased security threats. The chapter discusses economic sanctions, consent-based peacekeeping, robust peace operations, the coercive responsibility to protect (R2P), and nuclear security. In particular, it considers the evolution of peacekeeping side by side with preventive diplomacy, as well as
APA, Harvard, Vancouver, ISO, and other styles
2

Gill, Terry. When Does Self-Defence End? Edited by Marc Weller. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780199673049.003.0034.

Full text
Abstract:
This chapter discusses issues surrounding the suspension and termination of the right of self-defence. More specifically, it examines whether the right to exercise self-defence ends once an initial attack has been dealt with, or whether the right to exercise self-defence remains operative until the threat has been neutralized. The chapter first considers the nature of self-defence and the modalities of armed attack in relation to the duration of the initial attack and possible subsequent attacks. It then looks at the principles of necessity, proportionality, and immediacy in the context of the
APA, Harvard, Vancouver, ISO, and other styles
3

Lawson, Stephanie. 17. Security and Insecurity. Oxford University Press, 2017. http://dx.doi.org/10.1093/hepl/9780198704386.003.0018.

Full text
Abstract:
This chapter examines traditional concepts of security and insecurity in the realm of international politics. It first considers Thomas Hobbes's account of the state of nature and the emergence of the power politics approach to security as worked out by Hans Morgenthau and his successors. It then discusses the evolution of security thinking through to the end of the Cold War, ideas about collective security as embodied in the United Nations and the nature of security cooperation in Europe through NATO. It also explores some pressing security challenges in the post-Cold War period and the broad
APA, Harvard, Vancouver, ISO, and other styles
4

Lippert, Randy, and Kevin Walby. A Criminology of Policing and Security Frontiers. Policy Press, 2019. http://dx.doi.org/10.1332/policypress/9781529202489.001.0001.

Full text
Abstract:
Policing and security provision are subjects central to criminology. Yet there are newer and neglected forms that are currently unscrutinised. By examining the work of community safety officers, ambassador patrols, conservation officers, and private police foundations, who operate on and are animated by a frontier, this book reveals why criminological inquiry must reach beyond traditional conceptual and methodological boundaries in the twenty-first century. Including novel case studies, this multi-disciplinary and international book assembles a rich collection of policing and security frontier
APA, Harvard, Vancouver, ISO, and other styles
5

Imlay, Talbot C. European Socialists and the International Order, 1918–1925. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780199641048.003.0004.

Full text
Abstract:
This chapter examines the collective efforts of British, French, and German socialists to place a socialist stamp on the emerging post-war political order both within and between countries. The period covered runs from the end of the First World War to the mid-1920s, a moment that several recent scholars have identified as marking the end of the post-war period and the making of a ‘real peace’. In exploring the post-war practice of socialist internationalism, the chapter focuses on a series of interlocking issues: the peace treaties; national self-determination; reparations and economic recons
APA, Harvard, Vancouver, ISO, and other styles
6

Hedberg, Masha, and Andres Kasekamp. Baltic States. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.003.0012.

Full text
Abstract:
Since the end of the cold war, Estonia, Latvia, and Lithuania have been confronted with four major milestones that necessitated the cardinal transformation of their national security and defence policies: the collapse of the Soviet Union, NATO membership, EU accession, and the resurgence of Russia under Putin. This chapter analyses the countries’ responses to these changes and challenges, tracing and explaining the evolution of Estonian, Latvian, and Lithuanian national strategies, military doctrines, and capabilities since 1989. It both provides an analytical overview of how the countries col
APA, Harvard, Vancouver, ISO, and other styles
7

Meijer, Hugo, and Marco Wyss, eds. The Handbook of European Defence Policies and Armed Forces. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198790501.001.0001.

Full text
Abstract:
The armed forces of Europe have undergone a dramatic transformation since the collapse of the Soviet Union. The Handbook of European Defence Policies and Armed Forces provides the first comprehensive analysis of national security and defence policies, strategies, doctrines, capabilities, and military operations, as well as the alliances and partnerships of European armed forces in response to the security challenges Europe has faced since the end of the cold war. A truly cross-European comparison of the evolution of national defence policies and armed forces remains a notable blind spot in the
APA, Harvard, Vancouver, ISO, and other styles
8

Dwyer, Peter, ed. Dealing with Welfare Conditionality. Policy Press, 2019. http://dx.doi.org/10.1332/policypress/9781447341826.001.0001.

Full text
Abstract:
This edited collection considers how conditional welfare policies and services are implemented and experienced by a diverse range of welfare service users across a range of UK policy domains including social security, homelessness, migration and criminal justice. The book showcases the insights and findings of a series of distinct, independent studies undertaken by early career researchers associated with the ESRC funded Welfare Conditionality project. Each chapter presents a new empirical analysis of data generated in fieldwork conducted with practitioners charged with interpreting and delive
APA, Harvard, Vancouver, ISO, and other styles
9

Randhawa, Gurvaneet S., and Edwin A. Lomotan. Harnessing Big Data-Based Technologies to Improve Cancer Care. Edited by David A. Chambers, Wynne E. Norton, and Cynthia A. Vinson. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190647421.003.0034.

Full text
Abstract:
Big data promises to harness the power of advanced computing to transform health and health care, including cancer research and care delivery. In health care, big data can be generated by administrative and clinical processes, by patients and families, and by machines. Ultimately, the goal of big data is to transform data into actionable knowledge with attention to four dimensions: person-level data collection; data access, exchange, and aggregation; population-level analytics; and provider, researcher, or patient-facing clinical decision support. A fabric of trust forms the basis for policies
APA, Harvard, Vancouver, ISO, and other styles
10

Warren, Aiden, and Damian Grenfell, eds. Rethinking Humanitarian Intervention in the 21st Century. Edinburgh University Press, 2017. http://dx.doi.org/10.3366/edinburgh/9781474423816.001.0001.

Full text
Abstract:
Rethinking Humanitarian Interventions in the 21st Century examines the complex ethics and politics of humanitarian intervention since the end of the Cold War. These 12 essays focus on the challenges associated with interventions, conflict and attendant human rights violations, unmitigated and systematic violence, state re-building, and issues associated with human mobility and dislocation. In a context where layers to conflict are so complex and fluid, it is difficult to imagine one book could ‘rethink interventions’ to the extent that is required. Nevertheless, a contribution to debates can b
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Collective Security. eng"

1

Lamb, Margaret, and Nicholas Tarling. "The End of Collective Security." In From Versailles to Pearl Harbor. Macmillan Education UK, 2001. http://dx.doi.org/10.1007/978-1-4039-3772-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Roberts, Geoffrey. "From Co-operation to Confrontation: The End of Rapallo and the Turn to Collective Security, 1933–1935." In The Soviet Union and the Origins of the Second World War. Macmillan Education UK, 1995. http://dx.doi.org/10.1007/978-1-349-24124-8_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huntjens, Patrick. "Conclusion." In Towards a Natural Social Contract. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-67130-3_8.

Full text
Abstract:
AbstractIn this book, I argue that the societal fault lines of our times are deeply intertwined and that they confront us with challenges affecting the security, fairness, and sustainability of our societies. Overcoming these existential challenges will require a fundamental shift from our current anthropocentric and economic growth-oriented approach to a more ecocentric and regenerative approach. The outline of a Natural Social Contract presented in this book serves as a counter-proposal to existing social contracts. A Natural Social Contract implies an existential change in the way humankind lives in and interacts with its social and natural environment, and emphasizes long-term sustainability and the general welfare of both humankind and planet Earth. Achieving this crucial balance calls for an end to unlimited economic growth, overconsumption, and overindividualization for the benefit of ourselves, our planet, and future generations. To this end, sustainability, health, and justice in all social-ecological systems will require systemic innovation and prioritizing a collective effort. The Transformative Social-Ecological Innovation (TSEI) framework presented in this book serves that cause. It helps to diagnose and advance innovation and spur change across sectors, disciplines, and at different levels of governance. Altogether, TSEI identifies intervention points and formulates jointly developed and shared solutions to inform policy- and lawmakers, administrators, concerned citizens, and professionals dedicated towards a more sustainable, healthy, and just society.
APA, Harvard, Vancouver, ISO, and other styles
4

Köhler, Peter A. "Occupational Supplementary Insurance in Sweden – Collectively Agreed Addition to the Statutory Pension Insurance." In Steuerung der betrieblichen Altersversorgung in Europa: garantierte Sicherheit? Governance of Occupational Pensions in Europe: Guaranteed Security? Gouvernance des retraites professionnelles en Europe: Sécurité garantie? Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-15731-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"The End of Collective Security, 1935–37." In Post-Victorian Britain 1902-1951. Routledge, 2003. http://dx.doi.org/10.4324/9780203406441-29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Bachleitner, Kathrin. "Temporal Security in IR." In Collective Memory in International Relations. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192895363.003.0002.

Full text
Abstract:
The first chapter of this book theoretically conceptualizes collective memory in international relations (IR). The link between the IR discipline and the interdisciplinary collective memory concept is provided through the framework of ontological security. The inquiry begins by extrapolating the nature of ontological security and its most essential component: state identity. It then moves on to theorize collective memory as the underlying carrier of state identity. Collective memory highlights identity’s temporal dimension and manifests it within the collective frameworks of narration. At the end, a new approach, ‘temporal security’, is developed. It combines the ontological security of being with the definition of memory as being-in-time. Security-seeking behaviour for states now implies to be temporally grounded in a consistent narrative that links past, present, and future. The reference point for this as of yet untheorized security need is collective memory. Manifesting itself in the varying forms of political strategy, public identity, state behaviour, and national values, collective memory thus navigates countries through time in IR.
APA, Harvard, Vancouver, ISO, and other styles
7

Bachleitner, Kathrin. "Memory as State Behaviour." In Collective Memory in International Relations. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780192895363.003.0005.

Full text
Abstract:
This chapter shows how collective memory channels a country’s international behaviour. To that end, it first lays out the nexus between memory and state behaviour put forward by the temporal security concept. It then goes on to distinguish it from international relations’ classical realist and ontological security approaches and their predictions on state behaviour. To keep their temporal security intact, countries are assumed to enter into an ‘in-between-time’ conversation with their ‘significant historical others’. Through the emotional trigger of shame, policymakers avoid potential disconnects with their country’s ‘narrated self in the past’, thus bringing their courses of action in line with collective memory. To illustrate this process, the empirical case study looks at the reaction of West Germany and Austria to two wars in the Middle East. It contrasts their support for either of the warring parties during the Six Day War of 1967 and the Yom Kippur War and international oil crisis of 1973. The qualitative analysis demonstrates that West Germany and Austria’s different collective memories of the Nazi legacy channelled their behaviour along diverse reasonings to support either the Israeli or the Arab side.
APA, Harvard, Vancouver, ISO, and other styles
8

Gaeta, Paola, Jorge E. Viñuales, and Salvatore Zappalà. "16. Collective Security and the use of Armed Force." In Cassese's International Law. Oxford University Press, 2020. http://dx.doi.org/10.1093/he/9780199231287.003.0016.

Full text
Abstract:
The Cold War era prevented the UN Security Council from using most of the powers provided for by the UN Charter, including adopting measures under Chapter VII (the so-called ‘collective security system’ which provides for measures ranging from sanctions to the use of armed force) for events deemed (by the Security Council) to be threats to the peace, breaches of the peace, or acts of aggression. However, the end of the Cold War enabled the Security Council to take some of the measures short of force envisaged in Article 41 and to interpret creatively the provisions of the Charter so as to authorize enforcement action through the use of armed force by individual States or coalitions of States. This chapter discusses measures short of armed force; peacekeeping operations; resort to force by States, as well as regional and other organizations, upon authorization of the Security Council; the special case of authorization to use force given by the General Assembly; as well as the right to self-defence and the various situations in which armed force has been used unilaterally by States.
APA, Harvard, Vancouver, ISO, and other styles
9

Lawson, Stephanie. "19. Security and Insecurity." In Introduction to Politics. Oxford University Press, 2020. http://dx.doi.org/10.1093/hepl/9780198820611.003.0019.

Full text
Abstract:
This chapter examines traditional concepts of security and insecurity in the realm of international politics. It first considers Thomas Hobbes’s account of the state of nature and the emergence of the power politics approach to security as worked out by Hans Morgenthau and his successors. It then discusses the evolution of security thinking through to the end of the Cold War, ideas about collective security as embodied in the United Nations and the nature of security cooperation in Europe through NATO. It also explores some pressing security challenges in the post-Cold War period and the broadening of the security agenda to encompass more recent concerns ranging from environmental security to energy security and the notions of ‘human security’ and ‘responsibility to protect’. Finally, it analyses the ‘global war on terror’ and especially how the 9/11 attacks affected the discourse on security and insecurity.
APA, Harvard, Vancouver, ISO, and other styles
10

Lawson, Stephanie. "6. Security and Insecurity." In Global Politics. Oxford University Press, 2021. http://dx.doi.org/10.1093/hepl/9780198844327.003.0006.

Full text
Abstract:
This chapter assesses the general concept of security and the way in which issues come to be ‘securitized’. The security of the sovereign state, in a system of states, and existing under conditions of anarchy, has been the traditional focus of studies in global or international politics. Security in this context has therefore been concerned largely with the threats that states pose to each other. Over the last few decades, however, the agenda for security in global politics has expanded, and so too has its conceptualization. The chapter looks at traditional approaches to security and insecurity, revisiting the Hobbesian state of nature and tracing security thinking in global politics through to the end of the Cold War. This is followed by a discussion of ideas about collective security as embodied in the UN, paying particular attention to the role of the Security Council and the issue of intervention in the post-Cold War period. This period has also seen the broadening of the security agenda to encompass concerns such as gender security, environmental security, cyber security, and the diffuse concept of ‘human security’. Finally, the chapter provides an overview of the ‘war on terror’, raising further questions concerning how best to deal with non-conventional security threats.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Collective Security. eng"

1

Roukounaki, Aikaterini, Sofoklis Efremidis, John Soldatos, Juergen Neises, Thomas Walloschke, and Nikos Kefalakis. "Scalable and Configurable End-to-End Collection and Analysis of IoT Security Data : Towards End-to-End Security in IoT Systems." In 2019 Global IoT Summit (GIoTS). IEEE, 2019. http://dx.doi.org/10.1109/giots.2019.8766407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Heydari, Vahid, and Seong-Moo Yoo. "EACK: End-to-End Acknowledgement-Based Method for Reliable Data Collection in Wireless Sensor Networks." In 2015 2nd International Conference on Information Science and Security (ICISS). IEEE, 2015. http://dx.doi.org/10.1109/icissec.2015.7370998.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sabate, Andrew C., Em Julius De La Cruz, and Christopher Rieck. "Failure Analysis Process Improvement Using Barcode Equipment Management System." In ISTFA 2016. ASM International, 2016. http://dx.doi.org/10.31399/asm.cp.istfa2016p0294.

Full text
Abstract:
Abstract Failure Analysis (FA) process improvement is vital to cope with increasing demand on FA cycle time reduction from end customer. Real time failure analysis update, equipment usage data collection, and equipment security enhancement plays significant factor on cycle time reduction. This paper aims to discuss the barcode equipment management system in aiding FA Lab for process improvement.
APA, Harvard, Vancouver, ISO, and other styles
4

Alharthi, Dalal, and Amelia Regan. "Social Engineering Infosec Policies (SE-IPS)." In 8th International Conference on Artificial Intelligence and Applications (AIAP 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110104.

Full text
Abstract:
The sudden increase in employees working primarily or even exclusively at home has generated unique societal and economic circumstances which makes the protection of information assets a major problem for organizations. The application of security policies is essential for mitigating the risk of social engineering attacks. However, incorporating and enforcing successful security policies in an organization is not a straightforward task. To that end, this paper develops a model of Social Engineering InfoSec Policies (SE-IPs) and investigates the incorporation of those SE-IPs in organizations. T
APA, Harvard, Vancouver, ISO, and other styles
5

Mills, Jeffrey, Tabitha Dwyer, Jennie Ablanedo, Tamara Griffith, Elwin Collins, and Ron Acker. "Crime scene evidence collection as a Virtual Reality use case." In The 8th International Defence and Homeland Security Simulation Workshop. CAL-TEK srl, 2018. http://dx.doi.org/10.46354/i3m.2018.dhss.002.

Full text
Abstract:
"Virtual Reality (VR) is an interface strategy that completely immerses the user into a virtual environment. Users with head mounted displays (HMD) see and hear the immersive space as if they are no longer in the real world. Instead they are fully wrapped in the surroundings of the virtual space. While VR has been around for many years, recent advances in commercial technology have provided a surge of costeffective devices to mainstream end-users. With this surge in hardware availability, software developers have been exploring ways to make use of VR to design engaging training experiences. Th
APA, Harvard, Vancouver, ISO, and other styles
6

Parekh, Mithil, Yuan Gao, Mariana Jockenhoevel-Barttfeld, and Karl Waedt. "Confluent Modeling of Heterogeneous Safety and Operational I&C Systems." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-67333.

Full text
Abstract:
Individual systems or groups of systems related to the safety and operational I&amp;C, and Electrical Systems (ES) are gradually replaced in existing Nuclear Power Plants (NPPs) as part of modernization projects. Modernizations are usually scheduled over multiple years. Different automation platform generations and safety-related product families are deployed to progressively replace legacy systems. Typically, each of the new I&amp;C platforms and products have their own set of engineering tools. One challenge for the modernization of installed systems is the safety and security approval of th
APA, Harvard, Vancouver, ISO, and other styles
7

Cherubini, N., A. Dodaro, G. Gandolfo, et al. "The Neutron Active Interrogation System for In-Field Detection of Transuranic-Based Radioactive Dispersal Devices for Security Applications." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-81422.

Full text
Abstract:
The increasing of terror menace in recent years led the international community to enhance the efforts to minimize threats to people in everyday life by developing devices, techniques, and procedures targeted to improve the collective security. In this framework the Italian National Agency for New Technologies, Energy and Sustainable Economic Development (ENEA) developed a new device to improve CBRNe resilience, the Neutron Active Interrogation system (NAI). It has been conceived and optimized to identify transuranic-based Radioactive Dispersal Devices potentially hidden in packages, envisagin
APA, Harvard, Vancouver, ISO, and other styles
8

Ivan, Lucian. "Management of Covid-19 Crisis at the Level of Defence Industry." In International Conference Innovative Business Management & Global Entrepreneurship. LUMEN Publishing, 2020. http://dx.doi.org/10.18662/lumproc/ibmage2020/21.

Full text
Abstract:
According to estimates and analyses by the international community of economic analysts, the medical crisis generated by the Covid-19 pandemic will induce a major economic and financial crisis worldwide which, in conjunction with the current geopolitical situation, characterized by a high degree of uncertainty (e.g. strategic economic confrontation between the US and China, the position of force adopted by the Russian Federation), will affect production and supply chains, amplify the phenomenon of the adoption of trade policies of a protectionist nature, and, indirectly, will significantly aff
APA, Harvard, Vancouver, ISO, and other styles
9

Boyle, N., B. Archambault, A. Hagen, C. Meert, and R. P. Taleyarkhan. "Detection of Radon-Progeny and Other Alpha-Emitting Radionuclides in Air Using Tensioned Metastable Fluid Detectors." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-66805.

Full text
Abstract:
Alpha radiation emitting radon (Rn) gas seepage into homes in the USA leads to over 21,000 annual lung cancer deaths (according to the US-Environmental Protection Agency, EPA) leading to mandatory monitoring for Rn throughout the USA. In the nuclear industry alpha emitting radionuclides in air (e.g., in spent fuel reprocessing) also constitute a major safety and security-safeguards related issues. Purdue University, along with Sagamore Adams Laboratories LLC, is developing the tensioned metastable fluid detector (TMFD) technology for general-purpose alpha-neutron-fission spectroscopy. This pap
APA, Harvard, Vancouver, ISO, and other styles
10

Cap, Constant. "The Importance of Participation and Inclusion in African Urbanization. A focused look at Transport and Housing Projects." In 55th ISOCARP World Planning Congress, Beyond Metropolis, Jakarta-Bogor, Indonesia. ISOCARP, 2019. http://dx.doi.org/10.47472/dmcz6151.

Full text
Abstract:
According to the World Bank (2015) Africa’s urbanization rate has surpassed other parts of the world. It is believed that by 2030, over 50% of Africans will reside in Urban Centres. Kenya is among the African counties that has experienced a tremendous increase in her urban population. This is most visible in the capital, the primate city of Nairobi. The growth has led to increased pressure on basic needs like housing, transport, water, education and security. Coupled with unequal economic development and social benefits, the result has been the tremendous expansion of informal sectors across f
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Collective Security. eng"

1

Idris, Iffat. Documentation of Survivors of Gender-based Violence (GBV). Institute of Development Studies (IDS), 2021. http://dx.doi.org/10.19088/k4d.2021.103.

Full text
Abstract:
This review is largely based on grey literature, in particular policy documents and reports by international development organizations. While there was substantial literature on approaches and principles to GBV documentation, there was less on remote service delivery such as helplines – much of this only in the wake of the COVID-19 pandemic. In addition, very little was found on actual examples of GBV documentation in developing contexts. By definition, gender featured strongly in the available literature; the particular needs of persons with disabilities were also addressed in discussions of
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!