Academic literature on the topic 'Non-traditional security threats'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Non-traditional security threats.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Non-traditional security threats"
Syed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.
Full textBasavarajeshwari Halu et al.,, Basavarajeshwari Halu et al ,. "Non-Traditional Security Threats in South Asia." International Journal of Political Science, Law and International Relations 10, no. 2 (2020): 23–30. http://dx.doi.org/10.24247/ijpslirdec20203.
Full textKumara, Jeewaka Saman. "Non-traditional Security Disputes of Sri Lanka." International Journal for Innovation Education and Research 3, no. 3 (2015): 1–14. http://dx.doi.org/10.31686/ijier.vol3.iss3.323.
Full textSen, Kaushik. "Book Review: India and ASEAN : Non-Traditional Security Threats." Jadavpur Journal of International Relations 11-12, no. 1 (2008): 427–31. http://dx.doi.org/10.1177/0973598408110029.
Full textBiswas, Subrata. "Drug Abuse and Drug Trafficking: Non-Traditional Security Threats in Post-Soviet Central Asia." Asian Journal of Legal Education 8, no. 2 (2021): 247–58. http://dx.doi.org/10.1177/23220058211025964.
Full textChatterjee, Aditi. "Non-traditional Maritime Security Threats in the Indian Ocean Region." Maritime Affairs: Journal of the National Maritime Foundation of India 10, no. 2 (2014): 77–95. http://dx.doi.org/10.1080/09733159.2014.972669.
Full textMladenov, Vasily Ivanovich, Sergey Viktorovich Kononov, Yulia Victorovna Gavrilova, and Ilona Valerievna Romanova. "Problematization of religious threats in the modern social discourse of Western countries and Russia." LAPLAGE EM REVISTA 7, Extra-B (2021): 193–202. http://dx.doi.org/10.24115/s2446-622020217extra-b911p.193-202.
Full textFusiek, Dawid Aristotelis. "Rethinking Security: The Limits of the Traditional Concept of Security in a World of Non-Traditional Threats." HAPSc Policy Briefs Series 1, no. 2 (2020): 265. http://dx.doi.org/10.12681/hapscpbs.26500.
Full textCUONG, Nguyen Xuan, and Nguyen Thi Phuong HOA. "Non-Traditional Security Issues across Vietnam and China Land Borders." East Asian Policy 10, no. 02 (2018): 109–22. http://dx.doi.org/10.1142/s1793930518000223.
Full textKrishnan, Tharishini, Abu Sadat Mahmud Safeer, and Inderjit Singh. "The Growing Power Struggle in Indian Ocean Region: Security Road Map for Bangladesh." JOURNAL OF SOCIAL SCIENCE RESEARCH 14 (October 28, 2019): 3372–79. http://dx.doi.org/10.24297/jssr.v14i0.8470.
Full textDissertations / Theses on the topic "Non-traditional security threats"
Mabanga, Silingile Portia. "South Africa's official external threat perceptions : 1994-2012." Diss., University of Pretoria, 2013. http://hdl.handle.net/2263/43680.
Full textKettil, Daniel. "From National Defence to International Operations? : A study on the transformation of Sweden's armed forces between 1989-2009." Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21908.
Full textPiletti, Felipe José. "Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/14386.
Full textFukumi, Sayaka. "A non-traditional security threat : contending EU and US approaches to cocaine trafficking from the Andes." Thesis, University of Nottingham, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421548.
Full textSciascia, Alban. ""Gotong royong" : la coopération sécuritaire américano-indonésienne depuis 2001. Analyse d'un partenariat stratégique en devenir par le prisme de la sécurité maritime." Thesis, Lyon, École normale supérieure, 2012. http://www.theses.fr/2012ENSL0763.
Full text華書賢. "Cross-Strait interactions and Non-Traditional Security Threats to Taiwan:The SARS Case." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/6y8vcj.
Full text李嘉峻. "The new Internet era of non-traditional security threats - A study of e-commerce fraud." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/75xfe4.
Full textYou, Shao-Yu, and 游邵予. "A Study of Measures of the Taiwan Customs Authorities toward the Non-Traditional Security Threats." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/x4t22j.
Full textWu, Jia-Li, and 吳嘉立. "The Response of ROC’s Chemical Troops to Non-Traditional Security Threats :Case of Taichung Science Park." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/8xa494.
Full textHSUAN-LUN, KUO, and 郭宣綸. "The Total–Defense Mechanism under Non-traditional Security Threats: A Case Study of the Military Training Instructor System." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/ffukd9.
Full textBooks on the topic "Non-traditional security threats"
South Asia: Traditional and non-traditional security threats. Pentagon Press, 2015.
Find full textIndia. Ministry of Defence. Integrated Defence Staff and Observer Research Foundation, eds. Navigating the near: Non-traditional security threats to India, 2022. Observer Research Foundation, 2011.
Find full textMustafa, Aydın, ed. Non-traditional security threats and regional cooperation in the Southern Caucasus. IOS Press, 2011.
Find full textR, Raghavan V., Centre for Security Analysis (Madras, India), and Hanns-Seidel-Stiftung, eds. India and ASEAN: Non-traditional security threats. EastWest Books (Madras), 2007.
Find full textTraditional and non-traditional threats to Central Asian security. KW Publishers, 2011.
Find full text(Editor), Jim Hanson, and Susan McNish (Editor), eds. Canada and the World: Non-Traditional Security Threats. Diane Pub Co, 1997.
Find full textBolt, Paul J., and Sharyl N. Cross. Emerging Non-traditional Security Challenges. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198719519.003.0005.
Full textJones, Lee, and Shahar Hameiri. Governing Borderless Threats: Non-Traditional Security and the Politics of State Transformation. University of Cambridge ESOL Examinations, 2015.
Find full textJones, Lee, and Shahar Hameiri. Governing Borderless Threats: Non-Traditional Security and the Politics of State Transformation. University of Cambridge ESOL Examinations, 2017.
Find full text1938-, Hanson Jim, McNish Susan, and Canadian Institute of Strategic Studies., eds. Canadian strategic forecast 1997: Canada and the world : non-traditional security threats. Canadian Institute of Strategic Studies, 1997.
Find full textBook chapters on the topic "Non-traditional security threats"
Titovich, Adam, and Vadim Atnashev. "Development Trends of the Strait of Malacca Countries in the Field of Countering Non-traditional Threats to National Security in the Context of the Indo-Pacific Region in 2010s–2020s." In Springer Geography. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-78690-8_17.
Full textTorcetti, Shelley. "Human insecurity and non-traditional threats to security." In Living in the Shadows of China’s HIV/AIDS Epidemics. Routledge, 2019. http://dx.doi.org/10.4324/9780429265488-2.
Full textVaseashta, Ashok, Sherri B. Vaseashta, and Eric W. Braman. "Mitigating Unconventional Cyber-Warfare." In Cyber Security and Threats. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-5634-3.ch071.
Full textEmerson, Stephen, and Hussein Solomon. "Understanding the security environment." In African security in the twenty-first century. Manchester University Press, 2018. http://dx.doi.org/10.7228/manchester/9781526122735.003.0001.
Full text"Maritime security in the Indian Ocean: confronting non-traditional security threats with regional cooperation." In Indian Ocean and Maritime Security. Routledge India, 2016. http://dx.doi.org/10.4324/9781315439761-17.
Full textParcon, RJ Marco Lorenzo C., and Julio S. Amador. "Preventive Diplomacy and Non-Traditional Security Threats: Natural Disasters and the Philippines." In Series on Asian Regional Cooperation Studies. WORLD SCIENTIFIC, 2020. http://dx.doi.org/10.1142/9789811218576_0011.
Full text"4. Strategic Responses to Non-traditional Security Threats: The Role of the Military." In Climate Change and the Bay of Bengal. ISEAS Publishing, 2015. http://dx.doi.org/10.1355/9789814517935-005.
Full text"1. Introduction: What is Security Studies?" In Contemporary Security Studies, edited by Alan Collins. Oxford University Press, 2018. http://dx.doi.org/10.1093/hepl/9780198804109.003.0001.
Full textCollins, Alan. "1. Introduction:." In Contemporary Security Studies. Oxford University Press, 2015. http://dx.doi.org/10.1093/hepl/9780198708315.003.0001.
Full textMarkos, Karavias. "Part II Predominant Security Challenges and International Law, Human Security, Ch.24 States and Non-State Actors and Human Security." In The Oxford Handbook of the International Law of Global Security. Oxford University Press, 2021. http://dx.doi.org/10.1093/law/9780198827276.003.0025.
Full textConference papers on the topic "Non-traditional security threats"
Xiong, Liang, Weiwei Wang, Huansong Liu, Xin Xu, and Chang Liu. "An Analysis of Major Non-traditional Security Threats Currently Faced in Xinjiang." In 2016 International Conference on Economics, Social Science, Arts, Education and Management Engineering. Atlantis Press, 2016. http://dx.doi.org/10.2991/essaeme-16.2016.123.
Full textXiong, Liang, Weiwei Wang, Silan Li, and Xin Xu. "The Quality Chain Management: A Framework for the Prevention and Countermeasures against Non-traditional Security Threats in Xinjiang." In 2nd International Symposium on Social Science 2016 (ISSS 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/isss-16.2016.70.
Full textXiong, Liang, Weiwei Wang, Silan Li, and Xin Xu. "The Status Quo and Development of Study on the Prevention and Countermeasures against the Non-traditional Security Threats in Xinjiang." In 2016 5th International Conference on Social Science, Education and Humanities Research. Atlantis Press, 2016. http://dx.doi.org/10.2991/ssehr-16.2016.217.
Full textWang, Weiwei, Liang Xiong, Huansong Liu, Xin Xu, and Chang Liu. "Research on the Application of Evidence-based Thought in the Prevention and Response to Non-traditional Security Threats in Xinjiang." In 2nd International Symposium on Social Science 2016 (ISSS 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/isss-16.2016.69.
Full textTam, K., K. Forshaw, and KD Jones. "Cyber-SHIP: Developing Next Generation Maritime Cyber Research Capabilities." In International Conference on Marine Engineering and Technology Oman. IMarEST, 2019. http://dx.doi.org/10.24868/icmet.oman.2019.005.
Full text