Search results for "National security"

showing 10 items of 62 documents

Foreign and Security Policy

2015

In early 2014 the foreign and security policy discourse in the Baltic region was transformed as a resurgent and assertive Russia annexed Crimea and launched covert operations in eastern Ukraine.1 Observers were quick to point out that events in Ukraine eerily paralleled the 1940 occupation of the Baltic states. The traditional security concerns about Russian intentions in the region that the Baltic states had increasingly suppressed over the previous 20 years once again rushed to the surface. The post-existential era of Baltic foreign and security policy that had marked the decade that followed accession to the EU and NATO seemed to have come to an end.

Policy studiesNational securitybusiness.industryForeign policyPolitical scienceEconomic securityForeign policy analysisInternational tradeForeign relationsbusinessSecurity policyCorporate security
researchProduct

Terroryzm w obliczu bezpieczeństwa państwa

2018

TERRORISM IN THE FACE OF STATE SECURITYThe article focuses on the issue of the threat of terrorism. Terrorism plays a vital role in the environment, gradually becoming a major threat to any conflict affecting the functioning of the state. Experience has shown that in the fight against terrorism, the key to victory is the exchange of intelligence and new techniques and procedures for action. Anti-terrorism methods are continually evolving as a result of new trends and ways in which terrorist activities are carried out.

Political scienceLawTerrorismInternational security
researchProduct

Cyber Situational Awareness in Critical Infrastructure Organizations

2021

The capability related to cybersecurity plays an ever-growing role on overall national security and securing the functions vital to society. The national cyber capability is mainly composed by resilience of companies running critical infrastructures and their cyber situational awareness (CSA). According to a common view, components of critical infrastructures become more complex and interdependent on each other and, as a consequence, ramifications of incidents multiply. In practice, the actions relate to developing better CSA and understanding of a critical infrastructure organization. The aim is to prepare for incidents and their management in a whole-of-society approach. The arrangement i…

Process managementNational securitySituation awarenessOperating modelcybersecurityProcess (engineering)business.industryturvallisuusympäristömedia_common.quotation_subjectInformation sharingtilannekuvaCritical infrastructureInterdependencesituational awarenesscritical infrastructureinformation sharingvital societal functionsBusinessinfrastruktuuritkansallinen turvallisuusResilience (network)kyberturvallisuusmedia_common
researchProduct

Beyond the notion of security community: What role for the African regional organizations in peace and security?

2005

African regional organizations' increasing activity in security policy is usually approached through the concept of ‘security community’, which can only partially clarify their difficult situation. A multi-level governance model is suggested as a more useful approach in a situation where economic cooperation is weak, member states' principles of governance diverge, and they themselves might be part of security problems. A security community is not a necessary condition for a regional organization to play a role in the field of security. Through new intra-regional and cross-level relationships with the international community and civil society, regional organizations can become important sec…

Regional organizationCritical security studiesNational securitybusiness.industryPolitical scienceGeography Planning and DevelopmentEconomic securityInternational securitySecurity communityPublic administrationSecurity studiesbusinessCorporate securityThe Round Table
researchProduct

"Waiting for Godot?" : Lithuania and the European Security Order in the 21-century

2000

Lietuvos užsienio ir saugumo politikos principai, kryptys ir pagrindiniai tikslai liko iš esmės nepakitę nuo pat valstybingumo atkūrimo, tačiau politinių sprendimų priėmimo kontekstas per tą laiką gerokai pasikeitė ir keičiasi toliau. Vidurio ir Rytų Europoje žlugus komunistiniams režimams, Šaltojo karo tvarka žlugo neįtikėtinai greitai. 2000 m. aiškėja, kad strateginė aplinka ir mūsų saugumo suvokimas taip pat pakito. Nors Vidurio ir Rytų Europos lyderiai nepamiršta sovietinės praeities, pastarieji dešimt metų leidžia tikėtis, kad šioms valstybėms pavyks sėkmingai integruotis į Vakarų Europos struktūras. 1999 m. Kosovo kampanija privertė peržiūrėti tarptautinio saugumo sampratą, Europos Są…

Saugumo esmėCold warSecurity policySecurity orderEuropinio saugumo tvarkaNature of securityTarptautinis saugumas / International securitySaugumo politikaŠaltasis karasSaugumo tvarkaEuropean Security Order
researchProduct

Relationships between core self-evaluation, leader empowering behavior, and job security among Jordan University Hospital nurses

2021

Nurses are facing real stressors due to patients’ needs and leaders’ demands. The aim of this study is to explore the perceived level of core self-evaluation (CSE), leader empowering behavior (LEB), and job security among Jordan University Hospital nurses in Amman, the capital of Jordan. Furthermore, it investigates the relationship between the selected variables. Differences of gender, educational level, experience, and site of work are also examined with job security. Moreover, it evaluates the contribution of CSE, LEB, gender, educational level, experience, and site of work in predicting job security among Jordan University Hospital nurses. A descriptive cross-sectional design was adopte…

Self-AssessmentEconomicsHealth Care ProvidersEmotionsNursesSocial SciencesSociologyMedicine and Health SciencesPsychologyNational SecurityMedical PersonnelEmpowermentmedia_commonMultidisciplinaryQRHospitalsProfessionsIntensive Care UnitsScale (social sciences)MedicinePsychologyResearch ArticleEmploymentNational securityPolitical Sciencemedia_common.quotation_subjectSciencePsychological StressJobsEducationDiagnostic Self EvaluationNursingCore self-evaluationsIntensive careMental Health and PsychiatryEducational AttainmentBehaviorJordanDescriptive statisticsbusiness.industryBiology and Life SciencesEducational attainmentHealth CareJob securityLeadershipCross-Sectional StudiesHealth Care FacilitiesLabor EconomicsPeople and PlacesPopulation GroupingsbusinessPLoS ONE
researchProduct

Libre circulación de inversiones en la Unión Europea en tiempos de COVID-19

2020

Las inversiones extranjeras han fluido como nunca durante las últimas décadas, en el marco de una aceptación generalizada de sus beneficios. Esta situación, sin embargo, comienza a alterarse de forma acelerada en múltiples lugares del planeta. La presencia de un entorno geoestratégico más complejo y la aproximación crítica de muchos Estados hacia la globalización y lo que ella significa, está consolidando una visión más cautelosa hacia la libre circulación de inversiones extranjeras que, entre otros efectos, se plasma en la elaboración de normativas más restrictivas. La Unión Europea es un espacio económicamente integrado, muy abierto a las inversiones extranjeras y dotado además, de una po…

SiegeNational securityinversiones extranjerasbusiness.industryDret internacional privatseguridad nacionalInternational tradeForeign direct investmentcontrol de las inversiones extranjerasGlobalizationConsolidation (business)covid-19lcsh:K1-7720Political sciencelcsh:Law in general. Comparative and uniform law. Jurisprudencemedia_common.cataloged_instanceElement (criminal law)European unionunión europeabusinessCommon commercial policymedia_common
researchProduct

Introduction: Security, Criminal Justice and Human Rights in Countering Terrorism in the Post 9/11 Era

2012

In the aftermath of the 9/11 attacks on New York and Washington, many commentators claimed that the world had changed ‘forever’ with international terrorism constituting one of the defining global security challenges of the twenty-first century. The renewed focus on counter-terrorism law and policy also called into question whether the lessons drawn from previous terrorism emergencies are pertinent to the post-9/11 environment. Indeed, to what extent, if at all, are the principles identified for the liberal democratic response to traditional forms of terrorism applicable to a response to contemporary international terrorism? The historical, political and security implications of 9/11 notwit…

Theory of criminal justicePoliticsHuman rightsLawPolitical sciencemedia_common.quotation_subjectTerrorismPolitical violenceInternational securityDemocracyCriminal justicemedia_common
researchProduct

Information as a determinant of a decision system

2018

The purpose of the article is to describe the considerations of measuring information in the aspect of making decisions. In the last two decades an "informational revolution" has been made that opens the era of computer tools supporting decision-making processes (Internet, mobile telephony). This relatively new information environment includes information, users and systems that enable information processing. In the information environment, the value and quality of information should be taken into account. An important place in the consideration of information is the measurement of information in the aspect of decision-making.

decision-making processnational securityinformation processinginformation
researchProduct

Components of defence strategies in society’s information environment: a case study based on the grounded theory

2020

Objectives: The goal of this study is to explore the components of defence strategies faced by society in its information environment, and how these strategies are inter-related. Methods: This qualitative in-depth case study applied past research and empirical evidence to identify the components of defence strategies in a society’s information environment. The collected data were analysed using the Grounded Theory approach and a conceptual framework with the components of defence strategies and the relationships between these components being developed using the Grounded Theory. Results: This study shows that the goal of politically and militarily hostile actors is to weaken society’s infor…

defencekybersodankäyntiKnowledge managementlcsh:Military SciencesotilasstrategiaComputer sciencebusiness.industrylcsh:UInformation environmentGrounded theorypuolustuspolitiikkasocietyComponent (UML)componentinformaatiosodankäyntiMilitary securityInternational securityinformation environmentbusinessgrounded theorySecurity and Defence Quarterly
researchProduct