Academic literature on the topic 'Security, International Case studies'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security, International Case studies.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Security, International Case studies"
kunz, Waldemar. "The European Case for International Security." Security Dimensions 41, no. 41 (July 29, 2022): 52–71. http://dx.doi.org/10.5604/01.3001.0015.9447.
Full textSingh, Abhishek Narain, and M. P. Gupta. "Information Security Management Practices: Case Studies from India." Global Business Review 20, no. 1 (November 9, 2017): 253–71. http://dx.doi.org/10.1177/0972150917721836.
Full textShipilov, Alexander Yurievich. "West African International Studies: Approaches to Regional Security." Vestnik RUDN. International Relations 19, no. 2 (December 15, 2019): 207–17. http://dx.doi.org/10.22363/2313-0660-2019-19-2-207-217.
Full textS Ghosh, Partha. "Refugees and National Security: Two South Asian Case Studies." Artha - Journal of Social Sciences 18, no. 4 (October 1, 2019): 43–55. http://dx.doi.org/10.12724/ajss.51.3.
Full textBaldwin, David A. "Security Studies and the end of the Cold War." World Politics 48, no. 1 (October 1995): 117–41. http://dx.doi.org/10.1353/wp.1995.0001.
Full textFarid, Miftah, and Ajeng Ayu Adhisty. "STATE ACTION AS AN INDIVIDUAL SECURITY THREAT IN CASE OF CYBERCRIME SECURITIZATION." Jurnal Pertahanan 5, no. 3 (December 2, 2019): 77. http://dx.doi.org/10.33172/jp.v5i3.589.
Full textFarah, Paolo Davide. "Strategies to balance energy security, business, trade and sustainable development: selected case studies†." Journal of World Energy Law & Business 13, no. 2 (April 1, 2020): 95–99. http://dx.doi.org/10.1093/jwelb/jwaa011.
Full textDilawar, Shahid, Asghar Khan, and Muhammad Nawaz Khan Jadoon. "A Gender Approach to Militancy (Extremism) in Pakistan –A Case Study of North-Western Region." Pakistan Journal of Gender Studies 18, no. 1 (March 8, 2019): 165–78. http://dx.doi.org/10.46568/pjgs.v18i1.31.
Full textMadeira, João Paulo. "Security Challenges for Small Island Developing States: The Case of Cape Verde." Revista Relaciones Internacionales, Estrategia y Seguridad 14, no. 2 (February 28, 2020): 155–77. http://dx.doi.org/10.18359/ries.3756.
Full textMisiągiewicz, Justyna. "Energy security as a research area of international security." Stosunki Międzynarodowe – International Relations 2 (December 16, 2022): 26. http://dx.doi.org/10.12688/stomiedintrelat.17622.1.
Full textDissertations / Theses on the topic "Security, International Case studies"
Kanchana, Kamonphorn. "Studies on Energy Security and International Relations: The Case of Regional Cooperation in Southeast Asia." Kyoto University, 2016. http://hdl.handle.net/2433/215646.
Full textChen, YuJane. "The economic security of Taiwan : a case study of cross-strait relations between Taiwan and China, 2000-2004." Thesis, University of Hull, 2007. http://hydra.hull.ac.uk/resources/hull:11083.
Full textKettle, Louise. "Learning from history in British overseas security : case studies from intervention in the Middle East." Thesis, University of Nottingham, 2015. http://eprints.nottingham.ac.uk/30575/.
Full textLucas, David Ryan. "Between Non-intervention and Protection: A study on the case of Darfur and the Responsibility to Protect." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/388.
Full textJulius, Paul Omoh. "Nigerian political elite’s perception and construction of security strategies 1999-2013 : the case of the Niger Delta oil conflict." Thesis, Kingston University, 2015. http://eprints.kingston.ac.uk/33409/.
Full textAl-Kasaji, Mohannad K. "Evaluating the Jordanian National Security Strategy Toward the Palestinian_Jordanians (Palestinian_Jordanians as a Securitization Case-Study)." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/554.
Full textTheron, Jenny. "The commodification and commercialisation of peace operations and security co-operations : a case study of Operation Rachel /." Thesis, Stellenbosch : Stellenbosch University, 2005. http://hdl.handle.net/10019.1/2505.
Full textPeace operations and security co-operations are expensive. Even though there are a variety of factors that influences peace agents when they consider approving a new, expanding an existing, or closing down a peace operation or security co-operation, one of these factors is the cost factor. If we were to isolate the cost factor it would follow that a reduction in the cost of peace operations and security co-operations, are likely to contribute to peace agents being more willing to approve new, expand existing or to give existing missions more time to consolidate before closing them down. There are a variety of ways how the cost of peace operations or security co-operations can be lowered. This thesis suggests an alliance with the private sector in the form of corporate sponsorships. In short, that peace operations and security co-operations be commodified and commercialised. This would entail introducing corporate sponsorship of some of the commodities that are used in peace operations and security co-operations, followed by the corporate sponsor using their involvement in the peace operation or security co-operation to their commercial advantage. The commodification and commercialisation of peace operations and security co-operations should result in the relevant operations and co-operations benefiting in a cost-effective as well as practical effectiveness sense, whereas the private sponsor should benefit in either or both a financial (profit) or an image-making sense. The psychological theory supporting such an argument is that of social identity theory. This theory explains how positive connotations made with peacemaking in warlike conditions will motivate industries to use this opportunity to show that their products can succeed in such demanding circumstances. Accordingly, social identity theory provides us with evidence as to how the commercialisation and commodification of peace operations and security co-operations can succeed. We also support our argument by providing a case study, Operation Rachel, which serves as a successful example of an operation that was (partially) commodified and commercialised. Operation Rachel, which can be seen as either or both a peace operation and security co-operation, shows that in the case of security co-operations, these operations should be presented as peace operations during the commodification and commercialisation processes.
Olivier, Laetitia. "Pursuing human security in Africa through developmental peace missions : ambitious construct or feasible ideal?" Thesis, Stellenbosch : Stellenbosch University, 2008. http://hdl.handle.net/10019.1/4080.
Full textENGLISH ABSTRACT: This thesis explores the feasibility of the concept Developmental Peace Missions (DPMs). It seeks to answer the question whether DPMs is an ambitious construct or a feasible ideal and whether DPMs could be effectively applied during peace missions. The study takes the form of a descriptive analysis of the theoretical underpinnings of the concept of DPMs, and includes the analysis of various relevant case studies in terms of the application of the concept of DPMs. The study further explores the evolution that has taken place in terms of United Nations peace missions, in that most modern peace missions include both peacekeeping and peacebuilding initiatives. The study also illustrates the modern approach to peace missions, based on an integrated systems-thinking approach by means of which the activities of all relevant role-players are integrated and fused towards a common end state: that of sustained security and development. In order to analyse the concept of DPMs, the theoretical underpinnings of the concept human security, the security-development nexus and peacebuilding were researched in depth. These concepts were then coupled to the concept of DPMs in terms of their utility during current complex peace missions, both internationally and on the African continent. The concept of DPMs was studied in the context of contemporary peacekeeping in terms of three case studies, namely the peace missions in Kosovo, Sierra Leone and the DRC. The DPMs concept was applied to these case studies and analysed in terms of the extent to which the peace interventions in these countries were conducted in accordance with the philosophical and theoretical underpinnings of DPMs. The study concludes that DPMs, in terms of its theoretical basis, is indeed a feasible ideal for peace missions, as it is based on and in line with the approved current UN- and AU-integrated planning processes. However, in terms of its practical utility in Africa, it currently remains an ambitious construct, given the limited capacity and resources of the AU and regional organisations. Therefore, DPMs should not be viewed as a short-term solution to, or panacea for, all intra-state wars. The study proposes that the UN, the AU, as well as relevant regional organisations will have to adjust and make changes in terms of their institutions, structures, funding and the provision of resources in order to operationalise the concept of DPMs successfully. This is especially true as far as the AU is concerned, as the AU currently experiences severe limitations in both material and human resources. However, the fact that both the UN and the AU have adopted the Integrated Mission Planning Process concept as planning tool for their respective missions is an indication that progress is being made towards the achievement of establishing a more holistic and integrated approach to finding sustainable solutions to global conflict. Ultimately, the success of DPMs will be determined by the will and commitment of all the relevant role-players involved in finding a lasting solution to intra-state conflicts. The concept itself cannot provide sustainable peace and development.
AFRIKAANSE OPSOMMING: Dié tesis verken die lewensvatbaarheid van die begrip Ontwikkelingsvredesendings. Daar sal gepoog word om ‘n antwoord te kry op die vraag of Ontwikkelingsvredesendings ‘n ambisieuse konstruk of ‘n haalbare ideal is. Verder sal gepoog word om te bepaal of dit effektief tydens vredesoperasies toegepas kan word. Die studie neem die vorm aan van ‘n beskrywende analise van die teoretiese grondbeginsels van die begrip Ontwikkelingsvredesendings en sluit die analise van verskeie relevante gevallestudies ten opsigte van die begrip in. Die studie ondersoek die evolusie wat plaasgevind het ten opsigte van vredesendings wat deur die Verenigde Nasies (VN) onderneem word, naamlik dat die meeste moderne vredesendings, vredesbewarings, sowel as vredesbou (nasiebou) inisiatiewe insluit. Die studie illustreer ook die moderne benadering wat ten opsigte van vredesendings toegepas word, naamlik dat die aktiwiteite van al die betrokke rolspelers geïntegreer word en op ‘n gedeelde einddoel gefokus word. Die teoretiese grondstelllings van die begrippe veiligheid en ontwikkeling, die veiligheid-ensekuriteit- neksus, sowel as die begrip van vredesbou (nasiebou) is in diepte ondersoek ten einde die begrip Ontwikkelingsvredesendings te analiseer. Hierdie begrippe is daarna in verband gebring met die begrip Ontwikkelingsvredesendings soos wat dit tans tydens moderne komplekse vredesendings toegepas word – beide internasionaal sowel as op die Afrika kontinent. Die begrip Ontwikkelingsvredesendings is bestudeer teen die agtergrond van eietydse vredesbewaring ten opsigte van drie gevallestudies, naamlik die intervensies in Kosovo, Sierra Leone en die Demokratiese Republiek van die Kongo. Hierdie drie gevallestudies is gekies aangesien dit die eerste sendings was waartydens die VN die nuwe geïntegreerde benadering tot vredesendings, soos in die Brahimi-verslag aanbeveel, toegepas is. Die studie het bevind dat Ontwikkelingsvredesendings, wat betref die teoretiese grondstellings inderdaad uitvoerbaar is, aangesien dit gebaseer is op en in ooreenstemming is met die huidige aanvaarde beplanninsprosesse van die VN en die AU. Maar, wat betref die praktiese bruikbaarheid van die begrip in Afrika, bly dit tans ‘n ambisieuse konstruk, gegewe die beperkte vermoë en hulpbronne van die AU en streeksorganisasies. Die begrip Ontwikkelingsvredesendings moet dus nie as ‘n korttermynoplossing vir alle interne oorloë beskou word nie. Die studie het bevind dat die VN, die AU, sowel as die betrokke streeksorganisasies, ingrypende veranderings sal moet ondergaan ten einde die begrip Ontwikkelingsvredesendings suksesvol te kan toepas, veral ten opsigte van strukture, befondsing en die voorsiening van hulpbronne. Dit is veral waar in die geval van die AU, aangesien die AU tans geweldige uitdagings in die gesig staar wat betref menslike sowel as materiële hulpbronne. Ten spyte van laasgenoemde uitdagings dui die aanvaarding van die Geïntegreerde Sendingbeplanningsproses as besluitnemings-meganisme deur beide die VN en die AU op die vordering wat gemaak word ten opsigte van die daarstelling van ‘n meer holistiese en geïntegreerde benadering vir volhoubare oplossings vir konflik. Die sukses van Ontwikkelingsvredesendings sal uiteindelik bepaal word deur die wil en toewyding van alle betrokkenes by die soeke na langdurige vrede – die begrip op sigself kan nie volhoubare vrede en ontwikkeling bewerkstellig nie.
Matthews, Danielle Tianne. "Dedicated to Norms of Interests? A Comparative Case Study of the United Nations Security Council Reactions in Authorizing Humanitarian Intervention in the Rwandan and Sudanese Genocides." Thesis, Webster University, 2013. http://pqdtopen.proquest.com/#viewpdf?dispub=1523364.
Full textThis thesis addresses the role of geopolitical interests in the voting record of the UNSC (UNSC) in authorizing action, specifically humanitarian intervention, in the cases of genocide in Rwanda and Sudan. The classic theories of international relations, realism and liberalism, are applied to determine which theory has higher explanatory power in determining the level of involvement and humanitarian intervention by the UNSC in these specific cases. Realist assumptions would expect that the possible economic or strategic interests of states within the Council would influence the level of involvement or humanitarian intervention authorized. In contrast, liberalist notions would expect that the level of conflict severity or duration would determine the level of involvement or humanitarian intervention authorized. This thesis finds that the economic and strategic interests of the members of the UNSC can serve as a better indicator in determining the level of intervention authorized in these cases. Thus, realist theory holds higher explanatory power of the UNSC reactions to the cases of Rwanda and Sudan.
Lewis, Olivier Rémy Tristan David. "Explaining military, law enforcement and intelligence cooperation between Western states." Thesis, University of St Andrews, 2018. http://hdl.handle.net/10023/16419.
Full textBooks on the topic "Security, International Case studies"
James, Midgley, and Tracy Martin, eds. Challenges to social security: An international exploration. Westport, Conn: Auburn House, 1996.
Find full textSecurity and development. New York: Berghahn Books, 2010.
Find full textP, Clements Kevin, Ward Robin, and Evans Gareth J. 1944-, eds. Building international community: Cooperating for peace : case studies. Canberra, ACT: Allen & Unwin in association with the Peace Research Centre, RPSAS, ANU, 1994.
Find full textComparative regional security governance. New York: Routledge, 2012.
Find full textAlava, Henni. Exploring the security-development nexus: Perspectives from Nepal, northern Uganda and "Sugango". Edited by Finland Ulkoasiainministeriö. Helsinki]: Ministry for Foreign Affairs, 2010.
Find full text1967-, Dominguez Roberto, ed. The security governance of regional organizations. New York: Routledge, 2011.
Find full textJames, Midgley, and Sherraden Michael W. 1948-, eds. Alternatives to social security: An international inquiry. Westport, Conn: Auburn House, 1997.
Find full textMilitarism and international relations: Political economy, security and theory. New York: Routledge, 2012.
Find full textEmilio, Viano, ed. Global organized crime and international security. Aldershot, Hants, England: Ashgate, 1999.
Find full textOnoja, Lawrence Anebi. Peace-keeping and international security in a changing world. Jos, Plateau State: Mono Expressions, 1996.
Find full textBook chapters on the topic "Security, International Case studies"
Mottaleb, Khondoker Abdul. "Impacts of Transboundary Crop Diseases on Sustainable Crop Production: The Case of Maize Lethal Necrosis (MLN) in Africa." In Emerging-Economy State and International Policy Studies, 163–79. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-5542-6_13.
Full textBergamini, Elisabetta, Francesca Jacobone, Donato Morea, and Giacomo Primo Sciortino. "The Increasing Risk of Space Debris Impact on Earth: Case Studies, Potential Damages, International Liability Framework and Management Systems." In Enhancing CBRNE Safety & Security: Proceedings of the SICC 2017 Conference, 271–80. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-91791-7_31.
Full textSpanier, Benny. "Freedom of Navigation in the Suez Canal and the Channels: Law of the Sea." In Palgrave Studies in Maritime Politics and Security, 117–33. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-15670-0_6.
Full textDietrich, Christopher R. W. "Suez and the United States: Oil, Lifelines, and “All of Mankind” in the Cold War." In Palgrave Studies in Maritime Politics and Security, 71–93. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-031-15670-0_4.
Full textViegas, Virgilio, and Oben Kuyucu. "Case Studies." In IT Security Controls, 245–62. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7799-7_8.
Full textHartung, William D. "International arms trade." In Security Studies, 467–81. Third edition. | New York : Routledge, 2018. |: Routledge, 2018. http://dx.doi.org/10.4324/9781315228358-32.
Full textHafner, Manfred, and Pier Paolo Raimondi. "Energy and the Economy in Europe." In The Palgrave Handbook of International Energy Economics, 731–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-86884-0_36.
Full textRyan, Matthew. "Ransomware Case Studies." In Advances in Information Security, 65–91. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-66583-8_5.
Full textZhang, Laobing, and Genserik Reniers. "Case Studies." In Advanced Sciences and Technologies for Security Applications, 111–49. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-92618-6_7.
Full textFlouros, Floros. "Case Studies." In Energy Security in the Eastern Mediterranean Region, 145–75. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-09603-7_6.
Full textConference papers on the topic "Security, International Case studies"
Jones, Micah, and Kevin W. Hamlen. "Enforcing IRM security policies: Two case studies." In 2009 IEEE International Conference on Intelligence and Security Informatics. IEEE, 2009. http://dx.doi.org/10.1109/isi.2009.5137306.
Full textGao, Chao, Lan Luo, Yue Zhang, Bryan Pearson, and Xinwen Fu. "Microcontroller Based IoT System Firmware Security: Case Studies." In 2019 IEEE International Conference on Industrial Internet (ICII). IEEE, 2019. http://dx.doi.org/10.1109/icii.2019.00045.
Full textTaylor, Kai, Alexandra Smith, Adam Zimmel, Korina Alcantara, and Yong Wang. "Medical Device Security Regulations and Assessment Case Studies." In 2022 IEEE 19th International Conference on Mobile Ad Hoc and Smart Systems (MASS). IEEE, 2022. http://dx.doi.org/10.1109/mass56207.2022.00116.
Full textMorrison, Patrick, Benjamin H. Smith, and Laurie Williams. "Measuring Security Practice Use: A Case Study at IBM." In 2017 IEEE/ACM 5th International Workshop on Conducting Empirical Studies in Industry (CESI). IEEE, 2017. http://dx.doi.org/10.1109/cesi.2017.4.
Full textMouhtaropoulos, Antonis, Panagiotis Dimotikalis, and Chang-Tsun Li. "Applying a Digital forensic readiness framework: Three case studies." In 2013 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2013. http://dx.doi.org/10.1109/ths.2013.6699003.
Full textOda, S. Michelle, Huirong Fu, and Ye Zhu. "Enterprise information security architecture a review of frameworks, methodology, and case studies." In 2009 2nd IEEE International Conference on Computer Science and Information Technology. IEEE, 2009. http://dx.doi.org/10.1109/iccsit.2009.5234695.
Full text"Process Modeling for Privacy - Conformant Biobanking: Case Studies on Modeling in UMLsec." In The 6th International Workshop on Security In Information Systems. SciTePress - Science and and Technology Publications, 2008. http://dx.doi.org/10.5220/0001732900030012.
Full textO'Brien, Brianne F., Anita D'Amico, and Mark E. Larkin. "Technology transition of network defense visual analytics: Lessons learned from case studies." In 2011 IEEE International Conference on Technologies for Homeland Security (HST). IEEE, 2011. http://dx.doi.org/10.1109/ths.2011.6107916.
Full textHarrell, Christopher R., Mark Patton, Hsinchun Chen, and Sagar Samtani. "Vulnerability Assessment, Remediation, and Automated Reporting: Case Studies of Higher Education Institutions." In 2018 IEEE International Conference on Intelligence and Security Informatics (ISI). IEEE, 2018. http://dx.doi.org/10.1109/isi.2018.8587380.
Full textClark, Jason W. "Threat from Within: Case Studies of Insiders Who Committed Information Technology Sabotage." In 2016 11th International Conference on Availability, Reliability and Security (ARES ). IEEE, 2016. http://dx.doi.org/10.1109/ares.2016.78.
Full textReports on the topic "Security, International Case studies"
Amar Flórez, Darío. International Case Studies of Smart Cities: Medellin, Colombia. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000406.
Full textGutiérrez Bayo, Jaime. International Case Studies of Smart Cities: Santander, Spain. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000407.
Full textToch, Eran, and Eyal Feder. International Case Studies of Smart Cities: Tel Aviv, Israel. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000416.
Full textInkret, Lisa, and John Scott. National Security & International Studies Quarter 1 2021 Newsletter. Office of Scientific and Technical Information (OSTI), January 2021. http://dx.doi.org/10.2172/1760560.
Full textLee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, Jongbok Kim, and Donju Lee. International Case Studies of Smart Cities: Singapore, Republic of Singapore. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000409.
Full textLee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, Jongbok Kim, and Donju Lee. International Case Studies of Smart Cities: Anyang, Republic of Korea. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000410.
Full textLee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, Jongbok Kim, and Donju Lee. International Case Studies of Smart Cities: Songdo, Republic of Korea. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000411.
Full textLee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, and Jongbok Kim. International Case Studies of Smart Cities: Pangyo, Republic of Korea. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000412.
Full textSchreiner, Clara. International Case Studies of Smart Cities: Rio de Janeiro, Brazil. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000414.
Full textLee, Sang Keon, Heeseo Rain Kwon, HeeAh Cho, Jongbok Kim, and Donju Lee. International Case Studies of Smart Cities: Namyangju, Republic of Korea. Inter-American Development Bank, June 2016. http://dx.doi.org/10.18235/0000415.
Full text