Academic literature on the topic 'Security state'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Security state.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Security state"

1

Hama, Hawre Hasan. "State Security, Societal Security, and Human Security." Jadavpur Journal of International Relations 21, no. 1 (June 2017): 1–19. http://dx.doi.org/10.1177/0973598417706591.

Full text
Abstract:
Generally speaking, the traditional approach of security mainly regards states as a sole referent object of security and refutes any attempt to broaden the concept of security. This understanding is known as a realist approach. This approach, however, has been recently challenged by the Copenhagen School, the Welsh School, and the human security approach. The Copenhagen School assumes that there is now a duality of security: state security and societal security. However, both the Welsh School and the human security school look at individuals as a sole referent object of security. This article critically reviews the traditional approaches of security, the Copenhagen School, the Welsh School, and the human security approach. This article finally argues that the Copenhagen School could successfully broaden the concept of security, and therefore, it is more convincing when compared to other schools.
APA, Harvard, Vancouver, ISO, and other styles
2

Aziz, Sahar. "State Sponsored Radicalization." Michigan Journal of Race & Law, no. 27.1 (2021): 125. http://dx.doi.org/10.36643/mjrl.27.1.state.

Full text
Abstract:
Where was the FBI in the months leading up to the violent siege on the U.S. Capitol in 2021? Among the many questions surrounding that historic day, this one reveals the extent to which double standards in law enforcement threaten our nation’s security. For weeks, Donald Trump’s far right-wing supporters had been publicly calling for and planning a protest in Washington, D.C. on January 6, the day Congress was to certify the 2021 presidential election results. Had they been following credible threats to domestic security, officials would have attempted to stop the Proud Boys and QAnon from breaching the Capitol perimeter. Yet when the day came, the mob of pro-Trump extremists seemed to catch law enforcement by surprise. They seized the Capitol, ransacked congress members’ offices, and openly posted photos of their destruction and their weapons online. In the preceding two decades, the U.S. government has poured money into a behemoth national security apparatus. The FBI’s annual budget ballooned from $3 billion in 1999 to nearly $10 billion today. Much of this 300% increase went to countering terrorism with a mandate to surveil, investigate, and prosecute “homegrown terrorists.” In no uncertain terms, the directive was for the FBI to target Muslim communities.
APA, Harvard, Vancouver, ISO, and other styles
3

Oghuvbu, Ejiroghene Augustine. "Security And The Challenges Of Securing Nigerian State." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 3 (April 10, 2021): 3924–30. http://dx.doi.org/10.17762/turcomat.v12i3.1681.

Full text
Abstract:
Nigeria, like most developing States is still grappling with the task of nation – building, responsive democratic order and a just and secured polity. The task over the years has remained arduous and seemingly illusive. Presently, the menance of Boko Haram, the marauding herdsmen militancy, the new face of militancy in the Niger Delta, the spate of kidnappings, armed robberies, and ethno-regional intolerance, the vociferous separatist agitations in the South-East and South-South and the deteriorating living conditions have continued to create survival, stability and security challenges and threaten the very existence of Nigeria as a federation. Against this backdrop, this paper therefore attempts to identify some of the emerging trends of security challenges in Nigeria with a view to diagnosing their causes and examining their implications on the corporate existence of Nigeria. This paper adopted the analytical method and relied on the natural theory of state to posit that the solution to the disturbing trend of security challenges in Nigeria is employment generation and genuine implementation of poverty alleviation programmes in the polity
APA, Harvard, Vancouver, ISO, and other styles
4

Blakyta, Ganna, and Tetiana Ganushchak. "Enterprise financial security as a component of the economic security of the state." Investment Management and Financial Innovations 15, no. 2 (June 14, 2018): 248–56. http://dx.doi.org/10.21511/imfi.15(2).2018.22.

Full text
Abstract:
The article deals with problems of economic and financial security ensuring both in companies and state. The Corruption Perceptions Index has been analyzed as one of the most important indicators in this sphere. The following research methods have been used: generalizing theoretical knowledge, comparison method, method of analysis and synthesis, statistical analysis, factual analysis. The authors give their own definitions to such concepts as “security”, “financial security of the enterprise”, “economic security of the enterprise”. There have been also systemized the threats to the economic security of the enterprise, as well as means of its strengthening. The rating of Ukraine according to the Corruption Perceptions Index has been identified. Also, the perspectives of future research have been defined.
APA, Harvard, Vancouver, ISO, and other styles
5

Onyshchenko, Svitlana. "State Budgetary Security Determinants." ЕКОНОМІКА І РЕГІОН Науковий вісник, no. 4(75) (December 27, 2019): 14–19. http://dx.doi.org/10.26906/eir.2019.4(75).1807.

Full text
Abstract:
Бюджетна безпека держави обумовлюється низкою детермінантів, які визначають зміст, структуру та рівень її забезпечення. Визначено, що визначальними фактами забезпечення державного бюджету є фактори, загрози як екзогенного, так і ендогенного походження, а також причинно-наслідкові зв’язки, які прямо чи опосередковано визначають його рівень та складність процесів його забезпечення.Запропоновано перелік основних детермінант, що впливають на забезпечення бюджетної безпеки держави з урахуванням процесів глобалізації, конструктивного / руйнівного впливу факторів та загроз. Зазначається, що систематичним елементом забезпечення державного бюджету є державний бюджет, який є багатогранним поняттям. Бюджет як інструмент державної політики відіграє ключову роль у забезпеченні соціально-економічного розвитку держави, реалізації її національних інтересів, а саме на обсяг та структуру дохідної та видаткової частини бюджету впливають на функціонування всіх галузей економіка.Обґрунтовується необхідність забезпечення бюджетної безпеки як складової соціально-економічного розвитку та передумовою здійснення ефективної державної фінансово-економічної політики як основи досягнення національних економічних інтересів держави.Систематизовано основні детермінанти впливу на бюджетну безпеку держави з урахуванням глобалізаційних процесів та багатокритерії існуючих факторів та загроз як екзогенного, так і ендогенного походження.
APA, Harvard, Vancouver, ISO, and other styles
6

Ganguly, Sumit. "The Troublesome Security State." Journal of Democracy 28, no. 3 (2017): 117–26. http://dx.doi.org/10.1353/jod.2017.0050.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Collins, Alan. "State-Induced Security Dilemma." Cooperation and Conflict 39, no. 1 (March 2004): 27–44. http://dx.doi.org/10.1177/0010836704040833.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kudelia, Serhiy. "Ukraine's Emerging Security State." Current History 117, no. 801 (October 1, 2018): 264–70. http://dx.doi.org/10.1525/curh.2018.117.801.264.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Chandramouli, Ramaswamy, and Peter Mell. "State of security readiness." XRDS: Crossroads, The ACM Magazine for Students 16, no. 3 (March 2010): 23–25. http://dx.doi.org/10.1145/1734160.1734168.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Nelson, Cary. "The National Security State." Cultural Studies ↔ Critical Methodologies 4, no. 3 (August 2004): 357–61. http://dx.doi.org/10.1177/1532708603262788.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Security state"

1

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Full text
Abstract:

Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.

This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.

APA, Harvard, Vancouver, ISO, and other styles
2

Majumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.

Full text
Abstract:
With the power system evolving from passive to a more active system there is an incorporation of information and communication infrastructures in the system. The measurement data are more prone to tampering from attackers for mala fide intentions. Therefore, security and reliability of distribution have become major concerns. State estimation (SE), being the core function of the energy/distribution management system (EMS/DMS), has become necessary in order to operate the system efficiently and in a controlled manner. Although SE is a well-known task in transmission systems, it is usually not a common task in unbalanced distribution systems due to the difference in design and operation philosophy. This thesis addresses these issues and investigates the distribution system state estimation with unbalanced full three-phase modelling. The formulation, based on weighted least squares estimation, is extended to include the open/closed switches as equality constraints. This research then explores the vulnerabilities of the state estimation problem against attacks associated with leverage measurements. Detecting gross error particularly for leverage measurements have been found to be difficult due to low residuals. The thesis presents and discusses the suitability of externally studentized residuals compared to traditional residual techniques. Additionally, the masking/swamping phenomenon associated with multiple leverages makes the identification of gross error even more difficult. This thesis proposes a robust method of identifying the high leverages and then detecting gross error when the leverage measurements are compromised. All algorithms are validated in different IEEE test systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Rockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.

Full text
Abstract:
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada
Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state disk storage, access controls, and data elimination in relation to various telemetry scenarios. The reader will be introduced to the operational considerations of solid state disk data security and the underlying technical concepts of how these are implemented.
APA, Harvard, Vancouver, ISO, and other styles
5

Gordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.

Full text
Abstract:
CHDS State/Local
Approved for public release, distribution is unlimited
To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Federal government to address these issues are limited and overextended. If states attempt to address this threat independently, important opportunities to reduce vulnerability and enhance capability will be lost. To achieve the capabilities needed for agro terrorism detection, mitigation, preparedness and response, states must collaborate to build the partnerships and programs their citizens require. This thesis argues multi-state partnerships are critical to defeating this threat as well as providing a robust response to an attack. Whether intentionally introduced or naturally occurring , infectious diseases can easily cross state borders before an outbreak is even detected. States must be prepared to act quickly to mitigate the effects of any crisis. There is a significant opportunity for states to strengthen their abilities to provide for a stronger agriculture counter terrorism preparedness system. The states can further their ability to combat attacks on agriculture actively by demonstrating leadership in implementing administrative agreements and ultimately adopting compact(s) between states as well as with the private sector.
Civilian, Homeland Security Advisor and Emergency Management Administrator, Iowa Homeland Security and Emergency Management Division
APA, Harvard, Vancouver, ISO, and other styles
6

Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Woodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Shamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.

Full text
Abstract:
The paper substantiates the theoretical and methodological foundations for ensuring the financial security of the state through the system of investment and stock markets. The role of the stock market and the peculiarity of stock exchange indices in ensuring the financial security of the state are investigated. A comparative analysis of the volatility of the Ukrainian stock market relative to the European and American ones, taking into account the time horizon of investment, is carried out, and a correlation is established between the indices under consideration. Based on the study, conclusions are drawn about the impact of trends in stock indices and international ratings of investment attractiveness on the financial security of Ukraine from the side of investor profitability.
APA, Harvard, Vancouver, ISO, and other styles
9

Blackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure as success factors in building successful homeland security programs. This research found that lack of information sharing, a disconnect between the federal and state government, and inadequate funding created barriers to the implementation of constructive homeland security programs. To better position the homeland security programs within state departments of agriculture, this research provides several recommendations. Given the diversity of the roles and responsibilities in agriculture agencies, it is not possible to develop a model program for every state. These recommendations identify components of a model program that agencies could selectively use to enhance the effectiveness of homeland security programs.
APA, Harvard, Vancouver, ISO, and other styles
10

Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.

Full text
Abstract:
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, l examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. l argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations: 1) it is unlikely that Muslims are able to present a national security risk and 2) there are reasons to suspect that the national security policies of the Uzbek leadership target Islamic fundamentalism at least in part to legitimize the continued repression of most types of opposition.
L'existence d'une "menace islamique" à la sécurité nationale de l'Ouzbékistan est une idée répandue dans les médias et chez certains spécialistes. Le régime du Président ouzbek Islam Karimov a souligné cette menace à plusieurs reprises et a agi en conséquence. J'examine à la fois la capacité actuelle de différents groupes musulmans à défier les mécanismes de défense de l'état, ainsi que des éléments d'histoire récente de la stratégie de sécurité nationale ouzbèke liés à l'Islam. L'argument présenté est que la relation entre les musulmans et la sécurité nationale en Ouzbékistan est caractérisée par les deux observations suivantes: 1) il est peu probable que les musulmans soient capables de poser un risque à la sécurité nationale et 2) il existe des raisons de suspecter que les politiques de sécurité nationale du gouvernment s'attaquent à l'intégrisme musulman au moins en partie dans le but de légitimiser la répression continue de la majorité des forces d'opposition.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Security state"

1

Hong, Yong-Pyo. State Security and Regime Security. London: Palgrave Macmillan UK, 2000. http://dx.doi.org/10.1057/9780230510777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Omand, David. Securing the state: National security in contemporary times. Singapore: S. Rajaratnam School of International Studies, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

S. Rajaratnam School of International Studies, ed. Securing the state: National security in contemporary times. Singapore: S. Rajaratnam School of International Studies, Nanyang Technological University, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Cañas, Dick. HOMELAND SECURITY AT THE STATE LEVEL: A Primer on State Homeland Security Programs. Bloomington, IN: authorHOUSE, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Baxter, John. State security, privacy and information. New York: Harvester Wheatsheaf, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Anna, Yeatman, and Żółkoś Magdalena, eds. State, security, and subject formation. New York: Continuum, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

D, Baxter John. State security, privacy, and information. New York: St. Martin's Press, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

author, Kotwal Navaz, and Commonwealth Human Rights Initiative, eds. State security commissions: Reform derailed. New Delhi: Commonwealth Human Rights Initiative, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Baxter, John. State security, privacy and information. Hemel Hempstead: Harvester Wheatsheaf, 1990.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Williams, Michael C. (Michael Charles), 1960-, ed. Security beyond the state: Private security in international politics. Cambridge: Cambridge University Press, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Security state"

1

Regilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies, 1–5. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-74336-3_126-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Paul, Erik. "Security State." In Australia as US Client State, 30–50. London: Palgrave Macmillan UK, 2014. http://dx.doi.org/10.1057/9781137469359_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Barnett, Hilaire. "State Security." In Constitutional & Administrative Law, 536–73. Twelfth edition. | Abingdon, Oxon [UK] ; New York : Routledge, 2017.: Routledge, 2017. http://dx.doi.org/10.4324/9781315458373-27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Barnett, Hilaire. "State Security." In Constitutional & Administrative Law, 513–50. 13th edition. | Milton Park, Abingdon, Oxon ; New York, NY : Routledge, 2019.: Routledge, 2019. http://dx.doi.org/10.4324/9780429322686-22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Regilme, Salvador Santino F., and Beate Beller. "Security State." In The Palgrave Encyclopedia of Global Security Studies, 1328–32. Cham: Springer International Publishing, 2023. http://dx.doi.org/10.1007/978-3-319-74319-6_126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Romero, Vidal. "Security." In Rebuilding the State Institutions, 107–22. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-31314-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kettunen, Pauli. "Welfare state, competition state, security state." In Remapping Security on Europe’s Northern Borders, 201–20. Milton Park, Abingdon, Oxon; New York, NY : Routledge, 2021.: Routledge, 2021. http://dx.doi.org/10.4324/9781003096412-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Fraser, Trudy. "Human Security as State Security." In Maintaining Peace and Security?, 186–214. London: Macmillan Education UK, 2015. http://dx.doi.org/10.1007/978-1-137-03215-7_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Heylen, Evelyn, Steven De Boeck, Marten Ovaere, Hakan Ergun, and Dirk Van Hertem. "Steady-State Security." In Dynamic Vulnerability Assessment and Intelligent Control for Sustainable Power Systems, 21–40. Chichester, UK: John Wiley & Sons, Ltd, 2018. http://dx.doi.org/10.1002/9781119214984.ch2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lekunze, Manu. "Modern state security." In Complex Adaptive Systems, Resilience and Security in Cameroon, 72–90. New York, NY : Routledge, 2019. | Series: Routledge contemporary Africa series: Routledge, 2019. http://dx.doi.org/10.4324/9780429273445-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Security state"

1

Bodden, Eric. "State of the systems security." In ICSE '18: 40th International Conference on Software Engineering. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3183440.3183462.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Frey, Michael R., and Jaclyn D. Szymonifka. "A Gaussian quantum state discriminator." In Defense and Security, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2005. http://dx.doi.org/10.1117/12.604340.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Simonaitis-Castillo, Vida K. "State of the art of crystal growth in the United States." In SPIE Defense, Security, and Sensing, edited by Mark Dubinskii and Stephen G. Post. SPIE, 2010. http://dx.doi.org/10.1117/12.849223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grunnan, Tonje, Monica Endregard, Ragnhild E. Siedler, and Ann-Kristin Elstad. "Norwegian Societal Security and State Security – Challenges and Dilemmas." In Proceedings of the 29th European Safety and Reliability Conference (ESREL). Singapore: Research Publishing Services, 2020. http://dx.doi.org/10.3850/978-981-14-8593-0_4467-cd.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Heremans, Joseph P. "Introduction to cryogenic solid state cooling." In SPIE Defense + Security, edited by Richard I. Epstein, Bjørn F. Andresen, Markus P. Hehlen, Joseph P. Heremans, Ingo N. Rühlich, and Mansoor Sheik-Bahae. SPIE, 2016. http://dx.doi.org/10.1117/12.2228756.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Suh, DongHyok, and Young-Hwan Oh. "Crime Prevention Using Individual’s State Estimation." In Security Technology 2016. Science & Engineering Research Support soCiety, 2016. http://dx.doi.org/10.14257/astl.2016.139.73.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sendobry, Alexander, Thorsten Graber, and Uwe Klingauf. "Purely optical navigation with model-based state prediction." In Security + Defence, edited by Edward M. Carapezza. SPIE, 2010. http://dx.doi.org/10.1117/12.864686.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wagner, Matthias, Eugene Ma, John Heanue, and Shuyun Wu. "Solid state optical thermal imagers." In Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2007. http://dx.doi.org/10.1117/12.730274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Frey, Michael R. "A quantum state discrimination martingale." In Defense and Security Symposium, edited by Eric J. Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2007. http://dx.doi.org/10.1117/12.717679.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Butkova, O. V. "THE MAIN DIRECTIONS OF IMPROVING THE FINANCIAL SECURITY OF AGRICULTURAL ENTERPRISES." In STATE AND DEVELOPMENT PROSPECTS OF AGRIBUSINESS. DSTU-PRINT, 2020. http://dx.doi.org/10.23947/interagro.2020.1.63-66.

Full text
Abstract:
The article presents the results of a study of the financial security of agricultural enterprises. The concept of financial security of an economic entity is given. The essence of the financial security of the enterprise and its relationship with the economic security of the enterprise is determined. The main problems in achieving financial security that are characteristic of most agricultural enterprises in the south of the Rostov region are identified, and ways to address them are outlined.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Security state"

1

Jablonsky, David. The State of the National Security State. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408224.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jablonsky, David. The State of the National Security State. Fort Belvoir, VA: Defense Technical Information Center, November 2002. http://dx.doi.org/10.21236/ada408437.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Feng, Shaw C., and Simon P. Frechette. The state of container security standards. Gaithersburg, MD: National Institute of Standards and Technology, 2007. http://dx.doi.org/10.6028/nist.ir.7153.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Chow, William. Fixing the Broken State of Mobile Security. Denmark: River Publishers, August 2016. http://dx.doi.org/10.13052/popcas009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Marcella, Gabriel. Affairs of State: The Interagency and National Security. Fort Belvoir, VA: Defense Technical Information Center, December 2008. http://dx.doi.org/10.21236/ada491602.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mikaelsen, Dallas P. U.S.-Brazil Security Cooperation and the State Partnership Program. Fort Belvoir, VA: Defense Technical Information Center, June 2015. http://dx.doi.org/10.21236/ad1012803.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Busch, Oberst G. German-Israeli Relations: Security of Israel--Reason of State? Fort Belvoir, VA: Defense Technical Information Center, March 2013. http://dx.doi.org/10.21236/ada589061.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Tulak, Arthur N., R. W. Kraft, and Don Silbaugh. State Defense Forces: Forces for NORTHCOM and Homeland Security? Fort Belvoir, VA: Defense Technical Information Center, March 2003. http://dx.doi.org/10.21236/ada421654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Goertzel, Karen M., Theodore Winograd, Holly L. McKinley, Lyndon J. Oh, Michael Colon, Thomas McGibbon, Elaine Fedchak, and Robert Vienneau. Software Security Assurance: A State-of-Art Report (SAR). Fort Belvoir, VA: Defense Technical Information Center, July 2007. http://dx.doi.org/10.21236/ada472363.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Obado-Joel, Jennifer. The Challenge of State-Backed Internal Security in Nigeria: Considerations for Amotekun. RESOLVE Network, December 2020. http://dx.doi.org/10.37805/pn2020.9.ssa.

Full text
Abstract:
Nigeria faces immense internal security challenges, including the Boko-Haram crisis in the northeast and violent farmer-herder conflicts in the southwest and north-central states. Across the Nigerian federation, pockets of violent clashes have sprung and escalated in new locales in the last decade. Community responses to these violent crises have been diverse and included the establishment of armed groups to supplement or act in parallel to the security efforts of the Nigerian state—in some cases with backing from federal or state governments. These local security assemblages, community-based armed groups (CBAGs), are on the one hand contributors to local order, and normative conceptions of peace and security. On the other hand, these groups are often a pernicious actor within the broader security landscape, undermining intercommunal peace and drivers of violence and human rights abuses. This Policy Note focuses on the characteristics, challenges, and opportunities of Amotekun, a recently formed CBAG in Southwest Nigeria. Drawing from the experiences of similar Nigerian groups, the Note details recommendations that may facilitate greater success and lessen poten al risk associated with Amotekun’s formation. These recommendations are aimed primarily at Nigerian government and civil society actors and describe areas where external support could potentially improve local capacity to conduct oversight of Amotekun and similar groups.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography