Search results for "International Security"

showing 10 items of 21 documents

Beyond the notion of security community: What role for the African regional organizations in peace and security?

2005

African regional organizations' increasing activity in security policy is usually approached through the concept of ‘security community’, which can only partially clarify their difficult situation. A multi-level governance model is suggested as a more useful approach in a situation where economic cooperation is weak, member states' principles of governance diverge, and they themselves might be part of security problems. A security community is not a necessary condition for a regional organization to play a role in the field of security. Through new intra-regional and cross-level relationships with the international community and civil society, regional organizations can become important sec…

Regional organizationCritical security studiesNational securitybusiness.industryPolitical scienceGeography Planning and DevelopmentEconomic securityInternational securitySecurity communityPublic administrationSecurity studiesbusinessCorporate securityThe Round Table
researchProduct

Terroryzm w obliczu bezpieczeństwa państwa

2018

TERRORISM IN THE FACE OF STATE SECURITYThe article focuses on the issue of the threat of terrorism. Terrorism plays a vital role in the environment, gradually becoming a major threat to any conflict affecting the functioning of the state. Experience has shown that in the fight against terrorism, the key to victory is the exchange of intelligence and new techniques and procedures for action. Anti-terrorism methods are continually evolving as a result of new trends and ways in which terrorist activities are carried out.

Political scienceLawTerrorismInternational security
researchProduct

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

2015

Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes …

Engineeringbusiness.industryNetwork securityInternet trafficComputer securitycomputer.software_genreInternet Architecture BoardInternational securityUse caseThe InternetbusinessResilience (network)computerTraffic generation model
researchProduct

The Preservation of Art and Culture in Times of War

2022

Conflict over cultural heritage has increasingly become a standard part of war. Today, systematic exploitation, manipulation, attacks, and destruction of cultural heritage by state and non-state actors form part of most violent conflicts across the world. Such acts are often intentional and based on well-planned strategies for inflicting harm on groups of people and communities. With this increasing awareness of the role cultural heritage plays in war, scholars and practitioners have progressed from seeing conflict-related destruction of cultural heritage as a cultural tragedy to understanding it as a vital national security issue. There is also a shift from the desire to protect cultural p…

philosophyinternational normsCultural heritageinternational securityvalueswarinternational lawcultural propertyarmed conflictidentity politics
researchProduct

Ekspansja militarna Rosji w regionie zagrożeniem dla grupy państw nadbałtyckich : Litwy, Łotwy i Estonii

2015

The authors of this article introduce the issue of the threat of the Baltic States from Russia. Consideration of the potential hazard of the Baltic States by the Russian Federation, manifested increasingly imperialistic aspirations, we want to identify the main causes that underlie such a policy of Russia. Membership in the Baltic states of NATO and the European Union gives hope for the unity of the members of NATO and the EU, these countries will be effectively defended against growing Russian militarism.

International SecuritySecurity threatsSpecial ForcesSecurity environmentEUThe North Atlantic Treaty Organization
researchProduct

Research and Science Today Supplement

2013

In this issue are included scientific articles who debate problems from social science fields: development, power of the state, European policy, democracy, freedom of choice, social science. Authors talk about subjects as Sport policy and heroes in the Romanian communism, Food in war time in Transylvania, Global Security, Cyberspace, Postcommunism, Evaluation of some toxic compounds in water, Public policies. Research and Science Today Journal is a publication founded in 2011 and it is dedicated to the students of all levels (license, master and doctoral) of faculties in the country and abroad. We want to offer the participants the opportunity to present their scientific works in the follow…

Conceptualizationbusiness.industrymedia_common.quotation_subjectFreedom of choicePublic policyPublic relationsDemocracyPolitical scienceInternational securitySocial sciencebusinessCyberspaceLicenseCommunismmedia_commonSSRN Electronic Journal
researchProduct

Components of defence strategies in society’s information environment: a case study based on the grounded theory

2020

Objectives: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. Methods: This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The collected data were analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components being developed using the Grounded Theory. Results: This study shows that the goal of politically and militarily hostile actors is to weaken society’s infor…

defencekybersodankäyntiKnowledge managementlcsh:Military SciencesotilasstrategiaComputer sciencebusiness.industrylcsh:UInformation environmentGrounded theorypuolustuspolitiikkasocietyComponent (UML)componentinformaatiosodankäyntiMilitary securityInternational securityinformation environmentbusinessgrounded theorySecurity and Defence Quarterly
researchProduct

Multiple Actors in Framing the EU's External Policy: The Case of the EU Global Security Strategy

2017

The functioning of the European External Action Service (EEAS) has been a much discussed issue since its establishment. By constructing, through the Treaty of Lisbon, a single actor for the EU external policy, the EEAS now has to deal with finding most efficient ways of accommodating the interests of both the EU Member States and the EU institutions. The paper applies the Principal-Agent method to examine the delegation of EU external policy to the EEAS. The vague mentioning of the EEAS in the Lisbon Treaty and the inter-institutional negotiations preceding the July 2010 Council Decision on the organisation and functioning of the EEAS illustrate how Member States have decided to leave a rem…

NegotiationFraming (social sciences)media_common.quotation_subjectCorporate governancePolitical scienceInternational securityGlobal strategyPublic administrationTreatyTreaty of LisbonDiscretionmedia_commonSSRN Electronic Journal
researchProduct

Zagrożenie terroryzmem oraz aspekt militarny w jego zwalczaniu

2015

security threatsinternational securitysecurity environmentspecial forcesterrorismNorth Atlantic Treaty OrganizationStudia nad Autorytaryzmem i Totalitaryzmem
researchProduct

Współczesne systemy bezpieczeństwa w filozoficznej wizji Emmanuela Kanta

2015

The authors of this article to introduce the issue of philosophical issues by Immanuel Kant and his interpretations. The article contains only a limited and necessary extent to which the authors present the main ideas of Kant related to human existence peaceful in the world, based on the work "To the eternal peace. Outline philosophical ". Kant realized that their works do not make changes in his lifetime, and many subsequent generations, but once implanted ideas must find a peaceful base for future communities, which will be able to bear fruit, which Immanuel Kant expected. Thus, the military security in the vision Kant is a world without violence, without the pressure of military elements…

International SecuritySecurity threatsSecurity environmentworld peace
researchProduct