Search

Search Constraints

Begin New Search You searched for: Topic Security Remove constraint Topic: Security Content Type Journal Article Remove constraint Content Type: Journal Article

Search Results

401. Nuclear Weapons with 21st Century Technology: A Conversation with John Borrie

402. Resilient Power: A New Model for Grid Security

403. Counter Terrorist Trends and Analyses (CTTA) – Volume 11 Issue 07: Southeast Asia’s Evolving and Resilient Militant Landscape

404. Counter Terrorist Trends and Analyses (CTTA) – Volume 11 Issue 06: June Issue

405. Counter Terrorist Trends and Analyses (CTTA) – Volume 11 Issue 02: Geographically Diverse, Organisationally Complex and Gender Inclusive Islamist Terrorist Landscape

406. Differences between Third World Security Approaches and Postcolonial Security Approaches: State, Culture and Modernity

407. Rethinking International Security: Feminist Critiques in International Relations

408. The Indo-Pak Rivalry and the Kashmir Issue: A Historical Analysis in the Security Context of the South Asia

409. Asian Space Race is Rhetoric or Reality: Implication for South Asia

410. Underlying Implicating factors of U.S. War on Terror and its Unintended Consequences for Pakistan

411. Back to the Russia-U.S.-China “Triangle”?

412. Strategic Stability in the Early 21st Century

413. Journal of Advanced Military Studies: Great Power Competition

414. Three boards: security, economy and the new unknown. The complicated relationship between China and Central and Eastern Europe

415. Regionalism and Security: The Case of Mercosur and the Absence of Defense Issues

416. Manufacturers and Security Providers: A Conceptual Essay

417. Africa and the Threats to Its Security

418. Disengaging from Violent Extremism

419. Regional security cooperation in Africa: An evaluation of the Regional Cooperation Initiative for the Elimination of the Lord’s Resistance Army

420. Boko Haram insurgency in Nigeria

421. State Fragility and Conflict Nexus

422. Biopolitics and Necropolitics on the Northern Border / La biopolítica y la necropolítica en la seguridad ciudadana de Tijuana

423. Drug Trafficking between Latin America and Africa: A contemporary Case between Security and Global Governance / Narcotráfico entre América Latina y África: un caso contemporáneo entre seguridad y gobernanza global

424. The Strategic Price of Neglect

425. Security Challenges of the New Colombian Administration

426. Taking Responsibility in a Dangerous World

427. Pathologies of Centralized State-Building

428. The Digital Maginot Line: Autonomous Warfare and Strategic Incoherence

429. The Domestic Politics of Nuclear Choices

430. Buying Allies: Payment Practices in Multilateral Military Coalition-Building

431. Poland’s Energy Security Strategy

432. The Role of the Arctic in Chinese Naval Strategy

433. China’s 2020 Economic Agenda: Maintaining Stability Amid Flux

434. The North Korean Factor in the Sino-Russian Alliance

435. Sino-Russian Relations, South Korea, and North Korea

436. The China-Russia-North Korea Triangle After Kim Jong-un's Turn to Diplomacy

437. Citizenship Deprivation under the European Convention-System

438. The Influence of strategic culture on shaping security policy

439. The impact of crime on security in tourism

440. China and its wests – evolution of security dynamics and its consequences for the defence industries of the involved actors

441. Sanitary aviation in post-war Poland – historical outline

442. Social structure determinants of Polish military manpower

443. Modern aspects of the development of security in air transport under the conditions of air terrorism

444. Russia's return to the superpower status

445. Recent U.S. and International Assessment of Baltic Security Developments

446. Combating destabilising forces in modern operations. Research report

447. Lithuania in European Union common security and defence policy context

448. European Union common security and defence policy and Latvian involvement in EU battlegroups

449. Concerns on the issue of defence expenditure in the post-crisis Greece

450. Preparing for future security challenges with practitioner research

451. The royal military college of Canada: Responding to the call for change

452. Non-military determinants of the Russian Federation policy

453. Hybridity – a ‘new’ method to accomplish dominance

454. Preparation of Polish police officers for peace missions

455. “Autonomisation” of security and defence systems

456. Winter 2018 edition of Contemporary Eurasia

457. Winter 2019 issue of Contemporary Eurasia

458. Security Dilemma in South Asian Context

459. Prospects of Internationalizing Nuclear Security: An Appraisal

460. Intervention fever: The politics of Turkey’s Operation Olive Branch

461. Climate Change: Conflict and Cooperation (Full Issue)

462. Implications of Climate Change for Security in Sub-Saharan Africa: Increased Conflict and Fragmentation

463. The Thirty Years Climate Warning: Climate Change, Security, and the Responsibility to Prepare

464. Russian Diplomacy: Challenging the West

465. La crítica neoconservadora a la política exterior de Donald Trump

466. The Role of Trauma in Romania’s Ontological Security

467. Threat Multiplier: The Growing Security Implications of Climate Change: A Conversation with Sherri Goodman

468. From Energy to Climate Security: The EU’s Evolving Views

469. In a World of War, Could it Be ‘From Russia with Love’: A Conversation with Igor Istomin

470. Building Trust and Confidence in International Security: A Conversation with OSCE Secretary General Thomas Greminger

471. The Future of Strategic Intelligence

472. Historical Trajectory of the U.S.-Russia Relationship: Perception and Misperception: A Conversation with Professor Tatiana Shakleina

473. Looking Inward to Improve National Security: A Conversation with Former Congressman Christopher Gibson

474. The Ghost: The Secret Life of CIA Spymaster James Jesus Angleton by Jefferson Morley

475. Energy Security in Armenia and the South Caucasus

476. Energy and Security in Mexico: The Real Winners of a Drug War

477. U.S.-Russia Relations: Energy Security & Beyond: A Conversation with Dr. Celeste Wallander

478. Human Trafficking and Climate Change: Understanding the Disastrous Relationship

479. Outlook: Chechnya and Terrorism, Putin and Kadyrov: A Conversation with Julie Wilhelmsen

480. Understanding Myanmar: History and Current Perspectives: A Conversation with Derek Mitchell

481. Intersectionality of Conflict in Africa The African Union’s Conflict Prevention and Early Warning Division (CPEWD) Mechanism

482. Identity and Conflict, Permanent Deconfliction or Eventual Reset? A Conversation with U.S. Army Colonel Robert E. Hamilton

483. Where Are We Now? Important U.S.-Russia Geo-Strategic Flashpoints: A Conversation with Dr. Evelyn N. Farkas

484. Counter Terrorist Trends and Analyses (CTTA) – Volume 10, Issue 03: Emergence of Post-‘Islamic State’ (IS) Threat Environment

485. Navy Classification: Proposal for a Comparative Methodology

486. Military Expenditures and the Armed Forces Actions in South America: An Appreciation About the Regional Defense Convergence

487. Regional Cooperation in Public Security: Assessment of UNASUR's Normative Framework

488. Armament Modernization in South America: Empirical and Theoretical Pressures on the Dualistic Views of Regional Security

489. Peace Missions and Civil-Military Relations: Reflections on the Brazilian Case

490. Subnational Experiences in the Defense Industry Promotion Policies: The Case of Rio Grande Do Sul

491. Pakistan’s Search for Security through Reliable Balance of Power and Nuclear Weapons

492. Rise of Extremism and Growing Threats of Transnational Terrorism

493. Journal of Advanced Military Studies: Superpowers

494. Round Table I – Regional Security

495. Change of the Security Environment in the Transatlantic Region and its Impact on the Evolution of Foreign and Security Policy of the State

496. Round Table I – Regional Security

497. Crime, citizenship and race: Latin American dilemmas in security doctrine

498. Japan’s new assertiveness: institutional change and Japan’s securitization of China

499. Detecting patterns in North Korean military provocations: what machine-learning tells us

500. Britain’s Post-Colonial Foreign Policy Towards the Persian Gulf Security (1971-1991): An Alternative Approach