Showing 81 - 100 results of 109 for search '"international security"', query time: 0.08s Refine Results
  1. 81

    Locarno Treaties (1925) in the Context of the Versailles System Transformation as seen from London by E. V. Khakhalkina, V. S. Dzyuba

    Published 2021-04-01
    “…A systematic comparison of views of the Conservative and the Labour party representatives on the Geneva Protocol and the Rhineland Pact shows that by mid-1920s the British political elites advocated for an in-depth transformation of the Versailles order, particularly, through the development of an effective mechanism for maintaining international security. On that basis a broad political consensus had arisen, which led to the formation of a new two-party structure (Tory-Labour) after World War I.The study begins with an overview of the political situation in Europe and in Great Britain in the early 1920s. …”
    Get full text
    Article
  2. 82

    Armed aggression of the Russian Federation against Ukraine as a threat to the collective security system by A. V. Voitsikhovkyi, O. S. Bakumov

    Published 2023-03-01
    “…The purpose of the article is to clarify the essence of the collective security system, to analyze the activities of the most influential international security organizations (UN, NATO and OSCE) since the outbreak of the Russian-Ukrainian war and to assess their ability to end this war, to formulate problematic issues regarding the functioning of the existing collective security system, and to argue for the need to build a new collective security system with a definition of Ukraine's role and place in it. …”
    Get full text
    Article
  3. 83

    Legal regulation of national security in Ukraine: today’s challenges by Ye. V. Kobko

    Published 2022-06-01
    “…The standards defined in international treaties on human rights were further improved in international security acts developed under the auspices of the United Nations, the Council of Europe, the OSCE, the European Union, etc.…”
    Get full text
    Article
  4. 84

    Russian-Japanese Relations: Long-Term Development Factors by D. V. Streltsov

    Published 2020-07-01
    “…On the other hand, Japan and Russia are both interested interest in political cooperation in creating multilateral dialog mechanisms of international security in East Asia, resolving the nuclear issue on the Korean Peninsula, and easing tensions around territorial disputes in the East China and South China seas. …”
    Get full text
    Article
  5. 85

    The first Lithuanian Archaeological expedition in Afghanistan by Aleksiejus Luchtanas, Ramunė Butrimaitė

    Published 2008-08-01
    “…With the creation of the International Security Assistance Force (ISAF) in Afghanistan and the establishment of the provincial reconstruction team in Ghor province, conducted by Lithuania, civilian projects related to culture, education, and health services are being carried on. …”
    Get full text
    Article
  6. 86

    Venezuela: Political Confrontation and the World Community by Z. W. Iwanowski, D. M. Rozental

    Published 2020-11-01
    “…The inability or unwillingness of external forces to reach compromise and to bring the parties to the negotiating table can pose a threat to peace and international security.As a result, Venezuela has become one of the most turbulent countries in the region. …”
    Get full text
    Article
  7. 87

    Global Governance of Biogenic Threats by M. M. Lebedeva, D. A. Kuznetsov

    Published 2021-04-01
    “…The SARS-CoV-2 virus, which caused a pandemic in 2020, has posed not only a medical, economic and social threat, but also a challenge to international security and international cooperation. It is now becoming obvious that the problem of the current pandemic cannot be reduced to individual states and regions and has the potential to influence the entire political organization of the modern world. …”
    Get full text
    Article
  8. 88

    Evolution entropy risk assessment of ERP information security based on the business process by Biao SONG, Jian-ming ZHU

    Published 2012-09-01
    “…ERP internal security holes often bind with business process closely,make the value of information assets has dynamic properties and difficult to determined,so such security will not be prompt capture and evaluation.Compored the difference of ERP system and other information system in the information security,the risk assessment model which adapt to the characteristics of ERP system was proposed,and gave a new idea for the ERP system information safety risk assessment.…”
    Get full text
    Article
  9. 89

    Current situation and development trend of data network by Lintao JIANG

    Published 2019-08-01
    “…The technological innovation of network is the basis and enabling condition of new application and business innovation.The industrial internet,5G and the ICT infrastructure had put forward new requirements and challenges to the data network,including deterministic transmission,differentiated access services,ubiquitous mobile support,the credible internal security,and autonomous operation and maintenance.The existing problems of data network were analyzed,the research ideas of data network generation were pointed out,some key technologies of network 5.0 were put forward,and the problems involved in the construction of network innovation platform was dicussed.…”
    Get full text
    Article
  10. 90
  11. 91

    Network security situational awareness model based on threat intelligence by Hongbin ZHANG, Yan YIN, Dongmei ZHAO, Bin LIU

    Published 2021-06-01
    “…In order to deal with the problems that the increasing scale of the network in the real environment leads to the continuous high incidence of network attacks, the threat intelligence was applied to situational awareness, and the situational awareness model based on random game was constructed.Threat perception of the target system was performed by comparing the similarity between the exogenous threat intelligence and the internal security events of the system.At the same time, internal threat intelligence was generated based on the threat information inside the system.In this process, game theory was used to quantify the current network security situation of the system, evaluate the security status of the network.Finally, the prediction of the network security situation was realized.The experimental results show that the network security situation awareness method based on threat intelligence can reflect the changes in the network security situation and predict attack behaviors accurately.…”
    Get full text
    Article
  12. 92

    The status of the Prime Minister in the sphere of security by Mirosław Karpiuk, Marek Klimek

    Published 2024-12-01
    “…Objectives The purpose of this article is to analyse legal regulations defining the status of the Prime Minister in the sphere of both internal security and external security of the state, and also to characterise and systematise the Chairperson’s tasks and competences which concern preventing and combating threats, as well as mitigating their consequences. …”
    Get full text
    Article
  13. 93

    The Small Wars Doctrine of the US Marine Corps and Colonial Experience of the European Powers by S. G. Malkin

    Published 2023-12-01
    “…The findings broaden the understanding of the modern leading powers’ approaches to internal security models transfer, as well as of its limits.…”
    Get full text
    Article
  14. 94

    MILITARY INTERVENTIONSAND THE NIGERIA FOURTH REPUBLIC: A REFLECTION DISCOURSE by Stella Ughulu Eghoikhunu, Ihaza Kayode

    Published 2023-08-01
    “…The study recommends that there should be a conscious effort on the part of leaders of the nation to improve the socio-economic development of the country and more funding and training of the agencies/forces responsible for internal security. …”
    Get full text
    Article
  15. 95

    Counterterrorism in the Southern American Cone by Tadeu Morato Maciel, Vinícius Armele, Mariana da Gama Janot, Karime Ahmad Borraschi Cheaito

    Published 2024-12-01
    “…We conclude that the exercise of counterterrorism in these nations is driven by a confluence of internal security imperatives, financial considerations, and broader global security concerns. …”
    Get full text
    Article
  16. 96

    Healthcare assessment tools—a valid source of data for pre-hospital care? Usability for ensuring medical care in the event of a disaster by Robert Konrad, Robert Konrad, Denise Schuster, HJ Heppner, HJ Heppner

    Published 2025-02-01
    “…Currently, only the German Armed Forces (Bundeswehr) offer an internally secured infrastructure that allows all those involved in the care of soldiers to access all important medical data quickly and easily from any location.…”
    Get full text
    Article
  17. 97

    Opportunities to use the EU countries experience in the field of preventive police activities in Ukraine by O. Yu. Prokopenko, D. O. Bulatin, R. O. Kushnirenko

    Published 2021-12-01
    “…Focusing on the European experience of preventive activity, the author emphasizes that there are three models of internal security in the European Union, and then reveals the content of each model. …”
    Get full text
    Article
  18. 98

    POVERTY AND NATIONAL SECURITY: AN OVERVIEW OF NIGERIA’S FOURTH REPUBLIC by ADAMU MOHAMMED

    Published 2024-07-01
    “… Nigeria is now facing significant internal security difficulties, such as the Niger Delta militancy in the South-South geopolitical zone that includes Bayelsa and Rivers, and the Boko Haram insurgency in the northeastern regions of Borno, Yobe, and Adamawa. …”
    Get full text
    Article
  19. 99

    NATIONAL SECURITY AND BORDER MANAGEMENT IN WEST AFRICA: A STUDY OF NIGERIA-NIGER RELATIONS by IYANU-OLUWA AYOBAMI AYODELE, UMARU TOYIN SHIRU

    Published 2024-07-01
    “…This paper seeks to outline the benefit of a good national security and adequate management strategy to the internal security of states. National security challenges in West African countries partly stem from ineffective border management strategies. …”
    Get full text
    Article
  20. 100

    Refugee securitization and the challenges of formal integration: case of Somali refugees in Kenya and Ethiopia by Fred N. Ikanda, Abdirahman A. Muhumad, Jana Kuhnt

    Published 2025-01-01
    “…Policymakers and the media prominently feature the migration-security connection and depict refugees as threats to internal security, linking their presence to acts of terrorism and crime. …”
    Get full text
    Article