Academic literature on the topic 'Security state'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security state.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security state"

1

Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.

Full text
Abstract:
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article
APA, Harvard, Vancouver, ISO, and other styles
2

Wiśniewski, Bernard. "NATIONAL SECURITY AND STATE SECURITY (REMINISCENCES)." Bulletin of Lviv State University of Life Safetyі 27 (June 26, 2023): 144–49. http://dx.doi.org/10.32447/20784643.27.2023.16.

Full text
Abstract:
State security and homeland security are concepts that frequently appear in academic studies and are permanently enshrined in law. They are sometimes even treated as synonyms, despite sharing only a single element, that of security. Are they really identical concepts? Do they have relations indicating interpretative differences? Is there something common to these expressions that link them in their content? These are the questions that determined the formulation of the statements presented in this article, which reviews the standpoints of recognised Polish scholars, being supplemented by the a
APA, Harvard, Vancouver, ISO, and other styles
3

Ievgeniia, Mishchuk. "DEVELOPMENT OF MODERN DIRECTIONS OF ESTIMATOLOGY IN THE ECONOMIC SECURITY OF THE ENTERPRISE." TECHNOLOGY AUDIT AND PRODUCTION RESERVES 6, no. 4(56) (2020): 22–28. https://doi.org/10.15587/2706-5448.2020.220332.

Full text
Abstract:
<em>The object of research is the process of developing directions in estimatology of the economic security of an enterprise. Multiple objects are taken into account in the estimatology of economic security. It is revealed that the presence of many approaches to determining liminal (recommended, desired) values when assessing indicators of economic security is due to their multitasking. It is substantiated that the detected multitasking generates multilevel and multi-persistence of economic security. The property of variability of the degree of rigidity of the liminal (recommended and other) v
APA, Harvard, Vancouver, ISO, and other styles
4

Agwanwo, Destiny Eze, and Raphael Lawal. "Non-state Security Actors and Security Governance in Taraba State." Middle East Research Journal of Humanities and Social Sciences 5, no. 02 (2025): 41–48. https://doi.org/10.36348/merjhss.2025.v05i02.004.

Full text
Abstract:
This study explores the role of non-state security actors in security governance in Taraba State, Nigeria. It adopted the descriptive research design and the community involvement approach theory to examine the role of non-state security actors in Taraba State. It looks at how private security firms, and neighborhood watch groups, vigilantes, and tribal militias—such as the Tiv and Jukun groups support official security measures. The study used a multistage sample approach to choose seven LGAs where these actors are most active: Ardo Kola, Bali, Donga, Gashaka, Gassol, Ibi, and Jalingo. Key pa
APA, Harvard, Vancouver, ISO, and other styles
5

Oghuvbu, Ejiroghene Augustine. "Security And The Challenges Of Securing Nigerian State." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (2021): 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.

Full text
Abstract:
Nigeria, like most developing States is still grappling with the task of nation – building, responsive democratic order and a just and secured polity. The task over the years has remained arduous and seemingly illusive. Presently, the menance of Boko Haram, the marauding herdsmen militancy, the new face of militancy in the Niger Delta, the spate of kidnappings, armed robberies, and ethno-regional intolerance, the vociferous separatist agitations in the South-East and South-South and the deteriorating living conditions have continued to create survival, stability and security challenges and thr
APA, Harvard, Vancouver, ISO, and other styles
6

Aziz, Sahar. "State Sponsored Radicalization." Michigan Journal of Race & Law, no. 27.1 (2021): 125. http://dx.doi.org/10.36643/mjrl.27.1.state.

Full text
Abstract:
Where was the FBI in the months leading up to the violent siege on the U.S. Capitol in 2021? Among the many questions surrounding that historic day, this one reveals the extent to which double standards in law enforcement threaten our nation’s security. For weeks, Donald Trump’s far right-wing supporters had been publicly calling for and planning a protest in Washington, D.C. on January 6, the day Congress was to certify the 2021 presidential election results. Had they been following credible threats to domestic security, officials would have attempted to stop the Proud Boys and QAnon from bre
APA, Harvard, Vancouver, ISO, and other styles
7

Onyshchenko, Svitlana. "State Budgetary Security Determinants." ЕКОНОМІКА І РЕГІОН Науковий вісник, no. 4(75) (December 27, 2019): 14–19. http://dx.doi.org/10.26906/eir.2019.4(75).1807.

Full text
Abstract:
Бюджетна безпека держави обумовлюється низкою детермінантів, які визначають зміст, структуру та рівень її забезпечення. Визначено, що визначальними фактами забезпечення державного бюджету є фактори, загрози як екзогенного, так і ендогенного походження, а також причинно-наслідкові зв’язки, які прямо чи опосередковано визначають його рівень та складність процесів його забезпечення.Запропоновано перелік основних детермінант, що впливають на забезпечення бюджетної безпеки держави з урахуванням процесів глобалізації, конструктивного / руйнівного впливу факторів та загроз. Зазначається, що системати
APA, Harvard, Vancouver, ISO, and other styles
8

Ganguly, Sumit. "The Troublesome Security State." Journal of Democracy 28, no. 3 (2017): 117–26. http://dx.doi.org/10.1353/jod.2017.0050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Collins, Alan. "State-Induced Security Dilemma." Cooperation and Conflict 39, no. 1 (2004): 27–44. http://dx.doi.org/10.1177/0010836704040833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kudelia, Serhiy. "Ukraine's Emerging Security State." Current History 117, no. 801 (2018): 264–70. http://dx.doi.org/10.1525/curh.2018.117.801.264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Security state"

1

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Full text
Abstract:
<p>Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security. </p><p>This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chap
APA, Harvard, Vancouver, ISO, and other styles
2

Majumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.

Full text
Abstract:
With the power system evolving from passive to a more active system there is an incorporation of information and communication infrastructures in the system. The measurement data are more prone to tampering from attackers for mala fide intentions. Therefore, security and reliability of distribution have become major concerns. State estimation (SE), being the core function of the energy/distribution management system (EMS/DMS), has become necessary in order to operate the system efficiently and in a controlled manner. Although SE is a well-known task in transmission systems, it is usually not a
APA, Harvard, Vancouver, ISO, and other styles
3

Rockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.

Full text
Abstract:
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state dis
APA, Harvard, Vancouver, ISO, and other styles
5

Gordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.

Full text
Abstract:
CHDS State/Local<br>Approved for public release, distribution is unlimited<br>To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Fed
APA, Harvard, Vancouver, ISO, and other styles
6

Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Woodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Shamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.

Full text
Abstract:
The paper substantiates the theoretical and methodological foundations for ensuring the financial security of the state through the system of investment and stock markets. The role of the stock market and the peculiarity of stock exchange indices in ensuring the financial security of the state are investigated. A comparative analysis of the volatility of the Ukrainian stock market relative to the European and American ones, taking into account the time horizon of investment, is carried out, and a correlation is established between the indices under consideration. Based on the study, conclusion
APA, Harvard, Vancouver, ISO, and other styles
9

Blackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure
APA, Harvard, Vancouver, ISO, and other styles
10

Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.

Full text
Abstract:
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, l examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. l argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations:
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Security state"

1

Hong, Yong-Pyo. State Security and Regime Security. Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Omand, David. Securing the state: National security in contemporary times. S. Rajaratnam School of International Studies, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

S. Rajaratnam School of International Studies, ed. Securing the state: National security in contemporary times. S. Rajaratnam School of International Studies, Nanyang Technological University, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Baxter, John. State security, privacy and information. Harvester Wheatsheaf, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Baxter, John. State security, privacy and information. Harvester Wheatsheaf, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

D, Baxter John. State security, privacy, and information. St. Martin's Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

author, Kotwal Navaz, and Commonwealth Human Rights Initiative, eds. State security commissions: Reform derailed. Commonwealth Human Rights Initiative, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Anna, Yeatman, and Żółkoś Magdalena, eds. State, security, and subject formation. Continuum, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Cañas, Dick. HOMELAND SECURITY AT THE STATE LEVEL: A Primer on State Homeland Security Programs. authorHOUSE, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Meyerowitz, Steven A. State by state privacy and data security law. Sheshunoff, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Security state"

1

Regilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_126-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Barnett, Hilaire. "State Security." In Constitutional and Administrative Law, 15th ed. Routledge, 2023. http://dx.doi.org/10.4324/9781003360438-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Regilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies. Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Paul, Erik. "Security State." In Australia as US Client State. Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137469359_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Barnett, Hilaire. "State Security." In Constitutional & Administrative Law. Routledge, 2017. http://dx.doi.org/10.4324/9781315458373-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Barnett, Hilaire. "State Security." In Constitutional & Administrative Law. Routledge, 2019. http://dx.doi.org/10.4324/9780429322686-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Barnett, Hilaire. "State Security." In Constitutional and Administrative Law, 16th ed. Routledge, 2025. https://doi.org/10.4324/9781003519027-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Romero, Vidal. "Security." In Rebuilding the State Institutions. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31314-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kettunen, Pauli. "Welfare state, competition state, security state." In Remapping Security on Europe’s Northern Borders. Routledge, 2021. http://dx.doi.org/10.4324/9781003096412-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fraser, Trudy. "Human Security as State Security." In Maintaining Peace and Security? Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-1-137-03215-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security state"

1

Andreeva, Tatiana. "Information security of the state as one of the main components of state security." In Universitas Europaea: Towards a Knowledge Based Society Through Europeanisation and Globalisation. Free International University of Moldova, 2025. https://doi.org/10.54481/uekbs2024.v1.31.

Full text
Abstract:
The problem of the existence of any state lies in the possibility of ensuring state security by public authorities. A state that is unable to ensure its state security for one reason or another is not viable, and, sooner or later, ceases to exist. Ensuring state security is one of the most urgent tasks facing public authorities. And the understanding by the authorities of the importance of this issue is the basis for further steps in this area. State security is the state of protection of the state from internal and external threats, in which sovereignty, independence, state and territorial in
APA, Harvard, Vancouver, ISO, and other styles
2

Bodden, Eric. "State of the systems security." In ICSE '18: 40th International Conference on Software Engineering. ACM, 2018. http://dx.doi.org/10.1145/3183440.3183462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Lisovskyi, Volodymyr Mykolayovych. "State policy of national security." In MARITIME SECURITY OF THE BALTIC-BLACK SEA REGION: CHALLENGES AND THREATS. Baltija Publishing, 2023. http://dx.doi.org/10.30525/978-9934-26-392-7-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Frey, Michael R., and Jaclyn D. Szymonifka. "A Gaussian quantum state discriminator." In Defense and Security, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2005. http://dx.doi.org/10.1117/12.604340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Simonaitis-Castillo, Vida K. "State of the art of crystal growth in the United States." In SPIE Defense, Security, and Sensing, edited by Mark Dubinskii and Stephen G. Post. SPIE, 2010. http://dx.doi.org/10.1117/12.849223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Grunnan, Tonje, Monica Endregard, Ragnhild E. Siedler, and Ann-Kristin Elstad. "Norwegian Societal Security and State Security – Challenges and Dilemmas." In Proceedings of the 29th European Safety and Reliability Conference (ESREL). Research Publishing Services, 2020. http://dx.doi.org/10.3850/978-981-14-8593-0_4467-cd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Heremans, Joseph P. "Introduction to cryogenic solid state cooling." In SPIE Defense + Security, edited by Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich, and Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2228756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Suh, DongHyok, and Young-Hwan Oh. "Crime Prevention Using Individual’s State Estimation." In Security Technology 2016. Science & Engineering Research Support soCiety, 2016. http://dx.doi.org/10.14257/astl.2016.139.73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sendobry, Alexander, Thorsten Graber, and Uwe Klingauf. "Purely optical navigation with model-based state prediction." In Security + Defence, edited by Edward M. Carapezza. SPIE, 2010. http://dx.doi.org/10.1117/12.864686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wagner, Matthias, Eugene Ma, John Heanue, and Shuyun Wu. "Solid state optical thermal imagers." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.730274.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security state"

1

Jablonsky, David. The State of the National Security State. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jablonsky, David. The State of the National Security State. Defense Technical Information Center, 2002. http://dx.doi.org/10.21236/ada408437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cheeseman, Kathryn. Approaches to State Fragility and Climate Security. Institute of Development Studies, 2025. https://doi.org/10.19088/k4dd.2025.057.

Full text
Abstract:
This rapid evidence review considers some illustrative examples of indices used to inform policymaking on fragile and conflict-affected states, namely the Bertelsmann Transformation Index, the Constellations of State Fragility, and the Fragile States Index. Metrics for determining a state’s fragility, and the underlying assumptions entailed, are compared to provide a snapshot of common approaches to defining and understanding the relationship between climate change, fragility, peace and security. It is notable that indicators of environmental change are not included as part of these metrics.
APA, Harvard, Vancouver, ISO, and other styles
4

Feng, Shaw C., and Simon P. Frechette. The state of container security standards. National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chow, William. Fixing the Broken State of Mobile Security. River Publishers, 2016. http://dx.doi.org/10.13052/popcas009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Marcella, Gabriel. Affairs of State: The Interagency and National Security. Defense Technical Information Center, 2008. http://dx.doi.org/10.21236/ada491602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Miller, Jack, and Rowena Bermingham. Regulation and state use of social media. Parliamentary Office of Science and Technology, 2021. http://dx.doi.org/10.58248/hs29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Mikaelsen, Dallas P. U.S.-Brazil Security Cooperation and the State Partnership Program. Defense Technical Information Center, 2015. http://dx.doi.org/10.21236/ad1012803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Busch, Oberst G. German-Israeli Relations: Security of Israel--Reason of State? Defense Technical Information Center, 2013. http://dx.doi.org/10.21236/ada589061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Tulak, Arthur N., R. W. Kraft, and Don Silbaugh. State Defense Forces: Forces for NORTHCOM and Homeland Security? Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada421654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!