Journal articles on the topic 'Security policy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security policy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Banks, Simon. "Security policy." Computers & Security 9, no. 7 (November 1990): 605–10. http://dx.doi.org/10.1016/0167-4048(90)90058-2.
Full textOgi, Adolf. "Security through cooperation: Switzerland's security policy." RUSI Journal 145, no. 3 (June 2000): 37–39. http://dx.doi.org/10.1080/03071840008446531.
Full textBilocerkowycz, Jaroslaw, and Taras Kuzio. "Ukrainian Security Policy." Russian Review 56, no. 1 (January 1997): 145. http://dx.doi.org/10.2307/131507.
Full textDuncan, Peter J. S. "Indian security policy." International Affairs 63, no. 3 (1987): 528–29. http://dx.doi.org/10.2307/2619328.
Full textJones, Rodney W., and Raju G. C. Thomas. "Indian Security Policy." Pacific Affairs 60, no. 4 (1987): 687. http://dx.doi.org/10.2307/2759213.
Full textLagassé, Philippe, and Justin Massie. "Canadian Security Policy." International Journal: Canada's Journal of Global Policy Analysis 64, no. 3 (September 2009): 601–4. http://dx.doi.org/10.1177/002070200906400301.
Full textBroderick, J. S. "VPN Security Policy." Information Security Technical Report 6, no. 1 (March 2001): 31–34. http://dx.doi.org/10.1016/s1363-4127(01)00105-4.
Full textPounder, Chris. "Security policy update." Computers & Security 21, no. 7 (November 2002): 620–23. http://dx.doi.org/10.1016/s0167-4048(02)01109-4.
Full textWeiller, Matthew A. "SPD security policy." Survival 30, no. 6 (November 1988): 515–28. http://dx.doi.org/10.1080/00396338808442437.
Full textHunt, Kenneth. "Japan's security policy." Survival 31, no. 3 (May 1989): 201–7. http://dx.doi.org/10.1080/00396338908442466.
Full textSchneider, Henrique, and Hans-Ulrich Bigler. "Raw materials policy as security policy." Vojno delo 67, no. 4 (2015): 24–43. http://dx.doi.org/10.5937/vojdelo1504024s.
Full textKim, ChangYun. "A Study on North Korean Police Security Policy." Korean Association of Police Science Review 22, no. 4 (August 31, 2020): 321–66. http://dx.doi.org/10.24055/kaps.22.4.13.
Full textBăloi, Alexandra-Iulia. "Politica de securitate națională a României 1990-2020." Sociologie Romaneasca 19, no. 1 (May 31, 2021): 168–82. http://dx.doi.org/10.33788/sr.19.1.9.
Full textChoi, Junho, Chong Soo Cheung, Dongkwan Lee, Seol A. Kwon, and Jae Eun Lee. "Policy Directions for Securing Food Security by Applying Critical Infrastructure in the Field of Agriculture." Crisis and Emergency Management: Theory and Praxis 13, no. 8 (August 31, 2023): 17–27. http://dx.doi.org/10.14251/jscm.2023.8.17.
Full textGiegerich, Bastian, and Maximilian Terhalle. "Germany’s troubled security policy." Adelphi Series 58, no. 477 (November 2, 2018): 41–62. http://dx.doi.org/10.1080/19445571.2018.1932197.
Full textVance, Anthony, and Mikko T. Siponen. "IS Security Policy Violations." Journal of Organizational and End User Computing 24, no. 1 (January 2012): 21–41. http://dx.doi.org/10.4018/joeuc.2012010102.
Full textYadav, R. S. "India's Energy Security Policy." India Quarterly: A Journal of International Affairs 64, no. 3 (July 2008): 1–27. http://dx.doi.org/10.1177/097492840806400301.
Full textAxinn, June, and Mark J. Stern. "Social Security Policy Reconsidered." Challenge 33, no. 4 (July 1990): 22–27. http://dx.doi.org/10.1080/05775132.1990.11471438.
Full textSrivastava, Varun, Michael D. Bond, Kathryn S. McKinley, and Vitaly Shmatikov. "A security policy oracle." ACM SIGPLAN Notices 47, no. 6 (August 6, 2012): 343. http://dx.doi.org/10.1145/2345156.1993539.
Full textMacnamara, Don, David B. Dewitt, and David Leyton-Brown. "Canada's International Security Policy." International Journal 50, no. 4 (1995): 808. http://dx.doi.org/10.2307/40203052.
Full textSchlör, Wolfgang F. "German security policy: Introduction." Adelphi Papers 33, no. 277 (June 1993): 3–5. http://dx.doi.org/10.1080/05679329308449164.
Full textSrivastava, Varun, Michael D. Bond, Kathryn S. McKinley, and Vitaly Shmatikov. "A security policy oracle." ACM SIGPLAN Notices 46, no. 6 (June 4, 2011): 343–54. http://dx.doi.org/10.1145/1993316.1993539.
Full textLange, David. "New Zealand's Security Policy." Foreign Affairs 63, no. 5 (1985): 1009. http://dx.doi.org/10.2307/20042366.
Full textAl-Mayahi, Ibrahim H., and Sa’ad P. Mansoor. "Information Security Policy Development." Journal of Advanced Management Science 2, no. 1 (2014): 135–39. http://dx.doi.org/10.12720/joams.2.2.135-139.
Full textToueiti, Slim, Amir Souissi, and Karim Hassan. "Security Policy Monitoring System." International Journal of Computer Trends and Technology 54, no. 3 (December 25, 2017): 127–32. http://dx.doi.org/10.14445/22312803/ijctt-v54p122.
Full textHughes, Mark, and Ray Stanton. "Winning security policy acceptance." Computer Fraud & Security 2006, no. 5 (May 2006): 17–19. http://dx.doi.org/10.1016/s1361-3723(06)70358-x.
Full textHinde, S. V. "Company computer security policy." Computer Audit Update 1992, no. 10 (October 1992): 8–12. http://dx.doi.org/10.1016/0960-2593(92)90050-w.
Full textMontanari, Mirko, Ellick Chan, Kevin Larson, Wucherl Yoo, and Roy H. Campbell. "Distributed security policy conformance." Computers & Security 33 (March 2013): 28–40. http://dx.doi.org/10.1016/j.cose.2012.11.007.
Full textGarwin, Richard L. "National Security Space Policy." International Security 11, no. 4 (1987): 165. http://dx.doi.org/10.2307/2538846.
Full textNam, Joo-Hong. "Democratization and Security Policy." Korean Journal of International Relations 28, no. 2 (March 31, 1989): 209–18. http://dx.doi.org/10.14731/kjir.1989.03.28.2.209.
Full textPollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.
Full textSoare, Simona R. "Biden’s Security Policy: Democratic Security or Democratic Exceptionalism?" Intereconomics 56, no. 1 (January 2021): 14–20. http://dx.doi.org/10.1007/s10272-021-0945-1.
Full textLamb, Guy. "Parading US Security Interests as African Security Policy." Contemporary Security Policy 30, no. 1 (April 2009): 50–52. http://dx.doi.org/10.1080/13523260902760058.
Full textOrynbayev, Zhassulan, Yelena Nechayeva, Yerbolat Sergazin, Nurlan Muminov, and Talgat Tumashbay. "Characteristics and features of Kazakhstan’s water security policy." Problems and Perspectives in Management 22, no. 2 (June 26, 2024): 654–66. http://dx.doi.org/10.21511/ppm.22(2).2024.51.
Full textChufrin, Gennady. "Putin’s Domestic Policy: Its Implications for National Security." Connections: The Quarterly Journal 01, no. 2 (2002): 9–19. http://dx.doi.org/10.11610/connections.01.2.02.
Full textKim, Hae Kyoung. "The Impact of Police Organization Support on Public Policy: Focusing on Learning Organizations." Korean Society of Private Security 22, no. 3 (September 30, 2023): 47–68. http://dx.doi.org/10.56603/jksps.2023.22.3.47.
Full textMatvejevs, Aleksandrs. "LEGAL REGIMES IN POLICE ACTIVITY AT LATVIAN SECURITY POLICY." Journal of Security and Sustainability Issues 3, no. 1 (September 19, 2013): 23–30. http://dx.doi.org/10.9770/jssi.2013.3.1(3).
Full textBrandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.
Full textAgafonova, O. V. "DEVELOPMENT POLICY IN CONTEXT OF GERMAN SECURITY POLICY." Вестник Московского государственного лингвистического университета. Общественные науки, no. 4 (2021): 9–21. http://dx.doi.org/10.52070/2500-347x_2021_4_845_9.
Full textCACM Staff. "A policy that deters violation of security policy." Communications of the ACM 54, no. 8 (August 2011): 7. http://dx.doi.org/10.1145/1978542.1978544.
Full textBeydina, T., and A. Kukharsky. "INFORMATION SECURITY POLICY: A CRITICAL STUDY OF THE CONTENT OF UNIVERSITY POLICY." Transbaikal State University Journal 27, no. 4 (2021): 55–72. http://dx.doi.org/10.21209/2227-9245-2021-27-4-55-72.
Full textShen Zihao, and Liu Shufen. "Security Threats And Security Policy In Wireless Sensor Networks." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 4, no. 10 (June 30, 2012): 166–73. http://dx.doi.org/10.4156/aiss.vol4.issue10.20.
Full textOhta, Hiroshi. "Climate security and human security: Convergence on policy requirements." IOP Conference Series: Earth and Environmental Science 6, no. 56 (February 1, 2009): 562016. http://dx.doi.org/10.1088/1755-1307/6/56/562016.
Full textAsmadi, Asmadi, Hasan Almutahar, Sukamto Sukamto, Zulkarnaen Zulkarnaen, Endang Indri Listiani, and Agus Sikwan. "Digital Information Security Policy in the National Security Strategy." International Journal of Multidisciplinary Approach Research and Science 1, no. 02 (May 31, 2023): 96–103. http://dx.doi.org/10.59653/ijmars.v1i02.61.
Full textBondar, H. L., and L. O. Rakutina. "Information policy and information security." Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.
Full textCASIS. "Data Analytics and Security Policy." Journal of Intelligence, Conflict, and Warfare 3, no. 1 (May 30, 2020): 6. http://dx.doi.org/10.21810/jicw.v3i1.2357.
Full textChittick, William O. "The Politicization of Security Policy." Journal of Politics 50, no. 1 (February 1988): 180–91. http://dx.doi.org/10.2307/2131047.
Full textGlennerster, Howard, and Michael Hill. "Social Security Policy in Britain." British Journal of Sociology 44, no. 2 (June 1993): 372. http://dx.doi.org/10.2307/591256.
Full textMedvedev, S. "Russia: Foreign Policy, Security, Identity." World Economy and International Relations, no. 7 (2003): 22–30. http://dx.doi.org/10.20542/0131-2227-2003-7-22-30.
Full textGrover, Chris. "Social Security Policy and Vindictiveness." Sociological Research Online 15, no. 2 (May 2010): 30–41. http://dx.doi.org/10.5153/sro.2111.
Full text