To see the other types of publications on this topic, follow the link: Iot security solutions.

Books on the topic 'Iot security solutions'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Iot security solutions.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Sharma, Smita, Manikandan Thirumalaisamy, Balamurugan Balusamy, and Naveen Chilamkurti. Artificial Intelligence and IoT for Cyber Security Solutions in Smart Cities. Chapman and Hall/CRC, 2024. https://doi.org/10.1201/9781003459835.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Caregorodcev, Anatoliy, and Sergey Romanovskiy. Digital sovereignty: current problems and solutions. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2122428.

Full text
Abstract:
The monograph examines the concept and components of the digital sovereignty of the state in the context of global processes of technological transformation. It is shown that digital sovereignty is a factor that is directly involved in the formation of traditional spheres of life of the state and society, being an integral part of state sovereignty as a whole. For employees of public administration bodies whose activities are related to ensuring information interaction between society and social media, as well as for teachers, students and postgraduates studying in an enlarged group of specialties and training areas 10.00.00 "Information security".
APA, Harvard, Vancouver, ISO, and other styles
3

Shumilina, Vera, Galina Krohicheva, Yuliya Mezentseva, et al. Management of enterprises and organizations: problems and solutions. AUS PUBLISHERS, 2021. http://dx.doi.org/10.26526/monography_6180d1003e3fd1.15351579.

Full text
Abstract:
At the present stage in the global information society, a new economic structure is being actively formed - digital. There is a digitalization of economic processes and the penetration of information technologies into all spheres of activity. There are new requirements for the sources of competitive advantages of enterprises and effective concepts of their functioning and management.
 This monograph is a collective work of teachers, students, graduate students, undergraduates of the Department of Economic Security, Accounting and Law, Don State Technical University, Rostov State Economic University RINH, Tula State University. It is devoted to the consideration of individual problems of management of enterprises and organizations.
APA, Harvard, Vancouver, ISO, and other styles
4

Russkevich, Evgeniy. Criminal law and "digital crime": problems and solutions. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1840963.

Full text
Abstract:
The monograph is devoted to a complex of theoretical and applied problems of adapting the domestic mechanism of criminal law protection to the "digitalization" of crime in the conditions of the formation of the information society. Along with general theoretical issues, foreign criminal legislation and provisions of international law are being thoroughly analyzed. The paper presents an updated criminal-legal description of crimes in the field of computer information, including novelties of Russian criminal legislation - unlawful impact on the critical information infrastructure of the Russian Federation (Article 2741 of the Criminal Code of the Russian Federation), developed proposals for the differentiation of criminal liability for attacks on the security of computer data and systems, developed scientifically sound recommendations for qualification.
 In the second edition, the issues of differentiation of criminal liability for digital crimes by means of the General and Special Parts of the Criminal Code of the Russian Federation are separately worked out. The analysis of the problems of qualification of crimes in the field of computer information, as well as other crimes committed using information and communication technologies, outside of Chapter 28 of the Criminal Code of the Russian Federation. Taking into account the results obtained, a draft resolution of the Plenum of the Supreme Court of the Russian Federation "On judicial practice in cases of crimes in the field of computer information" is presented.
 It is intended for researchers, teachers, practicing lawyers, students and postgraduates of law schools and faculties.
APA, Harvard, Vancouver, ISO, and other styles
5

Caregorodcev, Anatoliy, Sergey Romanovskiy, and Sergey Volkov. Risk analysis in the processes of ensuring information security of the life cycle of financial automated information systems. INFRA-M Academic Publishing LLC., 2023. http://dx.doi.org/10.12737/2049718.

Full text
Abstract:
One of the key elements of the development strategy of a modern organization is the solution of the task of transforming the information security risk management system. Today, more and more modern organizations are moving away from the maturity-based model in favor of a risk-based approach. The monograph examines this approach and provides recommendations for its application in credit and financial organizations.
 It may be of interest both for employees of departments whose activities are related to risk analysis and management, credit and financial organizations, and for teachers, students and postgraduates studying in training areas and specialties related to the enlarged group of specialties and training areas 10.00.00 "Information security".
APA, Harvard, Vancouver, ISO, and other styles
6

Bragina, Zinaida, Tat'yana Vasil'kova, Natal'ya Gorbina, et al. Priorities of socio-economic development of rural areas in the context of global challenges. INFRA-M Academic Publishing LLC., 2022. http://dx.doi.org/10.12737/1870593.

Full text
Abstract:
The monograph examines the priority areas of rural development caused by the global challenges of the economy and society as a whole. The main factors of rural development, multidirectional links between the economy of municipalities and the level of economic development and economic security of the region are noted. The most important organizational and economic mechanisms for the development of the agricultural sector are shown: state support, tax regulation, introduction of information and communication technologies and digitalization. Applied solutions for managing costs and financial results, directions for diversifying the rural economy, and the feasibility of developing cooperation are outlined. The
 target positive directions of structural shifts in agriculture, ensuring the achievement of food security, are outlined.
 It is intended for managers and specialists of agricultural organizations, local governments, researchers, teachers and students of higher educational institutions.
APA, Harvard, Vancouver, ISO, and other styles
7

Oreshina, Marina, and Andrey Garnov. Information management technologies in the context of digital transformation. INFRA-M Academic Publishing LLC., 2025. https://doi.org/10.12737/2186397.

Full text
Abstract:
The textbook provides a general description of the processes of collecting, transmitting, and storing information using information management systems in organizations and enterprises, and discusses information processing methods and tools, including data visualization using the Yandex DataLens service. The creation of a complex of interrelated models of information processes is considered, the development of methods that allow automated solutions to various problems of an applied nature is presented, ways and means of implementing information technologies are shown: methodological, informational, mathematical, algorithmic, technical and programmatic. The basic concepts of modeling information systems and processes are defined, the classification and types of models of information management systems are given. The issues of information system security are considered. Meets the requirements of the latest generation of federal state educational standards for higher education. It is intended for students studying in the fields of 09.03.03 "Applied Informatics", 01.04.05 "Statistics" and 10.03.01 "Information Security".
APA, Harvard, Vancouver, ISO, and other styles
8

Zhukova, Galina, and Lyudmila Borisova. Mathematics. INFRA-M Academic Publishing LLC., 2024. http://dx.doi.org/10.12737/2082652.

Full text
Abstract:
The textbook contains a systematic presentation of theoretical material that allows you to master the basic techniques and methods of researching a wide range of practical tasks. For each topic under discussion, a large number of examples and tasks developed in accordance with the work program of the discipline "Mathematics" are proposed with detailed analysis and solution. Much attention is paid to the application of mathematical methods to the study of economic problems. Provides assistance in self-preparation and self-control in mastering the discipline, including preparation for lectures and practical classes, control work, computer testing in LMS Moodle, intermediate certifications. It is addressed to university students studying in the field of training 03/10/2011 "Information security", teachers for the organization of the educational process, as well as to anyone interested in self-education.
APA, Harvard, Vancouver, ISO, and other styles
9

Anufriev, Valeriy, Yuliya Gudim, and Aytkali Kaminov. Sustainable development. Energy efficiency. Green economy. INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1226403.

Full text
Abstract:
The monograph examines the problems of sustainable development and energy efficiency using the scientific and methodological approach proposed by the authors for the development of regional fuel and energy programs based on the KhMAO, the Sverdlovsk region, and the oil and gas production enterprise JSC Yuganskneftegaz, and presents the results of the environmental and economic assessment. This approach allows us to evaluate and select the most effective investment project for the utilization of associated petroleum gas from the point of view of energy, environmental and climate security on comparable indicators (tons, rubles). The authors proposed to distinguish from more than 200 UN indicators four basic indicators: the change in the green area (country, region, city, household) for the year; the level of energy efficiency; the amount of pollutants released per year; the annual amount of greenhouse gas emissions. It is proposed to consider the possibility of using the" energy " ruble of S. A. Podolinsky (kW / h) as a possible world reserve currency. Taking into account the unique experience of the region's participation in various projects of sustainable development, energy-efficient and low-carbon economy, it is proposed to create a market for waste and greenhouse gas emissions on the basis of the trade exchange of the Sverdlovsk region as a pilot platform for the implementation of the green economy. The history of the term "green economy", the essence of this concept is considered; the results of the application of green economy in different countries are shown. The international experience of green solutions and technologies is analyzed, the psychological aspects of the transition to a green economy are studied. For all those interested in the environmental development of the economy.
APA, Harvard, Vancouver, ISO, and other styles
10

Hei, Xiali. Security, Data Analytics, and Energy-Aware Solutions in the IoT. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Hei, Xiali. Security, Data Analytics, and Energy-Aware Solutions in the IoT. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

Hei, Xiali, ed. Security, Data Analytics, and Energy-Aware Solutions in the IoT. IGI Global, 2022. http://dx.doi.org/10.4018/978-1-7998-7323-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hei, Xiali. Security, Data Analytics, and Energy-Aware Solutions in the IoT. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Hei, Xiali. Security, Data Analytics, and Energy-Aware Solutions in the IoT. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

Hei, Xiali. Security, Data Analytics, and Energy-Aware Solutions in the IoT. IGI Global, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

Bhushan, Bharat, Sudhir Kumar Sharma, Loai A. Tawalbeh, Muzafer Saracevic, and Azedine Boulmakoul. Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems. Elsevier Science & Technology, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Bhushan, Bharat, Sudhir Kumar Sharma, Loai A. Tawalbeh, Muzafer Saracevic, and Azedine Boulmakoul. Blockchain Technology Solutions for the Security of IoT-Based Healthcare Systems. Elsevier Science & Technology Books, 2023.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Machine Learning Based Solutions for Security of Internet of Things: The IoT Hacker's. ,Security Solution,IoT Attacks,Architecture,Attack Surfaces,Challenges,Internet of Things,5g,smart Cities. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security. Packt Publishing, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Blockchain Based Solutions to Secure IoT : Background, Integration Trends and a Way Forward: Internet of Things,Blockchain,Security,Privacy,Smart Contract,the IoT Hacker's,smart Cities. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Olivier, Steve, Jeff Lindborg, Dustin Grant, and Todd Stone. Cisco Unity Deployment and Solutions Guide. Brand: Cisco Press, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Olivier, Steve, Jeff Lindborg, Dustin Grant, and Todd Stone. Cisco Unity Deployment and Solutions Guide. Pearson Education, Limited, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Bhushan, Megha, Sailesh Iyer, Ashok Kumar, Tanupriya Choudhury, and Arun Negi, eds. Artificial Intelligence for Smart Cities and Villages: Advanced Technologies, Development, and Challenges. BENTHAM SCIENCE PUBLISHERS, 2022. http://dx.doi.org/10.2174/97898150492511220101.

Full text
Abstract:
Smart cities and villages have enhanced the quality of lives of residents. Various computer-assisted technologies have been harnessed for the development of smart cities and villages in order to provide solutions for common and niche urban problems. The development of smart environments has been possible due to advances in computing power and artificial intelligence (AI) that have allowed the deployment of scalable technologies. Artificial Intelligence for Smart Cities and Villages: Advanced Technologies, Development, and Challenges summarizes the role of AI in planning and designing smart solutions for urban and rural environments. This book is divided into three sections to impart a better understanding of the topics to readers. These sections are: 1) Demystifying smart cities and villages: A traditional perspective, 2) Smart innovations for rural lifestyle management solutions, and 3) Case studies. Through this book, readers will be able to understand various advanced technologies that are vital to the development of smart cities and villages. The book presents 15 chapters that present effective solutions to urban and rural challenges. Concepts highlighted in chapters include smart farms, indoor object classification systems, smart transportation, blockchains for medical information, humanoid robots for rural education, IoT devices for farming, and much more. This book is intended for undergraduate and graduate engineering students across all disciplines, security providers in the IT and related fields, and trainees working for infrastructure management companies. Researchers and consultants at all levels working in the areas of artificial intelligence, machine learning, IoT, blockchain, network security, and cloud computing will also find the contents beneficial for planning projects involving smart environments.
APA, Harvard, Vancouver, ISO, and other styles
24

Heshmati, Almas, and Shahrouz Abolhosseini. European Energy Security. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198802242.003.0015.

Full text
Abstract:
This chapter reviews relevant literature on the current state and effectiveness of developing renewable energy on energy security in general, and on energy security in the European Union (EU) in particular. The chapter elaborates on primary energy import sources, possible alternatives, and how energy security is affected by the sources of supply. It also gives an analysis of the effects of the Ukrainian crisis, the isolation of Iran on diversification sources, and on European energy security. It examines EU’s energy policy, analyses the best motivation for a new energy policy direction within Europe, and suggests alternative solutions for enhanced energy supply security. The aim is to suggest suitable solutions for energy security in Europe through energy supply diversification. Supply diversification includes alternative energy corridors for reducing dependency on Russia as a supplier and enhancing the power generated by renewable energy sources under the European Union 2020 strategy.
APA, Harvard, Vancouver, ISO, and other styles
25

Anker, Victoria, Rachael Maysels, and Maria Valasia Peppa, eds. Pushing the Paradigm of Global Water Security. IWA Publishing, 2024. http://dx.doi.org/10.2166/9781789062540.

Full text
Abstract:
Abstract This book brings together early career researchers, non-governmental organisations and industry practitioners, indigenous and local communities, and government agency workers to interrogate the concept of water security. By collating multicultural perspectives, diverse contributions, and illustrative media, we challenge the current anthropocentric, technocratic narrative of water security, according to which: water security is solely for humans; development initiatives and interventions are driven by neocolonial and neoliberal ideologies; the socio-cultural approach to water security is secondary to a technical, engineering-based approach; and interdisciplinarity is not practical in its application. Presented here is an amalgamation of our personal and professional efforts to address these challenges. The nuance of this book is in our methodology: transnational cooperation, collaboration across disciplines, and diagnostic problem-solving. While we do not promise a single solution (there is no such thing as ‘one size fits all’), we believe this timely contribution broadens the discussion around water security through its firm rejection of reductionist approaches to this most complex of ‘wicked problems’. Most notably, we push for the radical acceptance of the indivisibility of environmental conservation, social stability, and economic vitality. We resist the temptation of ‘green growth’, recognising it as little more than neoliberalism in disguise. The brilliance, innovation, and recall to tradition that emerge through this book demonstrate the importance of solutions that are informed by a plurality of knowledge types (from scientific and technical to indigenous and local) and generated through collaboration and partnerships to support the attainment of socio-ecological justice. Essential reading for water practitioners, policy makers, and multilateral organisations in the development sector, it is also a must-read for doctoral and master's students working at intersections of water, and undergraduates who want to challenge their subject-specific perspectives on water and push disciplinary boundaries. ISBN: 9781789062540 (eBook) ISBN: 9781789062557 (ePub)
APA, Harvard, Vancouver, ISO, and other styles
26

Fox, James Alan, and Harvey Burstein. Violence and Security on Campus. ABC-CLIO, LLC, 2010. http://dx.doi.org/10.5040/9798216032380.

Full text
Abstract:
This comprehensive, evidence-based examination looks at violence and security across the entire spectrum of education, from preschool through college. In Violence and Security on Campus: From Preschool through College two expert authors take an evidence-based look at this important issue, dispelling myths and misconceptions about the problem and offering appropriate responses to it. Their book examines patterns, trends, correlations, and causes of violence, crime, and disorder in diverse educational settings, from elementary schools through colleges and universities. It reviews data and research evidence related to forms of violence, from bullying to murder, and it explores the varied security concerns that confront schools of different levels. In addition to describing the nature and extent of the school violence problem, which is often divergent from media reports, the authors point to other security issues that need to be considered and addressed by administrators and security personnel. Finally, they assess a variety of policy responses and security solutions—some popular yet ineffective, some challenging yet promising—offering advice that will enhance the security of any institution of learning.
APA, Harvard, Vancouver, ISO, and other styles
27

Peters, Diana, Jennifer Chan Kim Lian, Gusni Saat, Abentin Estim, and Martin A. Sebastian, eds. Holistic Development and Security for ESSZONE. UMS Press, 2019. http://dx.doi.org/10.51200/holisticdevelopmentumspress2019-978-967-2166-35-1.

Full text
Abstract:
This book is an attempt to contextualise the issues occurring in this part of the region which is not only solely constrained by security in the traditional sense, but also to ensure the livelihoods of citizens are being protected. The four pillars for a holistic approach identified in this book are based on the inputs by stakeholders in four workshops organised in throughout 2016, under the same theme. It is realised that the challenges to the security of Eastern Sabah has many faces – piracy, illicit trafficking, and kidnappings – and these challenges are evolving. As such, an all-encompassing solution is needed.
APA, Harvard, Vancouver, ISO, and other styles
28

Goldstone, Jack A. Population Movements and Security. Oxford University Press, 2017. http://dx.doi.org/10.1093/acrefore/9780190846626.013.277.

Full text
Abstract:
Population movements can affect security in a variety of ways. Aside from altering a society’s overall balance of population and physical resources, they exert a considerable influence on the institutions of society—the state, elite recruitment and social status, the military, labor organizations and peasant villages—in a way that undermines political and social order. The consequences of population movements for security can also be seen in differential population growth and migration, differential aging of different populations, and issues of resource allocation and climate change. The work of T. R. Malthus in the early nineteenth century advanced the argument that more people would put an undesirable burden on societies, and weaken them. Julian Simon turned the Malthusian argument on its head with his claim that people were the “ultimate resource,” and that the more people were around to work on solving the globe’s problems, the more likely it was that powerful solutions would be found. The debate between Malthusians, represented by Paul Ehrlich, and Cornucopians, represented by Simon, from the 1960s to the 1990s was primarily about the impact of population on economic growth. In the 1990s, a new direction emerged in the debate on population and security. This was the argument that population growth would lead to local shortages of critical resources such as farmland, water, and timber, and that these could trigger internal conflicts and even civil wars. These conflicts arise only where states and economies are relatively weak and unable to respond to population growth.
APA, Harvard, Vancouver, ISO, and other styles
29

Agarwal, Bina. Food Security, Productivity, and Gender Inequality. Edited by Ronald J. Herring. Oxford University Press, 2013. http://dx.doi.org/10.1093/oxfordhb/9780195397772.013.002.

Full text
Abstract:
This chapter examines the relationship between gender inequality and food security, with a particular focus on women as food producers, consumers, and family food managers. The discussion is set against the backdrop of rising and volatile food prices, the vulnerabilities created by regional concentrations of food production, imports and exports, the feminization of agriculture, and the projected effect of climate change on crop yields. The chapter outlines the constraints women face as farmers, in terms of their access to land, credit, production inputs, technology, and markets. It argues that there is substantial potential for increasing agricultural output by helping women farmers overcome these production constraints and so bridging the productivity differentials between them and male farmers. This becomes even more of an imperative, given the feminization of agriculture. The chapter spells out the mechanisms, especially institutional, for overcoming the constraints and the inequalities women face as producers, consumers, and home food managers. Institutionally, a group approach to farming could, for instance, enable women and other small holders to enhance their access to land and inputs, benefit from economies of scale, and increase their bargaining power. Other innovative solutions discussed here include the creation of Public Land Banks that would empower the smallholder, and the establishment of agricultural resource centers that would cater especially to small-scale women farmers.
APA, Harvard, Vancouver, ISO, and other styles
30

Cavelty, Myriam Dunn. Aligning Security Needs for Order in Cyberspace. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198828945.003.0006.

Full text
Abstract:
Due to heightened threat perceptions, states are currently expanding their coercive power in cyberspace. They attempt to reduce the risk of escalation in (cybered-)conflict through traditional norms building. At the same time, their strategic actions remain the biggest threat to stability. Cyber-exploitations are a major part of the problem, hindering the removal of known insecurities, thus reducing the effectiveness of any future order. At the same time, the forceful role that states aspire to play in cyber-security has led to questions of legitimacy. The security arrangements that emerged in the 1990s, focused on protection and risk management, had a high degree of legitimacy because they built on a pragmatic solution of distributed security provision. Unless a future order in cyberspace takes into account the interests of companies and consumers who shape this domain in peacetime, it will be met with considerable resistance, with high costs for all sides.
APA, Harvard, Vancouver, ISO, and other styles
31

Pontes Filho, Raimundo Pereira. Desafios à segurança pública no Brasil. Brazil Publishing, 2020. http://dx.doi.org/10.31012/978-65-5861-169-1.

Full text
Abstract:
The problems and themes dealt with in the course of this work constitute repeated challenges to public security in Brazil. There are several others, no doubt, but here is a simple sample of the main ones. The urgent need to review the concept and the model put into practice, predominantly, as a public security paradigm in Brazilian society is evident. It is a demanding task, it requires considerable effort, however, it is essential to the perspectives of life in society in the country, under penalty of making the social reality increasingly dramatic and violent. In this sense, without pretending to point out or constitute any conclusive character, this work aims to collaborate to understand, subsidize, encourage the search for new multidisciplinary solutions with a view to overcoming the serious scenarios of violence and crime in force in the country. It is important to recognize the existence of good practices, including with an interactive focus between disciplines that study or deal with the problem, although they are still far from the answers demanded by the problems arising from public insecurity. In short, “Challenges to public security” is a work that proposes dialogue, questioning and the effort to jointly build possible alternatives and solutions aimed at different socio-cultural contexts impacted adversely by the damages imposed by violence and the culture of crime in Brazil.
APA, Harvard, Vancouver, ISO, and other styles
32

Chinese Industry 4.0: Designing High-Tech Solutions under the Cybersecurity Regime of the People’s Republic of China. SinopeerPress, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

King, Roy D. A Comparison of British and American Policies for Managing Dangerous Prisoners. Edited by John Wooldredge and Paula Smith. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199948154.013.18.

Full text
Abstract:
This essay traces the development of policies regarding difficult and dangerous prisoners in Britain and the United States from the 1960s to the present day. In essence policies about dangerous prisoners in the Unites States have been driven primarily by concerns about bad behaviors inside prisons control problems whereas in Britain the driving force has been fears about escapes security risks. Although control problems and security risks can and do sometimes overlap, it is argued that the two issues can be analyzed separately and have different solutions. Failure to distinguish clearly between security and control issues has bedeviled policies in both countries, sometimes seriously undermining the legitimacy of the system concerned, and led to misunderstandings on both sides of the Atlantic. The essay is organized in three chronological periods in the hope that moving the discussion between the two countries will better bring out the similarities and differences.
APA, Harvard, Vancouver, ISO, and other styles
34

Graham, Jed. A Well-Tailored Safety Net. ABC-CLIO, LLC, 2009. http://dx.doi.org/10.5040/9798216034391.

Full text
Abstract:
This intriguing book introduces the first Social Security reform proposal tailored to meet the nation’s fiscal challenges and care for an aging population. Tackling one of the most difficult and divisive issues facing America today, A Well-Tailored Safety Net: The Only Fair and Sensible Way to Save Social Security seeks to transform the political debate over Social Security reform by introducing the first proposal tailored to meet both the nation’s fiscal challenges and the responsibility of caring for an aging population. As the first batch of 77 million baby boomers begins to collect its social security benefits in the midst of the explosion of national debt from economic recovery expenditures, Social Security reform becomes increasingly urgent. Jed Graham takes apart each of the current leading proposals and shows how all of them fall short by the key criteria of affordability, effectiveness, and fairness. Graham proposes a bold new approach that would erase more debt than any other proposal, yet avoid benefit cuts in very old age, when people can least afford them. Short on actuary speak and long on common sense, A Well-Tailored Safety Net makes the Social Security debate accessible to general readers. At the same time, it advances innovative solutions with such command of analytic detail and ideological impartiality as to merit serious study by legislators and policymakers.
APA, Harvard, Vancouver, ISO, and other styles
35

Walden, Michael. Smart Economics. Greenwood Publishing Group, Inc., 2005. http://dx.doi.org/10.5040/9798216015444.

Full text
Abstract:
Budget deficits, gas prices, health care costs, social security, job security…. Anxiety over the economy pervades our daily lives—from reports on the early morning newscasts to gossip around the water cooler to dinner table debate. Yet most citizens are woefully ignorant when it comes to understanding how the economy works and how to interpret the impact of policies and business decisions. It's easy to slip into generalities: government spending is wasteful, taxes are too high, good-paying jobs are being shipped overseas, Americans don't save enough. Other issues become hijacked by political partisans to advance their agendas: trade must be fair!, tax cuts will pay for themselves!, there will be no money left in the social security till after the baby boomers loot it! In Smart Economics, Michael Walden provides an antidote: take 50 of today's top economic issues and explain their meaning, implications, and potential solutions in a logical, straightforward, commonsense, and non-partisan way. Has Government Spending Been Out of Control? Is Profit Bad? Walden applies basic economic concepts and logical argumentation to help readers get their bearings—to separate fact from fiction and ultimately make better economic decisions themselves. The result is an entertaining and highly informative introduction to economic principles and their influence on our behavior. In Smart Economics, Michael Walden provides an antidote: take 50 of today's top economic issues and explain their meaning, implications, and potential solutions in a logical, straightforward, commonsense, and non-partisan way. From Has Government Spending Been out of Control? to Is Profit Bad? to Why Are Pro Sports Stars Paid So Much? Walden demystifies the dismal science, using basic concepts and logical argumentation to help readers get their bearings—to separate fact from fiction and ultimately make better decisions, when it comes to spending, investing, saving, and voting. The result is an entertaining and informative introduction to economic principles and their influence on our behavior.
APA, Harvard, Vancouver, ISO, and other styles
36

Pasqualetti, Martin J. The Thread of Energy. Oxford University Press, 2022. http://dx.doi.org/10.1093/oso/9780199394807.001.0001.

Full text
Abstract:
The Thread of Energy simplifies the world’s complexity by recognizing energy as the single most important influence on human behavior. It exposes how fundamental is energy on our lives, our security, and our relationships with others in an ever-shrinking and complicated world. It examines the typical inspiration energy has on all activities, ways of life, ambitions, and costs while illustrating its central role in explaining how the world works and how it will influence the future we are creating. It reduces the myriad interlocking and inscrutable effects on human security and happiness while preparing us—in lay language—for the coming energy transition. In sum, the book weaves a tapestry of all human activities by describing how energy drives human actions, decisions, barriers, and opportunities. Acknowledging and acting upon this accumulated awareness is the first step in illuminating the path to the solutions we must identify to survive. Once we do so, we will have accepted that energy is a social issue with a technical component rather than the other way around.
APA, Harvard, Vancouver, ISO, and other styles
37

Dov, Jacobs. Part II The Relationship to Domestic Jurisdictions, 12 The Frog that Wanted to Be an Ox: The ICC’s Approach to Immunities and Cooperation. Oxford University Press, 2015. http://dx.doi.org/10.1093/law/9780198705161.003.0012.

Full text
Abstract:
This chapter addresses the relationship between immunities and the requirements of state cooperation in cases where the person prosecuted is a national of a non-State Party (e.g. Al Bashir). It examines the complex relationship between Articles 27 and 98 of the Rome Statute and the manner in which they comport with clearly established norms of public international law. The chapter highlights a number of possible legal avenues to circumvent the obstacle posed by immunities, which include reference to customary international law, analysis of the powers of the United Nations Security Council, and the Genocide Convention. It argues that all these solutions have a number of flaws that are difficult to overcome.
APA, Harvard, Vancouver, ISO, and other styles
38

Guerrero, Alexander A. Defense and Ignorance. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190922542.003.0016.

Full text
Abstract:
This chapter has a negative thesis and a positive thesis. The negative thesis is that, at least in the arena of national security, electoral representative democracy is incompatible with popular sovereignty, a prerequisite of political legitimacy. The incompatibility arises due to five distinct but interrelated factors. First, confidentiality: strategic requirements of confidentiality and secrecy undermine meaningful political accountability. Second, ignorance: national security policy is technical and complicated to an extent that the average voter lacks the information and competence required to hold elected political officials meaningfully accountable for enacting responsive policy. Third, voter psychology: national security policy is an area in which low information leads to easy psychological distortion. Fourth, electoral pathology: national security policy is an area where elected officials have dramatically and inappropriately circumscribed policy options, given the electoral repercussions of appearing :weak” on security and given that many of the most significant costs of ineffective policy are borne by others—either people in other countries or future generations of Americans. Fifth, money: national security policy is a policy arena where there is a lot of money to be made by a relatively small number of individuals and corporations, making lobbying and electioneering for certain political outcomes a very high-value proposition for those entities. These five factors work together and overlap in complex ways. The end result is that national security policy created by elected officials (and their appointees) is (1) largely unresponsive to the core beliefs, values, and preferences of those in whose name it is enacted; and (2) bad policy for those in whose name it is enacted. Thus, in the arena of national security policy, we have at most nominal popular sovereignty, not real popular sovereignty. The positive thesis of this chapter is that there may be institutional reforms that could be made which would help us reclaim popular sovereignty in the arena of national security policy. In particular, we should consider the use of lottocratic institutions, which employ randomly selected citizens in policymaking roles. The chapter introduces and briefly defends these institutions as a possible solution to the problem of popular sovereignty in the national defense context.
APA, Harvard, Vancouver, ISO, and other styles
39

Samset, Knut, and Gro Holst Volden. Quality Assurance in Megaproject Management. Edited by Bent Flyvbjerg. Oxford University Press, 2017. http://dx.doi.org/10.1093/oxfordhb/9780198732242.013.17.

Full text
Abstract:
This chapter discusses the Norwegian governance regime for public megaprojects and the lessons learned. Governance regimes for major public investment projects comprise the processes and systems which the financing party must implement to ensure a successful investment. Such regimes typically include a regulatory framework, compliance with agreed objectives, and sound management and resolution of issues that may arise. The challenges in securing quality at entry include identification of a conceptual solution that is economically viable and relevant with respect to the needs and often conflicting priorities in society, avoiding underestimating costs, overestimating utility and making unrealistic and inconsistent assumptions, and securing essential planning data and adequate contract regimes. The Norwegian regime involves external quality assurance of key decision documents, and has given the government greater control over the total cost of its investment project portfolio. It also ensures that decisions regarding the choice of conceptual solution are based on a broad assessment of overall needs and goals, as well as alternative ways of achieving these goals.
APA, Harvard, Vancouver, ISO, and other styles
40

Friedman, Hal M. Creating an American Lake. Praeger, 2000. http://dx.doi.org/10.5040/9798400633195.

Full text
Abstract:
Many historians of U.S. foreign relations think of the post-World War II period as a time when the United States, as an anti-colonial power, advocated collective security through the United Nations and denounced territorial aggrandizement. Yet between 1945 and 1947, the United States violated its wartime rhetoric and instead sought an imperial solution to its postwar security problems in East Asia by acquiring unilateral control of the western Pacific Islands and dominating influence throughout the entire Pacific Basin. This detailed study examines American foreign policy from the beginning of the Truman Administration to the implementation of Containment in the summer and fall of 1947. As a case study of the Truman Administration's Early Cold War efforts, it explores pre-Containment policy in light of U.S. security concerns vis-a-vis the Pearl Harbor Syndrome. The American pursuit of a secure Pacific Basin was inconsistent at the time with its foreign policy toward other areas of the world. Thus, the consolidation of power in this region was an exception to the avowed goal of a multilateral response to the policies of the Soviet Union. This example of national or strategic security went much further than simple military control; it included the cultural assimilation of the indigenous population and the unilateral exclusion of all other powers. Analyzing traditional archival records in a new light, Friedman also investigates the persisting American notions of a Westward moving frontier that stretches beyond North American territorial bounds.
APA, Harvard, Vancouver, ISO, and other styles
41

Hulnick, Arthur S. Keeping Us Safe. Greenwood Publishing Group, Inc., 2004. http://dx.doi.org/10.5040/9798400675577.

Full text
Abstract:
How can the United States guard against a clever unknown enemy while still preserving the freedoms it holds dear? Hulnick explains the need to revamp U.S. intelligence operations from a system focused on a single Cold War enemy to one offering more flexibility in combating non-state actors (including terrorists, spies, and criminals) like those responsible for the attacks of September 11, 2001. Offering possible solutions not to be found in the federal commission’s official report, Hulnick’s groundbreaking work examines what is really necessary to make intelligence and homeland security more efficient and competent, both at within the United States and abroad. The U.S. government’s progress in establishing a system for homeland security is considerable, yet, besides shifts in alert status, most U.S. residents are unaware of the work being done to keep them safe. Describing the system already in place, Hulnick adds further ideas about what more is needed to protect Americans in the ever-changing world of intelligence. To create a truly valuable program, it is suggested the the United States consider not only new strategies and tactics, but also the need to break down the barriers between intelligence agencies and law enforcement.
APA, Harvard, Vancouver, ISO, and other styles
42

Chapin, F. Stuart. Grassroots Stewardship. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780190081195.001.0001.

Full text
Abstract:
The book presents a novel strategy for addressing the major environmental and social problems of our time. It emphasizes transformative actions by individual citizens, both ordinary and extraordinary, rather than by government and other groups. It empowers a spectrum of solutions appropriate to people with varying interests, skills, political persuasions, and level of environmental and social commitment. The book draws on social and ecological theory to formulate a four-tiered stewardship strategy to transform communities, nations, and the planet. Key elements of this strategy are (1) individual actions that link people with nature and reduce human impacts on the planet, (2) effective communication to reduce political polarization and share solutions, (3) collaborations that integrate actions of multiple groups, and (4) political engagement to trigger needed transformations. The book builds on diverse visions and goals for the future of ecosystems and society: concern for future generations, a spiritual commitment to care for Creation and vulnerable people, a desire to sustain the best of nature and of cultures, and a concern about the security and well-being of communities, nations, and the world. This is not a book about what should be done. It is a book about what has been and can be done and a pragmatic strategy for tangible progress.
APA, Harvard, Vancouver, ISO, and other styles
43

Heath-Kelly, Charlotte, and Sadi Shanaah. The Politics of Preventing Violent Extremism. Oxford University PressOxford, 2025. https://doi.org/10.1093/9780198953814.001.0001.

Full text
Abstract:
Abstract The Politics of Preventing Violent Extremism explores how counter-radicalization policies have come to dominate European counterterrorism and security. Using interviews with practitioners across seven European nations, it documents how national security policies have been repurposed to identify individuals deemed ‘vulnerable’ to extremism and radicalization, and to provide targeted preventative interventions from welfare state agencies. Crucially, however, the methods (and limits) of preventing violent extremism (PVE) policies vary between nations. The Politics of Preventing Violent Extremism explores how political culture, the welfare state, and the conception of civil society in each nation shapes the type of counter-radicalization employed. While some European states have designed extensive pre-crime surveillance networks to identify those ‘radicalizing’ others, other states in Europe are bound by constitutional commitments to liberty of thought and speech which restrain them from using any type of pre-crime intervention. Accordingly, while PVE policies have been heralded as a novel solution to the problem of radicalization, they remain rooted in, and limited by, the political and social traditions of European democracies.
APA, Harvard, Vancouver, ISO, and other styles
44

Porter, Patrick. Virtue Runs Amok. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198807964.003.0006.

Full text
Abstract:
This chapter argues that a return to realism of a prudent and sceptical kind can help temper the pathologies that led to the Iraq War, on several fronts. It can counsel governments against excess certainty. In particular, it cautions against the ‘Gordian Knot’ temptation, the impatient urge to eliminate sources of insecurity and impose decisive solutions on problems, in particular the perennial demand for the downfall of adversary regimes. Realism can inform policymakers what war can affordably achieve. As well as placing princes on their guard against predation, iIt encourages prudent war avoidance. Mindful that states cannot avoid living with insecurity, uncertainty, and risk, we can draw upon realist insight to restore deterrence and consequential diplomacy as the central foundations of security. And with realism, we can guard against the temptation to view international life as a morality play requiring ideological crusades, recognizing it instead as a tragedy where good intentions can be deadly, as a conflicted world where not all good things go together, and where major powers can be their own worst enemies.
APA, Harvard, Vancouver, ISO, and other styles
45

Carr, Madeline. Cyberspace and International Order. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780198779605.003.0010.

Full text
Abstract:
When The Anarchical Society was published in 1977, the world was on the doorstep of seismic technological change. Forty years later, the information age has placed cyber security at the centre of many global political concerns including armed conflict and international law. The ongoing difficulties associated with accurately attributing cyber attacks introduce a new dimension of anarchy in international relations. This essay draws on Bull’s ideas about social interplay to explore the problem of attribution in cyberspace. It finds that the difficulties of identifying (even) state actors undermine some of the processes and institutions upon which Bull based his ideas. However, it also finds that Bull’s work is useful in unpicking exactly why attribution is so problematic for international relations. Ultimately, Bull’s expectation that actors will look for social solutions to maintain order appears to be holding up in the information age much as it did in the industrial age.
APA, Harvard, Vancouver, ISO, and other styles
46

Eileen, Denza. Introduction. Oxford University Press, 2016. http://dx.doi.org/10.1093/law/9780198703969.003.0001.

Full text
Abstract:
This introductory chapter outlines the development of the Vienna Convention on Diplomatic Relations, an international treaty that defines a framework for diplomatic relations between sovereign States. It elaborates three key details why the Convention serves as an important legal framework that regulates international relations. First, the Convention guarantees the efficacy and security of the machinery through which States conduct diplomacy, and without this machinery States cannot construct law, whether by custom or by agreement on matters of substance. The Convention constitutes the procedural framework for the construction of international law and international relations. Secondly, reciprocity forms a constant and effective sanction for the observance of nearly all the rules of the Convention, such as the treatment of representatives or diplomats abroad. Thirdly, the Convention never loses sight of the need to find solutions which would be acceptable to governments and to national Parliaments as a whole.
APA, Harvard, Vancouver, ISO, and other styles
47

Edele, Mark. The Impact of War and the Costs of Superpower Status. Edited by Simon Dixon. Oxford University Press, 2015. http://dx.doi.org/10.1093/oxfordhb/9780199236701.013.028.

Full text
Abstract:
Rather than recount the history of postwar society as a story of successive regimes identified with individual leaders, this chapter takes a thematic approach concentrating on the state’s attempts to balance the demands of international security against its ability to supply resources to the Soviet people. By the 1970s, the level of defence spending made it impossible to guarantee universal well-being and a good life through the official economy. So instead the state focused its attention on war veterans—a subgroup which by then encompassed most of the older generation—while allowing the rest of the citizenry to privatize everyday life. Soviet society’s spontaneous solutions to the war and postwar crises—suburban gardening at the dacha, barter, legal and illegal trade—thus became the base of the late socialist economy, while the new social entity born out of the war became a central status group in late socialist society.
APA, Harvard, Vancouver, ISO, and other styles
48

Jason, Leonard, and Martin Perdoux. Havens. www.praeger.com, 2004. http://dx.doi.org/10.5040/9798400662072.

Full text
Abstract:
For good reasons, Americans are growing concerned about the cost of health care and housing. There are many reasons why people need care-the addiction of a teenage child or spouse, an elderly relative in need of nursing home care, a psychological disorder, or a chronic medical condition—but even moderately successful institutional solutions for these problems are often too costly to be truly helpful. The cost of healthcare is so high it can result in homelessness. Leonard Jason and Martin Perdoux show us a relatively low-cost and effective solution growing in neighborhoods across the country: true community. People are moving in together to meet each other's needs and, in the process, create a much higher quality of life than they would find in an institution. People living together in these healing communities include the elderly, recovering alcoholics and drug addicts, and people suffering from mental illness, Chronic Fatigue Syndrome, AIDS, or Multiple Chemical Sensitivity. These communities offer them a way to recover the caring, structure, direction, and respect that a strong family can provide. The authors of this work show us how communities created out of necessity by their members constitute a more sustained, natural means to healing. In his foreword, Thomas Moore points out that the communities described in this book are not only physical homes, but also shelters for the soul, places to find the deepest kind of security. Here you will see concrete ways imaginative leaders help those in trouble find themselves rather than become dependent on institutions. It is a new and promising imagination of how social healing works: not by setting up more programs, but by treating people in trouble as human beings, with certain emotional and social needs. This book teaches how to re-imagine this whole process, and now, in an increasingly technical and lonely world, we need this precious wisdom more than ever.
APA, Harvard, Vancouver, ISO, and other styles
49

DeNardis, Laura. The Internet in Everything. Yale University Press, 2020. http://dx.doi.org/10.12987/yale/9780300233070.001.0001.

Full text
Abstract:
The Internet has leapt from human-facing display screens into the material objects all around us. In this so-called Internet of Things—connecting everything from cars to cardiac monitors to home appliances—there is no longer a meaningful distinction between physical and virtual worlds. Everything is connected. The social and economic benefits are tremendous, but there is a downside: an outage in cyberspace can result not only in a loss of communication but also potentially a loss of life. Control of this infrastructure has become a proxy for political power, since countries can easily reach across borders to disrupt real-world systems. This book argues that this diffusion of the Internet into the physical world radically escalates governance concerns around privacy, discrimination, human safety, democracy, and national security, and it offers new cyber-policy solutions. The book makes visible the sinews of power already embedded in our technology and explores how hidden technical governance arrangements will become the constitution of our future.
APA, Harvard, Vancouver, ISO, and other styles
50

Becker, Ulrich, and Olga Chesalina, eds. Social Law 4.0. Nomos Verlagsgesellschaft mbH & Co. KG, 2021. http://dx.doi.org/10.5771/9783748912002.

Full text
Abstract:
Digitalisation and the changing world of work are calling into question the standard employment model as a basis for social security systems. Whilst a growing number of publications deal with the consequences for industrial relations and labour law, social law is still being left out of most research projects on digital work. This book aims at widening the perspective. It concentrates on the two most important questions in the context of social protection in a digitalised world, namely access to social protection systems and their future financing, putting emphasis on platform work. It gives an overview of different national approaches to these questions, it analyses the respective solutions in a comparative manner, and it puts them into a transnational context. By bringing together case studies from Belgium, Italy, the United Kingdom, the Netherlands, Denmark, Sweden, Spain, France and Estonia and addressing the specific reform challenges for EU standard setting, EU coordination and the relation to tax law, the book provides new insights on what a “Social Law 4.0” should look like.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography