To see the other types of publications on this topic, follow the link: Security policy.

Journal articles on the topic 'Security policy'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security policy.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Banks, Simon. "Security policy." Computers & Security 9, no. 7 (November 1990): 605–10. http://dx.doi.org/10.1016/0167-4048(90)90058-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Ogi, Adolf. "Security through cooperation: Switzerland's security policy." RUSI Journal 145, no. 3 (June 2000): 37–39. http://dx.doi.org/10.1080/03071840008446531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bilocerkowycz, Jaroslaw, and Taras Kuzio. "Ukrainian Security Policy." Russian Review 56, no. 1 (January 1997): 145. http://dx.doi.org/10.2307/131507.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Duncan, Peter J. S. "Indian security policy." International Affairs 63, no. 3 (1987): 528–29. http://dx.doi.org/10.2307/2619328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jones, Rodney W., and Raju G. C. Thomas. "Indian Security Policy." Pacific Affairs 60, no. 4 (1987): 687. http://dx.doi.org/10.2307/2759213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Lagassé, Philippe, and Justin Massie. "Canadian Security Policy." International Journal: Canada's Journal of Global Policy Analysis 64, no. 3 (September 2009): 601–4. http://dx.doi.org/10.1177/002070200906400301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Broderick, J. S. "VPN Security Policy." Information Security Technical Report 6, no. 1 (March 2001): 31–34. http://dx.doi.org/10.1016/s1363-4127(01)00105-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pounder, Chris. "Security policy update." Computers & Security 21, no. 7 (November 2002): 620–23. http://dx.doi.org/10.1016/s0167-4048(02)01109-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Weiller, Matthew A. "SPD security policy." Survival 30, no. 6 (November 1988): 515–28. http://dx.doi.org/10.1080/00396338808442437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hunt, Kenneth. "Japan's security policy." Survival 31, no. 3 (May 1989): 201–7. http://dx.doi.org/10.1080/00396338908442466.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Schneider, Henrique, and Hans-Ulrich Bigler. "Raw materials policy as security policy." Vojno delo 67, no. 4 (2015): 24–43. http://dx.doi.org/10.5937/vojdelo1504024s.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

 Kim, ChangYun. "A Study on North Korean Police Security Policy." Korean Association of Police Science Review 22, no. 4 (August 31, 2020): 321–66. http://dx.doi.org/10.24055/kaps.22.4.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Băloi, Alexandra-Iulia. "Politica de securitate națională a României 1990-2020." Sociologie Romaneasca 19, no. 1 (May 31, 2021): 168–82. http://dx.doi.org/10.33788/sr.19.1.9.

Full text
Abstract:
Security is a complex, multi-dimensional approach context. In broad terms, it represents the ability to protect its citizens. The sole holder of the legitimate right to use intra-state and inter-state force is obliged through the consequence and expression of its sovereignty to protect and guarantee its citizens’ rights and freedoms and ensure the conditions for the exercise of their rights and freedoms. After the dissolution of the communist political and military bloc, security develops as a global concept that tends to include traditional political and military dimensions, new dimensions, such as economic, energy or security, individual rights, and freedoms. This study addresses Romania’s security policy, its evolution after 1990 and until now. The paper aims to highlight Romania’s position as a territory and its role in the regional context regarding security. Its statute as a NATO and E.U. member, and strategic partner of the United States, determined a permanent update of its security policy and proposed objectives, correlated with those of the entities to which it belongs. From the point of view of security policy, Romania has an important geostrategic role and can stand out as a regional leader due to the threats it could be subjected to. The study will highlight that its security policy provides many benefits for the country’s citizens and its institutions.
APA, Harvard, Vancouver, ISO, and other styles
14

Choi, Junho, Chong Soo Cheung, Dongkwan Lee, Seol A. Kwon, and Jae Eun Lee. "Policy Directions for Securing Food Security by Applying Critical Infrastructure in the Field of Agriculture." Crisis and Emergency Management: Theory and Praxis 13, no. 8 (August 31, 2023): 17–27. http://dx.doi.org/10.14251/jscm.2023.8.17.

Full text
Abstract:
This study aims to suggest policy directions to promote food security by applying the concept of critical infrastructure in Korea. It designates the agricultural sector for food security through the functions, systems, and facilities of critical infrastructure and presents policy directions. The results of the analysis show that the functions of critical infrastructure can be implemented by establishing a food security manual. Due to the lack of relevant manuals in Korea, it is necessary to strengthen the response system on a regular basis through the designation of a department dedicated to food security and the task, rather than ad hoc measures. The s y stem o f critical infrastructure is a public stockpile. As in the c ase of J apan, Korea also n eeds to strengthen the public stockpiling system through public-private cooperation to maintain an appropriate stockpile. The critical infrastructure facility is a grain stockpile. It is also necessary for Korea to devise a comprehensive food complex by understanding the characteristics and economic feasibility of grains in the future.
APA, Harvard, Vancouver, ISO, and other styles
15

Giegerich, Bastian, and Maximilian Terhalle. "Germany’s troubled security policy." Adelphi Series 58, no. 477 (November 2, 2018): 41–62. http://dx.doi.org/10.1080/19445571.2018.1932197.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Vance, Anthony, and Mikko T. Siponen. "IS Security Policy Violations." Journal of Organizational and End User Computing 24, no. 1 (January 2012): 21–41. http://dx.doi.org/10.4018/joeuc.2012010102.

Full text
Abstract:
Employee violations of IS security policies are reported as a key concern for organizations. Although behavioral research on IS security has received increasing attention from IS scholars, little empirical research has examined this problem. To address this research gap, the authors test a model based on Rational Choice Theory (RCT)—a prominent criminological theory not yet applied in IS—which explains, in terms of a utilitarian calculation, an individual’s decision to commit a violation. Empirical results show that the effects of informal sanctions, moral beliefs, and perceived benefits convincingly explain employee IS security policy violations, while the effect of formal sanctions is insignificant. Based on these findings, the authors discuss several implications for research and practice.
APA, Harvard, Vancouver, ISO, and other styles
17

Yadav, R. S. "India's Energy Security Policy." India Quarterly: A Journal of International Affairs 64, no. 3 (July 2008): 1–27. http://dx.doi.org/10.1177/097492840806400301.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Axinn, June, and Mark J. Stern. "Social Security Policy Reconsidered." Challenge 33, no. 4 (July 1990): 22–27. http://dx.doi.org/10.1080/05775132.1990.11471438.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Srivastava, Varun, Michael D. Bond, Kathryn S. McKinley, and Vitaly Shmatikov. "A security policy oracle." ACM SIGPLAN Notices 47, no. 6 (August 6, 2012): 343. http://dx.doi.org/10.1145/2345156.1993539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Macnamara, Don, David B. Dewitt, and David Leyton-Brown. "Canada's International Security Policy." International Journal 50, no. 4 (1995): 808. http://dx.doi.org/10.2307/40203052.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Schlör, Wolfgang F. "German security policy: Introduction." Adelphi Papers 33, no. 277 (June 1993): 3–5. http://dx.doi.org/10.1080/05679329308449164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Srivastava, Varun, Michael D. Bond, Kathryn S. McKinley, and Vitaly Shmatikov. "A security policy oracle." ACM SIGPLAN Notices 46, no. 6 (June 4, 2011): 343–54. http://dx.doi.org/10.1145/1993316.1993539.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Lange, David. "New Zealand's Security Policy." Foreign Affairs 63, no. 5 (1985): 1009. http://dx.doi.org/10.2307/20042366.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Al-Mayahi, Ibrahim H., and Sa’ad P. Mansoor. "Information Security Policy Development." Journal of Advanced Management Science 2, no. 1 (2014): 135–39. http://dx.doi.org/10.12720/joams.2.2.135-139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Toueiti, Slim, Amir Souissi, and Karim Hassan. "Security Policy Monitoring System." International Journal of Computer Trends and Technology 54, no. 3 (December 25, 2017): 127–32. http://dx.doi.org/10.14445/22312803/ijctt-v54p122.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Hughes, Mark, and Ray Stanton. "Winning security policy acceptance." Computer Fraud & Security 2006, no. 5 (May 2006): 17–19. http://dx.doi.org/10.1016/s1361-3723(06)70358-x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hinde, S. V. "Company computer security policy." Computer Audit Update 1992, no. 10 (October 1992): 8–12. http://dx.doi.org/10.1016/0960-2593(92)90050-w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Montanari, Mirko, Ellick Chan, Kevin Larson, Wucherl Yoo, and Roy H. Campbell. "Distributed security policy conformance." Computers & Security 33 (March 2013): 28–40. http://dx.doi.org/10.1016/j.cose.2012.11.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Garwin, Richard L. "National Security Space Policy." International Security 11, no. 4 (1987): 165. http://dx.doi.org/10.2307/2538846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Nam, Joo-Hong. "Democratization and Security Policy." Korean Journal of International Relations 28, no. 2 (March 31, 1989): 209–18. http://dx.doi.org/10.14731/kjir.1989.03.28.2.209.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Pollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.

Full text
Abstract:
Part I of this Note addresses the restrictions on intelligence gathering under FISA prior to 9/11 and the motivations underlying the Patriot Act's revisions to FISA. Part II discusses the problems with the "primary purpose" test, which was in effect prior to the Patriot Act's revisions to FISA. Part III reviews the various policy and constitutional arguments made against the Patriot Act's "significant purpose" test. Part IV proposes that Congress enact a new "inextricably intertwined" test to govern the admission of FISA material in criminal prosecutions. Specifically, this Part looks at sixty criminal cases in which FISA material was admitted and evaluates how the "inextricably intertwined" test would play out in those cases. Part V examines the arguments in favor of the inextricably intertwined test. Finally, Part VI counters the argument that the inextricably intertwined test violates the plain view doctrine.
APA, Harvard, Vancouver, ISO, and other styles
32

Soare, Simona R. "Biden’s Security Policy: Democratic Security or Democratic Exceptionalism?" Intereconomics 56, no. 1 (January 2021): 14–20. http://dx.doi.org/10.1007/s10272-021-0945-1.

Full text
Abstract:
AbstractBy emphasising the internal-external security nexus inherent in democratic security, the US could aspire again to lead through the example of its democracy’s resilience and ability to self-correct.
APA, Harvard, Vancouver, ISO, and other styles
33

Lamb, Guy. "Parading US Security Interests as African Security Policy." Contemporary Security Policy 30, no. 1 (April 2009): 50–52. http://dx.doi.org/10.1080/13523260902760058.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Orynbayev, Zhassulan, Yelena Nechayeva, Yerbolat Sergazin, Nurlan Muminov, and Talgat Tumashbay. "Characteristics and features of Kazakhstan’s water security policy." Problems and Perspectives in Management 22, no. 2 (June 26, 2024): 654–66. http://dx.doi.org/10.21511/ppm.22(2).2024.51.

Full text
Abstract:
Amidst the complex geopolitical dynamics of Central Asia, Kazakhstan grapples with urgent water security issues exacerbated by climate change, underscoring the critical need to examine this issue within the context of regional security. Therefore, this study seeks to comprehensively analyze Kazakhstan’s water security policy, examining its various elements and components at national and regional levels. Using system analysis and statistical techniques, data were collected from an array of sources, including strategies, development plans, statistical reports, analytical articles, methodological guidelines, and official government and international organization websites. The analysis revealed key challenges in Kazakhstan’s water security, including deteriorating infrastructure, outdated management practices, vulnerability to floods and low water levels, inadequate training, and regulatory deficiencies. A novel approach is offered by examining current trends in Kazakhstan’s water security domain, which involves scrutinizing the activities of relevant state bodies and analyzing regulatory frameworks amid rapid climate shifts. Additionally, the heightened potential for conflict across the continent was recognized. Despite earnest attempts to mitigate these challenges, the country confronts imminent water shortages exacerbated by heightened consumption and dwindling runoff from neighboring states. In light of these findings, policymakers and stakeholders are urged to devise robust policies and management strategies aimed at fortifying water security and addressing the underlying vulnerabilities in this critical domain.
APA, Harvard, Vancouver, ISO, and other styles
35

Chufrin, Gennady. "Putin’s Domestic Policy: Its Implications for National Security." Connections: The Quarterly Journal 01, no. 2 (2002): 9–19. http://dx.doi.org/10.11610/connections.01.2.02.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Kim, Hae Kyoung. "The Impact of Police Organization Support on Public Policy: Focusing on Learning Organizations." Korean Society of Private Security 22, no. 3 (September 30, 2023): 47–68. http://dx.doi.org/10.56603/jksps.2023.22.3.47.

Full text
Abstract:
People have a fear of crime because of constant crime in society. To promote the safety of these people, the police are presenting various security policies. The duty of the police is to protect the life, body and property of the people along with maintaining social order in the country. The security policy pursued by the police is influenced by various factors such as the external environment, the internal environment, and laws and systems. In previous studies on police security policy, the research on the internal environment and support of police organizations is somewhat limited, so this study aims to verify the relationship between police organization support and security policy. Since police organizations value police learning organizations in order to prepare for the rapidly changing public security environment, this study aims to identify the relationship between police organizations' support, public order policies, and learning organizations. To carry out the purpose of the study, a survey was conducted on police officers. As a result of the study, it was investigated that the recognition of support for police organizations and access to resources were statistically significant in public order policy. In addition, as a result of verifying the moderating effect of the support of the police organization and the police learning organization, it was confirmed that this also affects the public order policy. Therefore, in this study, the support of the police organization and the learning organization of the police were found to be important factors in public order policy. Based on the results of this study, the police organization intends to make policy suggestions on public security policies for the people.
APA, Harvard, Vancouver, ISO, and other styles
37

Matvejevs, Aleksandrs. "LEGAL REGIMES IN POLICE ACTIVITY AT LATVIAN SECURITY POLICY." Journal of Security and Sustainability Issues 3, no. 1 (September 19, 2013): 23–30. http://dx.doi.org/10.9770/jssi.2013.3.1(3).

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Brandon, William P., and Zachary Mohr. "Securing Social Security Solvency." Politics and the Life Sciences 38, no. 2 (2019): 144–67. http://dx.doi.org/10.1017/pls.2019.16.

Full text
Abstract:
AbstractAdequate income is a social determinant of health. In the United States, only Social Security beneficiaries receive inflation-protected guaranteed income. Social Security needs another 1983 compromise in which stakeholders accepted “shared pain” to avoid insolvency. We propose indexing the benefit using the chained consumer price index (CPI) for all urban consumers and providing a one-time bonus of 8% to 10% for beneficiaries in their mid-80s, when needs become greater. The chained CPI has little impact when beneficiaries start receiving benefits, but older beneficiaries need protection. The estimated 75-year savings from this restructured benefit amount to 14.2% to 18% of Social Security deficits. Modest increases in payroll taxes and maximum earnings taxed should make up most of the shortfall. Including unearned income with wages and salaries subject to the 6.2% individual tax would produce much more revenue. The discussion explores the proposal’s political feasibility, grounding in current policy and political science literature, and the role of income as a social determinant of health.
APA, Harvard, Vancouver, ISO, and other styles
39

Agafonova, O. V. "DEVELOPMENT POLICY IN CONTEXT OF GERMAN SECURITY POLICY." Вестник Московского государственного лингвистического университета. Общественные науки, no. 4 (2021): 9–21. http://dx.doi.org/10.52070/2500-347x_2021_4_845_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

CACM Staff. "A policy that deters violation of security policy." Communications of the ACM 54, no. 8 (August 2011): 7. http://dx.doi.org/10.1145/1978542.1978544.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Beydina, T., and A. Kukharsky. "INFORMATION SECURITY POLICY: A CRITICAL STUDY OF THE CONTENT OF UNIVERSITY POLICY." Transbaikal State University Journal 27, no. 4 (2021): 55–72. http://dx.doi.org/10.21209/2227-9245-2021-27-4-55-72.

Full text
Abstract:
The article is relevant, as it provides an assessment of the information security of universities. Ensuring the security of corporate information, which is increasingly stored, processed and disseminated using information and communication technologies (ICT). This is a particularly important problem for knowledge-intensive organizations such as universal ones; the effective conduct of their main educational activities and research activities increasingly depends on the availability, integrity and accuracy of computer information resources. One of the more important mechanisms to reduce the number of security breaches, and thus corporate information, is the development and implementation of a formal information security policy (ISP). Although much has now been written about the importance and role of information security policies and approaches to formulating them, there is relatively little empirical material that is incorporated into the structure or content of security policies. The purpose of the article is to fill this gap in the literature through this method of using the structure and methods of authentic information security policies. Having established the parameters and key features of university policies, the article critically examines the concept of information security embedded in the policy. Two important conclusions can be drawn from this study: 1) the wide variety of disparate policies and standards used, whether there will be a consistent approach to security management; and 2) the range of specific issues explicitly covered by university policy, a surprisingly low and highly technocentric view of information security management. This article is one of the first to objectively, rigorously and independently assess the content of authentic information security policies and information security documentation frameworks in a well-organized organizational environment. The article notes that there are four different levels of information policy: “system security policy, product security policy, community security policy, and corporate information security policy.” All policies involve: personal use of information systems, information disclosure, physical security, breaches and hacks, viruses, system access control, mobile computing, internet access, software development, encryption and contingency planning
APA, Harvard, Vancouver, ISO, and other styles
42

Shen Zihao, and Liu Shufen. "Security Threats And Security Policy In Wireless Sensor Networks." INTERNATIONAL JOURNAL ON Advances in Information Sciences and Service Sciences 4, no. 10 (June 30, 2012): 166–73. http://dx.doi.org/10.4156/aiss.vol4.issue10.20.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Ohta, Hiroshi. "Climate security and human security: Convergence on policy requirements." IOP Conference Series: Earth and Environmental Science 6, no. 56 (February 1, 2009): 562016. http://dx.doi.org/10.1088/1755-1307/6/56/562016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Asmadi, Asmadi, Hasan Almutahar, Sukamto Sukamto, Zulkarnaen Zulkarnaen, Endang Indri Listiani, and Agus Sikwan. "Digital Information Security Policy in the National Security Strategy." International Journal of Multidisciplinary Approach Research and Science 1, no. 02 (May 31, 2023): 96–103. http://dx.doi.org/10.59653/ijmars.v1i02.61.

Full text
Abstract:
Security comes from the Latin word secure, significantly different from the dangers, fears, and threats associated with traditional and non-traditional security methods. Meanwhile, defense is defined as the most vital technology for the state in carrying out its national security function. National security is defined as the dynamic state of a country which covers all aspects of the nation's life in facing threats. National security includes protection for the state, society, and individuals. Until now, experts have provided several different definitions of the terms security and defense. This article analyzes the current digital information security threats in national security strategies and the implementation of adequate legal protections. This article applies a descriptive qualitative research approach by conducting document analysis. This article describes various information security threats in Indonesia, including disinformation, privilege escalation, and protection against phishing threats, data forgery, and card crime. The similarities and differences between the concepts of defense and security can be observed through regulations, the terminology used, institutions, and constitutions. This article shows that national information security is closely related to policy and closely relates to security, especially ITE policies. It cannot be separated that the security situation of a country depends on security and defense but synergistically with other factors, namely economic, political, legal, socio-cultural, ideological, geographical, and demographic.
APA, Harvard, Vancouver, ISO, and other styles
45

Bondar, H. L., and L. O. Rakutina. "Information policy and information security." Public administration and customs administration 4 (2019): 42–49. http://dx.doi.org/10.32836/2310-9653-2019-4-42-49.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

CASIS. "Data Analytics and Security Policy." Journal of Intelligence, Conflict, and Warfare 3, no. 1 (May 30, 2020): 6. http://dx.doi.org/10.21810/jicw.v3i1.2357.

Full text
Abstract:
On January 16th, 2020, the Canadian Association for Security and Intelligence Studies (CASIS) Vancouver hosted its first roundtable event of the year, titled “Data Analytics and Security Policy: The New Paradigm?” This presentation featured Mr. Mark Masongsong, CEO of Urban Logiq, a Vancouver based data analytics company. Mr. Masongsong’s presentation focused on the development of data analytics technology, its utility in addressing recent security cases, and the projected future of the data analytics industry. The subsequent roundtable discussion centred around a case study on deep fakes and their prevalence throughout social media. Thereafter, audience members discussed the security implications of deep fake technology and ways to address the problem within online spaces.
APA, Harvard, Vancouver, ISO, and other styles
47

Chittick, William O. "The Politicization of Security Policy." Journal of Politics 50, no. 1 (February 1988): 180–91. http://dx.doi.org/10.2307/2131047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Glennerster, Howard, and Michael Hill. "Social Security Policy in Britain." British Journal of Sociology 44, no. 2 (June 1993): 372. http://dx.doi.org/10.2307/591256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Medvedev, S. "Russia: Foreign Policy, Security, Identity." World Economy and International Relations, no. 7 (2003): 22–30. http://dx.doi.org/10.20542/0131-2227-2003-7-22-30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Grover, Chris. "Social Security Policy and Vindictiveness." Sociological Research Online 15, no. 2 (May 2010): 30–41. http://dx.doi.org/10.5153/sro.2111.

Full text
Abstract:
This paper uses the work of Jock YOUNG (2002 , 2003 ) on the emergence of vindictiveness in late modern society to examine two recent developments – the withdrawal, in certain circumstances, of Housing Benefit from those people evicted for ‘anti-social’ behaviour and the proposed introduction of a Treatment Allowance for ‘problem drug users’ – in social security policy. The paper argues that while since the development of collective responses to poverty there has been concern with the behaviour of individuals in relation to paid work, we are entering a new period of social security policy where it is the general behaviour of individuals that increasingly defines access to social security benefits, rather than their financial needs.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography