Academic literature on the topic 'Ontological security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Ontological security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Ontological security"

1

Rumelili, Bahar, and Ayşe Betül Çelik. "Ontological insecurity in asymmetric conflicts: Reflections on agonistic peace in Turkey’s Kurdish issue." Security Dialogue 48, no. 4 (April 24, 2017): 279–96. http://dx.doi.org/10.1177/0967010617695715.

Full text
Abstract:
This article contributes to the recent literature on ontological security in conflict studies by empirically investigating, through a case study of Turkey’s Kurdish issue, how ontological asymmetry complicates peace processes. Over time, all conflicts become embroiled in a set of self-conceptions and narratives vis-à-vis the Other, the maintenance of which becomes critical for ontological security. In ethnic conflicts, however, these conceptions and narratives also intersect with a fundamental ontological asymmetry, because such conflicts often pit state parties with secure existence against ethnic groups with contested status and illegitimate standing. We argue that peace processes are easier to initiate but harder to conclude in ontologically asymmetric conflicts. Accordingly, we find that during the 2009–2015 peace process in Turkey, ontological (in)security-induced dynamics presented themselves in cyclical patterns of ambitious peace initiatives receiving greater support among the Kurdish public but giving way, at the first sign of crisis, to a rapid and dramatic return to violence, which neither side acted to stem. Moreover, we underscore that ontologically asymmetric conflicts, such as Turkey’s Kurdish issue, are often characterized by a societal security dilemma, where the conditions of ontological security for one party undermine those of the other. Therefore, building consensus around a new shared peace narrative may not be possible or desirable, and a lasting solution to Turkey’s Kurdish issue depends on the development of an agonistic peace around coexisting, multiple and contestatory narratives.
APA, Harvard, Vancouver, ISO, and other styles
2

Kazharski, Aliaksei. "Civilizations as Ontological Security?" Problems of Post-Communism 67, no. 1 (May 1, 2019): 24–36. http://dx.doi.org/10.1080/10758216.2019.1591925.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hapon, Nadiya, Anna Vovk, Iryna Snyadanko, and Liliya Fedyna. "ONTOLOGICAL SECURITY OF AN INDIVIDUAL: ATTACHMENT STYLES AND COPING STRATEGIES." Journal of Education Culture and Society 12, no. 2 (September 25, 2021): 317–29. http://dx.doi.org/10.15503/jecs2021.2.317.329.

Full text
Abstract:
Aim. The aim of this paper is to theoretically substantiate individual’s attachment as a need for ontological security, to outline the educational aspects of supporting the ontological security, and to empirically investigate the attachment styles and coping strategies of individuals in early and middle adulthood. Methods. The article is based on an extensive review of the literature, which involves the use of such methods as interpretation (of previously unexplained psychological aspects of ontological security) and comparative analysis (of the views of Ronald Laing and family psychotherapists). An empirical study was conducted. The study group consisted of 90 persons: 45 male and 45 female, at the age of early and middle adulthood. The research used a number of psychological methods to study different types of attachments, relationships, personality traits and coping strategies that help overcome ontological insecurity. The method of statistical and mathematical analysis of results was also applied. Results. Ontological security is a marker of positive types of attachment. Our empirical research has shown that people with anxious attachment more often overcome ontological insecurity by positively rethinking the problem, which can lead to an underestimation of the possibilities of its effective solution. People with a reliable attachment are ontologically secure due to mutual trust, responsibility, problem analysis and planning, which eliminate escape strategies and problem avoidance. Conclusions. Ontological security-insecurity manifests itself in different types of attachments and corresponding coping strategies. The results showed the importance of developing and adapting the methodology of ontological protection for Ukrainian socio-cultural realities. This technique is being prepared to be operationalized with the scales of psychological techniques used in this study.
APA, Harvard, Vancouver, ISO, and other styles
4

Tufte, Thomas. "AIDS, globalisation and ontological security." Comunicar 13, no. 26 (March 1, 2006): 27–34. http://dx.doi.org/10.3916/c26-2006-05.

Full text
Abstract:
The working hypothesis of this article is that many of the root causes of AIDS are intrinsically tied to the processes of globalisation. To develop efficient responses to AIDS requires more than conveying a clear message about sexual behaviour. It will often require broader strategies to empower the audiences to handle difficult conditions of everyday life. By drawing on post-colonial theory on the interrelation between media and migration, modernity and globalisation, this text seeks to re-assess the challenge of AIDS communication and prevention, suggesting a fundamental rethinking of current practice where the impacts of economic and cultural globalisation are taken into consideration. La hipótesis de trabajo de este artículo es que muchas de las causas primarias del SIDA están intrínsecamente ligadas a los procesos de globalización. Para desarrollar respuestas eficientes al problema del SIDA es necesario algo más que un mensaje claro acerca del comportamiento sexual. A menudo requerirá estrategias más amplias para animar a las audiencias a sobrellevar las difíciles condiciones de la vida cotidiana. Basándose en la teoría post-colonial de la relación existente entre medios de comunicación, migración, modernidad y globalización, este texto busca valorar el reto de la comunicación y prevención en SIDA, sugiriendo la reconsideración de las prácticas actuales donde los impactos de la globalización económica y cultural se tienen en consideración.
APA, Harvard, Vancouver, ISO, and other styles
5

Solomon, Ty. "Attachment, tautology, and ontological security." Critical Studies on Security 1, no. 1 (April 2013): 130–32. http://dx.doi.org/10.1080/21624887.2013.790228.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Krahmann, Elke. "The market for ontological security." European Security 27, no. 3 (July 3, 2018): 356–73. http://dx.doi.org/10.1080/09662839.2018.1497983.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

HÜRSOY, Siret, and Z. Melis ÖZÜN ÇÖLLÜOĞLU. "Avrupa Birliğinde Ontolojik Güven(siz)lik: Kıbrıs Örneği." Ankara Avrupa Calismalari Dergisi 21, no. 1 (August 5, 2022): 167–93. http://dx.doi.org/10.32450/aacd.1148623.

Full text
Abstract:
Ontological (in)security concept has been recently introduced to the security studies and qained popularity. Individuals and states instinctively pursue their physical security, but they never feel completely safe in an environment which stability and security of self’s existence cannot be guaranteed. They’re in a search for attaining ontological security through narratives, habits, and routines to generate a sense of trust in an uncertainty environment. In this regard, this article tries to answer a key question: how ongoing Cyprus conflict be explained through ontological (in)security considering the EU’s failure to unravel security dilemmas between Turkish and Greek communities on the island? The findings of the article will contribute to the existing literature and open up new debates concerning the role of ontological (in)security in ongoing conflicts
APA, Harvard, Vancouver, ISO, and other styles
8

Gazit, Orit. "Van Gennep Meets Ontological (In)Security: A Processual Approach to Ontological Security in Migration." International Studies Review 21, no. 4 (June 21, 2018): 572–97. http://dx.doi.org/10.1093/isr/viy049.

Full text
Abstract:
AbstractThis article utilizes van Gennep's neglected theory of territorial passages to answer two key questions in the study of ontological security (OS) in migration. First, why do the members of the receiving society lose their perceived sense of OS in face of a mass of strangers arriving at their gates? Second, how, if at all, do they attempt to reconstitute it while incorporating the strangers into their world? Following the recent call within OS studies in international relations (IR) to spell out the social mechanisms that facilitate the anxiety and uncertainty of the agents, I use the case of the German societal response to the 2015 refugee crisis to demonstrate that van Gennep's classical approach, far from being structural and functionalist, offers an advanced, power-informed, and processual perspective for uncovering a possible sociosymbolic mechanism behind the perceived “losing” and “re-finding” of OS in migratory encounters. The article delineates the principles of a “thick” approach to OS in migration, explains how van Gennep's theory adds to this approach, and highlights the ultimate unattainability of OS as an essentialist category that is either “present” or “absent” throughout the migratory encounter. It concludes by discussing the added value of van Gennep's theory to the study of OS in the contemporary global milieu of the “age of migration.”
APA, Harvard, Vancouver, ISO, and other styles
9

Zarakol, Ayşe. "States and ontological security: A historical rethinking." Cooperation and Conflict 52, no. 1 (July 11, 2016): 48–68. http://dx.doi.org/10.1177/0010836716653158.

Full text
Abstract:
In this brief essay, I explore the relationship between ‘states’ (or more broadly, institutions of political authority) and ontological security. Drawing from historical examples, I argue that it is a mistake to assume that all ‘states’ seek ontological security: this generalisation applies only to those polities that claim to be the main ontological security providers. I then develop a typology of institutional ontological security provision arrangements as have existed throughout history, arguing that another reason the concept of ontological security is valuable for international relations (IR) is because it offers a way to compare systems across time and space without assuming the primacy of politics or religion. In summary, IR does not have to limit its use of the concept of ontological security to a synonym for ‘state identity’ – ontological security can offer much more than that by helping the discipline reach across time and space.
APA, Harvard, Vancouver, ISO, and other styles
10

Shani, Giorgio. "Human Security as ontological security: a post-colonial approach." Postcolonial Studies 20, no. 3 (July 3, 2017): 275–93. http://dx.doi.org/10.1080/13688790.2017.1378062.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Ontological security"

1

Alexandersson, Robert. "Taiwan In Sino-American Relations : An Ontological Security Study." Thesis, Högskolan i Halmstad, Sektionen för hälsa och samhälle (HOS), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-22947.

Full text
Abstract:
The purpose of this thesis is to explain why China put so much emphasizes on the Taiwan issue in their relations with the U.S. This will be explored by looking at what elements are affecting the commitment to the Taiwan question in Sino-American relations and how this can be explained by using ontological terms such as "rooted identity" and "significant others". Two key elements has been identified to analyze this; victimization and legitimacy. To evaluate the subject two research questions will be used; how can legitimacy and victimization explain China’s commitment to the Taiwan question when it comes to Sino-American relations? What is the connection between legitimacy, victimization and the PRC’s rooted identity? Policy-statement and official documents will be used to sheed light on the Taiwan-questions affects on Sino-American relations from an ontological security theory perspective. The thesis will argue that the PRC’s early history has great effects on their commitment to this issue and that legitimacy and victimization is affecting China’s commitment to Taiwan to the extent that it cannot accept an independent Taiwan. Hence this issue will continue to have great impact on China’s foreign relations, especially with the U.S. However, despite strong rhetoric’s China does not necessarily need to achieve unification with Taiwan in the near future.
APA, Harvard, Vancouver, ISO, and other styles
2

Krüger, Katharina. "Ontological Security of Women : The Role of Digital Feminist Activism." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-89032.

Full text
Abstract:
Ontological Security Studies have been grounded on the ideas of Giddens (1991a,b). It describes how humans can face challenges of the modern world without being overwhelmed by anxieties. Since then many scholars such as Steele (2008) and Mitzen (2006) have developed his ideas furthermore. However, ontological security still lacks in terms of gender aspects (Kinnvall and Mitzen, 2016), individual security seeking (Croft and Vaughan-Williams, 2016) or the role of community rather than the state to secure ontological security (Berenskoetter, 2012). This thesis focusses on all three themes when analysing how women use mechanisms to strengthen their ontological security within the online community. Feminism is a strategy for women to build a common identity. Women used the #metoo to share their experience of sexual harassment and anxieties in a gender-hierarchical power system. Human development and security is not only physical security but includes living in freedom of fear, want and in dignity. Threats which challenge systems of believe, such as living in an equal world or living without fear, lead to ontological insecurity. Therefore, women look out for new routines which provide security. Drawing on existing scholarship, this thesis aims to undercover if digital feminist activism can be a source for women to gain ontological security when the state fails to provide it. A social constructivist approach is followed within the research. The aim is to acknowledge the experience and practices of the different perspectives: by female activists and women opposed to feminist movements. Therefore, the empirical basis of this study contains 198 Twitter posts which are sampled out of 6679 posts. A content analysis helped to understand the dynamics of online behaviour and furthermore, puts it into the context of their everyday experience.
APA, Harvard, Vancouver, ISO, and other styles
3

Ralston, Robert James. "Ontological Security: State Identity and Self-Image in the Digital Age." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/76785.

Full text
Abstract:
The driving argument of this thesis is that states, particularly the United States, are vulnerable in cyberspace for reasons that go beyond the material vulnerabilities that present studies on state insecurity in cyberspace focus on. This vulnerability in cyberspace is an ontological insecurity. Ontological insecurity reveals itself in the contradictions in official state discourse regarding cyberspace. State security of self—preserving and maintaining the seemingly concrete and consistent nature of what a state is about, how the state is understood in relation to other states, and how the state comes to understand itself through its own conceptions of self-identity—is challenged by cyberspace as a vehicle for massive amounts of information and challenges to state identity in relation to the state's behavior in cyberspace. Therefore, state identity and self-image are challenged in relation to cyberspace in two ways: first, through the vehicle that is cyberspace, and, second, through the practices that the state adopts to secure cyberspace and its broader security aims. The language that states, in this case the United States, use in order to justify surveillance practices and to impose meaning to cyberspace ultimately leads to projections of power that attempt to reinforce state strength and legitimacy vis-à-vis cyberspace, but these attempts fall short; contradictions arise in state discourse, and weaknesses are highlighted through these contradictions. Cyberspace, then, is an ontological as well as physical security threat to states.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
4

McGoldrick, John. "Ontological security and identity work : a case study of management consultancy." Thesis, University of Bristol, 2017. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738559.

Full text
Abstract:
This thesis explores a core concept in the social sciences, ontological security, and seeks to demonstrate its relevance to management and organization studies. Following Giddens (1984, 1991), ontological security is seen as a system of basic trust in oneself which offers a resource for meaningful continuity in self-identity, albeit one always open to disruption. However, the view, almost naturalised in critical management studies is that such security will only ever be fleeting, temporary and futile (Knights and Clarke, 2014) and that it is ontological insecurity that lies at the heart of work place relations and regulation (Alvesson and Willmott, 2002) is challenged. In addition, the research contributes to identity work theory by drawing on a Ricoeurian lens of the continuity and mobility of identity to differentiate between significant contexts of identity work. These are linked to identity regulation and processes of resistance and identity assertion and repair that can represent moments of micro-emancipation as well as resources to support future identity work. These dynamics are explored in the empirical context of individuals in the field of management consultancy in the UK, using an adapted learning history method (Roth and Kleiner, 1998) as a form of dialogical narrative analysis. This approach is shown to support two additional objectives of this research – heightened critical reflection among participants and avoiding a monopolisation of voice by the researcher.
APA, Harvard, Vancouver, ISO, and other styles
5

Hiscock, Rosemary Esther. "The relationship between housing tenure and health : does ontological security play a role?" Thesis, University of Glasgow, 2001. http://theses.gla.ac.uk/6146/.

Full text
Abstract:
Previous research in the UK and elsewhere has found that housing tenure (i.e. whether the dwelling is owned or rented) predicts mortality and morbidity. This thesis aims to explain whether ontological security (a long term tendency to believe things are reliable and secure as opposed to threatening) is more likely to be associated with owner occupation, and therefore whether it helps to explain the observed association with tenure and health. For the purposes of this study ontological security was operationalised as being formed of three components: protection, autonomy and prestige. A scale was devised to measure ontological security arising from the home through these three components. This scale was included in a postal survey that also included questions on health, housing area, psychological and sociodemographic characteristics. The postal survey was sent to a random sample of adults in the West of Scotland and nearly 300 completed questionnaires were returned. I found that ontological security was associated with owner occupation but not independently of features of housing. Ontological security was not independently related to housing tenure itself. Owner occupiers reported more ontological security from their homes because their homes were in better condition, situated in better areas and of higher value than social renters. Ontological security appeared to be related to health particularly through psychological characteristics. Other reasons for the associations between tenure and health were that owners were on average younger and richer than social renters. This study suggests that social meaning per se may not be health damaging, but that social rented homes might put their occupants at greater health risk because they are in poorer condition, located in more poorly resourced and problem ridden areas and of lower status. These features of social renting may also be observed in other countries (e.g. USA).
APA, Harvard, Vancouver, ISO, and other styles
6

Charoenvattananukul, Peera. "Ontological security and status-seeking : Thailand's proactive behaviours during the Second World War." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/278717.

Full text
Abstract:
The puzzle that drives this study is why Thailand pursued a proactive foreign policy towards greater powers during the Second World War. The main literature on Thai foreign policy-making generally suggests that Thailand is traditionally passive vis-à-vis greater powers. Oftentimes, it is believed that the fate of Thailand is subjected to the dictate of great powers. The empirical cases of Thailand during the Second World War suggest otherwise. How could a conventional understanding of Thai foreign policy make sense of Thailand’s war against France in 1940-41? Similarly, how could one understand Thailand’s defiant behaviours vis-à-vis Japan in 1941-44 despite the latter’s greater military capabilities and influence? This thesis employs the approaches of ontological security and status concern to interpret Thai proactive behaviours during the wartime period. It argues that concerns for status and recognition from the great powers were the primary motivations of Thailand’s proactive behaviours. In order to discern material and ideational motives of the Thai foreign policy-makers, this research heavily relies on archival research and utilises documents which were formerly considered to be classified. This methodological quest is to establish and enhance the credibility of the argument presented in the study.
APA, Harvard, Vancouver, ISO, and other styles
7

Harries, Tim. "Householder responses to flood risk : the consequences of the search for ontological security." Thesis, Middlesex University, 2008. http://eprints.mdx.ac.uk/13589/.

Full text
Abstract:
As the recent floods in the UK have shown, most householders in at-risk areas are not prepared for floods. In fact, even amongst those who know they are at risk, less than 10% have taken any practical steps to prepare for flooding. This research attempts to explain that phenomenon by examining the effects of the rhetorical strategies that lay-people employ to help them cope with household flood risk. Looking at at-risk householders who have been flooded, as well as at those who have not, it combines close textual analysis of spoken interviews with secondary analysis of survey data to identify the rationalities that structure lay-people's talk and behaviour on the issue of flood risk. The low take-up of mitigation measures, it concludes, can be explained by the fact that householders prioritise the reduction of anxiety over the reduction of the risk of physical harm. Anxiety is familiar, predictable and causes immediate harm; flooding is unfamiliar to most residents, is unpredictable and is represented as difficult to control. As a result, householders eschew mitigation measures if they are uncertain of their efficacy and if they feel they will make them more anxious. Instead, they choose to protect a representation of life that enables them to feel secure. If state agencies are to influence householder responses to flood risk, it is suggested, they need to understand this rationale and to work with it. In order to increase the take-up of mitigation measures they should minimise the anxiety associated with taking mitigation measures - avoiding messages that provoke fear responses, making flood risk mitigation seem a normal part of home security and providing householders with individually tailored advice so that they feel less anxious about making a mistake when they choose which measures to implement.
APA, Harvard, Vancouver, ISO, and other styles
8

Fontenele, Marcelo Paiva. "Designing a method for discovering expertise in cyber security communities : an ontological approach." Thesis, University of Reading, 2017. http://centaur.reading.ac.uk/71325/.

Full text
Abstract:
Cyber security aims to protect our connected society from threats affecting services that rely on cyberspace. The pervasive nature of those threats requires a collaborative engagement in which a heterogeneous set of stakeholders request or provide security services. One of the major challenges in current cyber security initiatives is to place skilled people wherever needed whilst reducing the overall knowledge gap. Thus, in order to orchestrate roles in such a complex and dynamic environment, a novel approach to discover talent within the cyber security community is required. This PhD research addresses this challenge by devising a conceptual model and an ontological methodology, which aids a robust discovery of the fittest expertise driven by the specific needs of cyber security projects, as well as benchmarking expertise shortages. Talent management, knowledge management and organisational modelling theories provide the theoretical foundations upon which the cyber security community is articulated. Mixed methods were performed within a cyber security community to triangulate findings in the literature, test the method and appraise the solution. The method for discovering expertise in cyber security communities (DECYSE) is capable of delivering a seamless solution for processes involving expertise discovery. This method enables learning from previous projects; supports selection, ranking and assessment of experts according to specified requirements in a project profile; and provides indicators to measure knowledge gaps and shortages in the cyber security community. The DECYSE method is robust and underpinned by analytical techniques, considering complex interactions and perspectives from the actors involved. In order to promote ongoing improvement on the method itself, this thesis also details the conceptual model which articulates the requirements for developing DECYSE. A round of experiments was successfully conducted, where a team of three experts, out of sixty-six participant profiles, met the criteria in a cyber security project. The method was also positively appraised by a board of experts working with strategic CS projects. DECYSE enables ongoing improvement and contributes to both theory and the cyber security community.
APA, Harvard, Vancouver, ISO, and other styles
9

Kirke, Alexander Tom Sebastian. "Political myth and the need for significance : finding ontological security during times of terror." Thesis, University of Newcastle upon Tyne, 2017. http://hdl.handle.net/10443/3707.

Full text
Abstract:
This thesis offers a novel theoretical framework for analysing how political and media elites invoke political myths following terror attacks. It does not define political myths as necessarily false claim or untrue stories, but instead draws on the existentialist approaches of Hans Blumenberg and Chiara Bottici to argue that they are form of dramatic narrative that answers human needs for significance (Bedeutsamkeit). Human beings require significance to live in a world that is otherwise indifferent to them or, as Martin Heidegger put it, they are “thrown” into. The thesis thereby connects modern literature on political myth to concept of Angst, most prominently discussed by Søren Kierkegaard and expanded upon by later existentialist philosophers. The thesis elaborates on this with the novel insight that the process of finding significance is also an act of constructing ontological security, and that this is particularly apparent in times of crisis. Following the works of Anthony Giddens and Stuart Croft, the thesis defines ontological security as a condition in which people have constructed a sense of biographical continuity, have a strong web of trust-relations, and are able to avoid Angst. The thesis argues that terror attacks are moments where ontological security (not just physical security) is under threat, and that the process of finding significance (Bedeutsamkeit) through the work on myth simultaneously (re)establishes ontological security. It focuses on two empirical examples: the 7th July 2005 bombings in London and the 2013 Murder of Fusilier Lee Rigby. Following these terror attacks, senior political figures and media commentators invoked a political myth which portrayed the United Kingdom as embroiled in an existential conflict with violent radical Muslims inspired by a warped interpretation of Islam. The thesis concludes that its novel theoretical framework can enable an understanding of discursive responses to other terror attacks across the globe.
APA, Harvard, Vancouver, ISO, and other styles
10

Chaplin, Aliviah N. "The Ontological Security Complex: The Impact of System Altering Events on States’ Existential Identities." Ohio University Honors Tutorial College / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1556210264741664.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Ontological security"

1

Colley, Thomas, and Carolijn van Noort. Strategic Narratives, Ontological Security and Global Policy. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-00852-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Franklin, Adrian. Owner occupation, privatism and ontological security: A critical reformulation. Bristol: University ofBristol, School for Advanced Urban Studies, 1986.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kinnvall, Catarina. Globalization and religious nationalism in India: The search for ontological security. London: Routledge, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Heritage, Anisa, and Pak K. Lee. Order, Contestation and Ontological Security-Seeking in the South China Sea. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-34807-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Steele, Brent J. Ontological security in international relations: Self-identity and the IR state. Milton Park, Abingdon, Oxon: Routledge, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Steele, Brent J. Ontological Security in International Relations. Routledge, 2008. http://dx.doi.org/10.4324/9780203018200.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rumelili, Bahar. Conflict Resolution and Ontological Security: Peace Anxieties. Taylor & Francis Group, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rumelili, Bahar. Conflict Resolution and Ontological Security: Peace Anxieties. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rumelili, Bahar. Conflict Resolution and Ontological Security: Peace Anxieties. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Rumelili, Bahar. Conflict Resolution and Ontological Security: Peace Anxieties. Taylor & Francis Group, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Ontological security"

1

Vékony, Dániel. "Ontological Security." In The Palgrave Encyclopedia of Global Security Studies, 1–8. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-74336-3_91-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Peoples, Columba, and Nick Vaughan-Williams. "Ontological security." In Critical Security Studies, 66–79. 3rd edition. | Abingdon, Oxon ; New York, NY : Routledge, 2021.: Routledge, 2020. http://dx.doi.org/10.4324/9780429274794-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Vékony, Dániel. "Ontological Security." In The Palgrave Encyclopedia of Global Security Studies, 1063–70. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_91.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Browning, Christopher. "Ethics and Ontological Security." In Ethical Security Studies, 160–73. and Anthony Burke. Description: Abingdon, Oxon ; New York, NY :: Routledge, 2016. http://dx.doi.org/10.4324/9781315692005-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Edwards, Jane. "Ideology and Ontological Security." In International Explorations in Outdoor and Environmental Education, 205–44. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-02147-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Geri, Maurizio. "Interacting Variable: Ontological Security." In Ethnic Minorities in Democratizing Muslim Countries, 201–34. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75574-8_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ejdus, Filip. "Conflict, Peace, and Ontological Security." In The Palgrave Encyclopedia of Peace and Conflict Studies, 1–9. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-11795-5_126-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wong, Catherine Mei Ling. "Risk, Safety and Ontological Security." In Energy, Risk and Governance, 107–51. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-63363-3_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ejdus, Filip. "Conflict, Peace, and Ontological Security." In The Palgrave Encyclopedia of Peace and Conflict Studies, 211–19. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-77954-2_126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaunert, Christian, and Edwin Ezeokafor. "Ontological security and West Africa." In Securitization Outside the West, 48–71. London: Routledge, 2022. http://dx.doi.org/10.4324/9781003133216-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Ontological security"

1

Joque, Justin, and S. M. Taiabul Haque. "Deconstructing Cybersecurity: From Ontological Security to Ontological Insecurity." In NSPW '20: New Security Paradigms Workshop 2020. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3442167.3442170.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chudinov, Sergey. "THE CONCEPT OF ONTOLOGICAL SECURITY: CRITICAL ANALYSIS." In 2nd International Multidisciplinary Scientific Conference on Social Sciences and Arts SGEM2015. Stef92 Technology, 2015. http://dx.doi.org/10.5593/sgemsocial2015/b31/s11.093.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Orwat, Mark E., Timothy E. Levin, and Cynthia E. Irvine. "An Ontological Approach to Secure MANET Management." In 2008 Third International Conference on Availability, Reliability and Security. IEEE, 2008. http://dx.doi.org/10.1109/ares.2008.183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Veloudis, Simeon, and Iraklis Paraskakis. "Ontological Templates for Modelling Security Policies in Cloud Environments." In PCI '16: 20th Pan-Hellenic Conference on Informatics. New York, NY, USA: ACM, 2016. http://dx.doi.org/10.1145/3003733.3003796.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jarwar, Muhammad Aslam, Jeremy Watson CBE FREng, Uchenna P. Daniel Ani, and Stuart Chalmers. "Industrial Internet of Things Security Modelling using Ontological Methods." In IoT 2022: The 12th International Conference on the Internet of Things. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3567445.3571103.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hempelmann, Christian F., Abdullah N. Arslan, Salvatore Attardo, Grady P. Blount, and Nikolay Metodiev Sirakov. "Assessing the threat of firearms: new threat formula, resources, and ontological linking algorithms." In SPIE Defense + Security, edited by Ivan Kadar. SPIE, 2014. http://dx.doi.org/10.1117/12.2050814.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Khoury, Paul El, Amine Mokhtari, Emmanuel Coquery, and Mohand-Said Hacid. "An Ontological Interface for Software Developers to Select Security Patterns." In 2008 19th International Conference on Database and Expert Systems Applications (DEXA). IEEE, 2008. http://dx.doi.org/10.1109/dexa.2008.110.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuri da Rosa, Diorgenes, Ricardo Almeida, Roger Machado, Adenauer Yamim, and Ana Marilza Pernas Fleischmann. "An Ontological Approach to Situational Awareness Applied to Information Security." In 2018 XLIV Latin American Computer Conference (CLEI). IEEE, 2018. http://dx.doi.org/10.1109/clei.2018.00091.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Fontenele, Marcelo, and Lily Sun. "Knowledge management of cyber security expertise: an ontological approach to talent discovery." In 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security). IEEE, 2016. http://dx.doi.org/10.1109/cybersecpods.2016.7502356.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fedorchenko, A. V., I. V. Kotenko, E. V. Doynikova, and A. A. Chechulin. "The ontological approach application for construction of the hybrid security repository." In 2017 XX IEEE International Conference on Soft Computing and Measurements (SCM). IEEE, 2017. http://dx.doi.org/10.1109/scm.2017.7970638.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography