To see the other types of publications on this topic, follow the link: National security.

Journal articles on the topic 'National security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'National security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Komissarov, Serhiy, and Dmytro Parkhomenko. "«National security», «system of national security», «types of national security», «forms of national security»: definitions." Naukovyy Visnyk Dnipropetrovs'kogo Derzhavnogo Universytetu Vnutrishnikh Sprav 3, no. 3 (September 30, 2021): 166–73. http://dx.doi.org/10.31733/2078-3566-2021-3-166-173.

Full text
Abstract:
In the article, based on the analysis of theoretical provisions of national security and current legislation governing the system of national security, the author explores the basic concepts: «national security», «national security», «types and forms of national security». As a result of the study for further development of the theory of national security of Ukraine, its implementation in modern practice of Ukraine, ensuring effective protection of vital interests of man and citizen, society and state, the author proposed his own definitions of «national security», «national security system». «Type of national security», «form of national security». The author proved that it is more appropriate to use the concept of «national security system» which means a set of measures taken by national security actors in accordance with the tasks and powers assigned to them, for timely detection / management / disposal of threats or dangers of external and internal nature. The author also formulates certain concepts of specific types and forms of national security. Thus, the type of national security is an action or set of actions of state and non-state institutions that are aimed at maintaining a level of national security that is necessary and sufficient for society and that satisfies the vital interests of the individual. The form of national security is the implementation by the subject of national security of normatively fixed, peculiar only to him measures, by means of which his powers to ensure national security are realized in accordance with the set tasks.
APA, Harvard, Vancouver, ISO, and other styles
2

Smith, Donna B., and Assistant. "National Security Archive9971National Security Archive. National Security Archive. National Security Archive, URL: www.seas.gwu.edu/nsarchive." Electronic Resources Review 3, no. 7 (July 1999): 77–78. http://dx.doi.org/10.1108/err.1999.3.7.77.71.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Nissenbaum, Helen. "Where Computer Security Meets National Security1." Ethics and Information Technology 7, no. 2 (June 2005): 61–73. http://dx.doi.org/10.1007/s10676-005-4582-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Clough, Patricia Ticineto, and Craig Willse. "Gendered Security/National Security." Social Text 28, no. 4 (2010): 45–63. http://dx.doi.org/10.1215/01642472-2010-010.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Meyer, Timothy, and Ganesh Sitaraman. "The National Security Consequences of the Major Questions Doctrine." Michigan Law Review, no. 122.1 (2023): 55. http://dx.doi.org/10.36644/mlr.122.1.national.

Full text
Abstract:
The rise of the major questions doctrine—the rule that says that in order to delegate to the executive branch the power to resolve a “question of ‘deep economic and political significance’ that is central to [a] statutory scheme,” Congress must do so expressly—threatens to unmake the modern executive’s authority over foreign affairs, especially in matters of national security and interstate conflict. In the twenty-first century, global conflicts increasingly involve economic warfare, rather than (or in addition to) the force of arms. In the United States, the executive power to levy economic sanctions and engage in other forms of economic warfare are generally based on extremely broad delegations of authority from Congress. The major questions doctrine (MQD) threatens the ability to fight modern conflicts for two reasons. First, classic national- security-related conflicts—wars of territorial conquest, terrorism, or nuclear proliferation—increasingly are met with economic measures. But the statutes that authorize economic warfare actions are incredibly broad and recent administrations have interpreted these statutes in ways that risk running afoul of an expansive and free-form MQD. Second, “foreign affairs exceptionalism,” in which the Court decides not to apply the MQD to statutes involving foreign affairs, is not likely to work well as a response because what is “foreign” and “domestic” cannot be easily distinguished and attempts to do so will have perverse consequences. The MQD raises serious problems for foreign affairs and national security. If the MQD is applied to domestic, but not foreign, delegations, then the executive branch will have an incentive to use broad foreign affairs delegations to accomplish domestic policy objectives in order to evade the safeguards and limits that attend domestic administrative action. At the same time, judges will have to police the porous boundary between “foreign” and “domestic,” with especially high error costs because wrong decisions will affect national security. If the MQD is applied to economic delegations that touch foreign commerce, the most likely consequence is that judges—particularly lower court judges—will be put in the position of second-guessing executive branch decisionmaking on precisely those questions—economic foreign policy questions of deep economic and political significance—on which the political branches enjoy both constitutional primacy and institutional expertise. This result is troubling; judges lack the knowledge and training to make effective decisions bearing on foreign policy, and putting them in the position to do so contravenes the norms of our legal system.
APA, Harvard, Vancouver, ISO, and other styles
6

Leffler, Melvyn P. "National Security." Journal of American History 77, no. 1 (June 1990): 143. http://dx.doi.org/10.2307/2078646.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Podberezkin, Aleksei. "National Security." Russian Social Science Review 41, no. 2 (March 2000): 76–95. http://dx.doi.org/10.2753/rss1061-1428410276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Podberezkin, Aleksei. "National Security." Russian Politics & Law 37, no. 5 (September 1999): 31–50. http://dx.doi.org/10.2753/rup1061-1940370531.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Roussel, Stéphane, and Samir Battiss. "National security." Canadian Foreign Policy Journal 16, no. 2 (July 2010): 27–43. http://dx.doi.org/10.1080/11926422.2010.9687306.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Badescu, Cristina G. "National security." Canadian Foreign Policy Journal 16, no. 2 (July 2010): 45–60. http://dx.doi.org/10.1080/11926422.2010.9687307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

SABĂU, Cristian-Gabriel, Virgil ION, and Mihai NEAG. "NATIONAL SECURITY AND PUBLIC OPINION." SCIENTIFIC RESEARCH AND EDUCATION IN THE AIR FORCE 18, no. 2 (June 24, 2016): 649–56. http://dx.doi.org/10.19062/2247-3173.2016.18.2.23.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Kumar, Dr Subodh. "Social Medial and National Security." Paripex - Indian Journal Of Research 2, no. 1 (January 15, 2012): 75–76. http://dx.doi.org/10.15373/22501991/jan2013/56.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Zh. Stoyanov, Stiliyan. "Space research and national security." Journal scientific and applied research 1, no. 1 (February 2, 2012): 154–57. http://dx.doi.org/10.46687/jsar.v1i1.33.

Full text
Abstract:
In the current stage of human evolution, it is necessary and important to receive information about risks and threats which concern the national security in times of peace, as well as in times of different crises and conflicts. The paper makes a link between the space research and national security. Special attention is paid to the optical methods and means for discovery and research of processes, phenomena and objects in the atmos-phere, as well as on the earth surface.
APA, Harvard, Vancouver, ISO, and other styles
14

SØRENSEN, GEORG. "Individual Security and National Security." Security Dialogue 27, no. 4 (December 1996): 371–86. http://dx.doi.org/10.1177/0967010696027004002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Fekete, Liz. "Peoples' Security Versus National Security." Race & Class 44, no. 3 (January 2003): 78–84. http://dx.doi.org/10.1177/030639603128968790.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Chun, Woong. "National Security and Human Security." Korean Journal of International Relations 44, no. 1 (April 30, 2004): 25–49. http://dx.doi.org/10.14731/kjir.2004.04.44.1.25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Kovács, László. "National Cyber Security as the Cornerstone of National Security." Land Forces Academy Review 23, no. 2 (June 1, 2018): 113–20. http://dx.doi.org/10.2478/raft-2018-0013.

Full text
Abstract:
Abstract The more advanced digital economy and society a country has the more exposed it is to cyber threats. Consequently, countries with advanced digital economy and digital infrastructure naturally need to pay more attention to protecting cyber space. Today it is a national security issue and it can no longer be argued that cyber security is its indispensable part. Accordingly, a national cyber security strategy has to be built on national security strategy. That is the main reason for using the word “cornerstone” in the title of this study. The relation between national security and national cyber security means a specific context, which is one of the subjects of our examination in this study. Today, most countries have a cyber security strategy. However, these strategies are mostly static documents that do not or only partially can handle the dynamism that characterizes cyberspace. This paper focuses on the key issues that are needed for developing a usable cyber security strategy.
APA, Harvard, Vancouver, ISO, and other styles
18

Pollak, William. "Shu'ubiyya or Security? Preserving Civil Liberties by Limiting FISA Evidence to National Security Prosecutions." University of Michigan Journal of Law Reform, no. 42.1 (2008): 221. http://dx.doi.org/10.36646/mjlr.42.1.security.

Full text
Abstract:
Part I of this Note addresses the restrictions on intelligence gathering under FISA prior to 9/11 and the motivations underlying the Patriot Act's revisions to FISA. Part II discusses the problems with the "primary purpose" test, which was in effect prior to the Patriot Act's revisions to FISA. Part III reviews the various policy and constitutional arguments made against the Patriot Act's "significant purpose" test. Part IV proposes that Congress enact a new "inextricably intertwined" test to govern the admission of FISA material in criminal prosecutions. Specifically, this Part looks at sixty criminal cases in which FISA material was admitted and evaluates how the "inextricably intertwined" test would play out in those cases. Part V examines the arguments in favor of the inextricably intertwined test. Finally, Part VI counters the argument that the inextricably intertwined test violates the plain view doctrine.
APA, Harvard, Vancouver, ISO, and other styles
19

Sokolov, Arkadiy V. "National Security and National Library." Bibliotekovedenie [Library and Information Science (Russia)] 68, no. 3 (July 27, 2019): 231–47. http://dx.doi.org/10.25281/0869-608x-2019-68-3-231-247.

Full text
Abstract:
The purpose of the study is to understand the mission of national library in the system of national security of Russia. The author formulates definition of national security basing on the analysis of state concepts and doctrines of national security. The national library is conceived as a humanistic resource of national security, which is protected from information wars. The author considers the components of national security: the nation at the level of individual, society and state; national values in the form of demographic stability, cultural heritage, favourable environment; hazards — hostile phenomena detrimental to the nation; types of security — the types of activities necessary to overcome external and internal hazards; resources — social institutions that ensure the integrity and sustainable development of the nation. The paper proposes definition of bibliosphere as a super-system (system of systems), carrying out production, preservation, use and further development of the national book communication. The components of bibliosphere are: professionally specialized social institutions (publishing, printing industry, book trade, librarianship, bibliography); bibliophile social and cultural movement; commercial and non-profit associations; government authorities and censorship, etc. Considering the doctrine of information security, the author notes that bibliosphere is not an element of information sphere and an object of information security. Culture is presented as a key factor in national security. The paper characterizes the dilemma of militarization and humanization of society in the post-industrial era and emphasizes the urgency of formation of moral and creative individual. The author grounds the new understanding of social mission of the national library.
APA, Harvard, Vancouver, ISO, and other styles
20

Arbatov, A. "National Idea and National Security." World Economy and International Relations, no. 5 (1998): 5–21. http://dx.doi.org/10.20542/0131-2227-1998-5-5-21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cornell, Phillip E. "Energy and the Three Levels of National Security: Differentiating Energy Concerns within a National Security Context." Connections: The Quarterly Journal 08, no. 4 (2009): 63–80. http://dx.doi.org/10.11610/connections.08.4.04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Tagarev, Peter. "National Security Concepts and Information Warfare." Information & Security: An International Journal 1, no. 2 (1998): 33–42. http://dx.doi.org/10.11610/isij.0114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Oghlu, Musayev Hafiz Maharram. "Contemporary Characteristics of Providing National Security." International Journal of Research Publication and Reviews 4, no. 12 (December 2, 2023): 709–13. http://dx.doi.org/10.55248/gengpi.4.1223.123322.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Hbur, Zoriana. "NATIONAL SECURITY OF THE COUNTRY AND PROTECTION OF NATIONAL MINORITIES." INTERNATIONAL JOURNAL OF NEW ECONOMICS, PUBLIC ADMINISTRATION AND LAW 1, no. 1 (May 15, 2018): 102–9. http://dx.doi.org/10.31264/2545-093x-2018-1(1)-102-109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Sorensen, Theodore C. "Rethinking National Security." Foreign Affairs 69, no. 3 (1990): 1. http://dx.doi.org/10.2307/20044397.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Brown, Lester R. "Redefining National Security." Challenge 29, no. 3 (July 1986): 25–32. http://dx.doi.org/10.1080/05775132.1986.11471086.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Dulovic, Ljubomir. "National Security Council." Vojno delo 67, no. 2 (2015): 105–17. http://dx.doi.org/10.5937/vojdelo1502105d.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Schake, Kori. "National Security Challenges." Orbis 61, no. 1 (2017): 4–12. http://dx.doi.org/10.1016/j.orbis.2016.12.007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Brams, Steven J., and D. Marc Kilgour. "National security games." Synthese 76, no. 2 (August 1988): 185–200. http://dx.doi.org/10.1007/bf00869588.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Lee, Sang Hwan. "Epidemics, Human Security, and National Security." Journal of international area studies 12, no. 3 (October 31, 2008): 229. http://dx.doi.org/10.18327/jias.2008.10.12.3.229.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Boxill, Ian. "Linking tourism security to national security." Worldwide Hospitality and Tourism Themes 4, no. 1 (January 27, 2012): 26–31. http://dx.doi.org/10.1108/17554211211198561.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Wiśniewski, Bernard. "NATIONAL SECURITY AND STATE SECURITY (REMINISCENCES)." Bulletin of Lviv State University of Life Safetyі 27 (June 26, 2023): 144–49. http://dx.doi.org/10.32447/20784643.27.2023.16.

Full text
Abstract:
State security and homeland security are concepts that frequently appear in academic studies and are permanently enshrined in law. They are sometimes even treated as synonyms, despite sharing only a single element, that of security. Are they really identical concepts? Do they have relations indicating interpretative differences? Is there something common to these expressions that link them in their content? These are the questions that determined the formulation of the statements presented in this article, which reviews the standpoints of recognised Polish scholars, being supplemented by the author's comments. The considerations presented in this paper are aimed at identifying similarities and differences in the interpretation of the concepts in question. The results of the presented investigations point to significant interpretational differences and similarities proving the possibility of interchangeable application on the grounds of law, not so much science. The presented deliberations indicate that the provisions of the law imposing on the state as a political organisation emphasise the necessity of taking utmost care of counteracting and eliminating the effects of symptoms, threats, and extraordinary events, detrimental to common goods. This is related to the activity of obtaining those assets only when it is certain that it is not under threat. This activity is related to the use of the forces and means at the disposal of the state only on the basis and within the limits of universally applicable law, both with the whole and in conditions threatening the security of individual citizens and local communities when the circumstances are beyond their capabilities. The considerations presented further indicate that the interpretative doubts are rooted in the lack of an unambiguous definition of security commonly accepted by specialists in various fields and scientific disciplines. After all, how can concepts that have their tight links with such a condition be explained without it? And such, for all those dealing with theory and practice related to a particular form of security, are the terms 'national security' and the closely related 'homeland security
APA, Harvard, Vancouver, ISO, and other styles
33

Sharma, Rajendra. "Evolution of Nepal’s National Security Council and National Security Policy." Unity Journal 4, no. 01 (February 15, 2023): 144–60. http://dx.doi.org/10.3126/unityj.v4i01.52236.

Full text
Abstract:
In a democratic system, there is a discussion about who will be the "guardian of the guards." For this, the military is made answerable to the parliament and parliamentary oversight bodies are established to make military affairs transparent and accountable to the civilian government. Democratic countries have adopted security policies in which the civilian government controls security strategy and priorities, which were previously handled by the military. A high-level body has been established in various countries to provide strategic direction to the country. For example, the National Security Act of 1947 established the National Security Council (NSC) in the United States; the United Kingdom established one in 2010; and India and Nepal both established one in the post-1990. In Nepal, the NSC of 1990, with only two members and the Prime Minister as chairperson, was unable to bring civilians and military personnel together, resulting in a security dilemma. However, Constitution of Nepal (2015) explicitly enjoins the NSC to formulate security policy and other strategic policies. The Nepali security policy, namely the National Security Policy (NSP), was enacted for the first time in 2016 by the government. This NSP was said to be revised by th e government in 2019, but what about the policy and what were the NSC’s roles in policy formulation are still kept secret to date?In this backdrop, this paper focuses on whether and to what extent the government takes geopolitics and security sensitivities of Nepal into account while formulating the NSP and constituting the NSC. This will focus on raising the government's security priority and will aid in identifying the factors influencing the evolution of the NSC and NSP. Hence, the research question addressing this objective is mainly, "What are the factors contributing to the evolution and development of NSC and NSP in Nepal?" For this, the academic literature, domestic laws, and national security and defense policy were studied. In addition, semi-structured questionnaires were used to interview experts on national security in an attempt to explore the evolution of NSC and NSP in general and the practicality of security governance in particular. This paper concludes by defending the necessity of the NSP and NSC in articulating the security vision and maintaining some continuity in the future security vision of Nepal's decision-makers.
APA, Harvard, Vancouver, ISO, and other styles
34

Mowery, David C. "National security and national innovation systems." Journal of Technology Transfer 34, no. 5 (December 12, 2008): 455–73. http://dx.doi.org/10.1007/s10961-008-9100-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kulinskaya, Anzhela. "Evolution of national economic security paradigm for national security strategic ensuring." Socio-Economic Research Bulletin, no. 3(58) (October 27, 2015): 72–78. http://dx.doi.org/10.33987/vsed.3(58).2015.72-78.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Yarovenko, Hanna. "Evaluating the threat to national information security." Problems and Perspectives in Management 18, no. 3 (September 9, 2020): 195–210. http://dx.doi.org/10.21511/ppm.18(3).2020.17.

Full text
Abstract:
An effective strategy for managing the national information security with capabilities to resist information threats significantly impacts its further development. This study aims to assess the level of threat to the information security of countries based on the integral index. It is proposed to use five indicators characterizing individual areas of information security and 37 world development indicators, selected from the World Bank database. Correlation analysis selected 12 out of 37 development indicators relevant to security indicators for which the correlation coefficient exceeded 0.5 or –0.5. The Harrington-Mencher function is proposed to determine the information security threat index. Nonlinear normalization was carried out to bring the initial data to a comparable measurement. Canonical analysis was performed to determine the indicator weights. The data from 159 countries were taken for 2018 to assess the index. The result was presented on the map showing countries’ distribution by the information security threat index, thus forming five groups. The group with a “very well” resistance to threats includes economically developed countries with a high level of information security. The “well” group was formed by new industrial and developing countries with economic potential sufficient to prevent information threats and combat their consequences. The information security level in developing countries, where the results of overcoming information threats will affect the economic sphere, is defined as “acceptable”. Countries with a low level of development and information security formed groups designated as “bad” and “very bad”, which indicates a high level of threats to their information security. AcknowledgmentThis work is carried out with in the tax payer – funded researches: No. 0118U003574 “Cybersecurity in the banking fraud enforcement: protection of financial service consumers and the financial and economic security growth in Ukraine”.
APA, Harvard, Vancouver, ISO, and other styles
37

Orlova, N. S. "Information security in Ukraine's national security system." States and Regions. Series: Public Administration, no. 4 (2019): 166–70. http://dx.doi.org/10.32840/1813-3401-2019-4-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Morgacheva, N. V., and O. V. Levashova. "Environmental security in the national security system." IOP Conference Series: Earth and Environmental Science 677, no. 4 (March 1, 2021): 042115. http://dx.doi.org/10.1088/1755-1315/677/4/042115.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Porter, Gareth. "Environmental Security as a National Security Issue." Current History 94, no. 592 (May 1, 1995): 218–22. http://dx.doi.org/10.1525/curh.1995.94.592.218.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Newmann, William W. "Reorganizing for National Security and Homeland Security." Public Administration Review 62, s1 (September 2002): 126–37. http://dx.doi.org/10.1111/1540-6210.62.s1.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Madsen, Wayne. "National Security Agency cited for security problems." Computer Fraud & Security 1997, no. 9 (September 1997): 10–11. http://dx.doi.org/10.1016/s1361-3723(97)82877-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Alguliyev, Rasim M., Yadigar N. Imamverdiyev, Rasim Sh Mahmudov, and Ramiz M. Aliguliyev. "Information security as a national security component." Information Security Journal: A Global Perspective 30, no. 1 (July 20, 2020): 1–18. http://dx.doi.org/10.1080/19393555.2020.1795323.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Jo, Sunggu. "National Security Perceptions of Korean University Students." J-INSTITUTE 8 (August 31, 2023): 1–14. http://dx.doi.org/10.22471/military.2023.8.01.

Full text
Abstract:
Purpose: Korean university students have a special interest in security issues, understand the importance of Northeast Asian and foreign situations and national security, and have a sense of responsibility. This is because Korean university students recognized the importance of security through service in the military, and they are aware of security threats and espionage activities even after being discharged. Therefore, by publishing this thesis in English, we intend to contribute to prosperity and peace by sharing information on the security awareness of Korean university students with researchers around the world. Method: Frequency analysis was conducted to identify general characteristics using the SPSS/PC+23.0 program, and Cronbach’s α coefficient was calculated to verify the reliability of the questionnaire. In addition, Factor Analysis, Correlation Analysis, and Simple Linear Regression Analysis were conducted on Korean university students’ perception of counterespionage activities, security reporting methods, threats from neighboring countries, and the role of the government. Results: ‘Threat and awareness’ factors were extracted for Korean university students’ perception of counterintelligence activities, and 'public factors' and 'personal factors' were extracted for security reporting methods. As major national threats, 'dictatorship' and 'liberal democracy' were classified and extracted, and the government's role was extracted as requiring 'joint response'. Perception of counterintelligence activities correlated with security reporting methods, threats from neighboring countries, and the role of the government. There was also a significant correlation between security reporting methods, threats from neighboring countries, and the role of the government. As a result of simple linear regression analysis, it was found that counterintelligence activity perception affects the method of reporting security, threats from neighboring countries, and the role of the government. Conclusion: Korean university students are aware of threats from neighboring countries, and Korea’s military service system is important for raising awareness of the importance of national security through mandatory service in the army and training in the reserves. Korean university students have negative perceptions of the dictatorships of neighboring countries North Korea and China, are aware of China's espionage and cyber psychological warfare, and are aware of the reality by watching TV broadcasts featuring North Korean defectors, and are fully aware of the threat. In response to these threats, Korean university students aspire for stability and prosperity in Northeast Asia through joint responses by government departments.
APA, Harvard, Vancouver, ISO, and other styles
44

Schmid, Steven R., and Shreyes N. Melkote. "Manufacturing and National Security." Mechanical Engineering 143, no. 3 (May 1, 2021): 37–41. http://dx.doi.org/10.1115/1.2021-may2.

Full text
Abstract:
Abstract The importance of manufacturing to national security is recognized by defense professionals across the political spectrum. And yet, investments in American manufacturing infrastructure have fallen behind other nations, exacerbating security concerns. As a new administration sets its course for both economic and security policy, there is an opportunity for new investments in infrastructure, education, and research and development to support advanced manufacturing that can enhance the national defense.
APA, Harvard, Vancouver, ISO, and other styles
45

Guzmán, Gerardo Reyes, and Carlos Moslares García. "The National Security Strategy." Anuario Latinoamericano – Ciencias Políticas y Relaciones Internacionales 2 (March 23, 2016): 105. http://dx.doi.org/10.17951/al.2015.2.105.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Makarov, Valerii L., Al’bert R. Bakhtizin, Nikolai I. Il’in, and Elena D. Sushko. "National Security of Russia." Economic Strategies 144 (September 20, 2020): 6–23. http://dx.doi.org/10.33917/es-5.171.2020.6-23.

Full text
Abstract:
The article is continuing the research “Modelling and Assessment of Russia’s National Power”, dedicated to calculating the index of national power, which is currently the most informative and popular indicator in the world that integrally characterizes the aggregate potential of a particular country and allows at the same time to compare the level of its power and socio-economic development with the other countries’ level. The research results were published in the “Economic Strategies” magazine No. 2 for 2020. [1]. If the national power of the state, in fact, determines its potential capabilities and mainly gross indicators are used for the calculation, then the national security indicators are calculated on the basis of normalized values (as a rule, per capita) and witness the development level of one or another component of the country’s socio-ecologic and economic system, as well as efficiency of using the existing potential. It should be reminded that in terms of the National Integral Strength Index, which includes many components, Russia ranks fourth in the world, slightly behind India. In this article, using the methods of multivariate statistical analysis, we’ll calculate the national security indicators of the UN member states, also defining the position of Russia, but in addition, we'll also estimate the threshold values for all the factors of national security considered in the work. In the last part of the paper, we'll give a medium-term forecast of national security.
APA, Harvard, Vancouver, ISO, and other styles
47

Pervozvanskiy, Valeriy B., and Yuriy N. Strogovich. "Migrants and National Security." Criminal-Executory System: law, economics, management 4 (July 10, 2019): 13–16. http://dx.doi.org/10.18572/2072-4438-2019-4-13-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Petkov, Marin. "THE NATIONAL SECURITY SYSTEM." Knowledge International Journal 28, no. 6 (December 10, 2018): 1849–54. http://dx.doi.org/10.35120/kij28061849m.

Full text
Abstract:
The rapid development of science and technology has led to the emergence of a crisis in society. Science "pushes" religion, but does not offer a new moral code in its place. The definitions of "security" are almost as many and as controversial as postmodernism. For the purposes of this study, however, it will be sufficient to define security as "the functional state of a system that provides for the neutralization and counteraction of external and internal factors affecting or potentially damaging the system." This scientific article presents a study, which seeks to answer the question why the paradigm "security" is so important in the postmodern society, what are the roots of its influence and meaning, and to seek conclusions and guidelines for its increase.
APA, Harvard, Vancouver, ISO, and other styles
49

Chandrasekara, Ray, and John M. Polimeni. "Water and National Security." International Journal of Interdisciplinary Social Sciences: Annual Review 2, no. 6 (2008): 11–20. http://dx.doi.org/10.18848/1833-1882/cgp/v02i06/52453.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mitkow, S., and D. Krupnik. "LOGISTICS AND NATIONAL SECURITY." Collection of scientific works of Odesa Military Academy 1, no. 13 (December 30, 2020): 148–55. http://dx.doi.org/10.37129/2313-7509.2020.13.1.148-155.

Full text
Abstract:
In article are presented role and meaning of the logistics in national security system and national security system within their sub-systems. In addition, the characteristics of the national security system was made and its functional subsystems. Proposed new look for logistics in the area of national security. Also shows a simplified model of logistics on national security. Keywords: logistics, national security system, modelling.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography