To see the other types of publications on this topic, follow the link: Dept of Defence.

Journal articles on the topic 'Dept of Defence'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Dept of Defence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

HIROSE, Takeichiryo. "The two-dimensional smoke wind tunnel of the Dept. of Aeronautical Engineering of the National Defence Academy." Journal of the Japan Society for Aeronautical and Space Sciences 36, no. 409 (1988): 100–102. http://dx.doi.org/10.2322/jjsass1969.36.100.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lapidoth, Ruth. "War, Aggression and Self-Defence. By Yoram Dinstein. [Grotius Publications, Sales Dept., P.O. Box 115, Cambridge CB3 9BP, United Kingdom, 1988, xxx + 292 pp., hardbound]." Israel Law Review 23, no. 4 (1989): 557–59. http://dx.doi.org/10.1017/s0021223700009687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jander, Kai, Lars Braubach, and Alexander Pokahr. "Practical Defense-in-depth Solution for Microservice Systems." Journal of Ubiquitous Systems and Pervasive Networks 11, no. 1 (May 1, 2019): 17–25. http://dx.doi.org/10.5383/juspn.11.01.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shasha, Dennis E. "Defense in Depth." Scientific American 286, no. 5 (May 2002): 101. http://dx.doi.org/10.1038/scientificamerican0502-101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Langerman, Neal. "Defense in Depth." Journal of Chemical Health and Safety 21, no. 1 (January 2014): 43–45. http://dx.doi.org/10.1016/j.jchas.2013.12.004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Günlük-Senesen, Gülay. "on Deficits, Debt and Defence." Defence and Peace Economics 15, no. 2 (April 2004): 1–2. http://dx.doi.org/10.1080/714866784.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dudzevičiūtė, Gitana, Vida Česnuitytė, and Dalia Prakapienė. "Defence Expenditure–Government Debt Nexus in the Context of Sustainability in Selected Small European Union Countries." Sustainability 13, no. 12 (June 11, 2021): 6669. http://dx.doi.org/10.3390/su13126669.

Full text
Abstract:
This paper explores the relationship between defence expenditure and government debt in small European Union countries that are members of NATO, such as Luxembourg, Lithuania, Latvia, Estonia, DRenmark, Slovakia, and Slovenia. The investigation used Eurostat data in relation to gross government debt, as well as NATO information regarding defence expenditure as a share of GDP and its distribution by main category for the period between 2005 and 2019. The authors applied descriptive statistics and methods of multivariate statistics: Spearman’s correlation, the ANOVA test, and Life tables. Taking into consideration the tendencies of variables in all examined countries, the results show that the share of defence expenditure in GDP correlates statistically significantly and negatively with government gross debt. Latvia, Slovakia, and Slovenia revealed statistically significant relationships between variables, while Luxembourg, Denmark and Lithuania insignificant. In Estonia, the relationship between variables is strong and positive. Additionally, the investigation shows that, whether for increasing defence expenditure or for stable or decreasing defence expenditure, the trajectories of government debt have no clear interrelation in explored countries. Therefore, the cause of government debt by means of defence expenditure alone can only be partially explained. The insights that were drawn from this study could be applied to government finance management processes, as well as to ensure both national security and the achievement of the Sustainable Development Goals 2030.
APA, Harvard, Vancouver, ISO, and other styles
8

Wu, Guangwei. "ICONE19-43249 PRINCIPLES OF DEFENSE-IN-DEPTH PHILOSOPHY APPLIED IN NPP ENGINEERING MANAGEMENT." Proceedings of the International Conference on Nuclear Engineering (ICONE) 2011.19 (2011): _ICONE1943. http://dx.doi.org/10.1299/jsmeicone.2011.19._icone1943_105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ranger, Robin. "3. Implications of Missile Defence for Europe: Academic Overview: Past and Present Imperatives for Defences in Depth." Whitehall Papers 55, no. 1 (January 2002): 34–44. http://dx.doi.org/10.1080/02681300209414870.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Anderson, David, Angela Leadbetter, and Bernie Williams. "In defence of the depot clinic." Psychiatric Bulletin 13, no. 4 (April 1989): 177–79. http://dx.doi.org/10.1192/pb.13.4.177.

Full text
Abstract:
The depot clinic has long been part of the traditional British psychiatric service. With moves towards care in the community many of the traditional, particularly hospital based, methods of service delivery are becoming unfashionable. The depot clinic has been criticised (Beveridge, 1987) for being out of date, not geared to the needs of the patient, inaccessible and unable to provide personalised care, especially regarding the family factors recognised to be important in the management of chronic psychosis, and is portrayed as a facility designed for the convenience of the staff not the patient. This has led to suggestions for alternative methods of administering treatment to these patients, e.g. at home, from GP, health centre based.
APA, Harvard, Vancouver, ISO, and other styles
11

Hunter, Philip. "Defence in depth — protecting the queen." Network Security 2003, no. 6 (June 2003): 17–18. http://dx.doi.org/10.1016/s1353-4858(03)00612-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Mansfield-Devine, Steve. "The death of defence in depth." Computer Fraud & Security 2016, no. 6 (June 2016): 16–20. http://dx.doi.org/10.1016/s1361-3723(15)30048-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

MILLER, NASEEM S. "IoM: Defense Dept. Should Update Substance Use Guidelines." Family Practice News 42, no. 16 (October 2012): 9. http://dx.doi.org/10.1016/s0300-7073(12)70658-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Steinberg, Jonathan. "Defense, debt, dollars and deficits." Defense Analysis 1, no. 1 (March 1985): 72–74. http://dx.doi.org/10.1080/07430178508405186.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

KARAGOL †, ERDAL. "Defence expenditures and external debt in Turkey." Defence and Peace Economics 16, no. 2 (January 2005): 117–25. http://dx.doi.org/10.1080/10242690500070045.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Günlük-Senesen, Gülay. "Special Issue on Deficits, Debt and Defence." Defence and Peace Economics 15, no. 2 (April 2004): 109–10. http://dx.doi.org/10.1080/10242694.2004.10055144.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jelliffe, D. B., and E. F. P. Jelliffe. "Breastfeeding and Immunity: Adaptable Defence in Depth." Journal of Tropical Pediatrics 31, no. 2 (April 1, 1985): 66–67. http://dx.doi.org/10.1093/tropej/31.2.66.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

O'Sullivan, Janet. "In Defence of Foakes v. Beer." Cambridge Law Journal 55, no. 2 (July 1996): 219–28. http://dx.doi.org/10.1017/s0008197300098135.

Full text
Abstract:
This paper aims to defend what many academic commentators regard as indefensible—the rule in Foakes v. Beer.For almost four hundred years (since Pinnel's Case) English law has been clear: the payment of, or promise to pay, a smaller sum than the amount due does not discharge the debt, since the debtor provides no considerationfor the creditor's promise to waive the balance—there is no “accord and satisfaction”. The House of Lords approved this rule, albeit reluctantly on the part of Lord Blackburn, in Foakes v. Beer.
APA, Harvard, Vancouver, ISO, and other styles
19

Cleghorn, Lance. "Network Defense Methodology: A Comparison of Defense in Depth and Defense in Breadth." Journal of Information Security 04, no. 03 (2013): 144–49. http://dx.doi.org/10.4236/jis.2013.43017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

González-Ruibal, Alfredo. "In praise of depth." Archaeological Dialogues 18, no. 2 (October 26, 2011): 164–68. http://dx.doi.org/10.1017/s1380203811000213.

Full text
Abstract:
I am totally for the archaeology in and of the present that Rodney Harrison defends in his powerful text. In fact, I have defended a similar idea elsewhere, although in a rather less eloquent and straightforward way. I have suggested that we could transform ethnoarchaeology, an archaeological subdiscipline that already deals with the present, into a true ‘archaeology of the present . . . that . . . deals with people that are alive and things that are in full use, and which accepts that all presents are entangled with a diversity of pasts in a percolating time’ (González-Ruibal 2006a, 112). With the author, I think that archaeological engagements should not be reduced to the past – understood as something remote and finished: archaeology can be a very creative way of dealing with the present, and even of transforming it. I also coincide with Harrison in considering that the archaeology of the contemporary past is less harassed than we tend to think and that we should be less anxious in defending ourselves against possible attackers and focusing more on creating exciting work.
APA, Harvard, Vancouver, ISO, and other styles
21

Kemp, Mike, and Michael Kemp. "Beyond trust: security policies and defence-in-depth." Network Security 2005, no. 8 (August 2005): 14–16. http://dx.doi.org/10.1016/s1353-4858(05)70271-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Byrne, Paul. "Application firewalls in a defence-in-depth design." Network Security 2006, no. 9 (September 2006): 9–11. http://dx.doi.org/10.1016/s1353-4858(06)70422-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Svendsen, Adam D. M. "Advancing “Defence-in-depth”: intelligence and systems dynamics." Defense & Security Analysis 31, no. 1 (January 2, 2015): 58–73. http://dx.doi.org/10.1080/14751798.2014.995337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Colom-Piella, Guillem. "A New Debt Burden for Spain’s Defence Planning." RUSI Journal 164, no. 7 (November 10, 2019): 32–41. http://dx.doi.org/10.1080/03071847.2019.1700685.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Wolde‐Rufael, Yemane. "THE DEFENCE SPENDING–EXTERNAL DEBT NEXUS IN ETHIOPIA." Defence and Peace Economics 20, no. 5 (October 2009): 423–36. http://dx.doi.org/10.1080/03066150902868171.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Nelson, Linden. "In defense of nuclear depth psychology." American Psychologist 43, no. 4 (April 1988): 321–22. http://dx.doi.org/10.1037/0003-066x.43.4.321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Cohen, Frederick B. "Defense-in-depth against computer viruses." Computers & Security 11, no. 6 (October 1992): 563–79. http://dx.doi.org/10.1016/0167-4048(92)90192-t.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Tuckett, Christopher M. "In Defence of R. H. Lightfoot." New Testament Studies 67, no. 3 (June 3, 2021): 454–73. http://dx.doi.org/10.1017/s0028688521000035.

Full text
Abstract:
A recent NTS article by B. Massey gives a highly critical appraisal of the work of R. H. Lightfoot, questioning Lightfoot's academic integrity and claiming that he borrowed much of his work from others without proper attribution. A study of Lightfoot's writings suggests however that Lightfoot did clearly acknowledge his debt to others and that he did not try to claim the ideas of others as his own. Further, his standing within English-speaking scholarship, as one who publicised the work of German form critics and who anticipated in a significant way the work of later redaction criticism, can remain intact and his work is still valuable today.
APA, Harvard, Vancouver, ISO, and other styles
29

Oh, Byung-Seob, and Dong-Hoon Kim. "An Exploratory Study on the Application of Relationship Marketing in the Defence Agency - Focused on In-depth Interviews of Defense Agents -." Journal of the Korean Association of Defense Industry Studies 27, no. 1 (June 30, 2020): 1–13. http://dx.doi.org/10.52798/kadis.2020.27.1.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Berndt, Antje, Hanno Lustig, and Şevin Yeltekin. "How Does The US Government Finance Fiscal Shocks?" American Economic Journal: Macroeconomics 4, no. 1 (January 1, 2012): 69–104. http://dx.doi.org/10.1257/mac.4.1.69.

Full text
Abstract:
We develop a method for identifying and quantifying the fiscal channels that help finance government spending shocks. We define fiscal shocks as surprises in defense spending and show that they are more precisely identified when defense stock data are used in addition to aggregate macroeconomic data. Our results show that in the postwar period, about 9 percent of the US government's unanticipated spending needs were financed by a reduction in the market value of debt and more than 70 percent by an increase in primary surpluses. Additionally, we find that long-term debt is more effective at absorbing fiscal risk than short-term debt. (JEL E62, H56, and H63)
APA, Harvard, Vancouver, ISO, and other styles
31

Emery, Carl. "The Vires Defence—“Ultra Vires” as a Defence to Criminal or Civil Proceedings." Cambridge Law Journal 51, no. 2 (July 1992): 308–48. http://dx.doi.org/10.1017/s0008197300095581.

Full text
Abstract:
Defendants to criminal or civil proceedings will often seek to escape liability by showing that a public authority has acted ultra vires. For example, a person prosecuted for infringing a byelaw or breaking a licence condition may seek to advance the defence that the byelaw or condition is ultra vires the public authority which made or imposed it. Again, a person sued in debt by a public authority may seek to raise the defence that no money is due because the authority acted ultra vires in imposing the charge which it is now suing to recover. Nowadays, too, the European Court of Justice may hold in effect that an Act of Parliament is contrary to Community law and so should not be applied by UK courts. A person prosecuted, say in a magistrates' court, for a criminal offence created by a statute which is or may be contrary to Community law may seek to persuade the justices to “disapply” the statute—virtually, in the case of a post-Accession statute, to treat it as ultra vires the UK Parliament—and so to acquit him.
APA, Harvard, Vancouver, ISO, and other styles
32

Smith, Ron P. "Debt, Deficits and Defence: The UK Experience 1700-2016." Defence and Peace Economics 31, no. 4 (January 5, 2020): 414–22. http://dx.doi.org/10.1080/10242694.2019.1710996.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Smith, Richard E. "Sidewinder: Defense in depth using type enforcement." International Journal of Network Management 5, no. 4 (July 1995): 219–29. http://dx.doi.org/10.1002/nem.4560050411.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Schwartau, Winn. "“Defense in depth” for information systems survival." International Journal of Intelligence and CounterIntelligence 8, no. 2 (June 1995): 229–34. http://dx.doi.org/10.1080/08850609508435280.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Stytz, M. R. "Considering defense in depth for software applications." IEEE Security & Privacy Magazine 2, no. 1 (January 2004): 72–75. http://dx.doi.org/10.1109/msecp.2004.1264860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Villarón-Peramato, Oscar, Isabel-María García-Sánchez, and Jennifer Martínez-Ferrero. "Capital structure as a control mechanism of a CSR entrenchment strategy." European Business Review 30, no. 3 (May 14, 2018): 340–71. http://dx.doi.org/10.1108/ebr-03-2017-0056.

Full text
Abstract:
PurposeThis paper aims to analyse the use of level of debt as an external control mechanism against an entrenchment strategy based on corporate social responsibility (CSR) practices.Design/methodology/approachThe authors use a database of 1,916 international companies for the years 2002 to 2010.FindingsThe evidence obtained confirms in a context of asymmetric information, bounded rationality and divergent interests, the use of debt as a control mechanism of managers’ discretionary comportment. In other words, CSR practices can be used by managers as an entrenchment strategy and self-defence with the aim of decreasing the possibility of being identified by those shareholders and stakeholders whose interests have been damaged. In this context, the market demands higher debt levels to solve agency frictions, playing an active role in monitoring the management. Moreover, the demand of higher debt as a control mechanism that minimises the expropriation risk by managers through CSR is lower in contexts of greater investor protection.Originality/valueThe findings reveal that CSR engagement can be explained by the hypothesis of being a strategy of entrenchment and self-defence. Overall, this study differs from previous literature in this field by taking an alternative approach to CSR practices, in contrast to the conventional wisdom of the benefits of CSR practices. The authors contribute by empirically testing the theoretical model proposed by Cespa and Cestone (2007) who suggest the discretionary use of CSR from an agency perspective. They also give empirical relief showing the use of CSR as an entrenchment strategy. Moreover, they demonstrate that the capital market of debt decreases in a context with a greater degree of investor protection, likewise under CSR promoted as an entrenchment tool, the demand for debt as a disciplinary mechanism is less necessary to control managers. In addition, the study is enriched by the database analysis.
APA, Harvard, Vancouver, ISO, and other styles
37

Karagol, Erdal T., and Aziz Turhan. "EXTERNAL DEBT, DEFENCE EXPENDITURES AND POLITICAL BUSINESS CYCLES IN TURKEY." Defence and Peace Economics 19, no. 3 (June 2008): 217–24. http://dx.doi.org/10.1080/10242690801972170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Georgantopoulos, Andreas G. "The Interrelationship between Military Expenditure and External Debt: Patterns of Causation in Northern Africa Countries." Journal of Economics and Behavioral Studies 3, no. 4 (October 15, 2011): 264–73. http://dx.doi.org/10.22610/jebs.v3i4.279.

Full text
Abstract:
It is supported by academics and scholars that defense expenditure can significantly affect a country’s economic growth and in some cases it influences external debt having implications in various macroeconomic indicators. However, relevant empirical studies have produced contradictory evidence while the literature in this field remains relatively poor. In this spirit, this survey investigates the causal links between military expenditure and external debt for four emerging Northern Africa countries (i.e. Egypt, Tunisia, Algeria and Morocco) during the period 1988-2009. Empirical findings on the long-term relationship between the tested variables are based on cointegration test. The Granger Causality test results using Vector Auto Regression (VAR) estimates and the Error Correction Model imply that there is no dynamic causal link between military expenditure and external debt for Tunisia, Algeria and Morocco. On the other hand regarding Egypt, results imply that a strong unidirectional causality exists running from defense expenditure to external debt. Collectively, empirical calculations show that military burden do not have any significant impact on most Northern Africa countries. The only exception is the case of Egypt; empirical results show that military expenditure robustly affect the country’s external debt. These are the only findings provided from this study that validate the hypothesis that military burden may be important in determining the evolution of debt in developing countries.
APA, Harvard, Vancouver, ISO, and other styles
39

BARBU, Ionuț-Daniel, and Gabriel PETRICĂ. "Defense in Depth Principle to Ensure Information Security." International Journal of Information Security and Cybercrime 4, no. 1 (June 29, 2015): 41–46. http://dx.doi.org/10.19107/ijisc.2015.01.06.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Dazahra, M. N., F. Elmariami, A. Belfqih, and J. Boukherouaa. "A Defense-in-depth Cybersecurity for Smart Substations." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 4423. http://dx.doi.org/10.11591/ijece.v8i6.pp4423-4431.

Full text
Abstract:
The increase of cyber-attacks on industrial and power systems in the recent years make the cybersecurity of supervisory control and data acquisition and substation automation systemsa high important engineering issue. This paper proposes a defense in depth cybersecurity solution for smart substations in different layers of the substation automation system. In fact, it presents possible vulnerabilities in the substation automation system and propose a multiple layer solution based on best practice in cyber security such as the hardening ofdevices, whitelisting, network configuration, network segmentation, role-based account management and cyber security management and deployement.
APA, Harvard, Vancouver, ISO, and other styles
41

Petraglia, Jonathan, Maneet Bhatia, Yves De Roten, Jean-Nicolas Despland, and Martin Drapeau. "Investigating defense interpretation depth using lag sequential analysis." Archives of Psychiatry and Psychotherapy 20, no. 4 (December 12, 2018): 7–16. http://dx.doi.org/10.12740/app/94400.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Pole, Adam. "Sheriffs’ sales during the land war, 1879–82." Irish Historical Studies 34, no. 136 (November 2005): 386–402. http://dx.doi.org/10.1017/s0021121400006398.

Full text
Abstract:
On Saturday 12 February 1881 two horses belonging to Andrew Kettle, executive member of the Land League, were auctioned at a sheriff’s sale at his residence, Kilmore Cottage, Artane, County Dublin. Lord Talbot de Malahide, Kettle’s landlord, obtained a decree to have Kettle’s goods seized and sold to obtain the £40 in rent Kettle had refused to pay. Norris Goddard, solicitor of the Property Defence Association, a landlord defence organisation, opened the bidding on the first horse at £5 but was soon outbid by Kettle’s brother at £20. A second draught horse was then auctioned to Kettle’s brother for £30, thus raising enough to cover the debt and costs.
APA, Harvard, Vancouver, ISO, and other styles
43

Sezgin, Selami. "An empirical note on external debt and defence expenditures in Turkey." Defence and Peace Economics 15, no. 2 (April 2004): 199–203. http://dx.doi.org/10.1080/1024269032000110568.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Karagol †, Erdal, and Selami Sezgin ‡. "DO defence expenditures increase debt rescheduling in Turkey? probit model approach." Defence and Peace Economics 15, no. 5 (October 2004): 471–80. http://dx.doi.org/10.1080/1024269042000215921.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chen, Rong Jun, Yong Zhang, and Hong Wei Liu. "Underground Engineering Avoid Incision and Reinforced Technology and Engineering Application." Advanced Materials Research 853 (December 2013): 174–77. http://dx.doi.org/10.4028/www.scientific.net/amr.853.174.

Full text
Abstract:
Because of traditional construction method in the construction at the mouth of underground engineering has characteristics such as slow rate of construction progress and poor defense property, mouth section of underground engineering avoid incision and reinforced technology was proposed. Basic principle and construction progress of avoid incision and reinforced technology was analyzed too. Combining with engineering example, avoid incision and reinforced technology was found to be able to improve the rate of construction progress and combing disguise and defense with weak rock-soil reinforced together well at the mouth of tunnel. Through improving structure resisting force and reducing the probability of discovery on the mouth of defense engineering tunnel, the defense ability of the mouth of cave depot was improved.
APA, Harvard, Vancouver, ISO, and other styles
46

Jander, Kai, Lars Braubach, and Alexander Pokahr. "Defense-in-depth and Role Authentication for Microservice Systems." Procedia Computer Science 130 (2018): 456–63. http://dx.doi.org/10.1016/j.procs.2018.04.047.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Matsui, Kazuaki. "“Some Thoughts on Defense in Depth from RIC 2016”." Journal of the Atomic Energy Society of Japan 58, no. 7 (2016): 440–43. http://dx.doi.org/10.3327/jaesjb.58.7_440.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Gilbert, Juan E., Jonathan MacDonald, Raquel Hill, Derek T. Sanders, Idongesit Mkpong-Ruffin, E. Vincent Cross, Ken Rouse, Jerome McClendon, and Gregory Rogers. "Prime III: Defense-in-Depth Approach to Electronic Voting." Journal of Information Privacy and Security 4, no. 3 (July 2008): 16–35. http://dx.doi.org/10.1080/2333696x.2008.10855844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Weber, Sebastian. "Defense in Depth: Sicherheitskonzepte im Inneren von Windows (I)." Datenschutz und Datensicherheit - DuD 32, no. 1 (January 2008): 59–62. http://dx.doi.org/10.1007/s11623-008-0014-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

WAIBEL, MICHAEL. "Two Worlds of Necessity in ICSID Arbitration: CMS and LG&E." Leiden Journal of International Law 20, no. 3 (August 30, 2007): 637–48. http://dx.doi.org/10.1017/s0922156507004293.

Full text
Abstract:
Two recent ICSID cases, CMS v. Argentina and LG&E v. Argentina, diverge on the application of necessity under customary international law. The LG&E tribunal affirmed that Argentina's financial crisis amounted to a state of necessity. On virtually identical facts, CMS had reached the opposite conclusion 18 months earlier. This unhealthy split of opinion highlights the fact that necessity is ill-suited to financial crises. The state of necessity is at best a crude defence, appropriate as long as international law in this area remains underdeveloped. Lack of payment capacity will strike a better balance between host country and investor interests in future sovereign debt crises. This defence is also more amenable to adjudication by national courts and international tribunals.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography