To see the other types of publications on this topic, follow the link: US national security studies.

Journal articles on the topic 'US national security studies'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'US national security studies.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Johnson, Karin E. "AIDS as a US National Security Threat: Media Effects and Geographical Imaginations." Feminist Media Studies 2, no. 1 (2002): 81–96. http://dx.doi.org/10.1080/14680770220122882.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Morrissey, John. "Architects of Empire: The Military-Strategic Studies Complex and the Scripting of US National Security." Antipode 43, no. 2 (2011): 435–70. http://dx.doi.org/10.1111/j.1467-8330.2010.00774.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hanson, Stephen E. "Soviet Studies, National Security and the Production of “Useful” Knowledge." Perspectives on Politics 8, no. 4 (2010): 1155–58. http://dx.doi.org/10.1017/s1537592710002215.

Full text
Abstract:
Know Your Enemy: The Rise and Fall of America's Soviet Experts. By David C. Engerman. New York: Oxford University Press, 2009. 480p. $34.95.Know Your Enemy is a sociology of knowledge of the rise of post–World War II Russian and Soviet Studies, written by intellectual historian David C. Engerman. While it is not a work of political science, it offers an important historical analysis of a foundational episode in the history of the political science discipline. It is an account of the evolution of a specific field—Soviet Studies—but it is more than this, because this particular field was at the
APA, Harvard, Vancouver, ISO, and other styles
4

Dawisha, Karen L. "Soviet Studies, National Security and the Production of “Useful” Knowledge." Perspectives on Politics 8, no. 4 (2010): 1158–62. http://dx.doi.org/10.1017/s1537592710002227.

Full text
Abstract:
Know Your Enemy: The Rise and Fall of America's Soviet Experts. By David C. Engerman. New York: Oxford University Press, 2009. 480p. $34.95.Know Your Enemy is a sociology of knowledge of the rise of post–World War II Russian and Soviet Studies, written by intellectual historian David C. Engerman. While it is not a work of political science, it offers an important historical analysis of a foundational episode in the history of the political science discipline. It is an account of the evolution of a specific field—Soviet Studies—but it is more than this, because this particular field was at the
APA, Harvard, Vancouver, ISO, and other styles
5

Kennedy, Michael D. "Soviet Studies, National Security and the Production of “Useful” Knowledge." Perspectives on Politics 8, no. 4 (2010): 1163–66. http://dx.doi.org/10.1017/s1537592710002239.

Full text
Abstract:
Know Your Enemy: The Rise and Fall of America's Soviet Experts. By David C. Engerman. New York: Oxford University Press, 2009. 480p. $34.95.Know Your Enemy is a sociology of knowledge of the rise of post–World War II Russian and Soviet Studies, written by intellectual historian David C. Engerman. While it is not a work of political science, it offers an important historical analysis of a foundational episode in the history of the political science discipline. It is an account of the evolution of a specific field—Soviet Studies—but it is more than this, because this particular field was at the
APA, Harvard, Vancouver, ISO, and other styles
6

Shin, Eunjung, and Eric W. Welch. "Socio-Technical Determinants of Information Security Perceptions in US Local Governments." International Journal of Electronic Government Research 12, no. 3 (2016): 1–20. http://dx.doi.org/10.4018/ijegr.2016070101.

Full text
Abstract:
Concerns about electronic information security in government have increased alongside increased use of online media. However, to date, few studies have examined the social mechanisms influencing electronic information security. This article applies a socio-technical framework to model how technical, organizational and environmental complexities limit electronic information security perceived by local government managers. Furthermore, it examines to what extent organizational design buffers security risks. Using data from a 2010 national survey of local government managers, this article empiric
APA, Harvard, Vancouver, ISO, and other styles
7

Adamson, Fiona B., and Kelly M. Greenhill. "Globality and Entangled Security: Rethinking the Post-1945 Order." New Global Studies 15, no. 2-3 (2021): 165–80. http://dx.doi.org/10.1515/ngs-2021-0006.

Full text
Abstract:
Abstract In this essay we argue for the utility of moving from a “national” to an “entangled global” perspective on security. Focusing on the post-1945 international context, we discuss how the concept of “globality” can inform and reframe our understanding of transnational security dynamics and help move us beyond traditional state-centric frameworks. Such a move enables a better understanding of historical events and contemporary security dynamics than classical “national security” frameworks alone. After outlining the rationale behind our call for expanding the aperture in the study of secu
APA, Harvard, Vancouver, ISO, and other styles
8

Selchow, Sabine. "The paths not (yet) taken: Ulrich Beck, the ‘cosmopolitized world’ and security studies." Security Dialogue 47, no. 5 (2016): 369–85. http://dx.doi.org/10.1177/0967010616647859.

Full text
Abstract:
While it is Ulrich Beck’s concept of ‘risk society’ that has mostly attracted attention in the field of security studies, in this article I argue that if we want to take Beck seriously, we need to go beyond his ‘risk society’ thesis and acknowledge that his main thesis was that we live in a social reality that is qualitatively new and, consequently, calls for a radical shift in how we look at and talk about it. To bring Beck into security studies, then, means to study ‘security’ from within Beck’s ‘new world’. For that, I argue, a sharper conception of what characterizes that world is needed.
APA, Harvard, Vancouver, ISO, and other styles
9

Driscoll, Jesse, and Caroline Schuster. "Spies like us." Ethnography 19, no. 3 (2017): 411–30. http://dx.doi.org/10.1177/1466138117711717.

Full text
Abstract:
The discipline of anthropology recoils instinctively at the idea that its researchers' labor might contribute to the national security state; other disciplines celebrate the same contributions as evidence of policy impact. In this article, we examine the seductions of espionage for professionally vulnerable (untenured) researchers that employ ethnographic methods but are operating in the shadow of market incentives and the Global War on Terror. We define “extreme fieldwork” as a research design likely to yield the kinds of data that Price identifies as “Dual Use Anthropology.” The bulk of our
APA, Harvard, Vancouver, ISO, and other styles
10

Petrov, Valentyn. "‘GRAND STRATEGIES’, MILITARY AND POLITICAL DOCTRINES OF THE UNITED STATES OF AMERICA: TRENDS OF EVOLUTION AFTER THE END OF THE COLD WAR. LESSONS FOR UKRAINE." ACTUAL PROBLEMS OF INTERNATIONAL RELATIONS, no. 128 (2016): 40–50. http://dx.doi.org/10.17721/apmv.2016.128.0.40-50.

Full text
Abstract:
The conceptual and practical aspects of security policy of the USA in terms of their reflection in the ‘Grand Strategy’, military and political-military doctrines are analyzed. The hierarchy of strategic documents that determine US security and defense policy, together with the approaches towards their development in the context of the domestic policy, global trends and forecasts, are examined. The mechanism of working out various national level strategies and doctrines in the USA can be studied as an example. This world superpower has a definitely clear set of relevant documents. First of all
APA, Harvard, Vancouver, ISO, and other styles
11

Lee, Sojeong, Brandon Prins, and Krista E. Wiegand. "The US–South Korea alliance: How the patron benefits from the protégé." International Area Studies Review 24, no. 2 (2021): 97–117. http://dx.doi.org/10.1177/22338659211018325.

Full text
Abstract:
Since the end of World War II, the US military has continuously deployed troops to South Korea. The alliance works as an asymmetrical alliance, where the US is a patron and South Korea is a protégé. While it is argued that this deployment has significant political, economic, and military effects on South Korea and the region, few studies have examined how the presence of US forces there enhances US military and economic power as well as national security interests. In this paper, we examine the costs and benefits of the US–South Korea alliance, specifically focusing on US troop deployment on t
APA, Harvard, Vancouver, ISO, and other styles
12

Logvinova, Irina, and Natalya Gorkovenko. "Social Security as the Basis of the National Security of the Country and the Region." SHS Web of Conferences 110 (2021): 04015. http://dx.doi.org/10.1051/shsconf/202111004015.

Full text
Abstract:
The article examines the phenomena of «security» and «social security» from philosophical, sociological and psychological perspectives. The analysis of domestic and foreign scientific literature on security issues undertaken by the authors of the article showed that solving the problems of ensuring social security of an individual and society as a whole involves the interdisciplinary integration of scientific knowledge (including in the field of pedagogy and education), which will allow us to develop practical recommendations for preventing the destruction of social systems. Based on the synth
APA, Harvard, Vancouver, ISO, and other styles
13

Batsis, John, Curtis Petersen, and Tyler Gooding. "Association of Food Insecurity and Sarcopenia: The National Health and Nutrition Examination Surveys." Innovation in Aging 4, Supplement_1 (2020): 773. http://dx.doi.org/10.1093/geroni/igaa057.2793.

Full text
Abstract:
Abstract Understanding the association between food insecurity and sarcopenia can inform policies that address healthcare disparities. We identified 2,965 subjects aged ≥60 years with grip strength and food security data from the National Health and Nutrition Examination Surveys 2011-14. Sarcopenia was defined using grip strength <26kg for men and <16kg for women, and food security with the 18-item US Household Food Security Survey. Logistic regression evaluated the association of food insecurity (referent = full security) with sarcopenia, adjusting for age, sex, marital status,
APA, Harvard, Vancouver, ISO, and other styles
14

Schimmel, Kimberly S. "From ‘Violence-complacent’ to ‘Terrorist-ready’." Urban Studies 48, no. 15 (2011): 3277–91. http://dx.doi.org/10.1177/0042098011422396.

Full text
Abstract:
This study focuses on emerging discourses of stadium and event security at the US National Football League’s (NFL) annual Super Bowl game. Unlike the championship series in other US sports leagues in which games are located in the cities of the teams that qualify, the NFL’s Super Bowl game is ‘awarded’ to cities after a competitive bidding process. The Super Bowl provides an interesting case study because football stadia are now developed based not only on franchise owners’ demands regarding profit and control, but also on the NFL’s requirements for hosting a Super Bowl. These requirements rea
APA, Harvard, Vancouver, ISO, and other styles
15

Munkholm, Johan Lau. "The Pursuit of Full Spectrum Dominance: The Archives of the NSA." Surveillance & Society 18, no. 2 (2020): 244–56. http://dx.doi.org/10.24908/ss.v18i2.13266.

Full text
Abstract:
This article explores the archives of the National Security Agency (NSA) and the inherent logic vested in the agency’s management of them. By drawing on Derrida’s conception of the archive and the compulsion to administer and complete it, this article suggests that the data collection practices, as well as the rhetoric, of the NSA indicate a specific logic of gathering and organizing data that presents a fantasy of perfect surveillance and pre-emptive intervention that stretches into the future to cancel emergent threats. To contextualize an understanding of the archival practices of the NSA w
APA, Harvard, Vancouver, ISO, and other styles
16

Nadtochey, Y. "Facets of Interdependency in Russia-US Relations." International Trends / Mezhdunarodnye protsessy 18, no. 2 (2020): 48–70. http://dx.doi.org/10.17994/it.2020.18.2.61.4.

Full text
Abstract:
The appliance of interdependence concepts in the International Relations studies can hardly be regarded as something new. However, slowing down globalization and rising international tensions even among partner or allied states make rethinking of these concepts relevant. The notion that interdependence may ease tensions was put under question and opposed by the idea that interdependence may become a source of conflict. Scholars also missed their focus on conceptualization of interdependence forgetting that it was not a product of globalization, rather a result of the Cold War era. Thus, it can
APA, Harvard, Vancouver, ISO, and other styles
17

Essex, Jamey. "The Neoliberal Geopolitics of Food Security: The Case of Indonesia." Human Geography 1, no. 2 (2008): 1–13. http://dx.doi.org/10.1177/194277860800100204.

Full text
Abstract:
The centering of development in post-9/11 US national security strategies, combined with the restructuring of the US state's foreign development apparatus, promise deep changes in understandings and practices of food security and its relationship to development and processes of neoliberalization, securitization, and militarization. Long a stated objective within US foreign aid programs, especially those based around food aid, recent strategic shifts have rescripted food security as a basic need that should be met through the market, and as a proxy measurement for good governance. By the same t
APA, Harvard, Vancouver, ISO, and other styles
18

Wang, Ping, Maurice Dawson, and Kenneth L. Williams. "Improving Cyber Defense Education through National Standard Alignment." International Journal of Hyperconnectivity and the Internet of Things 2, no. 1 (2018): 12–28. http://dx.doi.org/10.4018/ijhiot.2018010102.

Full text
Abstract:
There has been a fast-growing demand for cybersecurity professionals to defend cyber space and information systems. With more and more programs and course offerings in cybersecurity popping up in higher education, it is important to have a consistent and reliable quality standard to guide and evaluate the training and preparation of qualified cyber defense workforce. The national Centers of Academic Excellence in Cyber Defense Education (CAE-CDE) designation program jointly sponsored by the US National Security Agency (NSA) and Department of Homeland Security (DHS) is a rigorous national stand
APA, Harvard, Vancouver, ISO, and other styles
19

Meernik, James. "The Persistence of US Conflict Behavior: Continuity in the Use of Force." International Area Studies Review 14, no. 3 (2011): 33–60. http://dx.doi.org/10.1177/223386591101400302.

Full text
Abstract:
I argue that decision-making processes by the president and the national security establishment and a conception of past US military operations as credibility-establishing precedents for future US military actions have tended to result in a fixation on political developments occurring in a relatively small number of nations. Together, these foreign-policy making routines produce a high degree of regularity in US military activities whose importance is not often appreciated in studies that emphasize more variable domestic political forces, such as diversionary theory, or traditional security co
APA, Harvard, Vancouver, ISO, and other styles
20

Wapner, Paul. "The Importance of Critical Environmental Studies in the New Environmentalism." Global Environmental Politics 8, no. 1 (2008): 6–13. http://dx.doi.org/10.1162/glep.2008.8.1.6.

Full text
Abstract:
Over the past few years, environmental studies has been pushed to the sidelines of political discourse as environmental challenges have been overshadowed in world affairs by issues of terrorism, national security and global economic stability. However, a new Democratic Congress in the US and anticipation of a new US president, intensifying global concern about climate change and forward-looking environmental initiatives at the municipal and regional levels the world-over suggest that we may be entering a new era of environmental concern. How should environmental scholars position themselves in
APA, Harvard, Vancouver, ISO, and other styles
21

Nguyen, Nicole. "“The Eyes and Ears on Our Frontlines”: Policing without Police to Counter Violent Extremism." Surveillance & Society 17, no. 3/4 (2019): 322–37. http://dx.doi.org/10.24908/ss.v17i3/4.8142.

Full text
Abstract:
As the US public has grown more concerned about domestic terrorist attacks and the abrogation of civil liberties in the pursuit of national security, law enforcement agencies increasingly have applied the principles of community policing to the problem of homegrown terrorism. This community policing approach has anchored Countering Violent Extremism (CVE) initiatives that mobilize local communities to combat terrorist radicalization and recruitment. To do so, this emerging model has tasked community members and social service providers like teachers and mental health professionals with identif
APA, Harvard, Vancouver, ISO, and other styles
22

Charania, Moon. "Outing the Pakistani queer: Pride, paranoia and politics in US visual culture." Sexualities 20, no. 1-2 (2016): 41–64. http://dx.doi.org/10.1177/1363460716633393.

Full text
Abstract:
This article draws on the 26 June 2011 US embassy-sponsored Gay Pride parade in Islamabad, Pakistan alongside popular US visual cultural moments (2008–2012). I use visual culture to reread US intrigue in Pakistani queer subjects through specific images of terrorist/feminized masculinities – images that elucidate the conspicuous shifts in the technologies of power and sexuality in the context of contemporary Pakistani LGBT visibility. I move through popular US representations of Pakistan, Muslim masculinity and US LGBT visibility – all of which attempt to capture homoerotic desire (and dread) i
APA, Harvard, Vancouver, ISO, and other styles
23

ГАРУСОВА, Лариса. "Внешняя политика США в восприятии и оценках современного американского общества". Известия Восточного института 46, № 2 (2020): 57–66. http://dx.doi.org/10.24866/2542-1611/2020-2/57-66.

Full text
Abstract:
Анализируется взаимосвязь и корреляция современной внешнеполитической стратегии США с общественной рефлексией на неё. Информационной основой работы являются результаты социологических опросов ведущих американских исследовательских центров, статистические данные, статьи, официальные документы. Прослежена связь официальных внешнеполитических доктрин и мнения американских граждан в отношении России и Китая. Выявлена корреляция между усилением антикитайских настроений в США за последние два года и появлением новой официальной стратегии Вашингтона в отношении КНР («Стратегический подход США к КНР»)
APA, Harvard, Vancouver, ISO, and other styles
24

Maclellan, Nic. "Fiji, Iraq and Pacific island security." Race & Class 48, no. 3 (2007): 47–62. http://dx.doi.org/10.1177/0306396807073857.

Full text
Abstract:
The reverberations from the war in Iraq have been felt worldwide- and in regions far distant from the Middle East. A whole industry has grown up, in which private military and security corporations plug the gaps that the armed forces of the US and Britain cannot fill, providing back-up services, security and logistics. The Pacific nation of Fiji, with its highly regarded military tradition, has proved a fertile recruiting ground for such companies. High unemployment and lack of opportunity in Fiji has meant that Fijians are serving- and suffering casualties-in Iraq in increasing numbers. Moreo
APA, Harvard, Vancouver, ISO, and other styles
25

Bodden, Michael H. "Making Circles of Steel and Castles of Vanity Possible: The Cold War in theLongue Duréeof “Modernity”." Journal of Asian Studies 75, no. 4 (2016): 1019–29. http://dx.doi.org/10.1017/s0021911816001595.

Full text
Abstract:
Alfred McCoy's paper offers a masterful analysis of the way in which the Philippines, and more generally Southeast Asia, were used as base and laboratory for extending US dominance—its hegemony—in the twentieth century, and in particular the Cold War era and its aftermath. He offers a succinct summary of the way in which US organs of global domination—the National Security Council, the CIA, the Defense Department—worked throughout the developing world and in Europe to ensure compliant, anti-communist regimes during the Cold War period, which also meant that more than once the United States was
APA, Harvard, Vancouver, ISO, and other styles
26

Hollifield, James F. "SMU's Tower Center Links Washington with the “Heartland” and the World." PS: Political Science & Politics 41, no. 03 (2008): 661. http://dx.doi.org/10.1017/s1049096508310932.

Full text
Abstract:
The Tower Center for Political Studies at SMU maintains an office in the Centennial Center allowing us to link research activities of Tower Center faculty, fellows, and associates in Dallas (the heartland) with scholars, institutes, and think tanks in Washington and around the world. The Tower Center supports research and teaching in three areas: (1) international and comparative political economy, including trade, migration, and finance; (2) foreign policy, national security, and defense; and (3) American political development with an emphasis on policy, institutions, and process. Seyom Brown
APA, Harvard, Vancouver, ISO, and other styles
27

Fojas, Camilla. "Drone futures." Cultural Dynamics 31, no. 4 (2019): 308–22. http://dx.doi.org/10.1177/0921374019860944.

Full text
Abstract:
The US–Mexico border is the subject of an expanding market of cultural productions that frame this imagined and real location as the future and ultimate site of national security. It is also a site anchored in a past, where mobile subjects are sorted and processed in ways that correspond to racialized typologies of the Old West. The culture and politics of border security are saturated with this racial history even as drone technologies promise a future of neutral “target recognition,” so objective it can be automated. Even as this region is steeped in the future of surveillance technologies d
APA, Harvard, Vancouver, ISO, and other styles
28

Ebrahimi, Mansoureh, Saikou Kawsu Gassama, and Kamaruzaman bin Yusoff. "COVID-19: Threat and Response in Iran." Iran and the Caucasus 24, no. 4 (2020): 423–43. http://dx.doi.org/10.1163/1573384x-20200409.

Full text
Abstract:
The present study aims to emphasize an empirical perspective on the global scope of the COVID-19 event. The focus is that of an investigator concerned with Iran’s security and specific services used to process civil interactions. Game Theory dynamics affect uncertainty, proxy wars and the complex geopolitics of the Middle East. This often requires key players to focus on security by any means at their disposal. The maintenance of Iran’s autonomy and political security all too often require opposition to circumstances and players even while under heavy sanctions. This study seeks to answer the
APA, Harvard, Vancouver, ISO, and other styles
29

Böller, Florian, and Marcus Müller. "Unleashing the watchdogs: explaining congressional assertiveness in the politics of US military interventions." European Political Science Review 10, no. 4 (2018): 637–62. http://dx.doi.org/10.1017/s1755773918000152.

Full text
Abstract:
This article contributes to a burgeoning literature on parliamentary war powers by investigating the case of the US Congress drawing on both International Relations (IR) research and traditional war powers studies. Applying a fuzzy-set qualitative comparative analysis and case study method, we examine the conditions shaping congressional assertiveness. The article shows that the lack of national security interests and divided government are important conditions for members of Congress to criticize presidential intervention policies. While previous US war powers studies focused on the influence
APA, Harvard, Vancouver, ISO, and other styles
30

Ritchie, Marnie. "Fusing Race: The Phobogenics of Racializing Surveillance." Surveillance & Society 18, no. 1 (2020): 12–29. http://dx.doi.org/10.24908/ss.v18i1.13131.

Full text
Abstract:
This paper sets up a framework to assess how purportedly passive state surveillance comprises an infrastructure of active racialization. Frantz Fanon’s concept of “racial phobogenics,” or the process of making a raced body into an object of anxiety, can be useful for scholarship at the intersection of communication, race, data, security, policing, affect, and biopolitics. To read how local state surveillance justifies the aggregation of data by means of phobogenics, I analyzed 120 hours of field observations and conducted fourteen interviews from June 2017 to March 2018 in one US Homeland Secu
APA, Harvard, Vancouver, ISO, and other styles
31

Egry, Gábor. "The World between Us: State Security and the Negotiation of Social Categories in Interwar Romania." East Central Europe 44, no. 1 (2017): 17–46. http://dx.doi.org/10.1163/18763308-04401009.

Full text
Abstract:
The concept of security and the security culture of the state are always social constructs reflecting the outcome of interactions between state and society. Key categories of security, like dangerous social groups and activities are usually negotiated through these interactions. Politicians, secret agents, gendarms, denunciators, journalists, or the indicted, all shape the broader social meaning in a dynamic way. While in Greater Romania the state attempted to extend its control to ever broader segments of society in order to fend off perceived threats it had to rely on its own personnel and o
APA, Harvard, Vancouver, ISO, and other styles
32

Selchow, Sabine. "Resilience and resilient in Obama’s National Security Strategy 2010: Enter two ‘political keywords’." Politics 37, no. 1 (2016): 36–51. http://dx.doi.org/10.1177/0263395715614847.

Full text
Abstract:
Under US President Obama, the words resilience and resilient have been applied beyond the odd occasion in the National Security Strategy (NSS) document. Through a systematic analysis of the NSS 2010, the research behind this article sought to determine if there was anything in this linguistic phenomenon of interest to scholars in political studies. The article argues that what makes the appearance of the two words in the NSS 2010 relevant is not what these words do but what is done to them in the text. It shows how the document constructs resilience and resilient in a distinct way as symbolic
APA, Harvard, Vancouver, ISO, and other styles
33

Jakobsen, Peter Viggo, Jens Ringsmose, and Håkon Lunde Saxi. "Prestige-seeking small states: Danish and Norwegian military contributions to US-led operations." European Journal of International Security 3, no. 2 (2018): 256–77. http://dx.doi.org/10.1017/eis.2017.20.

Full text
Abstract:
AbstractIn this article we broaden the conventional understanding of prestige and show that prestige-seeking played a major role in the Danish and Norwegian decisions to provide military support to post-Cold War US-led wars. Both countries made costly military contributions in the hope of increasing their standing and prestige in Washington. Both governments regarded prestige as a form of soft power, which they could later convert into access, influence, and US support. Our findings are far from trivial. They make a theoretical contribution by demonstrating that small powers understand and see
APA, Harvard, Vancouver, ISO, and other styles
34

Okunev, I. Y., and D. V. Basova. "CAPITAL WITHOUT STATEHOOD: EMPIRICAL STUDIES IN STARAYA LADOGA, KASIMOV AND MYSHKIN." MGIMO Review of International Relations, no. 4(49) (August 28, 2016): 248–61. http://dx.doi.org/10.24833/2071-8160-2016-4-49-248-261.

Full text
Abstract:
The article covers the concept of "capitaleness" and "geographical identity". Our research will make an attempt to analyze an institute of capitals at functional as well as symbolic levels. In that case capitals serve not only as a place to dispose the governmental bodies, but their functions include national representation to themselves and the environment. Capitals are the idealized image of nation and national history, a sort of nation in miniature. Interregional differentiation within a state through establishing and maintaining mental boundaries between center and periphery is the mechani
APA, Harvard, Vancouver, ISO, and other styles
35

Gerges, Fawaz A. "What changes have taken place in US foreign policy towards Islamists?†." Contemporary Arab Affairs 6, no. 2 (2013): 189–97. http://dx.doi.org/10.1080/17550912.2013.788869.

Full text
Abstract:
American foreign policy does not seem to have undergone radical changes in its position towards Islamists. Instead, Islamists seem to display willingness to make a transition and cater for vital American interests in the Arab world - mainly with regard to the following four points: political economy; relations with Israel; the War on Terror; and issues related to identity, especially in the case of minorities. Islamists appear to have proven malleability towards the US in relation to the economic system and foreign policy. Some Islamist leaders have pointed out that the price of this adaptabil
APA, Harvard, Vancouver, ISO, and other styles
36

Boute, Anatole. "China’s External Energy Security: Energy Trade and Investment Along the ‘Belt and Road’." Journal of World Investment & Trade 20, no. 2-3 (2019): 195–220. http://dx.doi.org/10.1163/22119000-12340129.

Full text
Abstract:
Abstract As the world’s largest energy consumer, China’s energy security policies have significant implications for global, regional and national energy governance. However, the legal dimension of China’s external energy security remains understudied, with most attention in the energy law literature focused on EU and US energy security. This Special Issue studies the legal aspects of Chinese external energy cooperation by focusing on energy trade and investment under the ‘Belt and Road Initiative’ – the Chinese foreign policy concept aiming to promote regional and global economic integration t
APA, Harvard, Vancouver, ISO, and other styles
37

Khogali, Ishraga Mohamed Ahmed, and Hany Ammar. "A Scenario-Based Methodology for Cloud Computing Security Risk Assessment." International Journal for Innovation Education and Research 5, no. 12 (2017): 127–55. http://dx.doi.org/10.31686/ijier.vol5.iss12.875.

Full text
Abstract:
Cloud computing has been one of the major emerging technologies in recent years. However, for cloud computing, the risk assessment becomes more complex since there are several issues that likely emerged. In this paper, we survey the existing work on assessing security risks in cloud computing applications. Existing work does not address the dynamic nature of cloud applications and there is a need for methods that calculate the security risk factor dynamically. In this paper, we use the National Institute of Standards and Technology (NIST) Risk Management Framework and present a dynamic scenari
APA, Harvard, Vancouver, ISO, and other styles
38

Klaus, Witold. "Security First: The New Right-Wing Government in Poland and its Policy towards Immigrants and Refugees." Surveillance & Society 15, no. 3/4 (2017): 523–28. http://dx.doi.org/10.24908/ss.v15i3/4.6627.

Full text
Abstract:
The so called refugee crisis in 2015 coincided with the Polish parliamentary electoral campaign. The effect of it was – for the first time in Poland – the introduction of migration policy to the political agenda of the right-wing and populist political parties on a massive scale. They presented migration as an issue of security – both national and cultural, direct and symbolic. The new government, acting since the end of 2015, included immigration and asylum issues into their political programme as a key element of national security. Their discourse about refugees is usually based on the diffe
APA, Harvard, Vancouver, ISO, and other styles
39

van Eeten, Michel. "Patching security governance: an empirical view of emergent governance mechanisms for cybersecurity." Digital Policy, Regulation and Governance 19, no. 6 (2017): 429–48. http://dx.doi.org/10.1108/dprg-05-2017-0029.

Full text
Abstract:
Purpose The issue of cybersecurity has been cast as the focal point of a fight between two conflicting governance models: the nation-state model of national security and the global governance model of multi-stakeholder collaboration, as seen in forums like IGF, IETF, ICANN, etc. There is a strange disconnect, however, between this supposed fight and the actual control over cybersecurity “on the ground”. This paper aims to reconnect discourse and control via a property rights approach, where control is located first and foremost in ownership. Design/methodology/approach This paper first concept
APA, Harvard, Vancouver, ISO, and other styles
40

Bottoni, Stefano. "Talking to the System: Imre Mikó, 1911–1977." East Central Europe 44, no. 1 (2017): 47–75. http://dx.doi.org/10.1163/18763308-04401002.

Full text
Abstract:
Taking a cue from an intelligence file produced by the Romanian political police on Transylvanian Hungarian intellectual Imre Mikó (Cluj, 1911–1977), the article analyzes the various patterns of accomodation with the political system, which represents a key to the understanding of how social legitimacy was built and maintained by the communist regimes of Eastern Europe. The framework in which this story takes place is especially interesting due to the Romanian context. On the one hand, the analysis of an unconventional collaboration established during the 1970s between the security organs of a
APA, Harvard, Vancouver, ISO, and other styles
41

Ahmad, Mahvish, and Rabia Mehmood. "Surveillance, Authoritarianism and ‘Imperial Effects’ in Pakistan." Surveillance & Society 15, no. 3/4 (2017): 506–13. http://dx.doi.org/10.24908/ss.v15i3/4.6721.

Full text
Abstract:
To speak of ‘Surveillance and the Global Turn to Authoritarianism’ presupposes a moment with little connection to that which has gone before, or places outside of North America and Europe. While Trump and Brexit inaugurate a consequential shift, even rupture, in the political terrain, we must not lose sight of places and peoples where American Wars – with European support – were overtly and covertly waged in the decades preceding this ‘global turn’, nor the fate of these places today. We argue that the sustained transfer of sophisticated surveillance technologies, as part and parcel of both di
APA, Harvard, Vancouver, ISO, and other styles
42

Feinstein, Yuval. "Rallying around the President: When and Why Do Americans Close Ranks behind Their Presidents during International Crisis and War?" Social Science History 40, no. 2 (2016): 305–38. http://dx.doi.org/10.1017/ssh.2016.5.

Full text
Abstract:
Many studies have reported that US presidents often become more popular at the onset of wars and other security crises. Research on this “rally-round-the-flag” phenomenon has focused on either rational calculation of success, chances of military actions, popular perceptions of security threats, or the role of opinion leaders. This paper proposes a new approach: I argue that challenges to the symbolic status of the nation vis-à-vis other nations drive rally periods. This study examines the rally-round-the-flag phenomenon from a comparative historical perspective, using a new database of war eve
APA, Harvard, Vancouver, ISO, and other styles
43

Goffman, MD, FACP, Thomas E. "Bioterrorism versus radiological terrorism: Notes from a bio/nuclear epidemiologist." American Journal of Disaster Medicine 4, no. 1 (2009): 9–14. http://dx.doi.org/10.5055/ajdm.2009.0002.

Full text
Abstract:
The antiterrorism and disaster planning communities often speak of the high potential for bioterrorism and possible potential for radioterrorism, specifically the explosion of a fission device on US soil. Information gained from an epidemiologist’s work in the national and international scene, which inevitably involves Intel regarding the cultures and subcultures being studied, suggest that bioterrorism is far less likely to be a major threat, that has been over-emphasized at the state level due to warnings from Homeland Security, and that Homeland Security itself appears biased toward bioterr
APA, Harvard, Vancouver, ISO, and other styles
44

Podberyozkin, A. I. "Military and Political Studies." MGIMO Review of International Relations, no. 5(38) (October 28, 2014): 192–96. http://dx.doi.org/10.24833/2071-8160-2014-5-38-192-196.

Full text
Abstract:
Military-political issues is an important area of research work at MGIMO. The difference in this direction from the classical international specialization is that it is at the intersection of several disciplines: military science, military-technical and military-industrial as well as International Relations. A specialist in military and political issues should not only be an expert in the field of international relations and diplomacy, but also have a deep knowledge of military-technical issues to understand the basic trends in the development of scientific and technological progress and its i
APA, Harvard, Vancouver, ISO, and other styles
45

Subedi, Madhusudan. "COVID-19: Anthropocene and Capitalocene Caused Pandemics." Dhaulagiri Journal of Sociology and Anthropology 14 (December 29, 2020): 15–21. http://dx.doi.org/10.3126/dsaj.v14i0.32752.

Full text
Abstract:

 Most epidemiological studies focus on the direct causes of diseases while wider, social causal factors are ignored. This paper briefly highlights the history of major epidemics and the role of Anthropocene and Capitalocene for the emergence and reemergence of pandemics like COVID-19. Books, journal articles, and statistics offer information that can explain the phenomena. A historical inquiry can inform us about the fundamental causes of pandemics. Human security and ecology are intertwined, and the global effect of pandemics responded to at the national level is inadequate. The lessons
APA, Harvard, Vancouver, ISO, and other styles
46

Subedi, Madhusudan. "COVID-19: Anthropocene and Capitalocene Caused Pandemics." Dhaulagiri Journal of Sociology and Anthropology 14 (December 29, 2020): 15–21. http://dx.doi.org/10.3126/dsaj.v14i0.32752.

Full text
Abstract:

 Most epidemiological studies focus on the direct causes of diseases while wider, social causal factors are ignored. This paper briefly highlights the history of major epidemics and the role of Anthropocene and Capitalocene for the emergence and reemergence of pandemics like COVID-19. Books, journal articles, and statistics offer information that can explain the phenomena. A historical inquiry can inform us about the fundamental causes of pandemics. Human security and ecology are intertwined, and the global effect of pandemics responded to at the national level is inadequate. The lessons
APA, Harvard, Vancouver, ISO, and other styles
47

DeAro, Jessie, Sharon Bird, and Shermaine Mitchell Ryan. "NSF ADVANCE and gender equity." Equality, Diversity and Inclusion: An International Journal 38, no. 2 (2019): 131–39. http://dx.doi.org/10.1108/edi-09-2017-0188.

Full text
Abstract:
Purpose Supporting the advancement of science, technology, engineering and mathematics (STEM) in ways that help to ensure the health, prosperity, welfare and security of the nation has been central to the mission of the US National Science Foundation (NSF) since 1950, the year Congress created the agency. Preparing a highly qualified and diverse STEM workforce plays a central role in supporting this mission. The paper aims to discuss these issues. Design/methodology/approach Over the past several decades, many positive steps have been taken throughout the US education system to help ensure a m
APA, Harvard, Vancouver, ISO, and other styles
48

Pitra, Haetami. "CHINA COERCIVE DIPLOMACY THROUGH SOUTH CHINA SEA CONFLICT AND BELT & ROAD INITIATIVES." Jurnal Pertahanan 5, no. 2 (2019): 48. http://dx.doi.org/10.33172/jp.v5i2.522.

Full text
Abstract:
<p>This paper studies Chinese coercive diplomacy by first analyzing the South China Sea (SCS) issue from the perspective of China national interest which has Belt & Road Initiatives (BRI) political agenda (formerly known as OBOR). Through BRI, China will be a counterweight to the world economic power in countering US hegemony. This paper aims to describe the coercive form of China diplomacy which has been implemented through both phenomena and to analyze China coercive diplomacy using theory and relevant concept. To achieve those goals, this paper employs qualitative research met
APA, Harvard, Vancouver, ISO, and other styles
49

Bassamagne Mougnok, Cyprien. "United States–Africa Security Relations. Terrorism, Regional Security and National Interests, Kelechi A. Kalu et George Klay Kieh, Jr. (dir.), 2014, coll. Routledge Studies in US Foreign Policy, Londres, Routledge, 230 p." Études internationales 45, no. 3 (2014): 480. http://dx.doi.org/10.7202/1027569ar.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Gergiieva, Valeriia. "THE EVOLUTION OF THE US STRATEGY TOWARD THE NUCLEAR NONPROLIFERATION AFTER THE COLD WAR." Міжнародні відносини, суспільні комунікації та регіональні студії, no. 2 (8) (November 26, 2020): 112–26. http://dx.doi.org/10.29038/2524-2679-2020-02-112-126.

Full text
Abstract:
The article analyzes the US strategy in the nonproliferation field during three decades (in 1990s – 2018) and during the presidency of four US presidents (Bill Clinton, George Bush, Barack Obama, and Donald Trump). The author considers the key guidelines of US nonproliferation strategy that are described in four Nuclear Posture Reviews (NPR) issued by each post-Cold War presidential administration. These documents describe the US nuclear policy in general, but the author focused on analysis of those their sections that were devoted to dealing with the risks of proliferation of nuclear weapons.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!