Academic literature on the topic 'Theories of international security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Theories of international security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Theories of international security"

1

Koster, Ferry, and Maria Fleischmann. "Under pressure: an international comparison of job security, social security, and extra effort." International Journal of Sociology and Social Policy 37, no. 13/14 (December 4, 2017): 823–39. http://dx.doi.org/10.1108/ijssp-03-2016-0031.

Full text
Abstract:
Purpose Previous research leads to contrasting hypotheses about the relationship between extra effort of employees and the level of job security. According to agency theory, job security leads to lower levels of extra effort and social exchange theory argues that extra effort requires job security. The purpose of this paper is to formulate a set of hypotheses based on these theories. Besides considering them as mutually exclusive, they are integrated into a single theoretical framework that argues that both theories can apply, depending on the conditions and social context (in terms of the social security system). Design/methodology/approach Data from the International Social Survey Program (2005) including 22 countries from around the globe are analyzed using multilevel analysis. Findings The study provides evidence that social security moderates the relationship between job security and extra effort. Originality/value This study differs from previous research as it focuses on two sides of insecurity in the workplace and because it analyzes a large data set to include institutional factors.
APA, Harvard, Vancouver, ISO, and other styles
2

Lebow, Richard Ned. "The long peace, the end of the cold war, and the failure of realism." International Organization 48, no. 2 (1994): 249–77. http://dx.doi.org/10.1017/s0020818300028186.

Full text
Abstract:
Three of the more important international developments of the last half century are the “long peace” between the superpowers, the Soviet Union's renunciation of its empire and leading role as a superpower, and the post-cold war transformation of the international system. Realist theories at the international level address the first and third of these developments, and realist theories at the unit level have made an ex post facto attempt to account for the second. The conceptual and empirical weaknesses of these explanations raise serious problems for existing realist theories. Realists contend that the anarchy of the international system shapes interstate behavior. Postwar international relations indicates that international structure is not determining. Fear of anarchy and its consequences encouraged key international actors to modify their behavior with the avowed goal of changing that structure. The pluralist security community that has developed among the democratic industrial powers is in part the result of this process. This community and the end of the cold war provide evidence that states can escape from the security dilemma.
APA, Harvard, Vancouver, ISO, and other styles
3

Akbar, Asma, and Khawaja Alqama. "An Introduction to the Problematic of Security: Theory- Building in International Relations." PERENNIAL JOURNAL OF HISTORY 1, no. 2 (December 31, 2020): 113–31. http://dx.doi.org/10.52700/pjh.v1i2.8.

Full text
Abstract:
The paper discusses the problematic of security studies in relation to theory building in international relations.It aims to highlight apertures in the dominant explanations of security studies, and further provides an indication about mending these lacunas. To this end, dominant theories of international relations: Realism, Liberalism, and their progenies have been critically analyzed, and their problematics have been discussed in detail. Through critical analysis of dominant explanations in international relations theory, this paper helps to identify the gaps in the conceptual, methodological, and practical domains of security studies.
APA, Harvard, Vancouver, ISO, and other styles
4

Hussein, Dalsooz Jalal. "Theoretical approaches towards the steps of non-state actors in world politics: global para-diplomacy of the Iraqi Kurdistan (KRI)." Международные отношения, no. 1 (January 2021): 23–33. http://dx.doi.org/10.7256/2454-0641.2021.1.34461.

Full text
Abstract:
  This article presents a theoretical approach towards the global political steps of non-state actors. Particular attention is given to a number of theories of international relations, such as neorealism, international liberalism, and constructivism, which are able to encompass current global actions of non-state political actors. For a clearer perspective on the subject matter, the article employs the example of Iraqi Kurdistan (KRI); as a non-state actor, KRI has recently become a vivid example for the theories of international relations. The conclusion is made that security, economy, culture, religion and identity are the key and post powerful instruments of non-state actors of international politics. The example of KRI demonstrates that international relations of non-state actors focus on security, economy and culture, as well as serve as the instruments of interaction with both, state and non-state actors. The article reviews such activity within the framework of neorealism, international liberalism, and constructivism. It is underlines that the example of Iraqi Kurdistan (KRI) fully meets all the criteria of a non-state actor of international politics. It is also a brilliant example for the theories of international relations.  
APA, Harvard, Vancouver, ISO, and other styles
5

Hussein, Dalsooz Jalal. "Theoretical approaches towards the steps of nongovernmental actors in world politics: global paradiplomacy of the Iraqi Kurdistan (KRI)." SENTENTIA. European Journal of Humanities and Social Sciences, no. 1 (January 2021): 31–41. http://dx.doi.org/10.25136/1339-3057.2021.1.34624.

Full text
Abstract:
This article presents a theoretical approach towards the global political steps of non-state actors. Particular attention is given to a number of theories of international relations, such as neorealism, international liberalism, and constructivism, which are able to encompass current global actions of non-state political actors. For a clearer perspective on the subject matter, the article employs the example of Iraqi Kurdistan (KRI); as a non-state actor, KRI has recently become a vivid example for the theories of international relations. The conclusion is made that security, economy, culture, religion and identity are the key and post powerful instruments of non-state actors of international politics. The example of KRI demonstrates that international relations of non-state actors focus on security, economy and culture, as well as serve as the instruments of interaction with both, state and non-state actors. The article reviews such activity within the framework of neorealism, international liberalism, and constructivism. It is underlines that the example of Iraqi Kurdistan (KRI) fully meets all the criteria of a non-state actor of international politics. It is also a brilliant example for the theories of international relations.
APA, Harvard, Vancouver, ISO, and other styles
6

DEUDNEY, DANIEL, and G. JOHN IKENBERRY. "The nature and sources of liberal international order." Review of International Studies 25, no. 2 (April 1999): 179–96. http://dx.doi.org/10.1017/s0260210599001795.

Full text
Abstract:
Debates about the future of relations among the advanced industrial countries after the Cold War hinge on theories about the sources of international political order. Realism advances the most defined—and pessimistic—answers drawing on theories of anarchy, balance, and hegemony. But these theories are not able to explain the origins and continuing stability of relations among the United States and its European and Asian partners. This article develops a theory of liberal international order that captures its major structures, institutions, and practices. Distinctive features mark postwar liberal order—co-binding security institutions, penetrated American hegemony, semi-sovereign great powers, economic openness, and civic identity. It is these multifaceted and interlocking features of Western liberal order that give it a durability and significance.
APA, Harvard, Vancouver, ISO, and other styles
7

Vukadinović, Lidija Čehulić, and Monika Begović. "NATO Summit in Wales: From global megatrends to the new Euro-Atlanticism." Croatian International Relations Review 20, no. 71 (October 1, 2014): 11–41. http://dx.doi.org/10.2478/cirr-2014-0007.

Full text
Abstract:
Abstract Numerous representatives of theories of international relations, security theories or alliance theories have examined the new role of the North Atlantic Alliance or the North Atlantic Treaty Organization (NATO) in the post-bipolar world. Parallel with the theoretical examination of goals and tasks, NATO has transformed itself in practice, following the realities of the contemporary global era. In trying to achieve and keep the primacy of the strongest military- political organization, the Alliance has - especially in the Strategic Concept adopted in Lisbon in 2010-set the normative and institutional foundations of its global engagement, fulfilling the military (hard) and a wide array of non-military (soft) security challenges. This strategy has given rise to "Euro-Atlanticism", as a subsystem of international relations based on strong American-European relations, to fit with the process of regionalization of global politics. However, the 2013-2014 crisis in Ukraine has turned the focus of interest and activities of NATO once again primarily to Europe and it has stressed the importance and necessity of strengthening Euro-Atlantic security and defence ties. The most powerful member of the Alliance, the United States, is again strongly engaged in Europe and Russia, as a kind of successor to the Soviet Union, is once more detected as a major threat to European security. There have been many aspects of theories of international relations that have tried to explain the dynamic of the post-Cold War international community. However, the approach based on neo-realistic assumptions of the role of a security community, collective defence and the use of military force has proved to be dominant. NATO will continue to work on its political dimension as an alliance of the democratic world and the September 2014 Wales Summit will certainly mark the return of NATO to its roots, strengthening its security and military dimensions in the collective defence of Europe from Russia.
APA, Harvard, Vancouver, ISO, and other styles
8

Langendonck, Jef Van. "The meaning of the right to social security." Revista Brasileira de Direitos Fundamentais & Justiça 2, no. 2 (March 31, 2008): 13–21. http://dx.doi.org/10.30899/dfj.v2i2.553.

Full text
Abstract:
This article initially dwells on the concept of social security's historical development. It starts with the characteristics and the spirit behind the inclusion of such right in the Universal Declaration of Human Rights. It then discusses the now ancient paradigm set by the I.L.O and the neo-liberal approach by the World Bank, pointing both theories merits as well as unmasking their flaws. It concludes by offering a new concept of international social security via the collaboration between nations, grounded mainly on the solidarity principle.
APA, Harvard, Vancouver, ISO, and other styles
9

Czaputowicz, Jacek. "European cooperation in the field of security and defence. International Relation theories perspective." Securitologia 19, no. 1 (January 1, 2014): 105–15. http://dx.doi.org/10.5604/18984509.1129716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McCalla, Robert B. "NATO's persistence after the cold war." International Organization 50, no. 3 (1996): 445–75. http://dx.doi.org/10.1017/s0020818300033440.

Full text
Abstract:
Neorealist theories help explain alliance formation and longevity but have trouble explaining why the North Atlantic Treaty Organization (NATO) continues to exist after the cold war. Organizational theories further our understanding by noting that organizations have strong survival instincts, yet NATO survives only as long as its members wish it to. To understand NATO's persistence after the cold war, we must turn to international institutionalist theories to explain why, contrary to neorealist expectations, NATO remains the key international security institution for its members. International institutionalist theories add the conception of NATO as part of a broad multilevel and multi-issue relationship among member states, and this broader context is necessary to explain NATO's persistence.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Theories of international security"

1

Klykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.

Full text
Abstract:
Thesis is focusing on the analysis of the situation in Syria in the period since 2011 till present times. First part will present main theoretical thoughts on the international security such as Realist school, Liberalist school, Human and Collective security concepts and the most modern theoretical school of security- Copenhagen school. That was done in case to have a clear notion of the international security development and to chose the one theory which will reflect the best the situation in Syria. In the practical part I analyzing the actions and inter actions of the main international security actors, such as United Nations plus important actors in the region of the Middle East -- Arab League, and of course Syrian government and opposition. Also I will try to apply Copenhagen school of Security on the Syrian situation and to find out if that theory is good or not for that kind of analysis. After browsing actions taken by actors and opposition in the conclusion I found out that nowadays international security system cannot be called very successful and that Copenhagen school of Security its good explanatory theory but it pretty useless in case of conflict resolution.
APA, Harvard, Vancouver, ISO, and other styles
2

Perois, Jean Michel. "Theories of international relations and the private security analyst : the scope and limits of theoretically informed analysis." Thesis, University of Leicester, 2017. http://hdl.handle.net/2381/40132.

Full text
Abstract:
This thesis addresses a significant yet relatively neglected problem: the inadequacy of risk assessment methods of analysis currently available to security analysts and practitioners serving customers operating in challenging and volatile environments. It also challenges the idea shared by many analysts that theories of International Relations (IR) are irrelevant to the production of security analyses. Towards this end, this thesis begins by exploring the relationship between existing forecasting techniques and theories of IR. It then evaluates the extent to which their use has the potential to expand the analytical capabilities of private security analysts serving corporate customers in such contexts. In considering the possibilities and limitations of IR approaches the thesis finds that Realism alone cannot provide a valid framework to improve private security analysts’ skills, but argues that there are definite advantages to combining this with Constructivism complemented by cultural analysis. These three theoretical components constitute the backbone of an innovative approach to security analysis herein termed Reflexive Cultural Realism; a theory of security designed to explain politically-driven security events in particular social and cultural contexts whilst allowing for forecasting based on an original way of building scenarios. This theory is applied through a specific reading grid (via a 7- step method) at all levels of political activity, from the global to the domestic. Two detailed case studies are provided to demonstrate the effectiveness of the Reflexive Cultural Realism approach. These case studies, located in two of the GCC countries, consider security situations analysts are traditionally confronted with in their daily activities, and demonstrate the utility of the approach in facilitating practical answers to corporate questions. The thesis concludes that the Reflexive Cultural Realism approach, by combining an innovative theoretical framework with a robust application method, is able to satisfy the demands of corporate customers by improving significantly the analytical and forecasting skills of the analysts serving them.
APA, Harvard, Vancouver, ISO, and other styles
3

Hojzáková, Věra. "East Asia's Security System." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-162792.

Full text
Abstract:
The aim of the master thesis is to characterize and evaluate the current security system in East Asia, to show the security strategies of the system actors and the existing friction points, and to assess the future development of the security system in place. For this purpose the author first defines the East Asia's security system using the conceptual tools of three international relations theories, namely neo-realism, neo-liberalism, and constructivism. In the following section, the security strategies and security issues are discussed. In the final section, the international relations theories are used again to assess the stability of the current security system and lastly the prospects for a change of the system are evaluated.
APA, Harvard, Vancouver, ISO, and other styles
4

Sahlin, Jonathan. "Comparing Theories of the European Union: An essay on how to analyze the EU’s foreign policy and international power." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-23103.

Full text
Abstract:
The aim of this essay is to explain how IR theory relates to the European Union. Thisis motivated by the extensive use of empirical and descriptive studies on the EU. Togenerate knowledge on how theory relates to the EU, two seemingly differenttheories are compared. Neorealism and social constructivism are used to generatehypotheses, which are then tested on a quantitive study on the EU’s Common Foreignand Security Policy. The study covers the years of 2003-2005 and uses a statisticalmethod to present to empirical findings, which is supplemented by previous studieson EU’s foreign policy. The theoretical framework enables comparison of the twoemployed theories’ explanatory powers. The essay concludes that none of the theoriesprovides satisfactory explanations of in regard to EU’s global power and/or influence.Nevertheless, they are able to explain different aspects of the developments of EU’sforeign policy. Further theoretical studies should be undertaken in order to highlightthe issues of theory vis-à-vis the European Union.
APA, Harvard, Vancouver, ISO, and other styles
5

Cobb, Adam Campbell. "Changes in the concept of security since World War II among Western international theorists." Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/252234.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Virk, Kudrat. "Developing countries and humanitarian intervention in international society after the Cold War." Thesis, University of Oxford, 2010. http://ora.ox.ac.uk/objects/uuid:60fbdfeb-341c-430c-91c7-5071397a0e47.

Full text
Abstract:
This thesis examines the policies, positions, and perspectives of developing countries on the emerging norm of humanitarian intervention after the Cold War, focusing on the period between 1991 and 2001. In doing so, it questions the role of opposition that conventional wisdom has allotted to them as parochial defenders of sovereignty. Instead, the thesis reveals variation and complexity, which militates against defining the South, or the issues that humanitarian intervention raises, in simplistic either-or terms. Part I draws on insights about ‘sovereignty as what states make of it’ to break the classic pluralism-solidarism impasse that has otherwise stymied the conversation on humanitarian intervention and confined the South as a whole to a ‘black box’ labelled rejectionism. It reconstructs the empirical record of developing countries at large on six cases of military intervention (northern Iraq, Somalia, Haiti, Sierra Leone, Kosovo, and East Timor), revealing variation that defies easy categorization. It also charts a cumulative and dynamic trend within the South towards a grey area between pluralism and solidarism that shows how these were not diametrically opposed positions. Following from that, Part II looks in-depth at India and Argentina. Whereas Argentina accepted the idea of humanitarian intervention, India remained reluctant to countenance it and persistently objected to the development of a new rule in its favour. Part II argues that the level of congruence between the emerging norm and the two countries’ prevailing values, aspirations, and historically constructed ways of thinking played a key role in determining the different levels of acceptance that the idea found with them. Part III delves deeper into the substance of their views. It shows how neither country constructed mutually exclusive choices between pluralism and solidarism, sovereignty and human rights, and intervention and non-intervention. Rather, both exhibited an acute awareness of the dilemmas of protecting human rights in a society of states, and a wariness of yes-no answers. Cumulatively, this thesis thus points away from thinking about the South itself as a given category with clear, shared or pre-determined ideas, and towards a more nuanced and inclusive conversation on humanitarian intervention.
APA, Harvard, Vancouver, ISO, and other styles
7

Gruici, Simona. "International Security : Crossing Borders: International Migration and National Security." Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15242.

Full text
Abstract:
One of the most dynamic events of our time is the large extent of population movements within and across national boundaries. The causes of this movement of people include economic hardship due to various natural calamities such as earthquakes, droughts, famine and floods, as well as economic hardship due to lack of income. Political instabilities represent a central factor that is forcing the population movements at both national and international level. In most of the cases, reality is beeing perceived as follows: if international security is enhanced, so is national security. However, the phenomenon of migration is perceived as being a greater challenge in the field of security towards failure states, rather than it might affect any welfare postindustrial states. Nowadays we are facing a more globalized security environment, fact that is actually providing other states with the possibility to create a better security for their own nations. In order to gain this security immunity, the states should be able to enforce and protect the migration policies within international security. The relationship between migration and security became increasingly complex in the new millennium. As it follows, the focus of this theme is the correlation between migration´s consequences, both positive and negative, towards national security of host states. Furthermore, the topic of this paper is extending over ´what terrorism implies´. In order to reach a clear understanding, it has been analyzed the phenomenon of globalization and its forthcoming implications within both terrorism and migration. As a result of this transformation, terrorism has the power now to threat much more countries in the global area. Nevertheless, the purpose of this thesis is to examine which factors have an impact on international security, within a continental similarity. The central focus reflects over the Euro-Mediterranean area and to certain extends over the United States. The considered factors are: migration, loss/gain of governmental control, the political reaction after the attack of 9/11, spread of democracy (e.g. globalization), and creating citizenship.
APA, Harvard, Vancouver, ISO, and other styles
8

Baro, Mamadou Amadou 1959. "Household livelihood security: Theories, practice and perspectives." Diss., The University of Arizona, 1996. http://hdl.handle.net/10150/282180.

Full text
Abstract:
Conventional ways of looking at livelihood systems and household food security fail to capture the variations in procurement strategies used by different households to obtain resources. This can be attributed to the fact that the attention of the developers is mostly focused on national food supplies. Aggregate data obscures the local and regional inequality and seasonal disparities in access to food. This is exacerbated by the preconceived notion that peasant societies are a monolithic unit. Thus, our understanding of the internal dynamics of peasant communities, and of cooperation and conflict among their members becomes distorted. Considerable variability exists in Chad and Haiti both in terms of livelihood systems and household resource endowments. This dissertation argues that approaches to food security must address this variability at the household level. Social differentiation exists between households and within households within any given community. To improve our understanding of intra-household dynamics, gender analysis must be used to delineate the economic activities, division of labor, and access to and control over resources that exist among household members. Most food security scholars have assumed that rural households can adapt to sudden crises. This dissertation shows that rural households are always in the dynamic process of coping; crises are not conjunctural but rather endemic. The coping mechanisms they develop are not as well patterned as the literature portrays them. In a context of failing livelihood systems of the last two decades, people's responses to vulnerability vary according to changing circumstances. Another major assumption about food security is that child nutritional status is an indicator of the food and health conditions of child household and of the entire community. Research conducted in Haiti presents a case study which runs counter to this general assumption. Variability, flexibility, adaptability, diversification and resilience are key concepts in household food security. Studies on food security should take into consideration at least five major sources of variations: (1) Contrasts among livelihood systems; (2) Intra-community variations; (3) Differences in household resource endowments; (4) Variation between households or local communities in relation to the "national state"; and (5) Changes in all of the foregoing sources of variation over time.
APA, Harvard, Vancouver, ISO, and other styles
9

Phan, Quoc-Sang. "Model Counting Modulo Theories." Thesis, Queen Mary, University of London, 2015. http://qmro.qmul.ac.uk/xmlui/handle/123456789/15130.

Full text
Abstract:
This thesis is concerned with the quantitative assessment of security in software. More specifically, it tackles the problem of efficient computation of channel capacity, the maximum amount of confidential information leaked by software, measured in Shannon entropy or R²nyi's min-entropy. Most approaches to computing channel capacity are either efficient and return only (possibly very loose) upper bounds, or alternatively are inefficient but precise; few target realistic programs. In this thesis, we present a novel approach to the problem by reducing it to a model counting problem on first-order logic, which we name Model Counting Modulo Theories or #SMT for brevity. For quantitative security, our contribution is twofold. First, on the theoretical side we establish the connections between measuring confidentiality leaks and fundamental verification algorithms like Symbolic Execution, SMT solvers and DPLL. Second, exploiting these connections, we develop novel #SMT-based techniques to compute channel capacity, which achieve both accuracy and efficiency. These techniques are scalable to real-world programs, and illustrative case studies include C programs from Linux kernel, a Java program from a European project and anonymity protocols. For formal verification, our contribution is also twofold. First, we introduce and study a new research problem, namely #SMT, which has other potential applications beyond computing channel capacity, such as returning multiple-counterexamples for Bounded Model Checking or automated test generation. Second, we propose an alternative approach for Bounded Model Checking using classical Symbolic Execution, which can be parallelised to leverage modern multi-core and distributed architecture. For software engineering, our first contribution is to demonstrate the correspondence between the algorithm of Symbolic Execution and the DPLL(T ) algorithm used in state-of-the-art SMT solvers. This correspondence could be leveraged to improve Symbolic Execution for automated test generation. Finally, we show the relation between computing channel capacity and reliability analysis in software.
APA, Harvard, Vancouver, ISO, and other styles
10

Hoogensen-Brown, Gunhild. "Jeremy Bentham and the theories of international relations." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp02/NQ59972.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Theories of international security"

1

Yi, Hyŏk-sŏp. Hanbando pʻyŏnghwa pangwiron =: The Peace theories of Korean defense. Sŏul-si: Pongmyŏng, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Critical approaches to security: An introduction to theories and methods. Milton Park, Abingdon, Oxon: Routledge, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Bronstone, Adam. European security into the 21st century: Beyond traditional theories of international relations. Aldershot: Ashgate, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chwaszcza, Christine. Zwischenstaatliche Kooperation: Perspektiven einer normativen Theorie der internationalen Politik. Wiesbaden: Deutscher Universitäts Verlag, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bartosch, Ulrich. Weltinnenpolitik: Zur Theorie des Friedens von Carl Friedrich von Weizsäcker. Berlin: Duncker & Humblot, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Magenheimer, Heinz. Sicherheitspolitik in theorie und praxis: Strategische fallbeispiele. Wien: Landesverteidigungsakademie, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Meyer, Jörg. Theorien zum Frieden im neuen Europa: Ein Beitrag zur Debatte um eine europäische Friedensordnung. Berlin: Köster, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

1954-, Okada M., Japan Monbushō, National Science Foundation (U.S.), and Nihon Gakujutsu Shinkōkai, eds. Software security: Theories and systems : Mext-NSF-JSPS international symposium, ISSS 2002 : Tokyo, Japan, November 8-10, revised papers. New York: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

ISSS 2002 (2003 Tokyo, Japan). Software security: Theories and systems : Second Mext-NSF-JSPS international symposium, ISSS 2003, Tokyo, Japan, November 4-6, 2003 : revised papers. Berlin: Springer, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Chaos and complexity theory in world politics. Hershey PA: Business Science Reference, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Theories of international security"

1

Zwolski, Kamil. "Liberal Security Theories." In The Liberal International Theory Tradition in Europe, 91–104. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-52643-6_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gong, Gao-Xiang, Zheng Yuan, and Xiao Feng. "The Homomorphic Encryption Scheme of Security Obfuscation." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 595–603. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Yanbo, Huiqiang Wang, Chao Zhao, Yushu Zhang, and Ming Yu. "Research on Attack Graph Generation for Network Security Situation." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 1147–54. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fang, Xianwen, Mimi Wang, and Shenbing Wu. "A Method for Security Evaluation in Cloud Computing Based on Petri Behavioral Profiles." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 587–93. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Song, Xiaoqiang, Xia Lv, Xubo Guo, and Zuhai Zheng. "Research on Real-Time Security Risk Management of Rural Power Based on Monte Carlo Simulation Method." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 1183–88. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_138.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Liu, Lu, Xian-wen Fang, Xiang-wei Liu, and Jing Ji. "Study on Security Supervising and Managing Methods of the Trusted Cloud Computing Based on Petri Net." In Proceedings of The Eighth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA), 2013, 579–85. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-37502-6_70.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Nagy, Veronika. "Security: Theories." In Encyclopedia of Security and Emergency Management, 1–16. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-69891-5_244-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Nagy, Veronika. "Security: Theories." In Encyclopedia of Security and Emergency Management, 884–99. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-319-70488-3_244.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Peoples, Columba, and Nick Vaughan-Williams. "Constructivist theories." In Critical Security Studies, 16–30. 3rd edition. | Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2020. http://dx.doi.org/10.4324/9780429274794-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pease, Kelly-Kate S. "Mainstream Theories." In International Organizations, 47–75. Sixth edition. | New York, NY: Routledge, 2019.: Routledge, 2018. http://dx.doi.org/10.4324/9781351213110-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Theories of international security"

1

Lu, Tianbo, Jiaxi Lin, Lingling Zhao, Yang Li, and Yong Peng. "An Analysis of Cyber Physical System Security Theories." In 2014 7th International Conference on Security Technology (SecTech). IEEE, 2014. http://dx.doi.org/10.1109/sectech.2014.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumar, P. R. "Three theories for delays, clocks and security in wireless networks." In the 18th annual international conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2348543.2348546.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Houmani, Hanane, and Mohamed Mejri. "Sufficient Conditions for Secrecy under Any Equational Theories." In 2008 International Conference on Information Security and Assurance ISA. IEEE, 2008. http://dx.doi.org/10.1109/isa.2008.102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Phan, Quoc-Sang, and Pasquale Malacaria. "All-Solution Satisfiability Modulo Theories: Applications, Algorithms and Benchmarks." In 2015 10th International Conference on Availability, Reliability and Security (ARES). IEEE, 2015. http://dx.doi.org/10.1109/ares.2015.14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Xiazhong Zheng, Jie Guo, Shu Chen, and Wei Guo. "Rough set theories and applications in security evaluation of hydropower engineering construction." In 2010 IEEE International Conference on Information Theory and Information Security (ICITIS). IEEE, 2010. http://dx.doi.org/10.1109/icitis.2010.5689637.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dong, Shuxiang, and Guojun Jia. "Internet Addiction Diagnostic Decision-Making Based on Attribute Reduction of Rough Set Theories." In 2011 International Conference on Network Computing and Information Security (NCIS). IEEE, 2011. http://dx.doi.org/10.1109/ncis.2011.173.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sonmez, Yesim Ulgen, and Asaf Varol. "In-Depth Analysis of Speech Production, Auditory System, Emotion Theories and Emotion Recognition." In 2020 8th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2020. http://dx.doi.org/10.1109/isdfs49300.2020.9116231.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jiao, Han, Jixue Liu, Jiuyong Li, and Chengfei Liu. "A Framework for Reputation Bootstrapping Based on Reputation Utility and Game Theories." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hirabayashi, Miki, Hiroaki Kojima, Kazuhiro Oiwa, Akio Nishikawa, Fumiaki Tanaka, and Masami Hagiya. "Implementation of tile sequencing for DNA logical computation toward next-generation information security." In 2010 IEEE Fifth International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA). IEEE, 2010. http://dx.doi.org/10.1109/bicta.2010.5645074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"Research on Misunderstandings of "Cross-cultural Theories" and Strategies of Cultural Security in College English Teaching." In 2018 2nd International Conference on Social Sciences, Arts and Humanities. Francis Academic Press, 2018. http://dx.doi.org/10.25236/ssah.2018.120.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Theories of international security"

1

Malik, Fazley. XX International Workshop on Condensed Matter Theories. Fort Belvoir, VA: Defense Technical Information Center, January 1998. http://dx.doi.org/10.21236/ada344669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Eichengreen, Barry. Hegemonic Stability Theories of the International Monetary System. Cambridge, MA: National Bureau of Economic Research, March 1987. http://dx.doi.org/10.3386/w2193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mulligan, Casey, and Xavier Sala-i-Martin. Social Security in Theory and Practice (II): Efficiency Theories, Narrative Theories, and Implications for Reform. Cambridge, MA: National Bureau of Economic Research, May 1999. http://dx.doi.org/10.3386/w7119.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

DEPARTMENT OF THE ARMY WASHINGTON DC. Security Assistance and International Logistics: Security Assistance Teams. Fort Belvoir, VA: Defense Technical Information Center, June 1998. http://dx.doi.org/10.21236/ada402049.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mulligan, Casey, and Xavier Sala-i-Martin. Social Security in Theory and Practice (I): Facts and Political Theories. Cambridge, MA: National Bureau of Economic Research, May 1999. http://dx.doi.org/10.3386/w7118.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Brackin, S., S. Foley, L. Gong, B. Hartman, and A. Heff. Romulus, A Computer Security Properties Modeling Environment: Romulus Theories. Volume 2. Fort Belvoir, VA: Defense Technical Information Center, April 1996. http://dx.doi.org/10.21236/ada310946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rice, M. Global climate change and international security. Office of Scientific and Technical Information (OSTI), January 1991. http://dx.doi.org/10.2172/5506256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karas, Thomas H. Global climate change and international security. Office of Scientific and Technical Information (OSTI), November 2003. http://dx.doi.org/10.2172/918355.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kerr, Jaclyn A. Cyberspace, Information Strategy and International Security. Office of Scientific and Technical Information (OSTI), February 2018. http://dx.doi.org/10.2172/1635769.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Carballo, Jerónimo, Georg Schaur, and Christian Volpe Martincus. Trust No One?: Security and International Trade. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000491.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography