To see the other types of publications on this topic, follow the link: Collective Security. eng.

Journal articles on the topic 'Collective Security. eng'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Collective Security. eng.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Türsan, Huri. "La sécurité collective : chimère, éphémère ou mutante ?" Res Publica 36, no. 1 (1994): 67–84. http://dx.doi.org/10.21825/rp.v36i1.18754.

Full text
Abstract:
The joint international action against Iraq and the search for a new security doctrine following the end of the Cold War, led, in the early '90s, to a revival of the notion of collective security embodied in several international agreements. This notion is based on the assumption of responding collectively to international aggression. However, the international guagmires of recent years and especially the case of former Yugoslavia where international organizations have played the role of alibi to agression, has once more, dealt a major blow to the illusion of the implementation of the principl
APA, Harvard, Vancouver, ISO, and other styles
2

Snyman, Dirk, and Hennie Kruger. "The application of behavioural thresholds to analyse collective behaviour in information security." Information & Computer Security 25, no. 2 (2017): 152–64. http://dx.doi.org/10.1108/ics-03-2017-0015.

Full text
Abstract:
Purpose The purpose of this study is to perform an exploratory investigation into the feasibility of behavioural threshold analysis as a possible aid in security awareness campaigns. Design/methodology/approach Generic behavioural threshold analysis is presented and then applied in the domain of information security by collecting data on the behavioural thresholds of individuals in a group setting and how the individuals influence each other when it comes to security behaviour. Findings Initial experimental results show that behavioural threshold analysis is feasible in the context of informat
APA, Harvard, Vancouver, ISO, and other styles
3

Cîrdei, Ionuţ Alin. "The End of Oil and Its Impact on National and Collective Security." Land Forces Academy Review 25, no. 1 (2020): 1–7. http://dx.doi.org/10.2478/raft-2020-0001.

Full text
Abstract:
AbstractToday’s society is heavily dependent on fossil energy resources and especially on oil, which is the basis of the entire transport system and beyond. The need for energy resources will increase with the passage of time, in the context in which the population of the world grows, and the fulfillment of its basic needs implies an increasing consumption of energy. The fossil energy resources are in finite quantity, and their depletion is a matter of time, even if the moment when they will disappear is quite remote, due to the discovery of new deposits, the improvement of extraction technolo
APA, Harvard, Vancouver, ISO, and other styles
4

Brigden, Cathy. "Unions and Collective Bargaining in 2009." Journal of Industrial Relations 52, no. 3 (2010): 321–34. http://dx.doi.org/10.1177/0022185610365634.

Full text
Abstract:
With the global financial crisis posing an ongoing threat to job security, more positive experiences of trade unions were often overshadowed in 2009. The passage and commencement of the Fair Work Act finally brought Work Choices to an end, or so it seemed until leadership change in the federal Liberal Party revived debate over individual contracts at the end of the year. The still difficult relationship between the unions and the Rudd federal government was in evidence throughout the year, and was underlined at the ACTU Congress. The return of Telstra and the major banks to the bargaining tabl
APA, Harvard, Vancouver, ISO, and other styles
5

Froelicher, David, Patricia Egger, João Sá Sousa, et al. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.

Full text
Abstract:
Abstract Current solutions for privacy-preserving data sharing among multiple parties either depend on a centralized authority that must be trusted and provides only weakest-link security (e.g., the entity that manages private/secret cryptographic keys), or leverage on decentralized but impractical approaches (e.g., secure multi-party computation). When the data to be shared are of a sensitive nature and the number of data providers is high, these solutions are not appropriate. Therefore, we present UnLynx, a new decentralized system for efficient privacy-preserving data sharing. We consider m
APA, Harvard, Vancouver, ISO, and other styles
6

Canca, Hakan Selim. "Defeating terrorism, piracy and armed robbery against ships in a collective maritime security system." International Journal of Human Sciences./ Uluslararası İnsan Bilimleri Dergisi 11, no. 1 (2014): 1282–300. http://dx.doi.org/10.14687/ijhs.v11i1.2951.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Braeken, An, Pardeep Kumar, and Andrew Martin. "Efficient and Privacy-Preserving Data Aggregation and Dynamic Billing in Smart Grid Metering Networks." Energies 11, no. 8 (2018): 2085. http://dx.doi.org/10.3390/en11082085.

Full text
Abstract:
The smart grid enables convenient data collection between smart meters and operation centers via data concentrators. However, it presents security and privacy issues for the customer. For instance, a malicious data concentrator cannot only use consumption data for malicious purposes but also can reveal life patterns of the customers. Recently, several methods in different groups (e.g., secure data aggregation, etc.) have been proposed to collect the consumption usage in a privacy-preserving manner. Nevertheless, most of the schemes either introduce computational complexities in data aggregatio
APA, Harvard, Vancouver, ISO, and other styles
8

Mitchener-Nissen, Timothy. "Failure to collectively assess security surveillance technologies will inevitably lead to an absolute surveillance society." Surveillance & Society 12, no. 1 (2013): 73–88. http://dx.doi.org/10.24908/ss.v12i1.4364.

Full text
Abstract:
When assessing any security technology which impacts upon privacy, whether this constitutes a new technology or the novel application of existing technologies, we should do so by examining the combined effect of all security interventions currently employed within a society. This contrasts with the prevailing system whereby the impact of a new security technology is predominantly assessed on an individual basis by a subjective balancing of the security benefits of that technology against any reductions in concomitant rights, such as privacy and liberty. I contend that by continuing to focus on
APA, Harvard, Vancouver, ISO, and other styles
9

Moner, Ramon Alos. "Employment regulation in collective bargaining in Spain." Transfer: European Review of Labour and Research 7, no. 4 (2001): 674–81. http://dx.doi.org/10.1177/102425890100700410.

Full text
Abstract:
Concern surrounding employment issues such as job creation, job security and job quality has led to these issues being included in the collective bargaining process in Spain. Nevertheless, there are a number of matters which should receive greater attention from the social partners in future. Of particular importance is the need to co-ordinate collective bargaining in order to make it more flexible, i.e. more adaptable, whilst at the same time providing a stable framework in order to avoid the problems associated with the fragmentation of employment conditions. This article looks at the evolut
APA, Harvard, Vancouver, ISO, and other styles
10

Flynn, Gregory, and Henry Farrell. "Piecing Together the Democratic Peace: The CSCE, Norms, and the “Construction” of Security in Post–Cold War Europe." International Organization 53, no. 3 (1999): 505–35. http://dx.doi.org/10.1162/002081899550977.

Full text
Abstract:
The end of the Cold War has profoundly transformed Europe's security situation. Although traditional security issues remain important, the most immediate threats to security since 1989 have originated not from relations between states, but from instability and conflict within states that has threatened to spill over into the interstate arena. States' efforts to shape and control this new security environment have resulted in a unique hybrid arrangement containing elements of traditional alliances, great power concerts, state and community building, and collective security.
APA, Harvard, Vancouver, ISO, and other styles
11

Koloveas, Paris, Thanasis Chantzios, Sofia Alevizopoulou, Spiros Skiadopoulos , and Christos Tryfonopoulos . "inTIME: A Machine Learning-Based Framework for Gathering and Leveraging Web Data to Cyber-Threat Intelligence." Electronics 10, no. 7 (2021): 818. http://dx.doi.org/10.3390/electronics10070818.

Full text
Abstract:
In today’s world, technology has become deep-rooted and more accessible than ever over a plethora of different devices and platforms, ranging from company servers and commodity PCs to mobile phones and wearables, interconnecting a wide range of stakeholders such as households, organizations and critical infrastructures. The sheer volume and variety of the different operating systems, the device particularities, the various usage domains and the accessibility-ready nature of the platforms creates a vast and complex threat landscape that is difficult to contain. Staying on top of these evolving
APA, Harvard, Vancouver, ISO, and other styles
12

Papoutsakis, Manos, Konstantinos Fysarakis, George Spanoudakis, Sotiris Ioannidis, and Konstantina Koloutsou. "Towards a Collection of Security and Privacy Patterns." Applied Sciences 11, no. 4 (2021): 1396. http://dx.doi.org/10.3390/app11041396.

Full text
Abstract:
Security and privacy (SP)-related challenges constitute a significant barrier to the wider adoption of Internet of Things (IoT)/Industrial IoT (IIoT) devices and the associated novel applications and services. In this context, patterns, which are constructs encoding re-usable solutions to common problems and building blocks to architectures, can be an asset in alleviating said barrier. More specifically, patterns can be used to encode dependencies between SP properties of individual smart objects and corresponding properties of orchestrations (compositions) involving them, facilitating the des
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Zihao. "The Failure of Collective Security in the Far East——Take the Japanese Invasion of Northeast as an Example." Lifelong Education 9, no. 4 (2020): 133. http://dx.doi.org/10.18282/le.v9i4.938.

Full text
Abstract:
Collective security was originally based on a reflection on the cruel reality of centuries of European international relations. 17th-century William Penn, 18th-century Saint Pierre, Rousseau, Kant, Bentham, 19th-century Saint-Simon, U.S. President Woodrow Wilson at the beginning of the 20th century and others have designed different blueprints for peace. Their peaceful ideals of "idealists" and "utopians" were adopted in the collective security theory of the 20th century. The first attempt at collective security was the establishment of the "International League" after the end of the First Wor
APA, Harvard, Vancouver, ISO, and other styles
14

Muthusenthil, Balaubramanian, and Hyunsung Kim. "SHRP - Secure Hybrid Routing Protocol over Hierarchical Wireless Sensor Networks." International Journal of Computers Communications & Control 12, no. 6 (2017): 854. http://dx.doi.org/10.15837/ijccc.2017.6.2909.

Full text
Abstract:
A data collection via secure routing in wireless sensor networks (WSNs)has given attention to one of security issues. WSNs pose unique security challengesdue to their inherent limitations in communication and computing, which makes vulnerableto various attacks. Thus, how to gather data securely and efficiently based onrouting protocol is an important issue of WSNs. In this paper, we propose a securehybrid routing protocol, denoted by SHRP, which combines the geographic basedscheme and hierarchical scheme. First of all, SHRP differentiates sensor nodes intotwo categories, nodes with GPS (NG) an
APA, Harvard, Vancouver, ISO, and other styles
15

Schlesinger, Arthur M. "America and the World: Isolationism Resurgent?" Ethics & International Affairs 10 (March 1996): 149–63. http://dx.doi.org/10.1111/j.1747-7093.1996.tb00008.x.

Full text
Abstract:
Building on an earlier argument that isolationism may well be America's natural state, Schlesinger explains how the apparent rejection of isolationism during the long standoff with the Soviet Union during the Cold War was nothing more than a reaction to what was perceived as a direct and urgent threat to the security of the United States. In the wake of the Cold War's end, the incompatibility between collective international action and conceptions of national interest has highlighted the difficulties of democracies in sending their armies to war, especially those that do not directly threaten
APA, Harvard, Vancouver, ISO, and other styles
16

Berzan, Aleksander Aleksandrovich, and Svetlana Anatolievna Miklava. "Creation of an end-to-end customs control system as an economic security tool." SHS Web of Conferences 118 (2021): 03008. http://dx.doi.org/10.1051/shsconf/202111803008.

Full text
Abstract:
The purpose of the study is to identify ways to create a system of end-to-end customs control which would improve the efficiency of the activities of customs authorities and increase the level of economic security of the state. The research used methods of analysis and synthesis, formal logical, and comparative-legal method. The analysis of the customs control system resulted in the identified problems that do not allow increasing the efficiency of customs control and the level of economic security of the state. To solve them, the authors propose to organise the collection of primary informati
APA, Harvard, Vancouver, ISO, and other styles
17

KAJETANOWICZ, Jerzy. "POLISH SECURITY STRATEGIES IN THE LATTER HALF OF THE TWENTIETH CENTURY." Scientific Journal of the Military University of Land Forces 161, no. 3 (2011): 238–48. http://dx.doi.org/10.5604/01.3001.0002.3078.

Full text
Abstract:
The article presents the main concepts of the Polish military security strategy after WW2. Three main periods have been identified: the first one in the years of 1945-1955, the second one in the years of 1955-1991 and the third one in the years of 1991-1999. The first period includes the development of domestic security concepts during the post-war period. In the second period the participation of Poland in the Warsaw Pact as a collective security system has been elaborated. The last one, the end of the 20th century, describes the concepts of the Polish national security under the conditions o
APA, Harvard, Vancouver, ISO, and other styles
18

Harshadeep, Nagaraja Rao, and William Young. "Disruptive Technologies for Improving Water Security in Large River Basins." Water 12, no. 10 (2020): 2783. http://dx.doi.org/10.3390/w12102783.

Full text
Abstract:
Large river basins present significant challenges for water resource planning and management. They typically traverse a wide range of hydroclimatic regimes, are characterized by complex and variable hydrology, and span multiple jurisdictions with diverse water demands and values. They are often data-poor and in many developing economies are characterized by weak water governance. Rapid global change is seeing significant changes to the pressures on the water resources of large basins, exacerbating the challenge of sustainable water management. Diverse technologies have long supported water res
APA, Harvard, Vancouver, ISO, and other styles
19

Freymond, Jean. "Neutrality and Security Policy as Components of the Swiss Model." Government and Opposition 23, no. 1 (1988): 51–68. http://dx.doi.org/10.1017/s0017257x00017000.

Full text
Abstract:
IT IS NOT SO EASY TO DETECT THE SPECIFIC FEATURES OF THE Helvetian model in the Switzerland of today. They should rather be sought in what has made Switzerland what it is in seven centuries of the association of different communities, often disunited, fiercely determined to maintain their own sovereignty and independence. Switzerland was born from the conviction that only a system of collective security would in the long term assure to each community the liberty to which all aspired. It was a double liberty: that which was threatened by external aggression, and that which had to be preserved a
APA, Harvard, Vancouver, ISO, and other styles
20

Singh, Arun Kumar. "Human Security in Nepali Perspective." Journal of APF Command and Staff College 2, no. 1 (2019): 60–66. http://dx.doi.org/10.3126/japfcsc.v2i1.26732.

Full text
Abstract:
The conventional security paradigm was challenged and changed, especially after the end of the Cold War. It becomes more specific towards the human security when the UNDP published the Human Development Report in 1994. Thus scope of Human Security specifically focuses on different area which is related to the freedom and dignity of an individual thus it is people centric concept. Due to the globalization after the end of the cold war, the underdeveloped countries like Nepal, got globalized impact on human security. The Human security even more compromised due to the internal armed conflict and
APA, Harvard, Vancouver, ISO, and other styles
21

Li, Yunfa, Yifei Tu, and Jiawa Lu. "Multi-Point Collaborative Authentication Method Based on User Image Intelligent Collection in the Internet of Things." Electronics 8, no. 9 (2019): 978. http://dx.doi.org/10.3390/electronics8090978.

Full text
Abstract:
With the increasing demand for intelligent services of the Internet of Things (IoT), its security issues have attracted widespread attention recently. Since most of the existing identity authentication policies are based on a single authentication mode, they are highly likely to cause problems such as illegal operation and stealing of sensor information. In order to meet the needs of increasing IoT users for the security management of intelligent services, a multi-point collaborative authentication method based on user image intelligent collection for the security problems faced by IoT in iden
APA, Harvard, Vancouver, ISO, and other styles
22

Hristov, Jasmin. "Pro-Capitalist Violence and the Great Wave of Dispossession." Sociology of Development 7, no. 2 (2021): 129–58. http://dx.doi.org/10.1525/sod.2021.7.2.129.

Full text
Abstract:
This article aims to theorize the role of violence in securing and promoting conditions for capital accumulation in the era of globalization by focusing on neoliberal development projects in the global South. To this end, I introduce the concept of pro-capitalist violence, with an emphasis on its manifestations in agrarian contexts in Colombia, Mexico, and Honduras—countries that rank as the deadliest places in the world for defenders of land rights and the environment. I show that not all collective violence in these countries is a product of organized crime, gangs, or armed conflict between
APA, Harvard, Vancouver, ISO, and other styles
23

Yi, Sohoon, and Jennifer Jihye Chun. "Building worker power for day laborers in South Korea’s construction industry." International Journal of Comparative Sociology 61, no. 2-3 (2019): 122–40. http://dx.doi.org/10.1177/0020715219889383.

Full text
Abstract:
This article examines how unions build worker power for day laborers in South Korea’s construction industry in the context of widespread informality. Drawing upon regional case studies of the Korean Construction Workers Union (KCWU), we find that construction day laborers experience poor working conditions and rampant employment violations under multiple layers of subcontracting that enable capital to bypass existing labor laws and regulations. Despite the regulatory challenges of complex subcontracting systems, unions can still exert direct pressure on firms to improve informal working condit
APA, Harvard, Vancouver, ISO, and other styles
24

Hinrichs, Karl. "Elephants on the move. Patterns of public pension reform in OECD countries." European Review 8, no. 3 (2000): 353–78. http://dx.doi.org/10.1017/s1062798700004956.

Full text
Abstract:
Among OECD countries there are two clusters of old-age security systems: (1) ‘Social insurance’ countries had, by the end of the 1960s, fashioned the core of old-age security as public, contributory, earnings-related and unfunded insurance schemes; (2) a diverse collection of countries that, after 1970, topped up their basic pension arrangements with funded occupational pension schemes with (almost) universal coverage. ‘Social insurance’ countries, on which this essay focuses, reveal at least six common trends in pension reform, all about improving the financial sustainability of public scheme
APA, Harvard, Vancouver, ISO, and other styles
25

Hossain, Kamrul, Gerald Zojer, Wilfrid Greaves, J. Miguel Roncero, and Michael Sheehan. "Constructing Arctic security: an inter-disciplinary approach to understanding security in the Barents region." Polar Record 53, no. 1 (2016): 52–66. http://dx.doi.org/10.1017/s0032247416000693.

Full text
Abstract:
ABSTRACTThe field of Security Studies traditionally focused on military threats to states' survival, however, since the end of the Cold War the concept of security has widened and individuals and communities have gradually become viewed as appropriate referent objects of security: Multifaceted challenges facing communities at the sub-state level are increasingly regarded as security threats, including their potential to cause instability for the larger society, thus affecting states’ security. In the Arctic region, a central challenge is that inhabitants are exposed to multiple non-traditional
APA, Harvard, Vancouver, ISO, and other styles
26

HECZKO, Martina, and Josef SMOLÍK. "JAPANESE STRATEGIC DOCUMENTS: CONTENT ANALYSIS OF THE NATIONAL DEFENSE PROGRAM GUIDELINES." Kultura Bezpieczeństwa. Nauka – Praktyka - Refleksje 30, no. 30 (2018): 102–24. http://dx.doi.org/10.5604/01.3001.0012.5886.

Full text
Abstract:
The development and direction of Japan’s security policy is a topic of strategic importance in the region of East Asia, especially in the light of recent development of reinterpretation of the pacifist Constitution in terms of collective defense and its exercise. The aim of this article was to reveal and analyze trends and dissimilarities in Japan’s security policy after the end of the Cold War through the use of both quantitative and qualitative content analysis. The objects of the analysis were four subsequent revisions of National Defense Program Guidelines, a basic strategic document, from
APA, Harvard, Vancouver, ISO, and other styles
27

Rathbone, Meredith, and Pete Jeydel. "United Nations Security Council Resolutions 2321, 2371, & 2375." International Legal Materials 56, no. 6 (2017): 1176–208. http://dx.doi.org/10.1017/ilm.2017.40.

Full text
Abstract:
As concerns grow that North Korea's nuclear weapons and ballistic missile programs are nearing the point of becoming an unacceptably dire threat to international peace and security, the United Nations, acting with unprecedented collective resolve, has imposed potentially suffocating international economic sanctions on North Korea. These sanctions are bolstered by even more stringent measures imposed unilaterally by the United States. The international community has not in recent memory come together in this way to seek to cut a country off from nearly all trade and investment. This will be a t
APA, Harvard, Vancouver, ISO, and other styles
28

Maffly-Kipp, Joseph, Patricia Flanagan, Jinhyung Kim, Rebecca J. Schlegel, Matthew Vess, and Joshua A. Hicks. "The Role of Perceived Authenticity in Psychological Recovery from Collective Trauma." Journal of Social and Clinical Psychology 39, no. 5 (2020): 419–48. http://dx.doi.org/10.1521/jscp.2020.39.5.419.

Full text
Abstract:
Introduction: Previous research demonstrates that perceived authenticity is positively associated with psychological health and security in the face of threats. The current research extends this work by testing whether perceived authenticity promotes recovery from the negative mental health consequences of collective trauma (e.g., a natural disaster). Methods: We recruited a sample of undergraduates (N = 570), many of whom reported direct or indirect exposure to Hurricane Harvey, to complete surveys at two time points. We assessed exposure to the disaster, acute stress, post-traumatic stress,
APA, Harvard, Vancouver, ISO, and other styles
29

Gupta, Akash Kumar, Chinmay Chakraborty, and Bharat Gupta. "Secure Transmission of EEG Data Using Watermarking Algorithm for the Detection of Epileptical Seizures." Traitement du Signal 38, no. 2 (2021): 473–79. http://dx.doi.org/10.18280/ts.380227.

Full text
Abstract:
Internet of things (IoT) has a collection of multiple network-enabled devices like sensors, gateways, smartphones, and communication links (short and long ranges). Tremendous capacity of IoT system has made possible to monitoring and detection of epileptical seizures in real time. For this purpose, various smart devices and applications, helps to transmit information securely. Amalgamation of IoT with healthcare system provides opportunity to deal issues like security, detection of seizures and real time monitoring. The proposed model of cloud-enabled Health IoT system has been presented in th
APA, Harvard, Vancouver, ISO, and other styles
30

Blix, Hans. "un Security Council vs. Weapons of Mass Destruction." Nordic Journal of International Law 85, no. 2 (2016): 147–61. http://dx.doi.org/10.1163/15718107-08502003.

Full text
Abstract:
International institutions given the task to maintain collective security and to seek disarmament need to build on cooperation between major powers. The authors of the un Charter vested great powers in the Security Council but a consensus between the five permanent great powers was required for use of the powers. This inevitably paralyzed the Council during the Cold War. After the end of the Cold War, the permanent members have remained unable jointly to pursue disarmament, but they have succeeded in several remarkable cases to reach consensus, notably on measures to prevent the further spread
APA, Harvard, Vancouver, ISO, and other styles
31

Whyte, Christopher. "Crossing the Digital Divide: Monism, Dualism and the Reason Collective Action is Critical for Cyber Theory Production." Politics and Governance 6, no. 2 (2018): 73–82. http://dx.doi.org/10.17645/pag.v6i2.1338.

Full text
Abstract:
In studying topics in cyber conflict and cyber-security governance, scholars must ask—arguably more so than has been the case with any other emergent research agenda—where the epistemological and ontological value of different methods lies. This article describes the unique, dual methodological challenges inherent in the multifaceted program on global cyber-security and asks how problematic they are for scholarly efforts to construct knowledge about digital dynamics in world affairs. I argue that any answer to this question will vary depending on how one perceives the social science enterprise
APA, Harvard, Vancouver, ISO, and other styles
32

Dubnov, Arie M. "On Vertical Alliances, ‘Perfidious Albion’ and the Security Paradigm." European Judaism 52, no. 1 (2019): 67–110. http://dx.doi.org/10.3167/ej.2019.520112.

Full text
Abstract:
Revisiting the Balfour Declaration, this article offers a threefold argument: first, challenging those who read the Declaration as symbolizing a new dawn of Jewish political history, the article proposes an alternative reading that considers it as a continuation of familiar patterns of Jewish political behaviour based on the forging of ‘vertical alliances’. Second, it argues that this perspective led many Jews to treat the Declaration as an unsigned ‘contract’, and it was not until the 1940s, with the rise in popularity of a discourse concerning Britain’s ‘betrayal’, that this view began to be
APA, Harvard, Vancouver, ISO, and other styles
33

LYNCH, ALLEN. "Woodrow Wilson and the principle of ‘national self-determination’: a reconsideration." Review of International Studies 28, no. 2 (2002): 419–36. http://dx.doi.org/10.1017/s0260210502004199.

Full text
Abstract:
Examination of Woodrow Wilson's concept of national self-determination in light of both Wilson's own intellectual development and the evolution of wartime strategy and diplomacy establishes that there was no prior consideration of ethnic or collective versus liberal or civic nationalism in Wilson's idea of ‘national’ self-determination and that the actual enunciation and application of the principle was deeply affected by considerations of wartime strategy and diplomacy, above all to counter defeatist tendencies following Russia's withdrawal from the war as well as to induce a separate Austria
APA, Harvard, Vancouver, ISO, and other styles
34

Barros, Alex, Paulo Resque, João Almeida, et al. "Data Improvement Model Based on ECG Biometric for User Authentication and Identification." Sensors 20, no. 10 (2020): 2920. http://dx.doi.org/10.3390/s20102920.

Full text
Abstract:
The rapid spread of wearable technologies has motivated the collection of a variety of signals, such as pulse rate, electrocardiogram (ECG), electroencephalogram (EEG), and others. As those devices are used to do so many tasks and store a significant amount of personal data, the concern of how our data can be exposed starts to gain attention as the wearable devices can become an attack vector or a security breach. In this context, biometric also has expanded its use to meet new security requirements of authentication demanded by online applications, and it has been used in identification syste
APA, Harvard, Vancouver, ISO, and other styles
35

Karyadi, Lalu Wiresapta. "The Existence and Role of Indigenous Food Institution on Strengthening Foods Security of Rural Community." International Journal Papier Public Review 2, no. 1 (2021): 54–66. http://dx.doi.org/10.47667/ijppr.v2i1.73.

Full text
Abstract:
Local agricultural institutions as an important structure to support the food security system have been marginalized and replaced by formal social institutions that seem foreign to certain communities. This study aims to reveal and explain the existence and role of local agricultural institutions in strengthening the food security of rural communities on the island of Lombok. The research was designed with a qualitative research model. Data collection using several techniques, namely: in-depth interviews, direct observation and literature study. Data analysis used qualitative analysis with int
APA, Harvard, Vancouver, ISO, and other styles
36

Estrada-Galiñanes, Vero, and Katarzyna Wac. "Collecting, exploring and sharing personal data: Why, how and where." Data Science 3, no. 2 (2020): 79–106. http://dx.doi.org/10.3233/ds-190025.

Full text
Abstract:
New, multi-channel personal data sources (like heart rate, sleep patterns, travel patterns, or social activities) are enabled by ever increased availability of miniaturised technologies embedded within smartphones and wearables. These data sources enable personal self-management of lifestyle choices (e.g., exercise, move to a bike-friendly area) and, on a large scale, scientific discoveries to improve health and quality of life. However, there are no simple and reliable ways for individuals to securely collect, explore and share these sources. Additionally, much data is also wasted, especially
APA, Harvard, Vancouver, ISO, and other styles
37

Guzmán Fernández, Karla, Ana I. Moreno-Calles, Alejandro Casas, and José Blancas. "Contributions of Urban Collective Gardens to Local Sustainability in Mexico City." Sustainability 12, no. 18 (2020): 7562. http://dx.doi.org/10.3390/su12187562.

Full text
Abstract:
Urban collective gardens (UCG) are considered alternatives to face the environmental problems generated by urbanization, contributing to the sustainability of cities. This study aims to characterize UCG and its contributions to the local sustainability in Mexico City (CdMx). From bibliographic searches, consultation on social networks, and expert suggestions, our research group identified 40 gardens for CdMx, based on which we constructed a UCG typology. For deeper studies, we selected 19 UCGs based on several criteria: Number of members (at least three persons managing UCG), UCG age (at least
APA, Harvard, Vancouver, ISO, and other styles
38

Mendoza, Florina, Lucía Alonso, Andrés López, and Daniel and Patricia Arias Cabarcos. "Assessment of Fitness Tracker Security: A Case of Study." Proceedings 2, no. 19 (2018): 1235. http://dx.doi.org/10.3390/proceedings2191235.

Full text
Abstract:
The wearable industry has experienced a notable growth over the last decade, especially in fitness or e-health trackers. These trackers bring new functionalities that require collecting a great amount of sensitive information about the user. This fact has made fitness trackers the target of deliberate attacks, e.g., eavesdropping, unauthorized account access, fake firmware update, and so on. For this reason, this paper describes a vulnerability study on one of the most popular fitness trackers in 2017, together with the mobile application associated to the tracker. The study results show what
APA, Harvard, Vancouver, ISO, and other styles
39

Figueroa Lorenzo, Santiago, Javier Añorga Benito, Pablo García Cardarelli, Jon Alberdi Garaia, and Saioa Arrizabalaga Juaristi. "A Comprehensive Review of RFID and Bluetooth Security: Practical Analysis." Technologies 7, no. 1 (2019): 15. http://dx.doi.org/10.3390/technologies7010015.

Full text
Abstract:
The Internet of Things (IoT) provides the ability to digitize physical objects into virtual data, thanks to the integration of hardware (e.g., sensors, actuators) and network communications for collecting and exchanging data. In this digitization process, however, security challenges need to be taken into account in order to prevent information availability, integrity, and confidentiality from being compromised. In this paper, security challenges of two broadly used technologies, RFID (Radio Frequency Identification) and Bluetooth, are analyzed. First, a review of the main vulnerabilities, sec
APA, Harvard, Vancouver, ISO, and other styles
40

Papadopoulos, Pavlos, Nikolaos Pitropakis, William J. Buchanan, Owen Lo, and Sokratis Katsikas. "Privacy-Preserving Passive DNS." Computers 9, no. 3 (2020): 64. http://dx.doi.org/10.3390/computers9030064.

Full text
Abstract:
The Domain Name System (DNS) was created to resolve the IP addresses of web servers to easily remembered names. When it was initially created, security was not a major concern; nowadays, this lack of inherent security and trust has exposed the global DNS infrastructure to malicious actors. The passive DNS data collection process creates a database containing various DNS data elements, some of which are personal and need to be protected to preserve the privacy of the end users. To this end, we propose the use of distributed ledger technology. We use Hyperledger Fabric to create a permissioned b
APA, Harvard, Vancouver, ISO, and other styles
41

Recchia, Stefano. "Overcoming Opposition at the UNSC: Regional Multilateralism as a Form of Collective Pressure." Journal of Global Security Studies 5, no. 2 (2020): 265–81. http://dx.doi.org/10.1093/jogss/ogaa013.

Full text
Abstract:
Abstract Research suggests that military interveners often seek endorsements from regional international organizations (IOs), in addition to approval from the United Nations Security Council (UNSC), to reassure international and domestic audiences. Toward that end, interveners should seek the endorsement of continent-wide regional IOs with the broadest and most diverse membership, which are most likely to be independent. In practice, however, interveners often seek endorsements from subregional IOs with narrow membership and aggregate preferences similar to their own. This should weaken the re
APA, Harvard, Vancouver, ISO, and other styles
42

HAFTARCZYK, Karolina. "SECRET SERVICE AS PART OF NATIONAL SECURITY." Scientific Journal of the Military University of Land Forces 161, no. 3 (2011): 194–203. http://dx.doi.org/10.5604/01.3001.0002.3063.

Full text
Abstract:
Recent years mark a period of profound redefinition of threats and dangers to national security, also in Poland. The end of the Cold War, stabilization in Polish-German relations, normalization of the situation in the other neighbouring countries and an averted threat of the so- called ‘Russian military generals rebellion’ scenario – so popular with some Hollywood screenwriters in the past – finally, Poland’s accession to NATO, significantly cut the risk of an open, direct outside aggression. The term ‘intelligence services’ refers to governmental agencies involved both in the collection of co
APA, Harvard, Vancouver, ISO, and other styles
43

Dewani, Amirita, Pirah Memon, Veena Kumari, Anum Arain, Ayaz Jiskani, and Sania Bhatti. "Keyless Smart Home: An application of Home Security and Automation." Oriental journal of computer science and technology 11, no. 2 (2018): 107–14. http://dx.doi.org/10.13005/ojcst11.02.06.

Full text
Abstract:
The rapid and revolutionary advancement in technology has increased the demand for advanced ubiquitous mobile applications in our daily lives. Home automation system uses collective smart technology to elevate sphere of security and human living standards. Wireless Smart home systems have been prototyped by researchers to realize different applications in vast contexts. In this paper we propose a keyless smart home security system which uses Bluetooth as a communication protocol to automate door locks based on a security code and predefined user credentials. The system combines Android phone a
APA, Harvard, Vancouver, ISO, and other styles
44

Cameron, James E., Lucie Kocum, and John W. Berry. "Security and attitudes toward globalization: A multilevel analysis." Journal of Social and Political Psychology 8, no. 2 (2020): 805–22. http://dx.doi.org/10.5964/jspp.v8i2.418.

Full text
Abstract:
Globalization implicates a number of social psychological processes and outcomes, including openness to ideas, products, and people from outside one’s national boundaries. Drawing from theory and research on intergroup threat, the researchers posited that people will be more open to connections between their nation and others if they feel their economic situation and culture are relatively secure. They found some support for these hypotheses in 2 sets of archival survey responses collected by the Pew Global Attitudes Project in 2002 (40 countries; N = 34,073) and 2009 (25 countries; N = 22,500
APA, Harvard, Vancouver, ISO, and other styles
45

ANTONOPOULOS, CONSTANTINE. "Some Thoughts on the NATO Position in Relation to the Iraqi Crisis." Leiden Journal of International Law 17, no. 1 (2004): 171–83. http://dx.doi.org/10.1017/s0922156504001669.

Full text
Abstract:
NATO is a collective self-defence regional organization that was established at the time of the Cold War, and the end of East–West confrontation gave rise to the debate about its future role. In the 1999 Washington summit a new strategic concept was promulgated, according to which NATO was to act as a collective security organization as well. The community of interest previously represented by the Eastern bloc has not been unequivocally replaced by a new one. Hence there is room for national interest to play greater role in the decision-making by the alliance. This decision-making is based on
APA, Harvard, Vancouver, ISO, and other styles
46

Mare, Shrirang, Franziska Roesner, and Tadayoshi Kohno. "Smart Devices in Airbnbs: Considering Privacy and Security for both Guests and Hosts." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (2020): 436–58. http://dx.doi.org/10.2478/popets-2020-0035.

Full text
Abstract:
AbstractConsumer smart home devices are becoming increasingly pervasive. As Airbnb hosts deploy smart devices in spaces shared with guests, we seek to understand the security and privacy implications of these devices for both hosts and guests. We conducted a large-scale survey of 82 hosts and 554 guests to explore their current technology practices, their preferences for smart devices and data collection/sharing, and their privacy and security concerns in the context of Airbnbs. We found that guests preferred smart devices, even viewed them as a luxury, but some guests were concerned that smar
APA, Harvard, Vancouver, ISO, and other styles
47

RENNER, RENATO. "SECURITY OF QUANTUM KEY DISTRIBUTION." International Journal of Quantum Information 06, no. 01 (2008): 1–127. http://dx.doi.org/10.1142/s0219749908003256.

Full text
Abstract:
Quantum Information Theory is an area of physics which studies both fundamental and applied issues in quantum mechanics from an information-theoretical viewpoint. The underlying techniques are, however, often restricted to the analysis of systems which satisfy a certain independence condition. For example, it is assumed that an experiment can be repeated independently many times or that a large physical system consists of many virtually independent parts. Unfortunately, such assumptions are not always justified. This is particularly the case for practical applications — e.g. in quantum cryptog
APA, Harvard, Vancouver, ISO, and other styles
48

Thompson, Sue. "The Evolution of Southeast Asian Regionalism: Security, Economic Development and Foreign Power Support for Regional Initiatives, 1947-77." JAS (Journal of ASEAN Studies) 5, no. 1 (2017): 1. http://dx.doi.org/10.21512/jas.v5i1.4160.

Full text
Abstract:
Policy objectives for Southeast Asian regionalism had been evolving since the end of the Second World War. Economic development viewed as essential for establishing peace and stability in Southeast Asia and the links between development and security were evident in the elaboration of the Association of Southeast Asian Nations (ASEAN). Also evident was the second-line support provided by external powers. While ASEAN was a regional initiative that came out of the Bangkok talks to end Confrontation, Western governments had been formulating regional cooperation policies in Southeast Asia decades p
APA, Harvard, Vancouver, ISO, and other styles
49

Schachter, Oscar. "United Nations Law in the Gulf Conflict." American Journal of International Law 85, no. 3 (1991): 452–73. http://dx.doi.org/10.2307/2203107.

Full text
Abstract:
This was written shortly after the gulf war of 1990-1991 came to an end. The collective action taken under the aegis of the United Nations has been hailed as a vindication of international law and of the principle of collective security. At the same time, it has also been perceived by many as still another example of the dominant role of power and national self-interest in international relations. A plausible case can be made for each of these views. An optimist may conclude in the rosy glow of the desired outcome that law and power have happily converged in this case. Even so, the massive dev
APA, Harvard, Vancouver, ISO, and other styles
50

Alvarellos, Alberto, Marcos Gestal, Julián Dorado, and Juan Ramón Rabuñal. "Developing a Secure Low-Cost Radon Monitoring System." Sensors 20, no. 3 (2020): 752. http://dx.doi.org/10.3390/s20030752.

Full text
Abstract:
Radon gas has been declared a human carcinogen by the United States Environmental Protection Agency (USEPA) and the International Agency for Research on Cancer (IARC). Several studies carried out in Spain highlighted the high radon concentrations in several regions, with Galicia (northwestern Spain) being one of the regions with the highest radon concentrations. The objective of this work was to create a safe and low-cost radon monitoring and alert system, based on open source technologies. To achieve this objective, the system uses devices, a collection of sensors with a processing unit and a
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!