Academic literature on the topic 'Regional security analysis'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Regional security analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Regional security analysis"

1

Nazarova, Galyna, and Alina Demianenko. "Analysis of the human security in Ukraine in a regional perspective." Social and labour relations: theory and practice 8, no. 2 (February 27, 2019): 1–7. http://dx.doi.org/10.21511/slrtp.8(2).2018.01.

Full text
Abstract:
The article investigates the theoretical aspects, features and the main directions of development of human security concept. On the basis of systematization of scientific sources; and summarizing the experience of scientists, whose works are devoted to the problems of analysis and assessment the level of human security, the author improved the system of indicators that underlies the classification regions of Ukraine. According to the results of cluster analysis, the regions are grouped into six clusters. The article analyzes the dynamics of quantitative distribution regions of Ukraine according to the selected clusters. In the research process, we defined the cores with a constant composition of regions and presented the characteristics of each cluster. It is interesting to note that the appearance of the last (sixth) cluster has been observed since 2014, according to a number of objective reasons. The results of the study indicate a rather pronounced unevenness in the state of human security in the regions of Ukraine.
APA, Harvard, Vancouver, ISO, and other styles
2

Колесниченко, Elena Kolesnichenko, Спицына, and Evgeniya Spitsyna. "Factors of economic security: regional level analysis." Forestry Engineering Journal 5, no. 3 (November 15, 2015): 273–81. http://dx.doi.org/10.12737/14176.

Full text
Abstract:
Authors of the article a lot of attention is paid to the study of factors of economic security of the territory. The objects of study become classification and grading factors and determinants of economic security provided by various scientists in their research. The article found that in spite of numerous groups of factors important to their timely identification and development of an adequate type and kind of leveling tools. In this context, a study of factors of economic secu-rity of the territory on the principle of "external - internal."
APA, Harvard, Vancouver, ISO, and other styles
3

V., I., N. A., V. M., and V. O. "ANALYSIS OF ECONOMIC SECURITY AT THE REGIONAL LEVEL." Вестник Алтайской академии экономики и права, no. 7 2019 (2019): 31–36. http://dx.doi.org/10.17513/vaael.628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Spiegel, Steven. "Regional security and the levels of analysis problem." Journal of Strategic Studies 26, no. 3 (September 2003): 75–98. http://dx.doi.org/10.1080/01402390412331303065.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Yanxia, Buyu Chen, and Fangfei Li. "Analysis on the Coupling Relationship between Urbanization and Regional Ecological Security and Empirical Analysis." E3S Web of Conferences 143 (2020): 01037. http://dx.doi.org/10.1051/e3sconf/202014301037.

Full text
Abstract:
With the acceleration of urbanization, regional ecological security issues have become increasingly prominent. There is a complex relationship between urbanization and urban ecological security. This paper uses the method of system analysis to qualitatively describe the coupling relationship between urbanization system and urban regional ecological security system, and quantitatively evaluate the coupling and coordination relationship between these two systems. The results show that the spatial urbanization subsystem is the most driven to the urbanization system, and the ecological security response system is an important factor to maintain and enhance the urban ecological security. Therefore, the spatial urbanization subsystem and the ecological security response subsystem have the greatest influence on the coupled system between urbanization and urban ecological security. Taking Shaanxi Province as an example, it is analyzed that the coordination degree between Shaanxi's urbanization system and regional ecological security system is increasing from 2005 to 2016, and has experienced four stages : uncoordinated recession, low coordination, moderate coordination and high coordination. The coordination degree between urbanization development and urban ecological security has been continuously improved, indicating that urbanization development has a positive role in promoting urban ecological security.
APA, Harvard, Vancouver, ISO, and other styles
6

Sun, Jin Hua, Jian Hu, Jian Ming Yan, Zhen Liu, and Yu Ren Shi. "Regional Energy Security Analysis with Cluster Eensemble Method: A Case of Typical Regions in China." Applied Mechanics and Materials 291-294 (February 2013): 811–16. http://dx.doi.org/10.4028/www.scientific.net/amm.291-294.811.

Full text
Abstract:
Energy is the foundation of regional economy sustainable development. it is more and more serious of regional energy security problem with the rapid economic growth, industrialization and city development. The concept of regional energy security is defined. According to the characteristic of regional energy security problem, a cluster ensemble structure with system energy theory and an algorithm, called F-ETMC, are put forward to analysis regional energy security problem. The experiment shows that the method not only effectively analysis the regional energy security, but also provides the reference for energy development strategy and policy making.
APA, Harvard, Vancouver, ISO, and other styles
7

Okunev, I., and V. Vinogradov. "Regional Security Complexes (Spatial Autocorrelation and Cluster Analysis Stimulation)." World Economy and International Relations 65, no. 4 (2021): 30–41. http://dx.doi.org/10.20542/0131-2227-2021-65-4-30-41.

Full text
Abstract:
Received 23.03.2020. Security studies are going through a new stage of development. The 20th century was marked by scientific discussions about globalization itself and its possible impact on international security, the need to adjust concepts and methodologies. Many modern challenges are a direct consequence of increased global interdependence. At the same time, global attention is shifting towards regions, because the processes originating there can explain and determine the structure of international security. In turn, it is vital to adopt the knowledge and methodology of regional studies and political geography to avoid the “territorial trap”. In our opinion, international studies are still missing the importance of spatiality and its influence on the world political system. Regardless the importance of geographical factor and the fact that in some way it determines the vector of the world political system development, spatiality is often overlooked. “Thinking in the space” is a skill necessary for any researcher. Spatiality is not just a set of geographical characteristics, but something more integral. Therefore, to understand international security and prospects for its further development, we need a comprehensive approach taking a wide range of factors into account. Moreover, an important problem of modern international security is the lack of comprehensive security studies at the global level that take into account the factor of space and regionalization. The research identifies Regional Security Complexes using cluster analysis of k-means. A spatial autocorrelation analysis is used to justify found systems, which consider the mutual influence of countries on each other. In a nutshell, it can explain regionalization of international security and the role of spatial factor in this process, create methodological framework for further analysis of Regional Security Complexes. Acknowledgements. The article has been supported by the grant of the IIS MGIMO No. 1921-01-09 “Geopolitical Atlas of the Modern World: Cartograms Modelling, Multidimensional Scaling and Determination of Local Indicators of Spatial Autocorrelation in World Politics”.
APA, Harvard, Vancouver, ISO, and other styles
8

Somzhurek, B. Zh, A. M. Yessengaliyeva, Zh M. Medeubayeva, and B. K. Makangali. "Central Asia and regional security." Communist and Post-Communist Studies 51, no. 2 (June 1, 2018): 161–71. http://dx.doi.org/10.1016/j.postcomstud.2018.04.005.

Full text
Abstract:
This paper aims to analyze the politico-military cooperation among the Central Asian countries viewed as a key factor in ensuring the regional security. Today, the geopolitical tension in the surrounding regions, the worsening situation in Afghanistan, as well as intraregional socio-economic problems directly affect the security situation in Central Asia. In this regard, the question arises as to how well the Central Asian states are able to meet these challenges. The analysis of the situation in the region in the 1990s and at the beginning of the new century shows that attempts have been made to establish a regional security system based on military cooperation among Kazakhstan, Uzbekistan, Kyrgyzstan and Tajikistan. However, unregulated interstate relations in Central Asia, the lack of political will to cooperate with leaders of neighboring countries and the combination of external and internal threats have contributed to the creation of a regional security system based on the multilateral structures with the involvement of external actors.
APA, Harvard, Vancouver, ISO, and other styles
9

Romanova, N., S. Kononov, M. Shevchenko, and Yu Shevchenko. "REGIONAL SECURITY STUDIES IN MODERN FEDERAL STATE EDUCATIONS: GOVERNMENT AND REGIONAL DISCOURSES." Transbaikal State University Journal 27, no. 1 (2021): 85–94. http://dx.doi.org/10.21209/2227-9245-2021-27-1-85-94.

Full text
Abstract:
The purpose of the paper is to study the problem of regional security, for which the most urgent is the problem of powers distribution between the central government and the regions. The aim of the paper is to compare the ideas about the essence of regional security in the discourse of state power and the regions in order to find a solution to the possibility of managing the situation of regional security. The research methodology involves the use of comparative analysis, as well as the use of a phenomenological and situational approach, the theory of social services and the dialogue of cultures. The authors argue that the solution of the regional security problem within the framework of the federal state is a continuous process of finding a compromise aimed at an attempt to meet the multidirectional needs, one of which is to ensure the unity, sovereignty and integrity of the Russian Federation; the other is to protect and safeguard the safe existence of regions. Therefore, it is necessary to state that the system of vital interests at the regional level is mobile; it changes under the influence of conditions, security environment. A decisive role in the process of changes in regional interests, and, consequently, regional security, is played by factors prompting the region to take fundamentally important political and other actions, among which discourses of regional security stand out, such as the discourse of state power and regional discourse of security. This orientation determines the novelty of the study, which for the first time is aimed at separating the regional security discourse from the security discourse of state power and substantiating the resolution of the contradiction between them. As a result, the paper examines a regional security model within the framework of the concept of regional security complexes, which offers an analysis of this problem through a critical comparison of the power and regional discourses that have an intellectual impact on the formation of the foreign and domestic political situation in the country at various moments of political reality
APA, Harvard, Vancouver, ISO, and other styles
10

Knight, W. Andy, and Randolph B. Persaud. "Subsidiarity, Regional Governance, and Caribbean Security." Latin American Politics and Society 43, no. 1 (2001): 29–56. http://dx.doi.org/10.1111/j.1548-2456.2001.tb00169.x.

Full text
Abstract:
AbstractThe reconfiguration of the global security order since the late 1980s has had a heavy impact on regional security in the Caribbean. Having lost strategic importance, the Caribbean states have been attempting to restructure their relationship with the United States. These small states are interested in building a regional security regime that is inclusive, transparent, and accountable. This analysis shows how the principle of subsidiarity may be employed to achieve that end.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Regional security analysis"

1

Khoo, How San, and xiaosan@starhub net sg. "Approaches to the Regional Security Analysis of Southeast Asia." The Australian National University. Choose one, 1999. http://thesis.anu.edu.au./public/adt-ANU20050617.140925.

Full text
Abstract:
The purpose of this study is to critically evaluate three scholarly perspectives -- balance of power, institutional, and security complex -- to examine the evolving dynamics of security interdependence and inter-state relations among Southeast Asian states and external powers since 1945. This study is thus a comparative evaluation of the strengths and weaknesses of the three methods in their empirical analysis of the regional security dynamics of Southeast Asia.¶ There is much merit in the balance of power approach. It tracked the consequences of the bipolar Cold War rivalry on Southeast Asia. Its logical construction led it to be concerned with alliances, coalitions and alignments. But it has not satisfactorily explained the relatively benign conditions after the Cold War. The institutional approach similarly emphasizes material explanatory factors (although, in its case, not exclusively so). It identifies the emergence of institutions when groups of countries find it in their mutual interest to cooperate through rules and norms. But the approach may prove to be incomplete in assessing ASEAN's post-Cold War behaviour. As an analytical device, the security complex is deployed to provide a corrective to the over-emphasis (of the other two approaches) on the systemic dynamics. By identifying regional and local dynamics interacting with systemic dynamics via patterns of amity and enmity, it offers explanatory accounts of the behaviour of regional states in situations where the other two approaches fail to do satisfactorily. Moreover, it provides a framework for the deployment of constructivism, which identifies the ideational process whereby interdependent regional states respond to changes in both the power and amity-enmity attributes.¶ This study concludes that security relations among Southeast Asian states and in their relations with external powers after the Cold War, are better examined using the three approaches in a complementary manner. In this way, the influence of local amity-enmity patterns is seen to impact on balance of power and institutional situations.
APA, Harvard, Vancouver, ISO, and other styles
2

Darboe, Ndey Ramou. "REGIONAL SECURITY ANALYSIS : ECOWAS AND THE CONSTITUTIONAL CRISIS IN THE GAMBIA." Thesis, Karlstads universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-78750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anum, Samuel Adotey. "A security analysis of the Ivorian conflict : 1993-2003." Diss., University of Pretoria, 2010. http://hdl.handle.net/2263/27391.

Full text
Abstract:
The objective of this study is to examine the role of the political élite in the analysis of the causes of conflicts and insecurity as well as the determination of threats to national security in the Third World with particular reference to West Africa using Côte d’Ivoire as a case study. To achieve this aim, the study employed a conceptual framework of national security that highlighted the concept of security and the distinction between the traditional notions and widening views of security as manifested in the post-Cold War approaches to the subject. The differences between the various levels of security, namely national security and state and regime security were examined. A distinction was made between minimal and maximal states on the one hand, and strong and weak states on the other which enabled the application of the concepts to Third World countries, including Africa. The concept of threats and vulnerabilities and how subjective elements of threat assessment blurred the difference between national security and regime security, were also analyzed including the causes of armed conflicts in developing countries and in Africa specifically. Based on these concepts, the study analyzed the political, socio-economic and security conditions of the Ivory Coast in the period before and during French rule, including the post-independence era. The aim of the historical analysis was to highlight the critical role played by the élite in the identification of threats to national security. This role invariably identified with the protection of élite interest or regime security and often reflected a subjective view of threats to security, the management of which created high levels of insecurity leading to the armed conflict in Côte d’Ivoire in 2002. The study established that the preservation of élite interests and power is the root cause of conflicts in Africa and West Africa. Subsequently, élite cohesion becomes critical to the security of the state as élite disunity leads to manipulation of objective threats or risks that generates insecurity that not only transcends borders, but also creates a security dilemma for states as well as conditions for irredentism.
Dissertation (MSecurity Studies)--University of Pretoria, 2010.
Political Sciences
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
4

Abusidu-Al-Ghoul, Fady Y. "Why has the Arab League failed as a regional security organisation? An analysis of the Arab League¿s conditions of emergence, characteristics and the internal and external challenges that defined and redefined its regional security role." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6333.

Full text
Abstract:
This study presents a detailed examination of the Arab League¿s history, development, structure and roles in an effort to understand the cause of its failure as a regional security organisation. The research¿s point of departure is a questioning of the nature and scope of this failure in terms of the interplay between the conditions under which it was formed and the many actors and dynamics that had a long term-impact on the prospects for the League. To this end, the study looks at the League¿s conditions of emergence and Arab-Arab relations with the focus on Arab national security as the main concept determining its security role. The research synthesises methods of analysis from the existing literature and schools of thought so as to identify where and why failure and success occurred in relation to international relations theories, the security and international organisations literature, and comparable international models. The development and conditions affecting the League as discussed in the research demonstrate that none of the existing broad theories or approaches can fully explain the League¿s failure; however, the constructivist approach, although never before applied in this context, is shown to offer the most relevant approach for explaining this organisation and its unique parameters. The research also examines the role played by the Arab League in regional peacekeeping and conflict prevention in the context of Arab national security, with Palestine as a case study.
APA, Harvard, Vancouver, ISO, and other styles
5

Abusidu-Al-Ghoul, Fady Y. "Why has the Arab League failed as a regional security organisation? : an analysis of the Arab League's conditions of emergence, characteristics and the internal and external challenges that defined and redefined its regional security role." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6333.

Full text
Abstract:
This study presents a detailed examination of the Arab League's history, development, structure and roles in an effort to understand the cause of its failure as a regional security organisation. The research's point of departure is a questioning of the nature and scope of this failure in terms of the interplay between the conditions under which it was formed and the many actors and dynamics that had a long term-impact on the prospects for the League. To this end, the study looks at the League's conditions of emergence and Arab-Arab relations with the focus on Arab national security as the main concept determining its security role. The research synthesises methods of analysis from the existing literature and schools of thought so as to identify where and why failure and success occurred in relation to international relations theories, the security and international organisations literature, and comparable international models. The development and conditions affecting the League as discussed in the research demonstrate that none of the existing broad theories or approaches can fully explain the League's failure; however, the constructivist approach, although never before applied in this context, is shown to offer the most relevant approach for explaining this organisation and its unique parameters. The research also examines the role played by the Arab League in regional peacekeeping and conflict prevention in the context of Arab national security, with Palestine as a case study.
APA, Harvard, Vancouver, ISO, and other styles
6

Kusuma, Agus Renaldi. "Future Indonesia-East Timor relations an analysis of the regional security practices in the Cold War and after /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA392072.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, June 2001.
Thesis advisor(s): Christoffersen, Gaye. "June 2001." Includes bibliographical references (p. 139-142). Also Available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Mabon, Simon Paul. "The impact of identity incongruence upon regional security : an analysis of bi-lateral competition between Iran and Saudi Arabia post 1979." Thesis, University of Leeds, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.574520.

Full text
Abstract:
Despite the apparent resilience of the state as the primary actor across the Middle East myriad competing identities exist at the state, sub-state and trans- state levels that are often in direct competition with each other. The interaction of these identities can perhaps best be seen in the Gulf region and in particular, in relations between Iran and Saudi Arabia, where strong ethno-national and religious identities reside, often engaged in zero-sum competition with each other. Indeed, within both Iran and Saudi Arabia there exists incongruence between national, religious, and ethno-tribal identities. These identities threaten the ideological and territorial integrity of the regimes in question, while also challenging the legitimacy of ruling elites. This thesis considers the impact of this identity incongruence upon the bi-Iateral relationship between Iran and Saudi Arabia post 1979, focussing upon competition within ideological and geopolitical spheres. Given the threats to ideological and territorial integrity of the state, identity incongruence can be understood as an internal security dilemma. The thesis argues that attempts to manage internal security dilemmas manifest themsevles inan external security dilemma. The relationship between internal and external security is referred to here as the Incongruence Dilemma. The Incongruence Dilemma builds upon a Classical Realist position, but by giving credence to identity and internal dynamics it challenges several of the assumptions held by Realists. The move from internal security dilemmas to external security dilemmas occurs as ruling elites seek to remove the threat posed by internal security dilemmas by referring to rhetoric and narratives of a nationalist and religious nature. The history of the Persian Gulf contains a record of conquest by both Arab and Persian armies, along with a legacy of intra-Islamic competition, which engendered a shared normative environment. Thus, in attempting to resolve internal security dilemmas through the use of religious and nationalist rhetoric, the state becomes embroiled in an external security dilemma fuelled by ideology. As such, in order to fully understand the bi-Iateral relationship between Iran and Saudi Arabia, one must examine the internal dynamics of each state. iv
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Ross H. "SOF regional engagement : an analysis of the effectiveness of current attempts to shape future battlefields /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMeyer.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Forsman, Todd Patrick. "Foreign direct investment and security: simplifying the complexities." reponame:Repositório Institucional do FGV, 2016. http://hdl.handle.net/10438/17998.

Full text
Abstract:
Submitted by Daniele Santos (danielesantos.htl@gmail.com) on 2017-02-23T14:51:13Z No. of bitstreams: 1 Todd.pdf: 1104896 bytes, checksum: fcb20db5c4f43bd841fa271202a91405 (MD5)
Approved for entry into archive by Janete de Oliveira Feitosa (janete.feitosa@fgv.br) on 2017-02-23T20:43:44Z (GMT) No. of bitstreams: 1 Todd.pdf: 1104896 bytes, checksum: fcb20db5c4f43bd841fa271202a91405 (MD5)
Made available in DSpace on 2017-03-03T14:09:19Z (GMT). No. of bitstreams: 1 Todd.pdf: 1104896 bytes, checksum: fcb20db5c4f43bd841fa271202a91405 (MD5) Previous issue date: 2016-12-14
The relationship between foreign direct investment and the security situation of a given country is complex and difficult to define. To further complicate matters, security is only one of many variables that drives the decision of a firm to invest in a particular country. This paper simplifies some of the complexities related to the study of this topic, especially as it relates to security, by expanding on previous research done at the country level and applying it at the regional level. It concludes that the security situation of a given country can be approximated through the the independent variable of the annual per capita murder rate and that this rate is directly related with FDI in a given area. Business leaders can use this simple analysis as a starting point to aid in the decision in which country to invest in and why.
APA, Harvard, Vancouver, ISO, and other styles
10

Binaj, Dhimiter. "An analysis of United States-Albanian security relations in light of the War on Terrorism." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FBinaj.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Regional security analysis"

1

Levran, Aharon. The Middle East military balance, 1987-1988: A comprehensive data base & in-depth analysis of regional strategic issues. Jerusalem, Israel: Published for the Jaffee Center for Strategic Studies by the Jerusalem Post, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pope, Robert S. US interagency regional foreign policy implementation: A survey of current practice and an analysis of options for improvement. Maxwell Air Force Base, Alabama: Air University Press, Air Force Research Institute, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Makinda, Samuel M. Security in the Horn of Africa: An analysis of post cold-war developments in regional security and emerging strategic issues in Ethiopia, Somalia, Sudan and Djibouti. London: Brassey's for the International Institute for Strategic Studies, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gadzhiev, Nazirhan, Magomed Gazimagomedov, Andrey Doronin, Natal'ya Ivlicheva, Sergey Konovalenko, Sergey Lebedev, Nikolay Pilyugin, et al. Economic security. ru: INFRA-M Academic Publishing LLC., 2020. http://dx.doi.org/10.12737/1048684.

Full text
Abstract:
The textbook contains 15 topics that reveal the specifics of the discipline Economic security". The systems of quantitative and qualitative indicators for assessing economic security are considered; the methodological principles of assessing financial and monetary policy as a sphere of economic security are studied; the conceptual foundations of the regional economic security program are formed; the theoretical foundations of economic security of enterprises are considered. The main problems of economic security are described in the light of national security issues. Security aspects such as the role of the financial system, foreign economic aspects, social security, and the impact of scientific and technical security on economic security are considered. Special attention is paid to the role of law enforcement agencies in ensuring economic security. Methods of ensuring economic security are described that allow combining the analysis of theoretical positions with real practice and providing a higher level of material assimilation by cadets and students. Meets the requirements of the Federal state educational standard of higher education of the latest generation in the specialty 38.05.01 "Economic security (specialty level)".
APA, Harvard, Vancouver, ISO, and other styles
5

Trades Union Congress. Economic and Social Affairs Department. Britain divided: Insecurity at work : analysis of regional job generation and job security in 1993-4 based on the Labour Force Survey. [U.K.]: TUC Economic and Social Affairs Department, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Khabriyeva, Taliya, Igor' Shuvalov, Anatoliy Kapustin, Nelli Bevelikova, Rashad Kurbanov, Olga Shvedkova, Asiya Belyalova, et al. ASEAN is a driving force for regional integration in Asia. ru: INFRA-M Academic Publishing LLC., 2016. http://dx.doi.org/10.12737/23222.

Full text
Abstract:
The book introduces the reader to the changing nature of integration processes in Asia under the influence of globalization. The analysis of factors that promote and hinder interaction between the ASEAN countries and non-regional partners of this Association is carried out. The study describes the dynamic processes of economic integration within the framework of the Russia - ASEAN dialogue partnership and features of cooperation in various areas of legal regulation. The author reveals the mechanisms that influence the formation of a region-wide free trade zone for the ASEAN member States, and makes recommendations on priority areas of integration trends in Asia. Particular attention is paid to the specifics of investment regulation in South-East Asia, harmonization of ASEAN legislation in the field of security, taxation, education, prospects for cooperation and legal mechanisms that ensure the implementation of further cooperation programs developed by the ASEAN member States. For researchers, representatives of public authorities, as well as for anyone interested in the dynamics of integration processes in the Asia-Pacific region.
APA, Harvard, Vancouver, ISO, and other styles
7

Leonardi, Laura, ed. Flessicurezza/Flexiseguridad. Florence: Firenze University Press, 2012. http://dx.doi.org/10.36253/978-88-6655-097-6.

Full text
Abstract:
The strategy of flexicurity was adopted as a model by the European Union and proposed to all the Member States as a solution for addressing the challenges connected with the competitiveness and instability of the markets, with a view to enhancing employment levels and maintaining social cohesion. The various contributions in this book analyse the concept of flexicurity and its effective feasibility in different institutional contexts, in particular Italy and Spain and – at regional level – in Tuscany and Catalonia. The consequence of the variety of employment and social security models is that the meanings and manifestations of flexicurity are highly divergent, even in cases as analogous as Spain and Italy, since the different contexts generate significant differences. The overall analysis demonstrates that the forms of regulation and organisation of the social institutions, and their complementary nature, have a major impact on the relations between forms of flexibility and security, and do not always give rise to the virtuous process of flexicurity.
APA, Harvard, Vancouver, ISO, and other styles
8

1940-, Bühl Hartmut, and Quaden 1944-, eds. Sicherheit und Frieden: Handbuch der weltweiten sicherheitspolitischen Verflechtungen : Militärbündnisse, Rüstungen, Strategien : Analysen zu den globalen und regionalen Bedingungen unserer Sicherheit. 2nd ed. Herford: Mittler, 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lobanov, Aleksey. Medical and biological bases of safety. ru: INFRA-M Academic Publishing LLC., 2021. http://dx.doi.org/10.12737/1439619.

Full text
Abstract:
The textbook considers the subject and tasks of the discipline, highlights the medical and biological foundations of ensuring human security in the conditions of natural, man-made and biological-social emergencies, as well as when using modern weapons of destruction by a probable enemy. Briefly, but quite informative, the structure of the human body and the basics of its functioning are described. The specificity and mechanism of the toxic effect of harmful substances on a person, the energy effect and the combined effect of the main damaging factors of the sources of emergency situations of peacetime and wartime are shown. The article highlights the medical and biological aspects of ensuring the safe life of people in adverse environmental conditions, including in regions with hot and cold climates (the Arctic). The methods of forecasting and assessing the medical situation in emergency zones and lesions are presented. The means and methods of medical and biological protection and first aid to the affected are shown. The main tasks and organizational structure of formations and institutions of the medical rescue service of the GO, the All-Russian Service of Disaster Medicine and medical formations of the EMERCOM of Russia are considered. Organizational issues of medical and biological protection in emergency situations are highlighted. The features of the organization of medical support for those affected by terrorist attacks are considered. It is intended for students and cadets of educational institutions of higher education studying under the bachelor's degree program in the following areas of training: "Technosphere security", "Infocommunication technologies and communication systems", "Information systems and technologies", "State and municipal management", "Economics", "Mechatronics and robotics", "Operation of transport and technological machines and complexes", "Informatics and computer engineering", "Air Navigation", "System analysis and management". It can also be useful for researchers and a wide range of specialists engaged in practical work on planning and organizing medical and biological protection of the population.
APA, Harvard, Vancouver, ISO, and other styles
10

Institute for Security Studies (Other Contributor), ed. Prospects for a Security Community in Southern Africa: An Analysis of Regional Security in the Southern African Development Community. Institute for Security Studies, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Regional security analysis"

1

Onditi, Francis, Gilad Ben-Nun, Edmond M. Were, and Israel Nyaburi Nyadera. "Approaches to Regional Security Analysis." In Reimagining Security Communities, 49–80. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-70869-6_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Buzan, Barry. "A Framework For Regional Security Analysis." In South Asian Insecurity and the Great Powers, 3–33. London: Palgrave Macmillan UK, 1986. http://dx.doi.org/10.1007/978-1-349-07939-1_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ulgiati, Sergio, Marco Ascione, Silvia Bargigli, Francesco Cherubini, Mirco Federici, Pier Paolo Franzese, Marco Raugei, Silvio Viglia, and Amalia Zucaro. "Multi-method and Multi-scale Analysis of Energy and Resource Conversion and Use." In Energy Options Impact on Regional Security, 1–36. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9565-7_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Udovyk, Oleg, and Oksana Udovyk. "Analysis of Energy Options Impact on Regional Security: The Case of Eastern Europe." In Energy Options Impact on Regional Security, 231–44. Dordrecht: Springer Netherlands, 2010. http://dx.doi.org/10.1007/978-90-481-9565-7_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yongfu, and Fengying Nie. "Analysis of China’s Food Supply and Demand Balance and Food Security." In New Frontiers in Regional Science: Asian Perspectives, 47–59. Tokyo: Springer Japan, 2016. http://dx.doi.org/10.1007/978-4-431-55282-6_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Syed, Md Abu. "Regional Analysis, Import-Export and Related Issues on Food Security." In Disaster Risk Reduction, 111–34. Tokyo: Springer Japan, 2015. http://dx.doi.org/10.1007/978-4-431-55411-0_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kulba, V., O. Zaikin, A. Shelkov, and I. Chernov. "Scenario Analysis in the Management of Regional Security and Social Stability." In New Frontiers in Information and Production Systems Modelling and Analysis, 249–68. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23338-3_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Alagappa, Muthiah. "Regional Arrangements, the UN, and International Security: a Framework for Analysis." In Beyond UN Subcontracting, 3–29. London: Palgrave Macmillan UK, 1998. http://dx.doi.org/10.1007/978-1-349-26263-2_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Adachi, Yoshimi. "Analysis of the Regional Disparity in Long-Term Care Insurance Contributions." In The Economics of Tax and Social Security in Japan, 153–73. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7176-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xu, Xiaojing, and Xianghui Tian. "The Decomposition of Regional Employment Growth Based on Shift-Share Analysis." In Proceedings of 2014 1st International Conference on Industrial Economics and Industrial Security, 369–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2015. http://dx.doi.org/10.1007/978-3-662-44085-8_54.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Regional security analysis"

1

Tevis, Jay-Evan J., and John A. Hamilton. "Static analysis of anomalies and security vulnerabilities in executable files." In the 44th annual southeast regional conference. New York, New York, USA: ACM Press, 2006. http://dx.doi.org/10.1145/1185448.1185570.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Tao, Liqun Shang, and Xianmin Ma. "Analysis on Security and Stability of Regional Power Grid." In 2018 37th Chinese Control Conference (CCC). IEEE, 2018. http://dx.doi.org/10.23919/chicc.2018.8482878.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hou, Bowen, and Donald L. Paul. "Security Implications of IIoT Architectures for Oil & Gas Operations." In SPE Western Regional Meeting. SPE, 2021. http://dx.doi.org/10.2118/200858-ms.

Full text
Abstract:
Abstract Implementing the IIoT paradigm into the classical oil & gas field OT systems is one of the essential concepts for Digital Oilfield 2.0. The transition in architecture and the corresponding technology changes can create a new cyber-physical security risk profile through alterations in the digital information structure of the oilfield OT system. With the onset of IIoT implementations in the industry, it is an opportune time to review and assess the emerging cyber-physical risk landscape. In the paper, we identified and compared the current oilfield OT logical structures with the designs emerging through the IIoT implementations. The analysis includes extensive reviews of developing standards, such as those proposed by Industrial Internet Consortium, and ongoing published experiences to find the primary points of transition. The security risks stemming from the IIoT implementation appear to raise significant concerns with regard to potentially severe cybersecurity outcomes, which could materially impact the integrity and safety of oilfieldoperations. The study concentrated on the cybersecurity threats that could pose negative physical and operational conditions resulting from loss of visibility and / or loss of control of the operational processes in field facilities. Extensive literature reviews were the basis for identifying the implications of cybersecurity risks in the ongoing stages of integrating the IIoT into the field. The reviews identified the modified strategies for cyber-physical systems, including potential threats and counter measurements for the field IIoT model. However, these proposed strategies still miss a fundamental denominator - the assessments generally ignore that it is the fundamental nature of IIoT structure itself that creates cyber-security vulnerabilities. To investigate further, we performed a contrasting analysis based on specific case studies of field IIoT devices such as the pump-off controller and OT architectures. Three foundational threat implications emerged on the transformation of IIoT architecture into the oilfield: 1)The exponential growth of connected distributed artificial intelligence (DAI) devices enormously increases the complexity of designing the software of each facility and system. 2)The cutting-edge Machine to Machine (M2M) characteristic in the IIoT model pushes the human out of the traditional control and monitor loop. 3)The widespread scale of DAI devices with the unique IP address in the network shifts cybersecurity risks to each connected endpoint. The cornerstone of the distinctive IIoT attributes illustrated in the paper contributes to the potential loss of control, leading to potential for serious damaging operational outcomes in the field. The goal of this paper is to aid oilfield security planning and design processes through animproved recognition of the cyber-physical security impacts emerging from the implementation of IIoT architectures and technologies integration into field OT domains.
APA, Harvard, Vancouver, ISO, and other styles
4

Wang, Yonggang, and Yi Meng. "Analysis about the Impact of Regional Aviation Transportation Security Factors." In First International Conference on Transportation Information and Safety (ICTIS). Reston, VA: American Society of Civil Engineers, 2011. http://dx.doi.org/10.1061/41177(415)252.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Yafei, Huan Zhang, Xiaoyang Luo, and Mengsi Wang. "A Regional Security Situation Model Based on Space Analysis Technology." In 2nd International Conference on Computer Engineering, Information Science & Application Technology (ICCIA 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/iccia-17.2017.62.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Wen, Chunran, Xu Shen, and Zhiping Zhou. "Research on the Influencing Factors of Regional Financial Risk under Internet Financial Innovation." In 2018 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC). IEEE, 2018. http://dx.doi.org/10.1109/spac46244.2018.8965529.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Li, Min, Ziting Li, Zhengqun Zhan, and Qiaoling Zhang. "Regional industry network construction and industrial structure change analysis." In 2017 4th International Conference on Industrial Economics System and Industrial Security Engineering (IEIS). IEEE, 2017. http://dx.doi.org/10.1109/ieis.2017.8078608.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Karginova-Gubinova, V. V. "Multimoora Analysis Of Regional Economic Security And Its Connection With Environmental Innovations." In Proceedings of the II International Scientific Conference GCPMED 2019 - "Global Challenges and Prospects of the Modern Economic Development". European Publisher, 2020. http://dx.doi.org/10.15405/epsbs.2020.03.6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Liu, Weijie, and Bai Zhang. "Regional Ecological Security Assessment Based on Long Periods of Ecological Footprint Analysis." In 2012 2nd International Conference on Remote Sensing, Environment and Transportation Engineering (RSETE). IEEE, 2012. http://dx.doi.org/10.1109/rsete.2012.6260675.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wei, Wang, and Liu Zezhao. "On Regional Public Security Threshold Effect Exploration Based on Vulnerability-Ability Analysis Framework." In 2012 International Conference on Public Management. Paris, France: Atlantis Press, 2012. http://dx.doi.org/10.2991/icpm.2012.51.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Regional security analysis"

1

Howard, Heidi, Chad Helmle, Raina Dwivedi, and Daniel Gambill. Stormwater Management and Optimization Toolbox. Engineer Research and Development Center (U.S.), January 2021. http://dx.doi.org/10.21079/11681/39480.

Full text
Abstract:
As stormwater regulations for hydrologic and water quality control become increasingly stringent, Department of Defense (DoD) facilities are faced with the daunting task of complying with multiple laws and regulations. This often requires facilities to plan, design, and implement structural best management practices (BMPs) to capture, filter, and/or infiltrate runoff—requirements that can be complicated, contradictory, and difficult to plan. This project demonstrated the Stormwater Management Optimization Toolbox (SMOT), a spreadsheet-based tool that effectively analyzes and plans for compliance to the Energy Independence and Security Act (EISA) of 2007 pre-hydrologic conditions through BMP implementation, resulting in potential cost savings by reducing BMP sizes while simultaneously achieving compliance with multiple objectives. SMOT identifies the most cost-effective modeling method based on an installation’s local conditions (soils, rainfall patterns, drainage network, and regulatory requirements). The work first demonstrated that the Model Selection Tool (MST) recommendation accurately results in the minimum BMP cost for 45 facilities of widely varying climatic and regional conditions, and then demonstrated SMOT at two facilities.
APA, Harvard, Vancouver, ISO, and other styles
2

Roberts, Paige, Ahmed-Yasin Osman Moge, and Kaija Hurlburt. PROJECT BADWEYN: SOMALI COASTAL DEVELOPMENT OPPORTUNITIES. One Earth Future, August 2018. http://dx.doi.org/10.18289/oef.2018.032.

Full text
Abstract:
Interest in the Somali fishing sector is growing. Development agencies, donors, and investors see the potential for fisheries in Somali waters to provide income, food security, and stability in coastal communities. But reliable and up-to-date information about the state of Somali fisheries is difficult to find, complicating business decisions. Where should development be focused? What kind of investment will provide the most benefit and long-term return for coastal communities? What fisheries sector opportunities are the most sustainable, and which might be a threat to the health of Somali fisheries? Somali Coastal Development Opportunities answers these questions through targeted and original analysis of fisheries data coupled with information on current development projects throughout the Somali region. This report highlights six coastal fishing villages – Bereda, Hordio, Bander Beyla, Maydh, Hawaay, and Merca – to investigate the development needs and opportunities in each. Opportunities in the fisheries sectors are analyzed in light of sustainability and feasibility to provide recommendations that will guide investment and development in the Somali fisheries sector.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography