Search

Search Constraints

Begin New Search You searched for: Topic Security Remove constraint Topic: Security Content Type Journal Article Remove constraint Content Type: Journal Article Publication Year within 10 Years Remove constraint Publication Year: within 10 Years

Search Results

301. The rules and organisation of air traffic at airstrips during military operations: Based on experience gained on missions in Chad and Afghanistan

302. Compulsory military service as a social integrator

303. The future of energy security of states

304. What Allies Want: Reconsidering Loyalty, Reliability, and Alliance Interdependence

305. Counterterrorism and Preventive Repression: China’s Changing Strategy in Xinjiang

306. Coronavirus and the Future of Globalization

307. Turkish AK Parti’s Posture towards the 2003 War in Iraq The Impact of Religion amid Security Concerns

308. Nigeria and the Great Powers: The Impacts of

309. The Impossibility of a Defence Policy in the Americas? Comparing Hemispheric and South American Security Concepts and Military Roles

310. The Securitization of the Tri-Border Area between Argentina, Brazil and Paraguay

311. The Relation Among Regional Organisations, the Consolidation of Democracy and Citizen Security: The Cases of SICA and UNASUR

312. Joint U.S.-Korea Academic Studies 2020

313. China’s Economic Rise amid Renewed Great Power Competition, America’s Strategic Choices

314. China’s Role in India’s Hindu Nationalist Discourse

315. Ideas and Interests: European Democracy Aid and the Democracy-Security Dilemma, 1990-2010

316. Toxic Institutions in Security Sector Reform: Lesson Learned From the Failure of Building Security Institutions in East Timor

317. Maritime Insecurity in Sub-Saharan Africa and its Effects in the Economy of States

318. The American News Media’s Volatile Perspectives on China

319. Silencing the Guns Requires a Multi-Pronged Approach

320. The African Union, regional economic communities and regional mechanisms and United Nations: Leveraging the Triangular Partnership to Silence the Guns in Africa

321. How a Strong African Union–United Nations Partnership can Sustain the Silencing the Guns Agenda Beyond 2020

322. Migrations and Security. The Problematic Circularity ‘Philosophy, Law and Politics’

323. Migration and Asylum Policies in the European Union and its Application Problems in the Member States / Las políticas de migración y asilo en la Unión Europea y sus problemas de aplicación en los Estados miembros

324. COVID-19: The Pandemic and its Impact on Security Policy

325. No Such Thing as a Perfect Partner: The Challenges of “By, With, and Through”

326. Elite Incentives and Power Dynamics in Fragile States

327. The Essence of the Strategic Competition with China

328. Quantum Computing’s Cyber-Threat to National Security

329. Caught in the Crossfire: Challenges to Migrant Protection in the Yemeni and Libyan Conflicts

330. World Oil Security on a Precipice

331. It is Time to Establish a Middle East Regional Security System

332. Re-Engineering Regional Security

333. Is the “show-the-flag” strategy relevant for Visegrad countries in securing the EU?

334. Challenges for Security and Defence Cooperation in Central Europe: Will the EU be able to manage the crisis in the EU periphery?

335. Central Europe in the new Millennium: The new Great Game?

336. Will Informal Institutions Replace Formal Institutions? The Primacy of Church and “Uma Lisan” in Fostering Community Security in Timor Leste

337. Mainstreaming Realism Paradigm in Handling Illegal Immigrants in Malaysia

338. The two Koreas´ Relations with China: Vision and Challenge

339. Changing Roles of the EU and ASEAN on Peace in the Korean Peninsula

340. Directions of Poland’s Energy Security Policy in the Natural Gas Sector

341. Uzbekistan: A State Undergoing Total Reconstruction

342. Space Defense in Europe. Policy and Security Aspects

343. Changes in the Electoral Code and Their Impact on the Security of the Election The Origin for Discussion Based on Selected Comments

344. Indian and Australian Maritime Security Doctrines in the Indian Ocean Region in the 21st Century. Christian Bueger’s Matrix of Maritime Security Approach

345. The Strategic Implications of Chinese-Iranian-Russian Naval Drills in the Indian Ocean

346. Beijing Piles More Pressure on Taiwan after a Historic Victory by Tsai Ing-Wen

347. New Wine Into New Wineskins: The Evolving Role of the PLA Navy Marine Corps in Amphibious Warfare and Other Mission Areas

348. Entre políticos y criminales: corrupción política en Colombia 2013-2018 (Between Politicians and Criminals: Political Corruption in Colombia 2013-2018)

349. Inteligencia para la Seguridad Pública en las Entidades Federativas de México (Intelligence for Public Security in Mexican States)

350. Pacifying Police Units and private interests in Brazil

351. El islam en Rusia: desafíos a la seguridad y respuestas estratégicas (Islam in Russia: Security Challenges and Strategic Responses)

352. La brecha de ciberseguridad en América Latina frente al contexto global de ciberamenazas (The Cyber Security Gap in Latin America Against the Global Context of Cyber Threats)

353. String of Pearls: Politics of Ports in Indian Ocean

354. Indo- US Strategic Objectives in Afghanistan: Security Calculus of Pakistan

355. War on Terror: Repercussions for Pakistan

356. BRI & CPEC: Strategic & Economic Depth for Pakistan

357. Georgia’s Road to NATO: Everything but Membership?

358. The Kaliningrad Region – Key to Security in East-Central Europe

359. Shaking the Foundation: the Trump Administration and NATO’s East

360. Remarks on Regional Security

361. Turkey and East Central Europe: idealism, pragmatism, misperception or clash of interests?

362. The Balkan Front in the New Cold War

363. Nord Stream 2 Current State of the Project and its implications for European Energy Security

364. Devolution of Informality: Legacies of State-Engineered Hybridity in Libya

365. Critical infrastructure in the shaping of national security

366. An easy target? Types of attack on oil tankers by state actors

367. Components of defence strategies in society’s information environment: a case study based on the grounded theory

368. Near-Earth Objects (NEO) and other current space threats

369. Overcoming US-North Korean Enmity: Lessons from an Eclectic IR Approach

370. Unintended Consequences of EU Democracy Support in the European Neighbourhood

371. “Indigenous Communities are at the Heart of Canada’s North”: Media Misperceptions of the Canadian Rangers, Indigenous Service, and Arctic Securit

372. High expectations. Interregional agendas on global security challenges: East Asia, Europe and Latin America

373. Post-Hegemonic (Dis)order and Regional Balancing Strategies in the Middle East

374. Of Marauders and Brigands: Scoping the Threat of Rural Banditry in Nigeria’s North West

375. Vigilante Groups and Policing in a Democratizing NigeriA: Navigating the Context and Issues

376. Political Breakdown in South Sudan: United Nations and a New Challenge to Human Security (2014 - 2018)

377. Situation and Trends of Terrorist Acts Within the European Union

378. A State Visit by Kazakhstan’s President Demonstrates China’s Increasing Influence in Central Asia

379. China’s Future Naval Base in Cambodia and the Implications for India

380. The Prospects for Sino-Indian Relations During Modi’s Second Term

381. Nuclear Terrorism: Hype, Risks and Reality-A Case of Pakistan

382. Indian Strategic Influence in Afghanistan: Realist Ends through Social Means

383. Emergence of Sectarian Indigenous Militant Groups in Pakistan and Politicization of Militant Thought

384. The Contours of New Regional Alignments in South Asia

385. Reevaluation of U.S. Security Policy towards South Asia

386. The Rwandan Genocide Revisited

387. U.S. Security Coordination and the “Global War on Terror”

388. Special Document File: The Erasure of the Nakba in Israel's Archives

389. Power, Politics, and Community: Resistance Dynamics in the Occupied Golan

390. The Rise of Russia’s Hi-Tech Military

391. Challenges Technologies Pose to U.S.-Russia Arms Control: A Conversation with Dr. Heather Williams

392. The Intelligence Cycle of Targeted Killing in the United States

393. Sino-Indian Nuclear Dynamics: Taking the Global Lead

394. Re-thinking Biological Arms Control for the 21st Century

395. Technology and Tensions in the Global Commons

396. The Need for Countries to Establish Robust and Transparent Vulnerabilities Equities Processes

397. How Much Does a “Privacy” Weigh?

398. Learning from Russia’s Influence Campaigns in Eastern Europe: A Conversation with Nina Jankowicz

399. The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David Sanger

400. A Healthier Way for the Security Community to Partner with Tech Companies