Academic literature on the topic 'Traditional Security Approach'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Traditional Security Approach.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Traditional Security Approach"

1

Polcumpally, Arun Teja. "Non –Traditional Security Approach in International relations :." Jindal Journal of International Affairs 2, no. 5 (2021): 44–52. http://dx.doi.org/10.54945/jjia.v2i5.73.

Full text
Abstract:
This paper explores the phenomenon of Islamic State of Iraq and Syria (ISIS or IS) brides and tries to explain their role in global politics through the International Relations (IR) theories. Further, it argues that the approaches of critical securitization theory would be enriched by accommodating newer agencies into the explanatory models of IR. Historical agency considerations, the emancipation of the Islamic minorities in several countries, and deriving alternatives to the problem are much needed in the 21st century. With all such developments and the rapidly changing geopolitical dynamics
APA, Harvard, Vancouver, ISO, and other styles
2

Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.

Full text
Abstract:
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article
APA, Harvard, Vancouver, ISO, and other styles
3

Zainol Abidin, Zahimi, and Mohd Faizal Mohd Jais. "NON-TRADITIONAL SECURITY THREAT: IMPACT AND CHALLENGE ON MALAYSIAN SECURITY." International Journal of Law, Government and Communication 9, no. 37 (2024): 176–88. https://doi.org/10.35631/ijlgc.937015.

Full text
Abstract:
This study aims to analyse the impact of non-traditional security threats on Malaysia's security, identify the critical challenges posed by these threats, and propose recommendations for enhancing Malaysia's capacity to address them effectively. The investigation into Malaysia's non-traditional security concerns was conducted through a rigorous and comprehensive analysis process involving information gathered from various sources. This approach allows researchers to gain a deeper understanding of such threats and their prevalence in the country. The study also examines their effects on nationa
APA, Harvard, Vancouver, ISO, and other styles
4

Opeoluwa, Adisa Oluyemi. "Religion and Military Security: The Military Still Matters." Journal of Social and Political Sciences 4, no. 2 (2021): 41–52. https://doi.org/10.31014/aior.1991.04.02.274.

Full text
Abstract:
The debate on changes and continuity in the field of security studies before and aftermath of the Cold War expounds certain security issues that have been reformed or changed and those that continue to be essential security concerns after the Cold War. The pervasiveness of military security might have been reconstructed at the aftermath of the Cold War but has remained ubiquitous despite scholarly argumentative prepositions debating its declination. This article uses secondary sources of data analysis by obtaining necessary information from textbooks, libraries, academic journals, online data
APA, Harvard, Vancouver, ISO, and other styles
5

WEBER, CYNTHIA, and MARK LACY. "Securing by design." Review of International Studies 37, no. 3 (2011): 1021–43. http://dx.doi.org/10.1017/s0260210510001750.

Full text
Abstract:
AbstractThis article investigates how modern neo-liberal states are ‘securing by design’ – harnessing design to new technologies in order to produce security, safety, and protection. We take a critical view toward ‘securing by design’ and the policy agendas it produces of ‘designing out insecurity’ and ‘designing in protection’ because securing by design strategies rely upon inadequate conceptualisations of security, technology, and design and inadequate understandings of their relationships to produce inadequate ‘security solutions’ to ready-made ‘security problems’. This critique leads us to
APA, Harvard, Vancouver, ISO, and other styles
6

Farneubun, Petrus. "Feminist Critiques against Traditional Approaches to Security." Jurnal Global & Strategis 9, no. 1 (2018): 19. http://dx.doi.org/10.20473/jgs.9.1.2015.19-36.

Full text
Abstract:
Feminists claim that national security is a model of masculinity domination,which hardly disputes. This essay addresses feminists critique on notion ofconventional security and provides feminists own definition. It shows thatfeminists adopt comprehensive approach in relation to security. They tend todefine security in a broad term to accomodate contemporary issues. They alsopropose neutral concept of security to demonstrate that security is notexclusively men’s business.
APA, Harvard, Vancouver, ISO, and other styles
7

Tetmeyer, Annette, Daniel Hein, and Hossein Saiedian. "A Tagging Approach to Extract Security Requirements in Non-Traditional Software Development Processes." International Journal of Secure Software Engineering 5, no. 4 (2014): 31–47. http://dx.doi.org/10.4018/ijsse.2014100102.

Full text
Abstract:
While software security has become an expectation, stakeholders often have difficulty expressing such expectations. Elaborate (and expensive) frameworks to identify, analyze, validate and incorporate security requirements for large software systems (and organizations) have been proposed, however, small organizations working within short development lifecycles and minimal resources cannot justify such frameworks and often need a light and practical approach to security requirements engineering that can be easily integrated into their existing development processes. This work presents an approac
APA, Harvard, Vancouver, ISO, and other styles
8

Researcher. "SECURING CLOUD-NATIVE APPLICATIONS: A HOLISTIC APPROACH." International Journal of Computer Engineering and Technology (IJCET) 15, no. 4 (2024): 692–702. https://doi.org/10.5281/zenodo.13364065.

Full text
Abstract:
This comprehensive article explores the multifaceted approach required for securing cloud-native applications in today's rapidly evolving technological landscape. It delves into the unique security challenges posed by microservices, containers, and serverless architectures, highlighting the inadequacies of traditional perimeter-based defenses in these dynamic environments. The paper presents a detailed analysis of best practices, including runtime protection, container image scanning, zero trust networking, and the implementation of the least privilege principle. It emphasizes the critical nee
APA, Harvard, Vancouver, ISO, and other styles
9

Heriamsal, Krisman, Rivelda Pricilia Heatubun, Heyna Jekaisa, and Andi Ira Tenri Adikusuma. "Water Diplomacy and Non-Traditional Security." Nation State: Journal of International Studies 7, no. 2 (2025): 162–79. https://doi.org/10.24076/nsjis.v7i2.1387.

Full text
Abstract:
The water scarcity crisis in Iraq has become a non-traditional security issue that threatens the country's social, political and economic stability. According to international data, water scarcity is predicted to worsen by 2030, affecting more than 700 million people worldwide. Iraq, which depends on the flow of the Tigris and Euphrates rivers, is experiencing a decline in water quality and quantity that is worsening agricultural conditions, increasing social tensions and causing internal migration. This article analyzes the Iraqi government's efforts to address the water crisis through diplom
APA, Harvard, Vancouver, ISO, and other styles
10

Syed, Farzana Zaheer, and Saba Javed. "Deterrence: A Security Strategy against Non Traditional Security Threats to Pakistan." International Journal of Social Sciences and Management 4, no. 4 (2017): 267–74. http://dx.doi.org/10.3126/ijssm.v4i4.18503.

Full text
Abstract:
Deterrence as an approach aims to prevent a non-state actor who is planning to threat and harm a nation state externally and internally. The present study designed to find out that to what extent Deterrence as security strategy is effective against non-traditional threats in Pakistan?, and Whether the deterrence as security strategy remains effective against non-traditional threats of terrorism and cyber threats in Pakistan? The world has redefined and reorganized the security strategies after 9/11terroists attacks. The fourth wave in the deterrence theory has extended the deterrence security
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Traditional Security Approach"

1

Malec, Mieczyslaw. "Security perception : within and beyond the traditional approach /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMalec.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003.<br>Thesis advisor(s): Jeffrey Knopf, Boris Keyser. Includes bibliographical references (p. 69-73). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Méthot, Josée. "A multidimensional approach to food security and non-traditional export agriculture: a case study in Guatemala." Thesis, McGill University, 2014. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=121470.

Full text
Abstract:
There are four important dimensions of food security: food availability, food access, food utilization and food system stability. However, although the concept of food security has come of age, food security remains difficult to measure across these dimensions. In the first chapter of this thesis, I review the concepts and indicators used to assess the four dimensions of food security at the household level, and argue that a multidimensional approach to food security analysis is fundamental to understanding the overall impacts of development strategies on the food security of households. This
APA, Harvard, Vancouver, ISO, and other styles
3

Abadio, Finco Fernanda [Verfasser], and Lutz [Akademischer Betreuer] Graeve. "Health enhancing traditional foods in Brazil : an interdisciplinary approach to food and nutritional security / Fernanda Abadio Finco. Betreuer: Lutz Graeve." Hohenheim : Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim, 2012. http://d-nb.info/102856709X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Finco, Fernanda Abadio [Verfasser], and Lutz [Akademischer Betreuer] Graeve. "Health enhancing traditional foods in Brazil : an interdisciplinary approach to food and nutritional security / Fernanda Abadio Finco. Betreuer: Lutz Graeve." Hohenheim : Kommunikations-, Informations- und Medienzentrum der Universität Hohenheim, 2012. http://d-nb.info/102856709X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Fukumi, Sayaka. "A non-traditional security threat : contending EU and US approaches to cocaine trafficking from the Andes." Thesis, University of Nottingham, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.421548.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Dagne, Teshager Worku. "INTELLECTUAL PROPERTY, TRADITIONAL KNOWLEDGE AND BIODIVERSITY IN THE GLOBAL ECONOMY: THE POTENTIAL OF GEOGRAPHICAL INDICATIONS FOR PROTECTING TRADITIONAL KNOWLEDGE-BASED AGRICULTURAL PRODUCTS." Thesis, 2012. http://hdl.handle.net/10222/14535.

Full text
Abstract:
The relationship between international regimes regulating intellectual property, traditional knowledge and biodiversity has received much attention in recent times. Of the many complex and controversial issues in contemporary international legal discourse on this matter, the protection of traditional knowledge (TK) stands out as a significant challenge. Choices abound in the search for modalities to regulate rights to use and control TK systems and their underlying biodiversity. In recent times, the protection of geographical indications (GIs) has emerged as an option for protecting TK. Despi
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Traditional Security Approach"

1

Caballero-Anthony, Mely. An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hunter, Steven. Breaching barriers: A comprehensive approach to Special Operations Forces decision-making in non-traditional security environments. Canadian Defence Academy Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mallavarapu, Siddharth. International relations theory and non-traditional approaches to security. WISCOMP, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mallavarapu, Siddharth. International relations theory and non-traditional approaches to security. WISCOMP, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mallavarapu, Siddharth. International relations theory and non-traditional approaches to security. WISCOMP, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Security Perception: Within and Beyond the Traditional Approach. Storming Media, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ramon Pacheco E. T. Al PARDO. Non-Traditional Security in East Asia: A Regime Approach. Imperial College Press, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Caballero-Anthony, Mely. Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications, Limited, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Pardo, Ramon Pacheco. Non-Traditional Security in East Asia: A Regime Approach. World Scientific Publishing Co Pte Ltd, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Caballero-Anthony, Mely. Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications, Limited, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Traditional Security Approach"

1

Caballero-Anthony, Mely. "Understanding Non-traditional Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rushton, Simon. "Health Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Caballero-Anthony, Mely. "On Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ewing, J. Jackson. "Environmental Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Teng, Paul, and Jonatan Lassa. "Food Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zha, Daojiong. "Energy Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

King, Marcus DuBois. "Water Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Caballero-Anthony, Mely. "Conflict and Community Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hadiwinata, Bob S. "Poverty and Economic Security." In An Introduction to Non-Traditional Security Studies: A Transnational Approach. SAGE Publications Ltd, 2016. http://dx.doi.org/10.4135/9781473972308.n5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Shweta, S., B. Subramaniam, Manoj K. Rai, Shagun Danda, Anil Kurmi, and Sandeep Kaushik. "Traditional Agriculture: A Sustainable Approach Toward Attaining Food Security." In Crop Sustainability and Intellectual Property Rights. Apple Academic Press, 2023. http://dx.doi.org/10.1201/9781003383024-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Traditional Security Approach"

1

Varbanov, Velizar, Kalin Kopanov, and Tatiana Atanasova. "A MULTIDISCIPLINARY APPROACH TO TELEGRAM DATA ANALYSIS." In 24th SGEM International Multidisciplinary Scientific GeoConference 2024. STEF92 Technology, 2024. https://doi.org/10.5593/sgem2024/2.1/s07.01.

Full text
Abstract:
This paper presents a multidisciplinary approach to analyzing data from Telegram for early warning information regarding cyber threats. With the proliferation of hacktivist groups utilizing Telegram to disseminate information regarding future cyberattacks or to boast about successful ones, the need for effective data analysis methods is paramount. The primary challenge lies in the vast number of channels and the overwhelming volume of data, necessitating advanced techniques for discerning pertinent risks amidst the noise. To address this challenge, we employ a combination of neural network arc
APA, Harvard, Vancouver, ISO, and other styles
2

Gabštur, Peter, Martin Pollák, Marek Kočiško, and Jakub Kaščak. "Modification of Components Using Generative Design Tools." In Materials and Technologies for Defense and Security. Trans Tech Publications Ltd, 2025. https://doi.org/10.4028/p-7tgpug.

Full text
Abstract:
Parametric and generative design represent key elements of contemporary design, offering faster and more efficient ways of creating compared to traditional approaches. This article explores the use of generative design and parametric design in the field of industrial design, focusing on the application of generative design tools in Fusion 360 software for designing functional objects. Generative design, through algorithms and rules, enables the exploration of various design variants to find the optimal solution. It focuses on creating organic shapes and optimizing them based on specific criter
APA, Harvard, Vancouver, ISO, and other styles
3

Gupta, Sajal, John Alexander, Kanchan Bartwal, Harshit Narang, Daksh Rawat, and Manisha Aeri. "Securing Cyberspace: Traditional vs. IoT Botnets-A Machine Learning Classification Approach." In 2024 1st International Conference on Advanced Computing and Emerging Technologies (ACET). IEEE, 2024. http://dx.doi.org/10.1109/acet61898.2024.10730487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shuvo, Amit Mazumder, Md Sami Ul Islam Sami, Md Latifur Rahman, et al. "SYSFID—System-Aware Fault-Injection Attack Detection for System-In-Package Architectures." In ISTFA 2024. ASM International, 2024. http://dx.doi.org/10.31399/asm.cp.istfa2024p0332.

Full text
Abstract:
Abstract A system-in-package (SiP) design takes advantage of cutting-edge packaging technology and heterogeneous integration (HI) in response to the growing need for aggressive time-to-market, high-performance, less expensive, and smaller systems. However, aggregating dies with different functionalities introduces new attack vectors with fault-injection attacks (FIA) that can effectively alter a circuit's data and control flow maliciously to cause disruptions of secure communication or sensitive information leakage. Additionally, traditional threat models associated with FIA on a 2D monolithic
APA, Harvard, Vancouver, ISO, and other styles
5

Sayeed, Sayed Abu, Naresh Kshetri, Mir Mehedi Rahman, Samiul Alam, and Abdur Rahman. "dataLDA: Analyzing Data Quality in Big Data Using Traditional Approaches vs. Latent Dirichlet Allocation - Systematic Review." In 2025 13th International Symposium on Digital Forensics and Security (ISDFS). IEEE, 2025. https://doi.org/10.1109/isdfs65363.2025.11012074.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nahhas, Safia, Omaimah Bamasag, Maher Khemakhem, and Nada Bajnaid. "Linked Data Approach to Mutually Enrich Traditional Education Resources with Global Open Education." In 2018 1st International Conference on Computer Applications & Information Security (ICCAIS). IEEE, 2018. http://dx.doi.org/10.1109/cais.2018.8441941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Al Alawi, N. "Evergreen OT Security Assurance: A Sustainable Approach to OT Cybersecurity Risk Management." In SPE Conference at Oman Petroleum & Energy Show. SPE, 2025. https://doi.org/10.2118/224964-ms.

Full text
Abstract:
Abstract Operational Technology (OT) security is critical for protecting industrial control systems (ICS) in sectors such as oil and gas, power generation, and manufacturing. Traditional compliance-based audits provide only point-in-time security validation, failing to address evolving cyber threats. This paper introduces the Evergreen OT Security Assurance Model, a proactive and continuous approach that integrates risk-based assessment, real-time monitoring, and adaptive security controls across the entire asset lifecycle—from design to decommissioning. By aligning with ISA/IEC 62443, NIST SP
APA, Harvard, Vancouver, ISO, and other styles
8

Peshev, Aleksandar. "BEYOND PROPAGANDA AND FAKE NEWS: ELEMENTS OF PSYCHOLOGICAL OPERATIONS AND INFORMATION WARFARE." In SECURITY HORIZONS. Faculty of Security- Skopje, 2023. http://dx.doi.org/10.20544/icp.8.1.23.p22.

Full text
Abstract:
The topic of “fake news” has been determined to be one of the main factors that contribute to the creation of alternate realities, not based in fact, in what is called the posttruth era. Specifically, disinformation is being singled out as a serious threat to individual and collective security in campaigns via traditional media such as TV print and radio and on social networks. These campaigns are more than a random spread of disinformation. They are organized in systematic approaches for influence, known as psychological operations, and a specific approach in PsyOps that has been recorded in
APA, Harvard, Vancouver, ISO, and other styles
9

Mycek, Andrzej, and Maryna Lukaczyk. "Multi-Layered Security Of Web Applications In Cloud Environments Using WAF, Zero Trust, AI-Driven Threat Detection, And RASP." In 39th ECMS International Conference on Modelling and Simulation. ECMS, 2025. https://doi.org/10.7148/2025-0262.

Full text
Abstract:
Contemporary web applications, despite their increasing functional sophistication, remain highly vulnerable to numerous security threats. Undoubtedly, the most prevalent threats to web applications include SQL Injection (SQLi), Cross-Site Scripting (XSS), and Remote Code Execution (RCE). Traditional approaches to securing applications and their environments have proven insufficient in mitigating these risks effectively. The objective of this publication is to implement a multi-layered security model in the cloud, leveraging a Web Application Firewall (WAF), the Zero Trust concept, Artificial I
APA, Harvard, Vancouver, ISO, and other styles
10

Ciuperca, Ella magdalena. "SECURING COMMUNITY, SECURING BUSINESS! MANAGERS SECURITY AWARENESS THROUGH ELEARNING." In eLSE 2012. Editura Universitara, 2012. http://dx.doi.org/10.12753/2066-026x-12-169.

Full text
Abstract:
Contemporary approach of the intelligence domain is due to substantial changes that the umbrella concept of security has suffered in postmodern society and to the fact that at present nations have to face an extremely diverse range of threats. Comparing with other country, traditional Romanian academic programs for studying intelligence and security are undersized. I appreciate that one of the determinants of this situation is the lack of demand for specialized security and intelligence expertise in labour market. Also the priorities of the Romanian private sector are concerned especially abou
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Traditional Security Approach"

1

Brzoska, Michael, Wuyi Omitoogun, and Elisabeth Sköns. The Human Security Case for Military Expenditure Reductions. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/tmrz9944.

Full text
Abstract:
Global military expenditure has reached record levels. At the same time, hundreds of millions of people face non-traditional ‘vital’ risks and threats to their security—threats to their lives, livelihoods and dignity. Accelerating climate change and growing loss of biodiversity add unprecedented urgency to investing in people’s security. The concept of human security, as explained in this paper, emphasizes the security of people without neglecting the security of states and state order. The human security approach stresses the necessity to balance the financial needs from all vital risks and t
APA, Harvard, Vancouver, ISO, and other styles
2

Baldwin, Gretchen. Considering the Future of Gender and Peace Operations: Strategic Debates and Operational Challenges. Stockholm International Peace Research Institute, 2022. http://dx.doi.org/10.55163/lcsv1618.

Full text
Abstract:
The women, peace and security (WPS) agenda in peace operations has had myriad successes as well as setbacks in implementation. The rise of ‘gender-sensitive’ or ‘gender-responsive’ approaches to peacekeeping signals progress in policy language, but in practice, peacekeepers can struggle to comprehensively implement gender analyses or deliver on WPS tasks. Based on a review of existing academic and policy literature, this paper identifies five strategic debates central to WPS agenda implementation: participation beyond numbers, men’s roles, defining ‘gender’, balancing gender ‘inside and outsid
APA, Harvard, Vancouver, ISO, and other styles
3

Mangrulkar, Amol, Archita S, Elizabeth Shilpa Abraham, and Pooja Sagar. Flowing Towards Sustainability: Innovations in Campus Water Management. Indian Institute for Human Settlements, 2024. http://dx.doi.org/10.24943/9788195847372.

Full text
Abstract:
This book explores the intricate relationship between urbanization, water security, and climate change, emphasizing the challenges faced by cities distanced from traditional water sources. Focusing on the megacity of Bengaluru, the text highlights the urgency for innovative, sustainable approaches in the Anthropocene era, where climate change and pollution threaten water resources and human well-being. The IIHS Kengeri Campus in Bengaluru serves as a ground-breaking experiment, employing a multidisciplinary approach to develop resilient and sustainable urban water systems. This “living laborat
APA, Harvard, Vancouver, ISO, and other styles
4

Soramäki, Kimmo, and Florian Loecker. Preserving Data Sovereignty in National Fraud Portals- a Distributed Data Architecture. FNA, 2024. https://doi.org/10.69701/dhmk3850.

Full text
Abstract:
As a result of the widespread increase in consumer fraud and scams, several countries are looking to establish or strengthen cross-bank, cross-platform, and cross-industry utilities to counter fraud and scams on the national level and to augment traditional efforts at individual financial institutions1. However, questions quickly arise about how data on consumers and their payments can and should be shared across institutions. Some data sharing across Financial Institutions (FIs) is crucial for fighting consumer fraud and scams as it enables organizations to track fraudulent funds across the p
APA, Harvard, Vancouver, ISO, and other styles
5

Vuksanović, Vuk. Between Emotions and Realism: Two Faces of Turkish Foreign Policy in the Balkans. Belgrade Centre for Security Policy, 2023. http://dx.doi.org/10.55042/wzvw6831.

Full text
Abstract:
Turkey’s more assertive posture towards the Balkans is neglected compared to the commentariat that deals with Russia and China. To fill this policy gap, the research team of the Belgrade Centre for Security Policy (BCSP) has conducted research based on the analysis of secondary source material and, even more importantly, on fieldwork interviews that involved 16 sources, academics and think tank researchers based in Istanbul and Ankara. Although the consulted sources have different backgrounds and political sympathies, the research established a presence of common themes. Namely, Turkish foreig
APA, Harvard, Vancouver, ISO, and other styles
6

De Man, Philip, Gustavo Müller, Marie Vandendriessche, Carlota Moreno Villar, Ana Aguilera Raga, and Jan Wouters. The Evolution of Global Governance. EsadeGeo. Center for Global Economy and Geopolitics, 2022. https://doi.org/10.56269/202209/pdm.

Full text
Abstract:
This paper sets out to provide an overview of the evolution of global governance in key areas with security, defence and intelligence relevance, by mapping and analysing the evolution of eight case studies – trade, migration, outer space, health, energy, artificial intelligence, cybersecurity and climate change – over the past five to ten years. This approach allows the authors to identify key actors with which the EU should engage in multilateral settings. The paper finds that the role of traditional, formal intergovernmental organisations in the studied issue areas has shifted in recent year
APA, Harvard, Vancouver, ISO, and other styles
7

Lehotay, Steven J., and Aviv Amirav. Ultra-Fast Methods and Instrumentation for the Analysis of Hazardous Chemicals in the Food Supply. United States Department of Agriculture, 2012. http://dx.doi.org/10.32747/2012.7699852.bard.

Full text
Abstract:
Original proposal objectives: Our main original goal was to develop ultra-fast methods and instrumentation for the analysis of hazardous chemicals in the food supply. We proposed to extend the QuEChERS approach to veterinary drugs and other contaminants, and conduct fast and ultra-fast analyses using novel 5MB-MS instrumentation, ideally with real samples. Background to the topic: The international trade of agricultural food products is a $1.2 trill ion annual market and growing. Food safety is essential to human health, and chemical residue limits are legislated nationally and internationally
APA, Harvard, Vancouver, ISO, and other styles
8

Iffat, Idris. Approaches to Youth Violence in Jordan. Institute of Development Studies, 2020. http://dx.doi.org/10.19088/k4d.2021.121.

Full text
Abstract:
Youth violence, particularly targeting the state as well as engagement in violent extremism, has been a persistent feature in Jordan over the past decade. There are numerous factors driving this: economic, political and social marginalization of young people; a search for purpose (in the case of religious extremism); and ineffective youth policies on the part of the government. Other key forms of marginalization in Jordan are ethnicity, gender and disability. With regard to community security mechanisms, Jordan has made efforts to introduce community policing. These link in with traditional tr
APA, Harvard, Vancouver, ISO, and other styles
9

Henderson, Heath, and Nancy McCarthy. The Role of Renewable Energy Laws in Expanding Energy from Non-Traditional Renewables. Inter-American Development Bank, 2014. http://dx.doi.org/10.18235/0011659.

Full text
Abstract:
Many countries in Latin America and the Caribbean are interested in diversifying their energy sources for energy security and in contributing to the reduction of greenhouse gases. Non-traditional renewable energy (NTRE) sources, which include wind, solar, geothermal and small-scale hydropower, have received a lot of attention towards meeting these goals. To foster the expansion of NTRE, different countries have pursued different legal and regulatory approaches, but there remains very limited evidence regarding the effectiveness of different approaches. In this paper, we use a unique dataset th
APA, Harvard, Vancouver, ISO, and other styles
10

Bunse, Simone, and Caroline Delgado. Promoting Peace through Climate-resilient Food Security Initiatives. Stockholm International Peace Research Institute, 2024. http://dx.doi.org/10.55163/nfax5143.

Full text
Abstract:
This SIPRI Research Policy Paper examines the interconnectedness of food insecurity, climate and environmental pressures, and violent conflict, proposing strategies to enhance peacebuilding within integrated climate-resilient food security interventions. It asserts that collaborative, multisectoral programming among humanitarian, development and peacebuilding stakeholders is essential to disrupt vicious circles of food insecurity, climate challenges and conflict. Such programming should not only incorporate activities from the food security, climate adaptation and peacebuilding fields, but als
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!