Academic literature on the topic 'Small state security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Small state security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Small state security"

1

Rubinoff, Arthur. "Review: Peace & Security: Regional Powers and Small State Security." International Journal: Canada's Journal of Global Policy Analysis 51, no. 2 (June 1996): 380–82. http://dx.doi.org/10.1177/002070209605100219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baral, Bhimnath. "Security Challenges of Small States." Journal of Political Science 17 (February 6, 2017): 1–17. http://dx.doi.org/10.3126/jps.v17i0.20510.

Full text
Abstract:
The concept of Security has a vital role in the study of international relations. This concept is old as human civilization. It has different meaning in different phases of history. However, there have been sea changes in the interpretation of security matters. The traditional state-centric security has transferred into modern human centric approach. But the small states are always threatened by it in different forms and nature. As a precondition for sustainable political, economic and social development, small states are always tortured by several internal and external factors. So, this article overviews about the various security challenges faced by small states.Journal of Political Science. Vol. 17, 2017, Page: 1-17
APA, Harvard, Vancouver, ISO, and other styles
3

Kadıoğlu, İ. Aytaç, and Egemen B. Bezci. "Small State Intelligence: New Zealand in SEATO Security Affairs." Pacific Focus 35, no. 1 (April 2020): 5–28. http://dx.doi.org/10.1111/pafo.12152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sutton, Paul. "The politics of small state security in the caribbean." Journal of Commonwealth & Comparative Politics 31, no. 2 (July 1993): 1–32. http://dx.doi.org/10.1080/14662049308447654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Payne, Anthony. "The politics of small state security in the pacific." Journal of Commonwealth & Comparative Politics 31, no. 2 (July 1993): 103–32. http://dx.doi.org/10.1080/14662049308447658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

de Silva, K. M. "Sri Lanka: The security problems of a small state." Defence and Peace Economics 10, no. 4 (December 1999): 361–81. http://dx.doi.org/10.1080/10430719908404933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wrage, Stephen. "Small State Security in the Balkans (review)." Journal of Modern Greek Studies 3, no. 2 (1985): 215–16. http://dx.doi.org/10.1353/mgs.2010.0055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deres, Kornélia. "From State Security to Security State: Performing Control and Claustrophobia in Hungarian Theatre." New Theatre Quarterly 36, no. 4 (November 2020): 320–31. http://dx.doi.org/10.1017/s0266464x20000627.

Full text
Abstract:
This article examines how the exchanges of archival and artistic practices in Central European and, more precisely, in Hungarian theatre and performance can create performative sites calling attention to the continuities and recurring reflexes of pre- and post-1989 realities. The genre of re-performance allows performance artists to comment on their own experience with the communist regimes, as well as to enact the continuing political and aesthetic potentials of past performances. In 1986, a recently founded performance group, the Collective of Natural Disasters, premiered its piece Living Space in Budapest, considered to be an iconic production in the history of Hungarian dance theatre, and earning international success. The solo performer (Yvette Bozsik) was set in a small glass box, suggesting the claustrophobic atmosphere of the 1980s in the country. In 2012, the group re-interpreted the 1986 production with considerable critical changes under the title (In)Finity. The new solo performer (Rita Góbi) was locked in a similar glass box. However, the group refashioned the main question about freedom by offering a mediatized landscape on stage where the recurring experience of claustrophobia was seen through technical innovations forming new regimes and forms of surveillance. Kornélia Deres is a Humboldt Research Fellow in the Institute of Media Culture and Theatre at the University of Cologne. Between 2015 and 2018 she was an assistant professor at Károli University (Budapest), and since 2017 has been a lecturer at ELTE University in Budapest. She is co-editor of five books and the author of Hammer for Images (2016), as well as two volumes of poetry.
APA, Harvard, Vancouver, ISO, and other styles
9

Miller, Rory. "Qatar, Energy Security, and Strategic Vision in a Small State." Journal of Arabian Studies 10, no. 1 (January 2, 2020): 122–38. http://dx.doi.org/10.1080/21534764.2020.1793494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malcolm, James A. "‘Sustainability as Maritime Security: A Small Island Developing State Perspective?’." Global Policy 8, no. 2 (May 2017): 237–45. http://dx.doi.org/10.1111/1758-5899.12446.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Small state security"

1

Adelwerth, Shawn. "Security of a Small State: Case of Kuwait." Honors in the Major Thesis, University of Central Florida, 2004. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/694.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Arts and Sciences
Political Science
APA, Harvard, Vancouver, ISO, and other styles
2

Hwang, In Soo. "The United States-Republic of Korea security relationship, 1953-1960 : great power and small state." Thesis, University College London (University of London), 1999. http://discovery.ucl.ac.uk/1318002/.

Full text
Abstract:
This study investigates South Korea's security behaviour vis-a-vis the United States and that of the U.S. towards Korea. The significance of this study lies in its emphasis upon relations between South Korea and the United States during the 1953- 1960 period from the perspective of the patron-client state relationship. This study analyses the issues and historical events in order to trace the development of each nation's strategy, leverages, and tactics towards the other. Each chapter is related to the U.S. security commitment policy to South Korea, and South Korea's response in the frame work of the big power and small state relationship. The Introduction explains the purpose and importance of the research and the analytical framework. Chapter 1 analyses U.S. -South Korean diplomatic seesawing and Korean President Rhee's bargaining position during the Korean armistice negotiations. Chapter 2 traces the post-armistice period and the Korean Political Conference at Geneva during 1953-1954. As the Korean Armistice Agreement was a temporary measure to secure a complete cessation of hostilities, the Geneva Conference of 1954, intended to establish a political settlement, was a significant issue in the post-armistice period. Chapter 3 analyses U.S. security and military policy following the Korean War. The question of the proposed reduction of ROK forces and the redeployment of U.S. forces in Korea in connection with the 'New Look' policy were troublesome issues between Seoul and Washington, over which the two governments exerted their bargaining power. Chapter 4 deals with Rhee's conflicts with the U.S. concerning the normalisation of South Korea-Japan relations, U.S. economic policy towards Korea and its negative effects on Rhee's Government, and Rhee's undemocratic rule and dispute with the U.S. concerning Korean political affairs. Chapter 5, the conclusion of this study, summarises the research findings. As power and administration in South Korea were highly centralised under Rhee, it is important to ask to what extent did he, as the leader of the weaker state, manage and manipulate a bargaining position in Korea's relations with the United States.
APA, Harvard, Vancouver, ISO, and other styles
3

Foth, Marcus. "Backing up the Smart State: E-Security in Queensland's Small and Medium Enterprises." Thesis, Furtwangen University, Germany, 2002. https://eprints.qut.edu.au/1901/1/smart.pdf.

Full text
Abstract:
The vulnerability of today's information economy is still not sufficiently realised: The economic structure of Queensland is to a great extent made up of Small and Medium Enterprises (SME). Across all industry sectors, these businesses rapidly approach a similar level of information technology take-up than large enterprises and thus depend to an increasing degree on IT efficiency and security. The findings of this study, which has been conducted in partnership with the Information Industries Bureau and the Gold Coast City Council, are drawn from an online survey in order to provide an indication of the present e-security situation in SMEs of Queensland's Gold Coast region. The data shows that the installation and maintenance of e-business technology requires significant time, staff and money resources as well as a constant learning and updating process in order to be on top of the IT development, which is why most SMEs rely to a substantial degree on the expertise and competence of external IT service providers and consultants. E-Business technology is subject to various vulnerabilities. It is necessary to conduct proper risk analysis to gauge the impact and likelihood of any potential business threats. The risks identified in this process have then to be treated with appropriate backup plans. SMEs seem to be overstrained to handle this burden by themselves without the availability of support programs to reasonable charges, for specialised e-security service providers do not target SMEs. Their solutions are too pricey and are not designed to be applied in the setting of a SME. The Queensland Government shows a high level of interest in issues surrounding e-business and their usage. However, e-security issues in SMEs are rarely addressed. Many public funding and assistance schemes seem to be unknown, unattractive, or unsuitable to SMEs. There is an obvious lack of awareness for security issues among SMEs which has to be addressed by developing new and rethinking existing public programs and strategies. To stimulate awareness and appropriate action, it is desirable to provide certain incentives and rewards to enterprises that pass security audits and fulfil Australian security standards. These are essential steps towards the protection against and preparedness for any e-security incidents which both the public and private sector have to take in order to survive something Sam Nunn calls an "electronic Pearl Harbor".
APA, Harvard, Vancouver, ISO, and other styles
4

Lundberg, Karl Johan. "Investigating the current state of securityfor small sized web applications." Thesis, Linköpings universitet, Databas och informationsteknik, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-89160.

Full text
Abstract:
It is not uncommon to read about hacker attacks in the newspaper today. The hackers are targeting governments and enterprises, and motives vary. It may be political or economic reasons, or just to gain reputation. News about smaller systems is, unsurprisingly, not as common. Does this mean that security is less relevant of smaller systems? This report investigates the threat model of smaller web applications, to answer that very question.Different attacks are described in the detail needed for explaining their threat but the intention is not to teach the reader to write secure code. The report does, however, provide the reader with a rich source of references for that purpose. After describing some of the worst threats, the general cloud threat model is analyzed. This is followed by a practical analysis of a cloud system, and the report is closed with general strategies for countering threats.The severe destruction that a successful attack may cause and the high prevalence of those attacks motivates some security practices to be performed whenever software is produced. Attacks against smaller companies are more common now than ever before
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Kashif Nizam. "State-of-the-art Study and Design of a Small Footprint Version of the COOS Plugin Framework." Thesis, Norwegian University of Science and Technology, Department of Telematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-10904.

Full text
Abstract:
GSM and UMTS technologies have already gained a huge market penetrationresulting in millions of customers. Machine-to-Machine (M2M) Communicationis promising to be the next big technology that is going to hit themass market with numerous essential services. Telemetry systems, whichwere thought once as the domain of big industrial companies, are now beingavailable to larger and wider customers because of the advances in M2Mcommunication. Thanks to mobile technologies, millions of small handhelddevices are now available in the mass market which can be used to communicatereal time information to the customers. Telenor Objects (a smallbusiness unit of Telenor Group) has defined a new Connected Object Operatingsystem (COOS) which aims to provide a common platform for thedevices to communicate real time data and to provide value added servicesto the customers. COOS is a modular and flexible platform, and includes aplugin framework offered to device and service developers for easy connectingservices and devices to the platform. The current version of COOS pluginframework is based on Java Standard Edition and OSGI, with some supportfor development on J2ME. This thesis research work aims to provide a briefoverview of the Connected Object concept and the COOS platform architecture.The main goal of this thesis is to design a small footprint version ofthe COOS plugin framework for Windows-based handheld devices. It willalso provide a state-of- the art study on mobile device programming focusingon Windows-based services. This thesis research can serve as a startingdocument to provide a full functioning plugin framework for Windows-baseddevices and services.
APA, Harvard, Vancouver, ISO, and other styles
6

Mvé, ebang Bruno. "Politique étrangère et sécurité nationale d'un petit État : analyse de l'action du Gabon pour la paix et la sécurité en Afrique Centrale, une politique extérieure au service de la construction et de la préservation de l'intérieur." Thesis, Lyon 3, 2014. http://www.theses.fr/2014LYO30018.

Full text
Abstract:
L’Afrique est la région du monde, dans laquelle, existe le plus grand nombre de crises armées sanglantes. Depuis les indépendances, cette région n’a jamais véritablement connu de paix et de sécurité dans toutes ses entités régionales. Dans ce sombre tableau africain, l’Afrique centrale occupe une place peu enviable. Abandonnée à son triste sort à la fin de la Guerre Froide, des pays, tel que le Gabon, décidèrent de particulièrement orienter leur politique étrangère dans le but d’aider les États en crises, de son environnement immédiat, à recouvrir une certaine stabilité mais surtout dans une logique de sécurisation nationale. Petit pays d’Afrique centrale, le Gabon ressent les effets de l’instabilité régionale persistante. Cet engagement gabonais pour la paix n’est pas né avec son accession à la souveraineté. Il s’est construit au fil des années. Son action pour sa construction et sa sécurité nationale n’a jamais eu pour but de reproduire, exactement, le même modèle de stabilité qu’il connait mais, uniquement, d’arriver aux silences des armes. Il est évident que comme tout engagement politique, l’action r gabonaise présente certaines limites et l’État devrait prendre des mesures pour que l’objectif de sécurité nationale soit atteint sans ambages. Néanmoins, l’action de tel pays est importante car en priorisant le dialogue, ils fournissent un travail de fourmis qui arrive, tout de même, à mettre un terme aux effusions de sang et à leur tendance au débordement
Africa is the region of the world, in which, exists the largest number of bloody armed crises. Since the independences, this region has never really known peace and security in all its regional entities. In this somber african board, Central Africa occupies an unenviable place. Abandoned in its sad fate at the end of the Cold War, countries, such as the Gabon, decided to direct particularly their foreign policy with the aim of helping states in crises, of its immediate environment, to cover a certain stability But especially in a logic of national reassurance. Small country of Central Africa, the Gabon feels the effects of the persistent regional instability. This Gabonese commitment for the peace was not born with its entry in the sovereignty. It built itself over the years. Its action for its building and national security has never aimed at reproducing exactly the same model of stability which it can but only arrive at the silence of weapons. It is obvious that as any political commitment, the gabonese regional action presents certain limits and the state should take measures aiming at a better international assertion. Nevertheless, the action of such country is important because by prioritizing the dialogue, they supply a painstaking job which manages, all the same, to put an end to the bloodsheds and to their tendency to the overflowing
APA, Harvard, Vancouver, ISO, and other styles
7

Gubb, Matthew. "Foreign military intervention in response to microstate security crises : a study in vulnerability and dependence." Thesis, University of Oxford, 2000. http://ora.ox.ac.uk/objects/uuid:98efc23c-a17e-4ca6-9328-41d88366234a.

Full text
Abstract:
The thesis explores political-security aspects of a late twentieth century phenomenon: the existence of many diminutive and weak, yet ostensibly sovereign and independent, states. The thesis addresses two main questions concerning these "microstates" (with a population of less than one million). What are the principal sources of microstate vulnerability? How best can we conceptualize microstates' security dependence on larger powers? Foreign military intervention in response to microstate security crises throws these dual issues into sharp relief. The study covers all 55 independent microstates during the years 1960 to 1989, from the conventional beginning of decolonization to the end of the Cold War. Particular attention is paid to four representative case studies: Vanuatu (Papua New Guinea's 1980 intervention to quell a secessionist rebellion); The Gambia (Senegal's 1981 suppression of a coup attempt); Grenada (Cuba's role in respect of the 1983 American invasion); and the Maldives (India's thwarting of a 1988 mercenary attack). The thesis draws on an original data base of microstate security crises, a wide range of academic literature covering International Relations theory and small states, and field work. It tests the propositions that certain typical political, geographical and economic characteristics of microstates played a key role in determining vulnerability to security threats, and that microstates' dependent relationships with larger powers are in keeping with the patron-client model of such unequal associations. The thesis concludes that a mix of typical microstate features heightened their vulnerability, notably disadvantageous colonial legacies; tendencies towards "exaggerated personalism", "leadership longevity", and unrestrained executive power; remote insularity; and extreme government resource constraints. The patron-client model was found to be a useful conceptualization of dependent security relationships with larger powers, in terms of the pervasiveness of the latter's engagement in the microstates, conformity in foreign policy and mutual benefit, but the criterion of informality was frequently not met.
APA, Harvard, Vancouver, ISO, and other styles
8

Faizal, Farahanaz. "Security problems of small island developing states (SIDS) : with particular reference to the Indian Ocean." Thesis, University of Hull, 1996. http://hydra.hull.ac.uk/resources/hull:3948.

Full text
Abstract:
In succeeding chapters it will be argued that the characteristics of SIDS results in their security problems being substantially different to those of larger states. Chapter one seeks to provide the background information about international interest in small states in general and deals with the difficult issue of defining 'smallness'. It also reviews the existing theories of security and applies these theories to SIDS. Although no attempt will be made to give an alternative 'definition' of security it nevertheless attempts to outline security in relation to SIDS. Chapter two examines the concept of vulnerability and seeks to identify the different areas where SIDS are vulnerable. It also strives to identify the special attributes of SIDS pertaining to these states that makes their security environment different to small continental states. This is followed by Chapter three in which the threats confronting the SIDS are presented drawing insights from the Caribbean and the Pacific. Using examples from these two regions various types of threats are identified in the following: areas: military, political, economical, societal and environmental. Chapter four is devoted to the security scenario of the Indian Ocean. It analyses how the Indian Ocean geopolitics affect the Indian Ocean SIDS, especially the regional security scenario and in the various sub-systems in which the Indian Ocean SIDS are located. It also attempts to identify the changing security pattern of the Indian Ocean from the Cold War setting to the present day. Chapters five, six and seven are case studies of the Maldives, the Seychelles and Mauritius respectively. They attempt to give an in-depth analysis of the security problems of these states. Each chapter starts with a brief insight into the physical, historical and socio-cultural background of the countries. Next, it analyses the security problems as perceived by the leadership of these countries. It goes on to identify the security capabilities that exist in these countries. Finally, it attempts to identify the current security problems while differentiating security threats into real, potential and latent threats. Chapter eight is divided into two parts. The first part is a comparative analysis of the security problems faced by the three Indian Ocean SIDS. It deals with national, regional and international dimensions of the problems and tries to draw out the similarities and the differences between the three states and why they are so. The second part deals with the responses to the security problems of the SIDS. It identifies existing strategies and responses at various levels: Domestic, Regional and International. It also attempts to identify measures that the SIDS could undertake to enhance their security. Chapter Nine is a brief summary of the findings of this research. With regard to the Indian Ocean SIDS (IOS), the result of the research shows that these SIDS have security problems that are considerably different to those of larger states; and that these problems are attributable to the characteristics arising out of their smallness and their islandness. Furthermore, the research clearly strengthens the view that there is very little that the SIDS can do to enhance their security. While the geo-politics of the Indian Ocean did influence the security problems faced by these SIDS in the past and still does so to a certain extent, the majority of the problems faced by the Indian Ocean SIDS are due to the fact that they are small and island developing states rather than SIDS located in the Indian Ocean. As such there does not seem to be a common Indian Ocean security problem. On the basis of this, there is very little ground for an Indian Ocean response to the security problems faced by these IOS.
APA, Harvard, Vancouver, ISO, and other styles
9

Murphy, Martin N. "Small boats, weak states and dirty money : contemporary piracy and maritime terrorism's threat to international security." Thesis, University of Reading, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.493960.

Full text
Abstract:
The sea is a restless realm, In part that restlessness is timeless: the action of wind and waves. In part it is ancient: the direct threat of pirates. In part it is very modern: the threat of terrorism that has been felt acutely since the events of 11th September 2001. he reaction to these events has had a profound and continuing impact in the maritime domain. In particular it has been suggested that pirates and maritime terrorists present a largely common threat to international maritime security. This thesis examines this hypothesis by reviewing each phenomenon separately before asking how and under what circumstances pirates and maritime terrorists might come together.
APA, Harvard, Vancouver, ISO, and other styles
10

Nygren, Max. "Sveriges säkerhetspolitiska strategi: Balancing, bandwagoning eller hedging?" Thesis, Örebro universitet, Institutionen för humaniora, utbildnings- och samhällsvetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-85644.

Full text
Abstract:
Small states tend to use different security strategies to increase and gain influence over their own level of security. Sweden is a small Nordic state with a long history of proclaimed neutrality when it comes to security policy. But in the last couple of decades the country has increased its contributions to, and participations in, numerous EU and NATO security projects and exercises. In 2009, Sweden adopted a declaration of solidarity towards the member countries of the EU. In 2014, Sweden also signed a memorandum of understanding with NATO. This has ignited bothan internal and an external debate among political scientists and security experts about what the Swedish security strategy is. This paper seeks to describe and clarify the Swedish security strategy by analyzing documents on security policy from the Swedish government. The study also examines the level of continuity in the Swedish security strategy. Based on a theoretical framework of security strategies of small states, the study utilizes three ideal types of the small state security strategies balancing , bandwagoning and hedging to analyze and describe the Swedish security strategy. The study concludes that the Swedish security strategy as it is presented in two official documents on security policy ranging from 2009 to 2015 mostly indicates balancing . The willingness to strengthen the Swedish military capacity and theeagerness for cooperation with the EU, NATO and USA clearly indicates balancing towardsRussia, a state which is described as a security threat in both documents. However, there are also tendencies towards hedging due to the insistence of armed neutrality in both documents. The study also shows that while there is a high degree of continuity in Sweden’s security strategy there has been a small shift in strategy towards more balancing from 2009 to 2015.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Small state security"

1

Solidum, Estrella D. The small state: Security and world peace. Manila: Kalikasan Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Lange, David R. South Pacific security and development: A small-state perspective. Honolulu, Hawaii: East-West Center, 1987.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Coflin, James. State authorization and inter-state information sharing concerning small arms manufacturers, dealers and brokers. [Ottawa: Govt. of] Canada, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Keatinge, Patrick. Towards a safer Europe: Small state security policies and the European Union : implications for Europe. Dublin: Institute of European Affairs, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Silva, K. M. De. Regional powers and small state security: India and Sri Lanka, 1977-1990. Washington, D.C: Woodrow Wilson Center Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Keatinge, Patrick. Towards a safer Europe: Small state security policies and the European Union : implications for Europe : IEA interim report. Dublin: Institute of European Affairs, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

MacGowan, John. Supplemental information for NRMR MPOs integrating security into small MPO planning activities. Fargo, N.D.]: North Dakota State University, Upper Great Plains Transportation Institute, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

The state of small business security in a cyber economy: Hearing before the Subcommittee on Regulatory Reform and Oversight of the Committee on Small Business, House of Representatives, One Hundred Ninth Congress, second session, Washington, DC, March 16, 2006. Washington: U.S. G.P.O., 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A small state at the top table: Memories of Ireland on the UN Security Council, 1981-82. Dublin: Institute of Public Administration, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Institute), Agrarian Change and Small Farmers (Symposium) (2012 Govind Ballabh Pant Social Science. Agrarian change and small farmers: Super markets, viability and food policy. New Delhi: Published for G.B. Pant Social Science Institute, Allahabad by Concept Publishing Company Pvt. Ltd., 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Small state security"

1

Wilson, Page, and Auður H. Ingólfsdóttir. "Small state, big impact?" In Routledge Handbook of Arctic Security, 188–97. London ; New York : Routledge/Taylor & Francis Group, 2020.: Routledge, 2020. http://dx.doi.org/10.4324/9781315265797-16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wheelersburg, Robert P. "North Atlantic Small State Security 2025: The West Nordic Security Zone." In Small States and the New Security Environment, 87–101. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51529-4_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Myatt, Madeleine. "Small, Smart, Powerful?" In Global Studies, 233–60. Bielefeld, Germany: transcript Verlag, 2021. http://dx.doi.org/10.14361/9783839457474-010.

Full text
Abstract:
“Size matters in international relations,” (Steinsson /Thorhallsson 2017: 1), but does size still matter in the digital age, and in the cyber domain? Scholars have long believed that larger states are better equipped for state competition due the size of their populations, economies, and militaries based on a respective size/power calculus. This chapter explores how digital technological innovation help small states like the Nordic countries to gain influence on the world political stage and in the cyber domain. Emphasis is put on the way how smaller states like Estonia or Finland make use of this new asymmetric toolbox of 'cyber power' to gain leverage in the international security realm.
APA, Harvard, Vancouver, ISO, and other styles
4

Flynn, Brendan. "Only just making up the numbers? Understanding European small state participation in multilateral maritime security operations." In Small States and Security in Europe, 118–34. London: Routledge, 2021. http://dx.doi.org/10.4324/9781003082453-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tidwell, Alan C. "Building Shelter in Washington: The Politics of Small State Engagement." In Small States and the New Security Environment, 13–26. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51529-4_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hughes, Daniel, and Andrew Colarik. "Small State Acquisition of Offensive Cyberwarfare Capabilities: Towards Building an Analytical Framework." In Intelligence and Security Informatics, 166–79. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31863-9_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Holzer, Jan, and Miroslav Mareš. "In the Shadow of Russia: The Czech Republic as a Small Central European State." In Czech Security Dilemma, 221–31. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-20546-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shchemelev, Sergei N., Daniil A. Staroseltsev, Vasiliy U. Boev, and Svetlana S. Galazova. "The Identification of the Sphere of Small Business as a Condition for an Effective State Policy of Its Regulation." In Towards an Increased Security: Green Innovations, Intellectual Property Protection and Information Security, 713–26. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-93155-1_77.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Nielsen, Kristian H. "Small State Preoccupations: Science and Technology in the Pursuit of Modernization, Security, and Sovereignty in Greenland." In Exploring Greenland, 47–71. New York: Palgrave Macmillan US, 2016. http://dx.doi.org/10.1057/978-1-137-59688-8_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Braveboy-Wagner, Jacqueline Anne. "Political-Security Interests." In Small States in Global Affairs, 25–54. New York: Palgrave Macmillan US, 2008. http://dx.doi.org/10.1057/9780230610330_2.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Small state security"

1

Nazarenko, I. L. "ECONOMIC SECURITY OF SMALL FAMILY BUSINESS AFFECTED BY PANDEMIC: IDENTIFYING NEW THREATS." In Economic security: state, cluster, enterprise. Publishing House “Baltija Publishing”, 2020. http://dx.doi.org/10.30525/978-9934-26-018-6-12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mamatelashvili, O. V. "Financing Of Small Business To Ensure The Economic Security Of The State." In II International Conference on Economic and Social Trends for Sustainability of Modern Society. European Publisher, 2021. http://dx.doi.org/10.15405/epsbs.2021.09.02.99.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cohen, Reuven, Raziel Hess-Green, and Gabi Nakibly. "Small lies, lots of damage: a partition attack on link-state routing protocols." In 2015 IEEE Conference on Communications and Network Security (CNS). IEEE, 2015. http://dx.doi.org/10.1109/cns.2015.7346851.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fenglan Chen, Yongjun Shen, Guidong Zhang, and Xin Liu. "The network security situation predicting technology based on the small-world echo state network." In 2013 IEEE 4th International Conference on Software Engineering and Service Science (ICSESS). IEEE, 2013. http://dx.doi.org/10.1109/icsess.2013.6615328.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Bercier, Emmanuel, Jean Luc Dessus, Alain Manissadjian, and Philippe Tribolet. "State-of-the-art of mass production: challenges for low-cost and application benefits of high-performances small-pitch IR detectors." In SPIE Defense and Security Symposium, edited by Bjørn F. Andresen, Gabor F. Fulop, and Paul R. Norton. SPIE, 2008. http://dx.doi.org/10.1117/12.780558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zakharov, Sergey V., Alexandr S. Bovkun, and Konstantin O. Vasiliev. "The functioning of small innovative enterprises created in partnership with state universities and natural persons." In 2017 International Conference "Quality Management,Transport and Information Security, Information Technologies" (IT&QM&IS). IEEE, 2017. http://dx.doi.org/10.1109/itmqis.2017.8085754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Smith, Curtis. "Advanced Small Modular Reactor Probabilistic Risk Assessment Framework." In ASME 2014 Small Modular Reactors Symposium. American Society of Mechanical Engineers, 2014. http://dx.doi.org/10.1115/smr2014-3332.

Full text
Abstract:
A key area of the Small Modular Reactor (SMR) Probabilistic Risk Assessment (PRA) use is in the development of methodologies and tools that will be used to predict the safety, security, safeguards, performance, and deployment viability of SMR systems starting in the design process through the operation phase. Recently, the Idaho National Laboratory (INL) set out to develop quantitative methods and tools and the associated analysis framework for assessing a variety of SMR risks. Development and implementation of SMR-focused safety assessment methods may require new analytic methods or adaptation of traditional methods to the advanced design and operational features of SMRs. The development of SMR-specific safety models for margin determination will provide a safety case that describes potential accidents, design options (including postulated controls), and supports licensing activities by providing a technical basis for the safety envelope. INL has proposed an approach to expand and advance the state-of-the-practice in PRA. Specifically we will develop a framework for applying modern computational tools to create advanced risk-based methods for identifying design vulnerabilities in SMRs. This framework will require the fusion of state-of-the-art PRA methods, advanced 3D visualization methods, and highperformance optimization. The approach has several defining attributes focused within three general areas: 1. Models – A single 3D representation of all key systems, structures, and components (SSCs) will be defined for a particular facility. We will be able to simulate — by understanding how each SSC interacts with other parts of the facility — the hazard-induced susceptibilities of each SSC. 2. Phenomena – An approach to effectively representing hazards and their effect on physical behavior at a facility will need to be determined. In many cases, multiple models of a specific phenomenon may be available, but this ensemble of models will need to be intelligently managed. 3. Integration – Any advanced risk-informed decision support approach will rely on a variety of probabilistic and mechanistic information. The safety, security, and economic drivers will need to be integrated in order to determine the effectiveness of proposed mitigation strategies. We will need to be able to manage all (important) hazards for all (important) scenarios all of the time the facility is in operation. The focus of the paper will be on discussing the features of the proposed advanced SMR PRA Framework and providing an status update of the development activities.
APA, Harvard, Vancouver, ISO, and other styles
8

Perekrestova, Lyubov, Alfia Popova, and Olga Popova. "The security level of tax contribution of small businesses to the region’s consolidated budget." In Proceedings of the Volgograd State University International Scientific Conference "Competitive, Sustainable and Safe Development of the Regional Economy" (CSSDRE 2019). Paris, France: Atlantis Press, 2019. http://dx.doi.org/10.2991/cssdre-19.2019.81.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kolesnichenko, E. A., and Yu M. Sokolinskaya. "SPECIFICS OF THE IMPLEMENTATION OF THE NATIONAL SECURITY STRATEGY IN THE SMALL FOREST REGIONS OF RUSSIA." In All-Russian Scientific Conference, dedicated to the 90th anniversary of the Voronezh State Forestry University named after G.F. Morozov. Знание-М, 2020. http://dx.doi.org/10.38006/907345-73-7.2020.243.248.

Full text
Abstract:
в статье уточнено содержание понятия «национальная безопасность регионов России» применительно к малолесным территориям, определены структурные элементы стратегии ее обеспечения. Автором изучен алгоритм разработки и реализации стратегии национальной безопасности малолесного региона на предмет выявления в нем «узких» мест и разработки мер для его дальнейшей корректировки. Систематизированы факторы регионального уровня воздействия и имеющиеся ограничения для реализации стратегии национальной безопасности малолесных регионов России. На основе выявленных особенностей развития региона определен вектор совершенствования процесса реализации стратегии национальной безопасности малолесного региона с учетом территориальной специфики. Сформирован комплекс мер институционального характера для повышения эффективности реализации стратегии национальной безопасности на уровне региона применительно с специфике малолесных территорий
APA, Harvard, Vancouver, ISO, and other styles
10

Kefeli, Igor. "BIG DATA PREDICTIVE FUNCTION IN THE RESEARCH OF GLOBAL SECURITY." In Globalistics-2020: Global issues and the future of humankind. Interregional Social Organization for Assistance of Studying and Promotion the Scientific Heritage of N.D. Kondratieff / ISOASPSH of N.D. Kondratieff, 2020. http://dx.doi.org/10.46865/978-5-901640-33-3-2020-296-304.

Full text
Abstract:
The article analyzes the state of global security in the context of the «digital age» in the process of transition from «small» to big data. The focus is on the relationship in the «knowledge pyramid» between facts that are subject to scientific analysis and their measurement directly in practice, with data, information, knowledge and wisdom directly in the global infosphere.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Small state security"

1

Nagabhatla, Nidhi, Duminda Perera, Jana Gheuens, Chloe Wale, and Michael Devlin. Managing Disaster Risk and Water Security: Strategies for Small Island Developing States. United Nations University Institute for Water, Environment and Health, December 2019. http://dx.doi.org/10.53328/agnk1024.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Maletta, Giovanna, and Lauriane Héau. Funding Arms Transfers through the European Peace Facility: Preventing Risks of Diversion and Misuse. Stockholm International Peace Research Institute, June 2022. http://dx.doi.org/10.55163/oelz9733.

Full text
Abstract:
Since it was established in March 2021, the European Peace Facility (EPF) has become the main source of funding for European Union (EU) external actions in the field of crisis management and conflict prevention with defence and military implications. These include initiatives such as EU military missions, support to military peace operations led by other actors and assistance to strengthen third states’ military capacities. In addition, through the EPF, EU security assistance can also fund, for the first time, the supply of lethal military equipment and, thus, weapons. Arms transfers to countries that are affected by crises and conflict bear higher risks that the weapons provided may be misused or diverted to unauthorized end-users. Considering the contexts in which the EPF is already or will likely be funding the provision of weapons, these risks are particularly tangible. The EU and its member states have instruments and expertise at their disposal that they should use to minimize the potential negative consequences generated by using the EPF for addressing partners’ security needs. These include preventing overlaps in establishing relevant controls, including post-shipment controls, and coordinating EPF actions with assistance in the field of arms transfer and small arms and light weapons controls.
APA, Harvard, Vancouver, ISO, and other styles
3

Aromolaran, Adebayo B., and Milu Muyanga. Impact of COVID-19 on Food Systems and Rural Livelihoods in Nigeria. Institute of Development Studies (IDS), September 2020. http://dx.doi.org/10.19088/apra.2020.005.

Full text
Abstract:
This report presents an early assessment of the impacts of the COVID-19 pandemic on agricultural commercialisation, food and nutrition security, labour and employment, and poverty and well-being in rural Nigeria. Data was collected from a stratified random sample of 110 respondent households drawn from five Local Government Areas (LGAs) in Ogun (Ijebu East, Obafemi Owode, and Imeko Afon) and Kaduna (Chikun and Soba) States. At the time of the survey, these LGAs had reported a small number of COVID-19 cases. The survey data is complemented by insights from five in-depth key informant interviews conducted in the LGAs. The APRA COVID-19 data collection will be carried out over three rounds. This report presents insights obtained from the first round implemented during mid-July 2020.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography