Academic literature on the topic 'Hybrid security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Hybrid security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Hybrid security"

1

Enns, Charis, Nathan Andrews, and J. Andrew Grant. "Security for whom? Analysing hybrid security governance in Africa's extractive sectors." International Affairs 96, no. 4 (July 1, 2020): 995–1013. http://dx.doi.org/10.1093/ia/iiaa090.

Full text
Abstract:
Abstract In this article, we analyse the factors underpinning the shift towards hybrid security governance in Africa. Extant scholarship largely attributes this shift to broader global processes, such as histories of colonialism, neoliberalism and transformations in global governance, which have served to legitimize the role of private authority in security provision around sites of resource extraction. Our analysis seeks to understand the relative and relational influence of power and rules in international politics by offering empirical insights about what hybrid security arrangements look like ‘on the ground’. Drawing upon recently conducted fieldwork in Kenya, Uganda and Ghana, we examine how hybrid security arrangements affect the lives of those living near sites of natural resource extraction. Our analyses suggest that although hybrid security has emerged as the leading approach to security governance, this approach to security does not uniformly involve or serve the interests of all stakeholders. Rather, we find that hybrid security arrangements aid the security of extractive operations—securing investments in both physical and human capital—while sometimes undermining the security of nearby communities.
APA, Harvard, Vancouver, ISO, and other styles
2

Saravanan, V., M. Sathishkumar, and M. Babu. "ATM Security System by using Hybrid Authentication." International Journal of Trend in Scientific Research and Development Volume-2, Issue-3 (April 30, 2018): 1977–79. http://dx.doi.org/10.31142/ijtsrd11535.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Senhaji, Youssef, and Hicham Medromi. "Network Security: Hybrid IDPS." International Journal of Applied Information Systems 9, no. 5 (August 6, 2015): 5–8. http://dx.doi.org/10.5120/ijais2015451408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

CUREA, Cătălina-Gabriela. "А HYBRID SECURITY THREAT." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 24 (July 28, 2023): 67–72. http://dx.doi.org/10.19062/2247-3173.2023.24.9.

Full text
Abstract:
According with NATO Capstone Concept for the Military Contribution to Countering Hybrid Threats and EU Joint Framework to Counter Hybrid Threats, approved a new Military Strategy that will help set out NATO’s military priorities and approach to current and future challenges, including cyber and hybrid threats, instability across the Middle East and North Africa, and a more assertive Russia.[1]Hybrid conflict is defined as a dynamic interaction between elements of hard power (consolidation of military forces, deployment of military forces and capabilities in conflict zones, financing of separatist movements, activities to destabilize and undermine the security of a state or regions) and soft power ( maintaining an economic or energy dependence, applying economic sanctions, conducting propaganda, disinformation and influence campaigns, conducting cyber attacks, etc.)[2]. Hybrid warfare encompasses a vast area of hostile actions in which military force is only a small part of a flexible strategy with long-term objectives, complemented by political, economic and informational methods.
APA, Harvard, Vancouver, ISO, and other styles
5

Akrap, Gordan. "Hybrid Challenges Require Hybrid, Scientifically Based, Responses." National security and the future 20, no. 1-2 (January 9, 2020): 25–33. http://dx.doi.org/10.37458/nstf.20.1-2.4.

Full text
Abstract:
New security challenges are looking for new security paradigms in order that state and societies can successfully face with them on preventive level. Due to the rapid influence of hybrid threats to almost all areas of our lives today, we must change our attitude toward those problems and introduce and transform existing intelligence and security studies as a separate science in order to prepare our societies for security challenges that are already here.
APA, Harvard, Vancouver, ISO, and other styles
6

Kuppuswamy, Prakash, Saeed Qasim Yahya Al Khalidi Al-Maliki, Rajan John, Mohammad Haseebuddin, and Ahmed Ali Shaik Meeran. "A hybrid encryption system for communication and financial transactions using RSA and a novel symmetric key algorithm." Bulletin of Electrical Engineering and Informatics 12, no. 2 (April 1, 2023): 1148–58. http://dx.doi.org/10.11591/eei.v12i2.4967.

Full text
Abstract:
Today's digital data transmission over unsecured wired and wireless communication channels is making encryption algorithms an increasingly important tool for securing data and information. Hybrid encryption techniques combine encryption schemes of either two symmetric keys or both symmetric and asymmetric encryption methods, and that provides more security than public or private key single encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The recommended algorithm scheme is a combination of the well-known Rivest Shamir Adleman (RSA) algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
7

A. Correa, Roddy, Juan Ram髇 Bermejo Higuera, Javier Bermejo Higuera, Juan Antonio SiciliaMontalvo, Manuel S醤chez Rubio, and �. Alberto Magre襻n. "Hybrid Security AssessmentMethodology forWeb Applications." Computer Modeling in Engineering & Sciences 126, no. 1 (2021): 89–124. http://dx.doi.org/10.32604/cmes.2021.010700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Abdul Majeed Haleem, Alyaa. "Voice Security Using Hybrid Algorithm." AL-Rafidain Journal of Computer Sciences and Mathematics 7, no. 2 (December 1, 2010): 107–18. http://dx.doi.org/10.33899/csmj.2010.163889.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

OSTROVSKA, Iryna. "HYBRID THREATS TO GLOBAL SECURITY." Public Administration and Civil Service, no. 1-76 (March 31, 2021): 68–78. http://dx.doi.org/10.52123/1994-2370-2021-76-1-63.

Full text
Abstract:
This article examines the phenomenon of the influence of hybrid threats on global world security in the modern conditions of globalization and the information and communication revolution. In particular, it is argued that hybrid wars have become a new type of interstate confrontation for solving military-political problems. Conflict events in post-Soviet Ukraine are considered as an example, leading to the emergence of new risks for an individual and society as a whole. At the end of the article, the author concludes that the conflict events in Ukraine, after gaining independence, have a significant impact on global security in the world. And although Ukraine is carrying out attempts to confront hybrid wars, the threats continue to be relevant, which poses the same challenges for the entire world society to counter.
APA, Harvard, Vancouver, ISO, and other styles
10

MANISHA, KUMARI, EKKA DEEKSHA, and YADAV NISHI. "A NOVEL HYBRID SECURITY ALGORITHM." i-manager's Journal on Information Technology 7, no. 2 (2018): 37. http://dx.doi.org/10.26634/jit.7.2.14651.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Hybrid security"

1

Chaulagain, Dewan. "Hybrid Analysis of Android Applications for Security Vetting." Bowling Green State University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1555608766287613.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mundi, Anuj V. "PLC-WiFi hybrid broadband Internet deployment and security /." [Gainesville, Fla.] : University of Florida, 2004. http://purl.fcla.edu/fcla/etd/UFE0006964.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Teo, Hong-Siang. "Security of sensor networks." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FTeo.pdf.

Full text
Abstract:
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, June 2006.
Thesis Advisor(s): John McEachen. "June 2006." Includes bibliographical references (p. 49-51). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Van, der Horst Timothy W. "Thor : the hybrid online repository /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd696.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Cheng, Carol Shaoyu. "A hybrid approach to power system voltage security assessment." Diss., Georgia Institute of Technology, 1991. http://hdl.handle.net/1853/15469.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Katsis, Grigorios. "Multistage security mechanism for hybrid, large scale wireless sensor networks." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Jun%5FKatsis.pdf.

Full text
Abstract:
Thesis (M.S. in Applied Physics and M.S. in Electrical Engineering)--Naval Postgraduate School, June 2007.
Thesis Advisor(s): Murali Tummala, Gamani Karunasiri. "June 2007." Includes bibliographical references (p. 57-59). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.

Full text
Abstract:
This thesis is concerned with examining the intersection between the failed state and security governance literatures, through the case study of Jamaica. This thesis is primarily concerned with examining the under-researched link between concerns raised in failed state and security governance literatures. The thesis proposes that the presence of state failure and success in the same setting is a direct result of the execution of a problematic security governance framework that impedes the nation’s ability to establish a stable state infrastructure that is capable of fulfilling the welfare needs of the entire citizenry. By utilising Jamaica as a case study, and more specifically the Tivoli Gardens Incursion as a sub case study, the main contributions to research that this thesis makes is that state failure can co-exist alongside spaces of state success. State failure, as exemplified in Jamaica, can exist on a continuum and manifests itself geographically and within certain sectors of the state system, such as security.
APA, Harvard, Vancouver, ISO, and other styles
8

Suru, Hassan U. "Security and usability in a hybrid property based graphical authentication system." Thesis, University of Salford, 2018. http://usir.salford.ac.uk/48724/.

Full text
Abstract:
Alphanumeric text and PINs continue to be the dominant authentication methods in spite of the numerous concerns by security researchers of their inability to properly address usability and security flaws and to effectively combine usability and security. These flaws have, however, contributed to the growing research interest in the development and use of graphical authentication systems as alternatives to text based systems. Graphical passwords or graphical authentication systems are password systems that use images rather than characters or numbers in user authentication. The picture superiority effect, a belief that humans are better able to memorise images than text, has very much influenced the proliferation of and support for graphical authentication systems. In spite of their growing acceptance, however, empirical studies have shown that graphical authentication systems have also inherited some of the flaws of text based passwords. These flaws include predictability, vulnerability to observational attacks and the inability of systems to efficiently combine security with usability. Hence there is a continued quest among usable security researchers to find that hypothetical system that has both strong usability and strong security. In this research, a novel concept for hybrid graphical authentication systems is developed. This consists of a class of systems that are called 'property based authentication systems' which adopt the use of image properties for user authentication, rather than specific images as used in existing systems. Image properties are specified contents of images which gives the image a set of characteristics. Several implementations of these systems have been developed and evaluated. Significant empirical performance studies have been conducted to evaluate these systems in terms of usability and security. The usability evaluations conducted evaluate the systems in terms effectiveness, efficiency and user satisfaction, while security evaluations measure their susceptibility to common attacks. The results from these studies suggests that property based systems have better usability and security when compared to commonly known and well researched graphical authentication systems.
APA, Harvard, Vancouver, ISO, and other styles
9

Сабадаш, Віктор Володимирович, Виктор Владимирович Сабадаш, Viktor Volodymyrovych Sabadash, and В. В. Сабадаш. "The security challenges of hybrid work formats in a digital economy." Thesis, ДВНЗ «Приазовський державний технічний університет», 2021. https://essuir.sumdu.edu.ua/handle/123456789/84066.

Full text
Abstract:
Досліджено ключові виклики безпеки гібридних форматів роботи у цифровій економіці
Исследованы ключевые вызовы безопасности гибридных форматов работы в цифровой экономике
The key security challenges of hybrid work formats in the digital economy are investigated
APA, Harvard, Vancouver, ISO, and other styles
10

Sunkaralakunta, Venkatarama Reddy Rakesh. "A User-Centric Security Policy Enforcement Framework for Hybrid Mobile Applications." University of Dayton / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1564744609523447.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Hybrid security"

1

Tyagi, I. D. Hybrid vegetables for nutritional security. New Delhi: South Asian Publishers, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

1946-, Schmidt Peter, ed. A hybrid relationship: Transatlantic security cooperation beyond NATO. Frankfurt am Main: Peter Lang Publishing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fuchs, Ludwig. Methodology for hybrid role development. Lohmar: Eul Verlag, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hanoi, Vietnam) International Symposium on Hybrid Rice (4th 2002. Hybrid rice for food security, poverty alleviation, and environmental protection. Metro Manila, Philippines: IRRI, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Herrero, Alvaro. Mobile Hybrid Intrusion Detection: The MOVICAB-IDS System. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Banasik, Mirosław. Wojna hybrydowa i jej konsekwencje dla bezpieczeństwa euroatlantyckiego. Warszawa: Wydawnictwo "Difin", 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sayed-Mouchaweh, Moamar, ed. Diagnosability, Security and Safety of Hybrid Dynamic and Cyber-Physical Systems. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-74962-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hybrid and cyber war as consequences of the asymmetry: A comprehensive approach answering hybrid actors and activities in cyberspace : political social and military responses. Frankfurt am Main: Peter Lang, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bartosh, A. A. Serai︠a︡ zona: Teatr gibridnoĭ voĭny. Moskva: Gori︠a︡chai︠a︡ linii︠a︡ - Telekom, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

József, Horváth. Hibrid háború a jövőért. Budapest: Alapjogokért Központ, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Hybrid security"

1

Gentile, Anthony, and Lauren R. Shapiro. "Security: Hybrid." In Encyclopedia of Security and Emergency Management, 1–3. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-69891-5_293-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gentile, Anthony, and Lauren R. Shapiro. "Security: Hybrid." In Encyclopedia of Security and Emergency Management, 872–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_293.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mac Ginty, Roger. "Hybrid Security: Afghanistan." In International Peacebuilding and Local Resistance, 91–114. London: Palgrave Macmillan UK, 2011. http://dx.doi.org/10.1057/9780230307032_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Prischink, Michael, Christian Kloimüllner, Benjamin Biesinger, and Günther R. Raidl. "Districting and Routing for Security Control." In Hybrid Metaheuristics, 87–103. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-39636-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

van Os, Elsine. "Security in the Hybrid Organisation." In Leading Hybrid Organisations, 89–116. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003387602-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kurosawa, Kaoru. "Hybrid Encryption." In Encyclopedia of Cryptography and Security, 570–72. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-5906-5_321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Turner, Mandy. "Security, Cooptation and Resistance." In Hybrid Forms of Peace, 188–207. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9780230354234_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

El Balbali, Hiba, Anas Abou El Kalam, and Mohamed Talha. "Big Data Between Quality and Security." In Hybrid Intelligent Systems, 1315–26. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27409-1_120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tarannum, Sabrina, Syed Md Minhaz Hossain, and Taufique Sayeed. "Cyber Security Issues: Web Attack Investigation." In Hybrid Intelligent Systems, 1254–69. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-27409-1_115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Cho, Sung-Bae, and Sang-Jun Han. "Intrusion Detection for Computer Security." In Computationally Intelligent Hybrid Systems, 245–72. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9780471683407.ch8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Hybrid security"

1

Yeun-hee Jei, Ick-whan Bae, Sung-ja Choi, and Gang-soo Lee. "An Information Security Engineering Paradigm for Overcoming Information Security Crisis." In 2006 International Conference on Hybrid Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/ichit.2006.253526.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gray, George R., Edem Ibragimov, Joseph Sluz, and Raymond Sova. "Hybrid polarization control." In Defense and Security, edited by Andrew R. Pirich, Michael J. Hayduk, Eric J. Donkor, and Peter J. Delfyett, Jr. SPIE, 2005. http://dx.doi.org/10.1117/12.606952.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Silva, Otávio A. A., and Paulo Lício de Geus. "Lokke, a hybrid security hypervisor." In Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais. Sociedade Brasileira de Computação - SBC, 2020. http://dx.doi.org/10.5753/sbseg.2020.19238.

Full text
Abstract:
This work did ample research on techniques used by advanced threats that aim to evade detection systems, elevate privileges and manipulate objects in a modern OS kernel, using the Windows 10 kernel as a test bench. Given state-of-the-art attacks in kernelspace, this work's main goal is to design a secure mechanism to protect the OS kernel against a class of attacks, not relying upon any specific vector. This mechanism is based on hybrid virtualization and combines the advantages of Type 1 and 2 hypervisors, where the hypervisor runs at the same level as the OS kernel does, but within a privileged execution framework. The design of this security framework allows for the integration with other security subsystems, by providing security policies enforced by the hypervisor and independently of the kernel.
APA, Harvard, Vancouver, ISO, and other styles
4

Donadio, Pasquale, Giovanni B. Fioccola, Roberto Canonico, and Giorgio Ventre. "Network security for Hybrid Cloud." In 2014 Euro Med Telco Conference (EMTC). IEEE, 2014. http://dx.doi.org/10.1109/emtc.2014.6996640.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Gandotra, Vandana, Archana Singhal, and Punam Bedi. "Identifying Security Requirements Hybrid Technique." In 2009 Fourth International Conference on Software Engineering Advances (ICSEA). IEEE, 2009. http://dx.doi.org/10.1109/icsea.2009.65.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cogburn, Gabriel. "Chalcogenide and germanium hybrid optics." In SPIE Security + Defence, edited by Roberto Zamboni, François Kajzar, Attila A. Szep, Colin Lewis, Douglas Burgess, Mark T. Gruneisen, Miloslav Dusek, and John G. Rarity. SPIE, 2011. http://dx.doi.org/10.1117/12.897757.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kyo-il Chung. "Security Framework for Remote Access to Home Network." In 2006 International Conference on Hybrid Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/ichit.2006.253456.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Eun-Jun Yoon and Kee-Young Yoo. "Security of Authenticated Encryption Scheme with Message Linkages." In 2006 International Conference on Hybrid Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/ichit.2006.253532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Yoon, Eun-jun, and Kee-young Yoo. "Security Analysis of Hsieh-Sun's Deniable Authentication Protocol." In 2006 International Conference on Hybrid Information Technology. IEEE, 2006. http://dx.doi.org/10.1109/ichit.2006.253587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lee, Shinkyung, Namje Park, and Dooho Choi. "Security Management System for Sensor Network." In 2008 International Conference on Convergence and Hybrid Information Technology. IEEE, 2008. http://dx.doi.org/10.1109/ichit.2008.254.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Hybrid security"

1

Freddy, Imelda, and Gede Endy Gupta. Strengthening Food Security Policy: Reforms on Hybrid Maize Seeds Delivery Mechanism. Jakarta, Indonesia: Center for Indonesian Policy Studies, 2018. http://dx.doi.org/10.35497/271863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gaston, Erica, and András Derzsi-Horváth. Iraq after ISIL: An Analysis of Local, Hybrid, and Sub-State Security Forces. Institute of Regional and International Studies, August 2017. http://dx.doi.org/10.26598/auis_iris_2017_08_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Erkamo, Sanna, Karoliina Pilli-Sihvola, Atte Harjanne, and Heikki Tuomenvirta. Climate Security and Finland – A Review on Security Implications of Climate Change from the Finnish Perspective. Finnish Meteorological Institute, 2021. http://dx.doi.org/10.35614/isbn.9789523361362.

Full text
Abstract:
This report describes the effects of climate change for Finland from the view of comprehensive security. The report examines both direct and indirect climate security risks as well as transition risks related to climate change mitigation. The report is based on previous research and expert interviews. Direct security risks refer to the immediate risks caused by the changing nature of natural hazards. These include the risks to critical infrastructure and energy systems, the logistics system, health and food security. Indirect security risks relate to the potential economic, political and geopolitical impacts of climate change. Climate change can affect global migration, increase conflict risk, and cause social tensions and inequality. Transition risks are related to economic and technological changes in energy transition, as well as political and geopolitical tensions and social problems caused by climate change mitigation policies. Reducing the use of fossil fuels can result in domestic and foreign policy tensions and economic pressure especially in locations dependent on fossil fuels. Political tension can also increase the risks associated with hybrid and information warfare. The security effects of climate change affect all sectors of society and the Finnish comprehensive security model should be utilized in preparing for them. In the short run, the most substantial arising climate change related security risks in Finland are likely to occur through indirect or transition risks. Finland, similar to other wealthy countries, has better technological, economic and institutional conditions to deal with the problems and risks posed by climate change than many other countries. However, this requires political will and focus on risk reduction and management.
APA, Harvard, Vancouver, ISO, and other styles
4

Thomas, Jakana. Duty and Defiance: Women in Community-based Armed Groups in West Africa. RESOLVE Network, March 2021. http://dx.doi.org/10.37805/cbags2021.1.

Full text
Abstract:
This desk report explores how West African community-based armed groups (CBAGs) facilitate women’s engagement with politics, create avenues for female expressions of anger, commitment to community values and national identity, and enable women to push for change in their communities by opening spaces for female participation. Assessing the formal and informal contributions women make to armed community mobilization and hybrid security reveals opportunities for gender-specific engagement and cautions that unidimensional considerations of where and how women intersect with conflict and security have the potential to undermine violence reduction and post-conflict peacebuilding efforts.
APA, Harvard, Vancouver, ISO, and other styles
5

Lyzanchuk, Vasyl. COMMUNICATIVE SYNERGY OF UKRAINIAN NATIONAL VALUES IN THE CONTEXT OF THE RUSSIAN HYBRID WAR. Ivan Franko National University of Lviv, February 2021. http://dx.doi.org/10.30970/vjo.2021.49.11077.

Full text
Abstract:
The author characterized the Ukrainian national values, national interests and national goals. It is emphasized that national values are conceptual, ideological bases, consolidating factors, important life guidelines on the way to effective protection of Ukraine from Russian aggression and building a democratic, united Ukrainian state. Author analyzes the functioning of the mass media in the context of educational propaganda of individual, social and state values, the dominant core of which are patriotism, human rights and freedoms, social justice, material and spiritual wealth of Ukrainians, natural resources, morality, peace, religiosity, benevolence, national security, constitutional order. These key national values are a strong moral and civic core, a life-giving element, a self-affirming synergy, which on the basis of homogeneity binds the current Ukrainian society with the ancestors and their centuries-old material and spiritual heritage. Attention is focused on the fact that the current problem of building the Ukrainian state and protecting it from the brutal Moscow invaders is directly dependent on the awareness of all citizens of the essence of national values, national interests, national goals and filling them with the meaning of life, charitable socio-political life. It is emphasized that the missionary vocation of journalists to orient readers and listeners to the meaningful choice of basic national values, on the basis of which Ukrainian citizens, regardless of nationality together they will overcome the external Moscow and internal aggression of the pro-Russian fifth column, achieve peace, return the Ukrainian territories seized by the Kremlin imperialists and, in agreement will build Ukrainian Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
6

Lyammouri, Rida. Central Mali: Armed Community Mobilization in Crisis. RESOLVE Network, November 2021. http://dx.doi.org/10.37805/cbags2021.4.

Full text
Abstract:
The proliferation of community-based armed groups (CBAGs) in Mali’s Mopti and Ségou Regions has contributed to transforming Central Mali into a regional epicenter of conflict since 2016. Due to the lack of adequate presence of the state, certain vulnerable, conflict-affected communities resorted to embracing non-state armed groups as security umbrellas in the context of inter-communal violence. These local conflicts are the result of long-standing issues over increasing pressure on natural resources, climate shocks, competing economic lifestyles, nepotistic and exclusionary resource management practices, and the shifting representations of a segregated, historically constructed sense of ethnic identities in the region. This report untangles the legitimacy of armed groups, mobilizing factors, and the multi-level impact of violence implicating CBAGs. It further explores the relations amongst different actors, including the state, armed groups, and communities. The findings provide relevant insight for context-specific policy design toward conflict resolution and hybrid security governance.
APA, Harvard, Vancouver, ISO, and other styles
7

Clark, Helen. Environment of Peace. Stockholm International Peace Research Institute, August 2022. http://dx.doi.org/10.55163/fwdp2737.

Full text
Abstract:
The SIPRI Lecture is an annual event focusing on major themes in peace and security. The event provides a platform for prominent global thought leaders who share the values underpinning SIPRI and its research. The fourth SIPRI Lecture, which was held in a hybrid format on 23 May 2022, was delivered by HE Helen Clark and focused on the theme ‘Environment of Peace’. The lecture presented the findings of the SIPRI report Environment of Peace: Security in a New Era of Risk. In her address, Clark pointed out that the climate crisis looms ever larger, the world is off track to meet the Sustainable Development Goals, and the war in Ukraine is not only having tragic consequences in Ukraine but also has potentially catastrophic repercussions far beyond that country’s borders. Transformative change is needed, which will require global cooperation; but the current geopolitical climate makes it far more difficult to address these interconnected risks.
APA, Harvard, Vancouver, ISO, and other styles
8

Battersby, Jane, Mercy Brown-Luthango, Issahaka Fuseini, Herry Gulabani, Gareth Haysom, Ben Jackson, Vrashali Khandelwal, et al. Living Off-Grid Food and Infrastructure Collaboration Working Paper 1: Concepts and Assumptions. Institute of Development Studies, May 2023. http://dx.doi.org/10.19088/logic.2023.001.

Full text
Abstract:
This working paper is the product of the Living Off-Grid Food and Infrastructure Collaboration. It is designed to bring together our thinking on how infrastructure can shape the food and nutritional security of urban marginalised populations. Infrastructure assemblages include the material (physical and technological), as well as the political and systemic factors that ‘govern’ how infrastructure is developed and used. Urban food systems are made up of public and private actors, and market and governance processes that shape the cost and availability of food in different urban contexts. At the intersection of urban food systems and infrastructure assemblages lies the food and nutrition security of urban dwellers. The framing of contemporary debates and policy priorities with respect to both nutrition and infrastructure are heavily conditioned by presumptions – in favour of formality and griddedness, for example, or of the need to raise agricultural productivity – which fail to reflect the reality of marginalised communities in Southern cities. For these communities, their experience is one of hybridity, with formal and informal infrastructures and economies central to their lives and livelihoods. These hybrid arrangements are imbued with power structures and socio-political dynamics that are context specific and further condition communities’ experiences. Together, these are the factors that condition or shape the possibilities for individuals and households pursuing different food strategies. However, there is a failure to reflect this reality in the conceptualisation of infrastructure challenges, leading to unworkable solutions and policies that end up perpetuating problems. There is an urgent need to reframe problematic assumptions, starting first and foremost from the entry point of urban informal settlements in the global South. By taking food as a lens in this process, we illuminate these contexts, and how they relate to hybrid infrastructure arrangements and potential alternatives. This reformulation is vital at this critical juncture, when Southern cities need infrastructure development that meets the needs of rapidly changing demographics without locking cities and nations into unsustainable pathways.
APA, Harvard, Vancouver, ISO, and other styles
9

Lutz, Carsten, Carlos Areces, Ian Horrocks, and Ulrike Sattler. Keys, Nominals, and Concrete Domains. Technische Universität Dresden, 2002. http://dx.doi.org/10.25368/2022.122.

Full text
Abstract:
Many description logics (DLs) combine knowledge representation on an abstract, logical level with an interface to 'concrete' domains such as numbers and strings with built-in predicates such as <, +, and prefix-of. These hybrid DLs have turned out to be quite useful for reasoning about conceptual models of information systems, and as the basis for expressive ontology languages. We propose to further extend such DLs with key constraints that allow the expression of statements like 'US citizens are uniquely identified by their social security number'. Based on this idea, we introduce a number of natural description logics and perform a detailed analysis of their decidability and computational complexity. It turns out that naive extensions with key constraints easily lead to undecidability, whereas more careful extensions yield NEXPTIME-complete DLs for a variety of useful concrete domains.
APA, Harvard, Vancouver, ISO, and other styles
10

Davies, Will. Improving the engagement of UK armed forces overseas. Royal Institute of International Affairs, January 2022. http://dx.doi.org/10.55317/9781784135010.

Full text
Abstract:
The UK government’s Integrated Review of security, defence, development and foreign policy, published in March 2021 alongside a supporting defence command paper, set a new course for UK national security and highlighted opportunities for an innovative approach to international engagement activity. The Integrated Review focused principally on the state threats posed by China’s increasing power and by competitors – including Russia – armed with nuclear, conventional and hybrid capabilities. It also stressed the continuing risks to global security and resilience due to conflict and instability in weakened and failed states. These threats have the potential to increase poverty and inequality, violent extremism, climate degradation and the forced displacement of people, while presenting authoritarian competitors with opportunities to enhance their geopolitical influence. There are moral, security and economic motives to foster durable peace in conflict-prone and weakened regions through a peacebuilding approach that promotes good governance, addresses the root causes of conflict and prevents violence, while denying opportunities to state competitors. The recent withdrawal from Afghanistan serves to emphasize the complexities and potential pitfalls associated with intervention operations in complex, unstable regions. Success in the future will require the full, sustained and coordinated integration of national, allied and regional levers of power underpinned by a sophisticated understanding of the operating environment. The UK armed forces, with their considerable resources and global network, will contribute to this effort through ‘persistent engagement’. This is a new approach to overseas operations below the threshold of conflict, designed as a pre-emptive complement to warfighting. To achieve this, the UK Ministry of Defence (MOD) must develop a capability that can operate effectively in weak, unstable and complex regions prone to violent conflict and crises, not least in the regions on the eastern and southern flanks of the Euro-Atlantic area. The first step must be the development of a cohort of military personnel with enhanced, tailored levels of knowledge, skills and experience. Engagement roles must be filled by operators with specialist knowledge, skills and experience forged beyond the mainstream discipline of combat and warfighting. Only then will individuals develop a genuinely sophisticated understanding of complex, politically driven and sensitive operating environments and be able to infuse the design and delivery of international activities with practical wisdom and insight. Engagement personnel need to be equipped with: An inherent understanding of the human and political dimensions of conflict, the underlying drivers such as inequality and scarcity, and the exacerbating factors such as climate change and migration; - A grounding in social sciences and conflict modelling in order to understand complex human terrain; - Regional expertise enabled by language skills, cultural intelligence and human networks; - Familiarity with a diverse range of partners, allies and local actors and their approaches; - Expertise in building partner capacity and applying defence capabilities to deliver stability and peace; - A grasp of emerging artificial intelligence technology as a tool to understand human terrain; - Reach and insight developed through ‘knowledge networks’ of external experts in academia, think-tanks and NGOs. Successful change will be dependent on strong and overt advocacy by the MOD’s senior leadership and a revised set of personnel policies and procedures for this cohort’s selection, education, training, career management, incentivization, sustainability and support.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography