Search results for "National security"

showing 10 items of 62 documents

Stakeholders, contradictions and salience: An empirical study of a Norwegian G2G effort

2006

Author's version of a chapter in Proceedings of the 39th Annual Hawaii International Conference on Systems Sciences. Also available from the publisher at http://dx.doi.org/10.1109/HICSS.2006.436 Previous studies indicate that the expected effects of e-Government are slower to realize than initially expected. Several authors argue that e-Government involves particularly complex settings, consisting of a variety of stakeholders promoting different and often conflicting objectives. Yet, few studies have explicitly addressed the inherent challenges of this complexity. This study focuses on the extent to which contradictory stakeholder objectives can help explain the relatively slow progress of …

National securityEmpirical researchbusiness.industryInformation and Communications TechnologyLocal governmentInformation systemEconomicsStakeholderStakeholder analysisVDP::Social science: 200::Library and information science: 320::Information and communication systems: 321Public relationsbusinessStakeholder theory
researchProduct

Migration Trends in the World and in Poland versus National Security

2020

Purpose: The aim of the paper is to analyse migration trends in the world from 1990 to the present day and economic migration in Poland in the years 2015-2019. Aspects related to national security in the context of the scale of crimes committed by economic migrants residing in Poland will also be discussed. Design/Methodology/Approach: In the research implementation process, data, and sources analysis, as well as a modeling method to show extrapolation of migration trends. Findings: The methodology used allowed the authors to determine that international migration processes have permanently entered the order of functioning of countries around the world. Practical Implications: According to …

public policyEconomic migrationnational securitymigrationEuropean Research Studies Journal
researchProduct

Is Democracy Exportable?

2017

Among many aspects to the question of whether democracy is exportable, this contribution focuses on the role of the people, understood not as a unitary actor but as a heterogeneous set: the citizens. The people matter, in a different way, both in the countries to which democracy might be exported and in the democratic countries in which the question is about promoting democracy elsewhere. The mechanisms or characteristics involved in the discussion include yardstick competition, differences among citizens in the intensity of their preferences, differences among autocracies regarding intrusion into private life, citizens’ assessments of future regime change, and responsiveness of elected inc…

preference intensityhuman rights abusesmedia_common.quotation_subjectAutocracyPublic administrationCompetition (economics)YardstickPolitical scienceyardstick competition over regimes[ SHS.ECO ] Humanities and Social Sciences/Economies and financesDemocratization[SHS.ECO] Humanities and Social Sciences/Economics and Financemedia_commonsupport to autocraciesHuman rightspopulardemocratization[SHS.ECO]Humanities and Social Sciences/Economics and FinanceDemocracyJEL: F - International Economics/F.F5 - International Relations National Security and International Political EconomyRegime changeJEL : D - Microeconomics/D.D7 - Analysis of Collective Decision-MakingPolitical economydemocracy promotionJEL: D - Microeconomics/D.D7 - Analysis of Collective Decision-MakingJEL : F - International Economics/F.F5 - International Relations National Security and International Political EconomyDemocracy promotion
researchProduct

Beyond the notion of security community: What role for the African regional organizations in peace and security?

2005

African regional organizations' increasing activity in security policy is usually approached through the concept of ‘security community’, which can only partially clarify their difficult situation. A multi-level governance model is suggested as a more useful approach in a situation where economic cooperation is weak, member states' principles of governance diverge, and they themselves might be part of security problems. A security community is not a necessary condition for a regional organization to play a role in the field of security. Through new intra-regional and cross-level relationships with the international community and civil society, regional organizations can become important sec…

Regional organizationCritical security studiesNational securitybusiness.industryPolitical scienceGeography Planning and DevelopmentEconomic securityInternational securitySecurity communityPublic administrationSecurity studiesbusinessCorporate securityThe Round Table
researchProduct

Cyber Situational Awareness in Critical Infrastructure Organizations

2021

The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running critical infrastructures and their cyber situational awareness (CSA). According to a common view, components of critical infrastructures become more complex and interdependent on each other and, as a consequence, ramifications of incidents multiply. In practice, the actions relate to developing better CSA and understanding of a critical infrastructure organization. The aim is to prepare for incidents and their management in a whole-of-society approach. The arrangement i…

Process managementNational securitySituation awarenessOperating modelcybersecurityProcess (engineering)business.industryturvallisuusympäristömedia_common.quotation_subjectInformation sharingtilannekuvaCritical infrastructureInterdependencesituational awarenesscritical infrastructureinformation sharingvital societal functionsBusinessinfrastruktuuritkansallinen turvallisuusResilience (network)kyberturvallisuusmedia_common
researchProduct

Terroryzm w obliczu bezpieczeństwa państwa

2018

TERRORISM IN THE FACE OF STATE SECURITYThe article focuses on the issue of the threat of terrorism. Terrorism plays a vital role in the environment, gradually becoming a major threat to any conflict affecting the functioning of the state. Experience has shown that in the fight against terrorism, the key to victory is the exchange of intelligence and new techniques and procedures for action. Anti-terrorism methods are continually evolving as a result of new trends and ways in which terrorist activities are carried out.

Political scienceLawTerrorismInternational security
researchProduct

Analysis of Approaches to Internet Traffic Generation for Cyber Security Research and Exercise

2015

Because of the severe global security threat of malwares, vulnerabilities and attacks against networked systems cyber-security research, training and exercises are required for achieving cyber resilience of organizations. Especially requirement for organizing cyber security exercises has become more and more relevant for companies or government agencies. Cyber security research, training and exercise require closed Internet like environment and generated Internet traffic. JAMK University of Applied Sciences has built a closed Internet-like network called Realistic Global Cyber Environment (RGCE). The traffic generation software for the RGCE is introduced in this paper. This paper describes …

Engineeringbusiness.industryNetwork securityInternet trafficComputer securitycomputer.software_genreInternet Architecture BoardInternational securityUse caseThe InternetbusinessResilience (network)computerTraffic generation model
researchProduct

The Preservation of Art and Culture in Times of War

2022

Conflict over cultural heritage has increasingly become a standard part of war. Today, systematic exploitation, manipulation, attacks, and destruction of cultural heritage by state and non-state actors form part of most violent conflicts across the world. Such acts are often intentional and based on well-planned strategies for inflicting harm on groups of people and communities. With this increasing awareness of the role cultural heritage plays in war, scholars and practitioners have progressed from seeing conflict-related destruction of cultural heritage as a cultural tragedy to understanding it as a vital national security issue. There is also a shift from the desire to protect cultural p…

philosophyinternational normsCultural heritageinternational securityvalueswarinternational lawcultural propertyarmed conflictidentity politics
researchProduct

Ekspansja militarna Rosji w regionie zagrożeniem dla grupy państw nadbałtyckich : Litwy, Łotwy i Estonii

2015

The authors of this article introduce the issue of the threat of the Baltic States from Russia. Consideration of the potential hazard of the Baltic States by the Russian Federation, manifested increasingly imperialistic aspirations, we want to identify the main causes that underlie such a policy of Russia. Membership in the Baltic states of NATO and the European Union gives hope for the unity of the members of NATO and the EU, these countries will be effectively defended against growing Russian militarism.

International SecuritySecurity threatsSpecial ForcesSecurity environmentEUThe North Atlantic Treaty Organization
researchProduct

Foreign and Security Policy

2015

In early 2014 the foreign and security policy discourse in the Baltic region was transformed as a resurgent and assertive Russia annexed Crimea and launched covert operations in eastern Ukraine.1 Observers were quick to point out that events in Ukraine eerily paralleled the 1940 occupation of the Baltic states. The traditional security concerns about Russian intentions in the region that the Baltic states had increasingly suppressed over the previous 20 years once again rushed to the surface. The post-existential era of Baltic foreign and security policy that had marked the decade that followed accession to the EU and NATO seemed to have come to an end.

Policy studiesNational securitybusiness.industryForeign policyPolitical scienceEconomic securityForeign policy analysisInternational tradeForeign relationsbusinessSecurity policyCorporate security
researchProduct