Journal articles on the topic 'Small state security'

To see the other types of publications on this topic, follow the link: Small state security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Small state security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Rubinoff, Arthur. "Review: Peace & Security: Regional Powers and Small State Security." International Journal: Canada's Journal of Global Policy Analysis 51, no. 2 (June 1996): 380–82. http://dx.doi.org/10.1177/002070209605100219.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Baral, Bhimnath. "Security Challenges of Small States." Journal of Political Science 17 (February 6, 2017): 1–17. http://dx.doi.org/10.3126/jps.v17i0.20510.

Full text
Abstract:
The concept of Security has a vital role in the study of international relations. This concept is old as human civilization. It has different meaning in different phases of history. However, there have been sea changes in the interpretation of security matters. The traditional state-centric security has transferred into modern human centric approach. But the small states are always threatened by it in different forms and nature. As a precondition for sustainable political, economic and social development, small states are always tortured by several internal and external factors. So, this article overviews about the various security challenges faced by small states.Journal of Political Science. Vol. 17, 2017, Page: 1-17
APA, Harvard, Vancouver, ISO, and other styles
3

Kadıoğlu, İ. Aytaç, and Egemen B. Bezci. "Small State Intelligence: New Zealand in SEATO Security Affairs." Pacific Focus 35, no. 1 (April 2020): 5–28. http://dx.doi.org/10.1111/pafo.12152.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sutton, Paul. "The politics of small state security in the caribbean." Journal of Commonwealth & Comparative Politics 31, no. 2 (July 1993): 1–32. http://dx.doi.org/10.1080/14662049308447654.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Payne, Anthony. "The politics of small state security in the pacific." Journal of Commonwealth & Comparative Politics 31, no. 2 (July 1993): 103–32. http://dx.doi.org/10.1080/14662049308447658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

de Silva, K. M. "Sri Lanka: The security problems of a small state." Defence and Peace Economics 10, no. 4 (December 1999): 361–81. http://dx.doi.org/10.1080/10430719908404933.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wrage, Stephen. "Small State Security in the Balkans (review)." Journal of Modern Greek Studies 3, no. 2 (1985): 215–16. http://dx.doi.org/10.1353/mgs.2010.0055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Deres, Kornélia. "From State Security to Security State: Performing Control and Claustrophobia in Hungarian Theatre." New Theatre Quarterly 36, no. 4 (November 2020): 320–31. http://dx.doi.org/10.1017/s0266464x20000627.

Full text
Abstract:
This article examines how the exchanges of archival and artistic practices in Central European and, more precisely, in Hungarian theatre and performance can create performative sites calling attention to the continuities and recurring reflexes of pre- and post-1989 realities. The genre of re-performance allows performance artists to comment on their own experience with the communist regimes, as well as to enact the continuing political and aesthetic potentials of past performances. In 1986, a recently founded performance group, the Collective of Natural Disasters, premiered its piece Living Space in Budapest, considered to be an iconic production in the history of Hungarian dance theatre, and earning international success. The solo performer (Yvette Bozsik) was set in a small glass box, suggesting the claustrophobic atmosphere of the 1980s in the country. In 2012, the group re-interpreted the 1986 production with considerable critical changes under the title (In)Finity. The new solo performer (Rita Góbi) was locked in a similar glass box. However, the group refashioned the main question about freedom by offering a mediatized landscape on stage where the recurring experience of claustrophobia was seen through technical innovations forming new regimes and forms of surveillance. Kornélia Deres is a Humboldt Research Fellow in the Institute of Media Culture and Theatre at the University of Cologne. Between 2015 and 2018 she was an assistant professor at Károli University (Budapest), and since 2017 has been a lecturer at ELTE University in Budapest. She is co-editor of five books and the author of Hammer for Images (2016), as well as two volumes of poetry.
APA, Harvard, Vancouver, ISO, and other styles
9

Miller, Rory. "Qatar, Energy Security, and Strategic Vision in a Small State." Journal of Arabian Studies 10, no. 1 (January 2, 2020): 122–38. http://dx.doi.org/10.1080/21534764.2020.1793494.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malcolm, James A. "‘Sustainability as Maritime Security: A Small Island Developing State Perspective?’." Global Policy 8, no. 2 (May 2017): 237–45. http://dx.doi.org/10.1111/1758-5899.12446.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mohammed Ali, Umar. "The Effective Ways Of Entrepreneurial Opportunities For Small And Medium Enterprise Scheme (SMEs) In Borno State." American Journal of Management and Economics Innovations 03, no. 04 (April 11, 2021): 1–7. http://dx.doi.org/10.37547/tajmei/volume03issue04-01.

Full text
Abstract:
The study investigated effects of insurgency on educational development in Borno State. Basic education is the first level of education for children at primary 1 level to basic 9 which is the junior secondary school level in Nigeria. However, achieving education for all Nigerian children, Borno state need a secured teaching and learning environment. The study examined the effect of insurgent activities such as abduction of pupils and attacks on teachers in basic schools of Borno State and its effect to the development of the education in the state. The sample for the study was 270 teachers of basic schools, selected on the basis of 10 teachers from each of the 27 local government area that constitute Borno State. The instrument for data collection was a 20 items questionnaire title: Boko Haram Insurgency and educational development Questionnaires (HIEDQ). Two research questions were formulated, data collected were converted to mean, standard deviation and used to answer the research questions. It was therefore recommended that the Nigerian government should provide security to the state. The government should show higher commitment in mobilizing the armed forces to end the insurgency in the State and provide adequate security in schools. It was further recommended that the religious leaders should preach against violence act in their respective communities.
APA, Harvard, Vancouver, ISO, and other styles
12

Zoidov, Kobiljon Kh, Viktor G. Belomestnov, and Svetlana I. Bortalevich. "The contribution of small and medium-sized businesses in supporting the integrative security of the state." Market economy problems, no. 3 (2022): 92–106. http://dx.doi.org/10.33051/2500-2325-2022-3-92-106.

Full text
Abstract:
The article reveals the problems of the contribution of small and medium-sized businesses in supporting the integrative security of socio-economic systems, shows the need to improve the efficiency of using the potential of small and medium-sized businesses, including through the accelerated inspiration of new development concepts in small and medium-sized businesses. Goal. The purpose of this article is to study and justify methodological approaches to ensuring the integrative security of the state using the potential of small and medium-sized businesses. Tasks. To consider approaches to integrated modeling of integrative security; to reveal the areas of efficiency of small and medium-sized businesses in the context of supporting integrative security; to determine the potential for the development of the contribution of small and medium-sized businesses in supporting integrative security; to form approaches to the inspiration of modern concepts of development in small and medium-sized businesses. Methodology. The methodology for studying the contribution of small and medium-sized businesses in supporting integrative security is based on a systemic and structural analysis, an evolutionary-institutional approach. Results. Approaches to integrated modeling of integrative security are formed based on the classical model of assessing «portfolio» security risks, the hyper connection model of the components of security elements and the model of using integral reconciliation of indicators. The areas of efficiency of small and medium-sized businesses in the context of ensuring integrative security are disclosed. Special attention is paid to small innovative enterprises. The potential for the development of small and medium-sized businesses in ensuring integrative security, including: the potential of an ecosystem association based on integration, – clustering and associative cooperation; outsourcing potential; competition and cooperation potential; strategic adaptation potential; diversification potential; innovative development potential. Approaches to the inspiration of modern concepts of development in small and medium-sized businesses, including managed integration, catching up and advancing modernization and innovative development, have been formed; integrated inter-level digitalization; formation of a lean economy; formation of an eco-oriented «green» economy. Conclusions. The results of the study can serve as a basis for developing strategic plans for the development of small and medium-sized businesses and state regulation in the field of ensuring integrative security at different levels of the socio-economic system.
APA, Harvard, Vancouver, ISO, and other styles
13

Alshayji, Abdullah K. "Kuwait's Security Dilemma: The Balancing Acts of a Small Nation-State." Journal of South Asian and Middle Eastern Studies 33, no. 3 (2010): 59–81. http://dx.doi.org/10.1353/jsa.2010.0006.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Cela, Margrét. "Iceland: A Small Arctic State Facing Big Arctic Changes." Yearbook of Polar Law Online 5, no. 1 (2013): 75–92. http://dx.doi.org/10.1163/22116427-91000119.

Full text
Abstract:
Abstract Iceland is one of eight member states of the Arctic Council and claims to be the only sovereign state that is entirely located in the Arctic. Therefore, it should not come as a surprise that the region has gained a priority status in Iceland’s foreign policy. The developments in the Arctic will inevitably affect the country in one way or the other. This paper is divided into three sections; the first one discusses recent internal and external developments. The second section is about three different aspects of security, traditional, human and environmental, and furthermore, discusses those types of security in Icelandic context. The last section is on Iceland’s priorities in the Arctic, which are then measured against Lassi Heininen’s policy fields or indicators, and Arctic solutions presented by Alyson Bailes. Main conclusions are that even though Iceland has been going through challenging times in the resent years, the Arctic still remains somewhat a priority area, policy wise, and the Icelandic priorities, for the most part, fit within the frameworks of Arctic solutions and the policy fields they are measured against.
APA, Harvard, Vancouver, ISO, and other styles
15

Kubás, Jozef, Viktor Šoltés, and Katarína Repková Štofková. "SUPPORTING SMALL AND MEDIUM SIZED BUSINESSES IN SPECIFIC SERVICES WITHIN SLOVAKIA." CBU International Conference Proceedings 6 (September 25, 2018): 260–65. http://dx.doi.org/10.12955/cbup.v6.1166.

Full text
Abstract:
Providing private security is considered a specific type of business service, primarily carried out by small- and medium-sized enterprises. This specific type of business complements the state services in the field of internal security. State institutions support the creation of small- and medium-sized enterprises through targeted subsidies. The principal goal of this paper is to describe the business environment within Slovakia, focusing on small and medium enterprises providing services of private security. The secondary aim of the paper is to explain the support available for such business through subsidies from public authorities. The number of enterprises that provide services of private security, along with the number of their employees, is relevant. The outputs of the paper can be used as part of the analysis of the competitive environment by subsidy applicants who plan to operate in this specific area.
APA, Harvard, Vancouver, ISO, and other styles
16

Rubinoff, Arthur, and K. M. de Silva. "Regional Powers and Small State Security: India and Sri Lanka, 1977-90." International Journal 51, no. 2 (1996): 380. http://dx.doi.org/10.2307/40203798.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Haugevik, Kristin, and Pernille Rieker. "Autonomy or integration? Small-state responses to a changing European security landscape." Global Affairs 3, no. 3 (May 27, 2017): 211–21. http://dx.doi.org/10.1080/23340460.2017.1377625.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wrange, Jana, and Rikard Bengtsson. "Internal and external perceptions of small state security: the case of Estonia." European Security 28, no. 4 (September 18, 2019): 449–72. http://dx.doi.org/10.1080/09662839.2019.1665517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Teng, Paul. "Assuring food security in Singapore, a small island state facing COVID-19." Food Security 12, no. 4 (July 7, 2020): 801–4. http://dx.doi.org/10.1007/s12571-020-01077-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Shinkareva, O. V., and U. V. Evdokimova. "Features of calculation of state social security charges by medical companies — small and medium-sized enterprises." Buhuchet v zdravoohranenii (Accounting in Healthcare), no. 3 (March 22, 2022): 19–26. http://dx.doi.org/10.33920/med-17-2203-03.

Full text
Abstract:
The article is devoted to the peculiarities of calculating state social security charges by organizations that are small and medium-sized enterprises in accordance with the Federal Law of July 24, 2007 N 209-FL “On the Development of Small and Medium-Sized Enterprises in the Russian Federation”. The conditions of application of reduced tariffs were considered, it was noted that for the application of reduced rates it is necessary to enter the Unified Register of Small and Medium-Sized Enterprises. Issues related to the application of reduced tariffs in the calculation of state social security charges accrued for payments under civil contracts, as well as situations in which the application of reduced state social security charges rates and the actions of the accountant in this case cease, were analyzed. Practical examples of calculating state social security charges at reduced tariffs taking into account the federal minimum wage effective from January 1, 2022 are considered.
APA, Harvard, Vancouver, ISO, and other styles
21

Wu, Lili, Ganesh K. Venayagamoorthy, and Jinfeng Gao. "Online Steady-State Security Awareness Using Cellular Computation Networks and Fuzzy Techniques." Energies 14, no. 1 (December 30, 2020): 148. http://dx.doi.org/10.3390/en14010148.

Full text
Abstract:
Power system steady-state security relates to its robustness under a normal state as well as to withstanding foreseeable contingencies without interruption to customer service. In this study, a novel cellular computation network (CCN) and hierarchical cellular rule-based fuzzy system (HCRFS) based online situation awareness method regarding steady-state security was proposed. A CCN-based two-layer mechanism was applied for voltage and active power flow prediction. HCRFS block was applied after the CCN prediction block to generate the security level of the power system. The security status of the power system was visualized online through a geographic two-dimensional visualization mechanism for voltage magnitude and load flow. In order to test the performance of the proposed method, three types of neural networks were embedded in CCN cells successively to analyze the characteristics of the proposed methodology under white noise simulated small disturbance and single contingency. Results show that the proposed CCN and HCRFS combined situation awareness method could predict the system security of the power system with high accuracy under both small disturbance and contingencies.
APA, Harvard, Vancouver, ISO, and other styles
22

van der Molen, Thomas, and Ellen Bal. "Staging "small, small incidents"." Focaal 2011, no. 60 (June 1, 2011): 93–107. http://dx.doi.org/10.3167/fcl.2011.600108.

Full text
Abstract:
In this article, we reflect on the gendered contours of young Kashmiris’ dissident practices against the Indian military occupation of the Kashmir Valley. It is largely based on ethnographic research that coincided with the launch of an ongoing, predominantly nonviolent people’s movement in which youth have played a prominent role. The article shows how university students’ and young professionals’ “small activism” is entangled in the gendered dynamics of militarization and dissent, while underlining the threat posed by “security forces” to women’s “honor” and “dignity.” In the context of widespread societal anxiety about “dishonor,” young Kashmiris’ urge to reclaim dignity at once motivates them to practice dissent and narrows the scope for female dissidents’ capacity to act upon this drive overtly. The present case suggests that recent anthropological interest in global youth cultural practices may be supplemented with a recognition of local constraints on young people’s public opposition that arise in circumstances of (gendered) state oppression.
APA, Harvard, Vancouver, ISO, and other styles
23

Frantseva-Kostenko, E. E. "THE MAIN CATEGORIES OF THREATS AND RISK FACTORS FOR THE ECONOMIC SECURITY OF SMALL BUSINESSES." Globus 7, no. 2(59) (April 4, 2021): 52–54. http://dx.doi.org/10.52013/2658-5197-59-2-12.

Full text
Abstract:
The article discusses the threats to the economic security of small businesses. Enterprises are directly involved in the economic development of the state, are a platform for the introduction of innovative developments, act as a catalyst for the modernization of the national economy. Based on the analysis and evaluation of scientific and monographic literature, the main problems of the economic system of small businesses are identified. At the final stage of the study, a classification of external and internal threats to economic security is proposed, and the main risk factors for the functioning of small businesses are identified.
APA, Harvard, Vancouver, ISO, and other styles
24

Tètreault, Mary Ann. "Autonomy, necessity, and the small state: ruling Kuwait in the twentieth century." International Organization 45, no. 4 (1991): 565–91. http://dx.doi.org/10.1017/s002081830003321x.

Full text
Abstract:
To reduce its strategic vulnerability, a small state may enter into a cliency relationship with a more powerful state. Among the consequences of cliency for the small state are the acquisition of resources, which can be used against threatening neighbors as well as against domestic populations, and the reduction of autonomy. In 1899, Mubarak, Kuwait's ruler, entered a cliency relationship with Britain. As a result, Kuwait was able to avoid incorporation into the Ottoman Empire. Although Mubarak and subsequent Kuwaiti rulers lost their foreign policy autonomy, they acquired resources enabling them to enhance their domestic autonomy by suppressing elite groups that were formerly integral participants in governing Kuwait. In 1961, oil revenues enabled Kuwait's rulers to end the cliency relationship and to provide their own resources for repressing or pacifying domestic groups. But the fact that oil revenues proved less effective than cliency in maintaining Kuwait's strategic security illustrates the fundamental security dilemma faced by all small states, even rich ones.
APA, Harvard, Vancouver, ISO, and other styles
25

Wadhwani, R. Daniel. "Protecting Small Savers: The Political Economy of Economic Security." Journal of Policy History 18, no. 1 (January 2006): 126–45. http://dx.doi.org/10.1353/jph.2005.0031.

Full text
Abstract:
Admitting, then, that it is eminently desirable to reduce the action of the organized public force to the minimum … shall we not say that government can not relieve itself from the necessity of frequent and minute interferences with industry in any other way to so great an extent as by, 1st, insisting on the thorough primary education of the whole population; 2d, providing a strict system of sanitary administration; 3d, securing by special precautions the integrity of banks of savings for the encouragement of the instincts of frugality, sobriety, and industry? Each of these things is contrary to the doctrine of Laissez faire; yet I, for one, can not find room to doubt that, on purely economical grounds, the action of the State herein is not only justifiable but a matter of elementary duty.
APA, Harvard, Vancouver, ISO, and other styles
26

Phillips, Archilus. "Interagency Collaboration and National Security." Journal of Intelligence, Conflict, and Warfare 3, no. 3 (April 3, 2021): 170–75. http://dx.doi.org/10.21810/jicw.v3i3.2817.

Full text
Abstract:
On November 23, 2020, Brigadier-General Archilus Phillips presented Interagency Collaboration and National Security at the 2020 CASIS West Coast Security Conference. Key points of discussion included the perspective of a small state, Trinidad & Tobago, and their security strategies; achievements; challenges; Interagency Collaboration (IAC); the history of Trinidad & Tobago; and Caribbean security. The presentation was followed by a question and answer period.
APA, Harvard, Vancouver, ISO, and other styles
27

SHOPSKA, Yuliya. "THEORETICAL AND METHODOLOGICAL PRINCIPLES OF RESEARCH AND FEATURES OF ENSURING FINANCIAL SECURITY OF THE SMALL ENTERPRISE SECTOR OF THE REGION." Herald of Khmelnytskyi National University. Economic sciences 304, no. 2(1) (March 18, 2022): 116–21. http://dx.doi.org/10.31891/2307-5740-2022-304-2(1)-15.

Full text
Abstract:
The purpose of the study is to substantiate the theoretical and methodological foundations of the study and the features of financial security of the small business sector in the region. Scientific approaches to the essential interpretation of the concept of financial security of the state are generalized. The key characteristics of the theoretical and methodological foundations of financial security of the enterprise are given. The semantic specifics of the concept of economic security of the industry, sector of the national economy are revealed. On this basis, the theoretical and methodological foundations of the study of economic and financial security at different levels of management of economic development and established that the financial security of the small business sector is a characteristic: (1) the state of protection of its subjects from internal and external financial and economic challenges and threats, their financial security, financial and economic efficiency, strength and balance of financial condition, stability and solvency, trends in capitalization at the micro level and the financial system in general, ( 2) measures to realize the financial and economic interests of stakeholders in this sector, (3) the ability of the state to ensure guarantees of financial security and stability of the sector, especially at the regional level. The internal structure of financial security of the small business sector of the region is determined. The scientific novelty of the research results is the further development of theoretical and methodological foundations of financial security research at the sectoral level by determining its internal structure (for the small business sector of the region), consisting of components: (1) ability to markets and rights), (2) sustainability, efficiency, protection (against risks and threats, as well as financial and economic efficiency of management and investment), (3) development (ability to maintain a sustainable trajectory of improving the key financial and economic characteristics of both entities and the sector as a whole). The structural components of the financial security of the small business sector of the region are resource, financial and economic, investment, monetary, insurance and debt.
APA, Harvard, Vancouver, ISO, and other styles
28

Yahaya, Jibrin Ubale, A. N. Liman, and Yahaya Adadu. "An Assessment of Challenges Faced by Security Agencies in Fighting Proliferation of Small Arms and Light Weapons in Kano State, Nigeria." International Journal of Social Science Studies 6, no. 7 (July 2, 2018): 47. http://dx.doi.org/10.11114/ijsss.v6i7.3401.

Full text
Abstract:
Prevention and management of crime is one of the core mandate responsibilities of security agencies who are peoples that are trained to oversee the internal security system in Nigeria. These agencies includes Nigeria Police Force, Nigeria Security and civil Defense Corps, Nigeria Immigration Service, Nigeria Customs Service, Directorate of State Security Service(DSSS) and to some certain extend when the level of internal security is over raising Nigeria Militaries, both Land Armies, Air Force and Navy gives intervention hand to curtail the situations. The widespread of small arms and light weapons in Kano State has it is genesis from both locally manufactured and the imported ones that mostly passed from various porous or illegal borders that are located in the neighboring states of Kastina and Jigawa State. SALW are the primary tools that trigger both ethnic and internal conflict and other related violent crimes that poses a threat to internal security, democracy and the operation of good governance not only in Kano State but in Nigeria. SALW is one of the key major factor s that generate to various categories of crime like armed robbery, kidder napping, community violent conflict, insurgent attacks and the host of many other crimes. The paper uses the failed state theory to explain the gap how state as an institution fails in its responsibilities and also the paper is empirical in nature by conducting interviews and administering questionnaire to some selected respondent populations from security personnel’s, academicians, traditional institutions and Community Based Organization’s CBO’s. The paper was on the position that for democracy and good governance to be truly functional the internal security must be guaranteed by empowering security agencies in terms of increasing their number, effective training, enough working tools, good condition of service and providing policies that will address the level of poverty and unemployment in the society as well as prosecuting any member of elite that either imported the arms or given arms to youth for achieving his political interest.
APA, Harvard, Vancouver, ISO, and other styles
29

Mech, Jatin, and Abhijit Bhuyan. "Issues of Environmental Security of Bhutan as a Small State of South-Asia." Applied Ecology and Environmental Sciences 9, no. 10 (October 22, 2021): 873–78. http://dx.doi.org/10.12691/aees-9-10-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Arya, Saurabh, Asha Batra, and Arpit Arya. "Livelihood Security of Small and Marginal Farmers in Ambala Division of Haryana State." International Journal of Current Microbiology and Applied Sciences 8, no. 10 (October 10, 2019): 501–11. http://dx.doi.org/10.20546/ijcmas.2019.810.055.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Veselý, Zdeněk. "The Security of a Small State – The Historical Experience of the Czech Republic." Journal of Slavic Military Studies 20, no. 4 (December 7, 2007): 679–92. http://dx.doi.org/10.1080/13518040701703161.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Rohn, Eli, Gilad Sabari, and Guy Leshem. "Explaining small business InfoSec posture using social theories." Information & Computer Security 24, no. 5 (November 14, 2016): 534–56. http://dx.doi.org/10.1108/ics-09-2015-0041.

Full text
Abstract:
Purpose This study aims to investigate information technology security practices of very small enterprises. Design/methodology/approach The authors perform a formal information security field study using a representative sample. Using the Control Objectives for IT (COBIT) framework, the authors evaluate 67 information security controls and perform 206 related tests. The authors state six hypotheses about the findings and accept or reject those using inferential statistics. The authors explain findings using the social comparison theory and the rare events bias theory. Findings Only one-third of all the controls examined were designed properly and operated as expected. About half of the controls were either ill-designed or did not operate as intended. The social comparison theory and the rare events bias theory explain managers’s reliance on small experience samples which in turn leads to erroneous comprehension of their business environment, which relates to information security. Practical implications This information is valuable to executive branch policy makers striving to reduce information security vulnerability on local and national levels and small business organizations providing information and advice to their members. Originality/value Information security surveys are usually over-optimistic and avoid self-incrimination, yielding results that are less accurate than field work. To obtain grounded facts, the authors used the field research approach to gather qualitative and quantitative data by physically visiting active organizations, interviewing managers and staff, observing processes and reviewing written materials such as policies, procedure and logs, in accordance to common practices of security audits.
APA, Harvard, Vancouver, ISO, and other styles
33

Saleh, Aminu, R. B. Bako, and M. L. Suleiman. "FACTORS INFLUENCING ACCEPTANCE OF FARMER EDUCATION AND IRRIGATION TECHNOLOGY FOR SUSTAINABLE FOOD PRODUCTION IN KWANAR ARE DAM – KATSINA STATE." FUDMA JOURNAL OF SCIENCES 5, no. 4 (January 25, 2022): 142–48. http://dx.doi.org/10.33003/fjs-2021-0504-797.

Full text
Abstract:
This study was aimed at analysing factors influencing acceptance and adoption of farmer education and irrigation technology for sustainable food production as a means of ensuring food security in rural settlement of Katsina State – Nigeria. It provided insight on the underlying socio-economic factors influencing farmer’s decision to adopt education and irrigation technologies in the study area. A structured questionnaire was administered for selected farmers. Results obtained revealed that 94% of farmers were small holders with low level of education indicating that farming in the study area is highly dominated by traditional farming system that results in lower yields. It also indicates 87% of farmers were within the economic active age of 20 – 50 years. Farming experience, fragmented land holdings and poor extension services were directly related to the acceptance farmer education and adoption of irrigation technologies. The study concluded that training and educating small-scale small scale farmers that form the bulk of farming community in Nigeria are viable solutions to securing household food security, diversification of source of income and reducing rural poverty
APA, Harvard, Vancouver, ISO, and other styles
34

Plecka, Danuta, and Agnieszka Wlazły. "The Role of Micro-enterprises in Shaping the Social Security of the State. A Theoretical Analysis." Journal of Geography, Politics and Society 10, no. 4 (December 31, 2020): 17–22. http://dx.doi.org/10.26881/jpgs.2020.4.03.

Full text
Abstract:
The article presents considerations regarding the functioning of micro enterprises on the market and their impact on the social security of the state. The concept of micro enterprise and social security has been explained in detail. Social security threats and the role of micro sector companies in shaping this area of state security were also discussed. The considerations highlighted the importance of small business in creating conditions for economic stability and development guarantees for local communities.
APA, Harvard, Vancouver, ISO, and other styles
35

Зозуля, О. C. "Discursive field of dissertation research on the state of information security of Ukraine." PUBLIC ADMINISTRATION ASPECTS 4, no. 1-2 (February 4, 2016): 17–25. http://dx.doi.org/10.15421/1516002.

Full text
Abstract:
The article analyzed the of dissertations for science «Public Administration» on the problems ensuring information security of Ukraine.According to the data system catalog Vernadsky National Library of Ukraine was found that within the limits of science «Public Administration» problems of ensuring information security were devoted only 4 work. In view of the small number of disserta-tions, which explored the problems of public-management of ensuring information secu-rity Ukraine, we have to admit that today are absent Labour which would have addressed issues of improvement of the structure and functions of the system ensuring information security of Ukraine on the modern stage of state building. Under such circumstances, scientific solution of problems ensuring information security and in particular formation and functioning system of the information security ensuring. The analysis allows to state that authors of paid attention mainly study of theoretical principles of public administration information security, and analysis of available ap-proaches and mechanisms, development and introduction of new, more efficient models, methods and mechanisms of state information security management. However, in these studies without attention left issue of clarifying the structure and functions of informa-tion security assurance system, substantiation of theoretical and the institutional prin-ciples of the Public administration of information security of Ukraine in conditions of information-psychological confrontation, which does not allow to form a systemic vision and understanding of the correlation between elements of system public administration information security.
APA, Harvard, Vancouver, ISO, and other styles
36

Sapozhnikova, Ekaterina, and Olesya Ryazanova. "The role of small farms in ensuring food security in Russia." E3S Web of Conferences 110 (2019): 02010. http://dx.doi.org/10.1051/e3sconf/201911002010.

Full text
Abstract:
Food security is the most important area of national security. The market economy has led to the formation of new categories of agricultural producers. Country farms and personal subsidiary farms belong to the group of small farms. Modern approaches to determining the state of food security are discussed in the article. Indicators for assessing the role of small farms in food security are given. The method of calculating indicators is based on the provisions of the Food Security Doctrine and modern scientific concepts. Food independence analysis conducted. Indicators of independence from external supplies are defined for 2000-2017. The level of satisfaction of needs due to production in small farms is calculated. The growing role of peasant farms is determined in the food self-sufficiency of Russia. The direction of development of small farms investigated. Government support measures identified. The organizational and economic conditions for the development of small farms are presented.
APA, Harvard, Vancouver, ISO, and other styles
37

Ndawana, Enock, Mediel Hove, and Sylvester Ghuliku. "Tanzania: Small Arms Proliferation in East Africa and National Security." Conflict Studies Quarterly, no. 23 (April 10, 2018): 48–77. http://dx.doi.org/10.24193/csq.23.3.

Full text
Abstract:
This article examines the effects of the proliferation of small arms on Tanzania’s national security. Engaging the security dilemma theory, regional security complex theory and ideas about state weakness, the paper argues that the prevalence of small arms in Tanzania negatively shape the social, economic and political milieu with profound consequences for the stability and security of the country and region both in the short and longterm. While Tanzania continues to be relatively stable, it suffers from the proliferation of small arms. This may erode its long observed image as the anchor of East African stability if not urgently addressed. The paper concludes that Tanzania has both strengths or successes and weaknesses in its efforts to mitigate the small arms challenge in which the former need to be strengthened to avert the country’s image of peace and stability in East Africa from becoming an illusion.
APA, Harvard, Vancouver, ISO, and other styles
38

Zhao, Yi-Bo, and Zhen-Qiang Yin. "Apply current exponential de Finetti theorem to realistic quantum key distribution." International Journal of Modern Physics: Conference Series 33 (January 2014): 1460370. http://dx.doi.org/10.1142/s2010194514603706.

Full text
Abstract:
In the realistic quantum key distribution (QKD), Alice and Bob respectively get a quantum state from an unknown channel, whose dimension may be unknown. However, while discussing the security, sometime we need to know exact dimension, since current exponential de Finetti theorem, crucial to the information-theoretical security proof, is deeply related with the dimension and can only be applied to finite dimensional case. Here we address this problem in detail. We show that if POVM elements corresponding to Alice and Bob's measured results can be well described in a finite dimensional subspace with sufficiently small error, then dimensions of Alice and Bob's states can be almost regarded as finite. Since the security is well defined by the smooth entropy, which is continuous with the density matrix, the small error of state actually means small change of security. Then the security of unknown-dimensional system can be solved. Finally we prove that for heterodyne detection continuous variable QKD and differential phase shift QKD, the collective attack is optimal under the infinite key size case.
APA, Harvard, Vancouver, ISO, and other styles
39

Lopasteyskaya, Lyudmila Gennadyevna. "Economic security in Russia: current state, threats and prospects of development." KANT 40, no. 3 (March 2021): 48–52. http://dx.doi.org/10.24923/2222-243x.2021-40.9.

Full text
Abstract:
The purpose of the study is to determine the current state, threats and prospects for the development of Russia's economic security. The scientific novelty lies in the development of key areas for countering threats to Russia's economic security, which are represented by the consequences of the impact of the COVID-19 coronavirus infection. The solution to the key problems that have arisen as a result of the pandemic is to ensure effective protection of the Russian economy. Accordingly, the key direction of public administration should be the solution of strategic issues to stimulate the activity of small and medium-sized businesses, as well as to increase investment flows. As a result, the key risks and threats affecting the economic security of the Russian Federation were identified. In addition, the key problems affecting the level of economic security of the country are identified, which determines the relevance of studying the features of ensuring economic security in the country. In conclusion, recommendations aimed at improving the current system of economic security at the country level are proposed.
APA, Harvard, Vancouver, ISO, and other styles
40

Thorhallsson, Baldur. "Small States in the UN Security Council: Means of Influence?" Hague Journal of Diplomacy 7, no. 2 (2012): 135–60. http://dx.doi.org/10.1163/187119112x628454.

Full text
Abstract:
Summary This article argues that there are two broad categories of qualitative factors that determine the ability of small states to influence the United Nations Security Council (UNSC). The first is the internal competence of small states in areas such as knowledge, initiative, and diplomatic, coalition and leadership skills. The second is the image of the state in the international system with specific regard to its perceived neutrality or reputation as a norm entrepreneur in particular policy fields. These qualitative features need to be combined with quantitative variables — such as population, territorial size, gross domestic product (GDP) and military capacity — that are normally used in International Relations (IR) in order to understand small states’ ability to become active participants in the UNSC.
APA, Harvard, Vancouver, ISO, and other styles
41

Madeira, João Paulo. "Security Challenges for Small Island Developing States: The Case of Cape Verde." Revista Relaciones Internacionales, Estrategia y Seguridad 14, no. 2 (February 28, 2020): 155–77. http://dx.doi.org/10.18359/ries.3756.

Full text
Abstract:
This article is an exploratory, descriptive study, with a qualitative and interdisciplinary approach. It integrates concepts and perspectives of contemporary history, international relations, and security studies. Its main aim is to analyse security issues in Africa, taking as a reference the Cape Verde archipelago, which is part of the group of Small Island Developing States. This matter suggests a wider multidimensional approach that prioritizes the intersection of data obtained from a critical analysis in order to deepen regional cooperation and integration mechanisms. This can provide the Cape Verdean state with strategic options to prevent and mitigate potential security threats.
APA, Harvard, Vancouver, ISO, and other styles
42

Ušiak, Jaroslav. "Slovakia’s perspective on NATO." Communist and Post-Communist Studies 51, no. 2 (June 1, 2018): 125–37. http://dx.doi.org/10.1016/j.postcomstud.2018.04.004.

Full text
Abstract:
Security, as expressed by the security policy of a state, is one of the most fundamental aspects of a foreign and defense policies of a state. Together, they create a foreign orientation of the state which may alter with time, space and under the influence of political decision-making. This paper presents the sources of the strategic orientation of Slovakia that emerged in reaction to historical events that the faced country Slovakia gradually integrated into the European and Euro—Atlantic structures with the emphasis on coalition changes in the governance of the state. This paper, through analysis and comparison, shows the dominant changes in the Slovakian security environment. In any case, it has been the destiny of small countries to maintain their security through cooperation and integration.
APA, Harvard, Vancouver, ISO, and other styles
43

Tow, William T., and Russell Parkin. "Small State Security Postures: Material Compensation and Normative Leadership in Denmark and New Zealand." Contemporary Security Policy 28, no. 2 (August 2007): 308–29. http://dx.doi.org/10.1080/13523260701489867.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Ross, Robert S. "On the fungibility of economic power: China’s economic rise and the East Asian security order." European Journal of International Relations 25, no. 1 (March 16, 2018): 302–27. http://dx.doi.org/10.1177/1354066118757854.

Full text
Abstract:
China is now second only to the US as a world economic power. Its economic rise has challenged US ability to fundamentally shape the world trade order. However, the importance of the rise of the Chinese economy for international security affairs is less clear. The key analytical issue for international politics and for an understanding of the sources of power is whether economic power is fungible in international security affairs, whether it can independently determine the strategic alignments of small states. This is also the key question in assessing the implications of China’s economic rise for the East Asian security order. The political-economy literature argues that trade dependence can lead small states to realign within great power politics, regardless of the military balance. However, poor case selection challenges this prior literature. By using contemporary East Asia as a source of multiple bilateral case studies, I argue that the economic dependence of a small state on a great economic power is insufficient to influence independently small state strategic alignment preferences and that China’s rising economic power is not fungible in East Asian security affairs.
APA, Harvard, Vancouver, ISO, and other styles
45

James, Monte F. "Exempt Security Offerings Available in Texas." Texas Wesleyan Law Review 2, no. 1 (July 1995): 97–114. http://dx.doi.org/10.37419/twlr.v2.i1.3.

Full text
Abstract:
Recently due to the robust economy, the United States, including Texas, saw a significant increase in the number of initial public offerings ("IPOs") in the securities markets. Nationally, $1.16 trillion worth of new debt and equity IPOs were brought to market in 1993. Yet, 1994 saw a decrease in new IPOs due mainly to rising interest rates. In 1994, there was only $709.8 billion worth of IPOs brought to market in the U.S. The purpose of this article is to give direction to the business practitioner who unintentionally becomes involved in federal or state securities regulations. In Texas, a common involvement arises when a lawyer assists with the formation of a new business venture. A frequent misconception is if the deal is small enough, or if only a limited number of investors are involved, then federal and state securities laws are not invoked. This article will address those securities not requiring the filing of a registration statement with the Securities and Exchange Commission ("SEC") or the State Securities Board of the State of Texas ("State Securities Board"). The Securities Act of 19333 and the Securities Exchange Act of 19344 were enacted "to eliminate serious abuses in a largely unregulated securities market."' To achieve this goal, Congress "painted with a broad brush" in defining which activities invoked federal securities laws.
APA, Harvard, Vancouver, ISO, and other styles
46

Kumara, Jeewaka Saman. "Non-traditional Security Disputes of Sri Lanka." International Journal for Innovation Education and Research 3, no. 3 (March 31, 2015): 1–14. http://dx.doi.org/10.31686/ijier.vol3.iss3.323.

Full text
Abstract:
From the 1970s onwards, social constructivists criticized the intense narrowing of the field of security studies imposed by the military and nuclear obsessions of the Cold War. Further, they argued that these traditional issues have not disappeared, but that other, non-military sources of threat now seemed more pressing. Hence, the nature and magnitude of security within the states should be considered from different angles such as economic security, food security, health security, environmental security, personal security, community security and political security. In the context of small states, the issue of security has multiple dimensions in the complexities of the state. Apart from the traditional aspect of security threats of small states, the non-traditional aspect is very important to identify the security threats of small states. One of the most important aspects of non-traditional security thus, is that people should be able to live in a society that honours their political security. In this broader context this study makes an effort to answer whether the political security of Sri Lanka is being challenged in the context of power political paradigm. Further the research problem has been answered by using standard research tool including descriptive and analytical methods and also the research involves both qualitative and quantitative methods. As a developing small state, Sri Lanka is an electoral democracy. The 1978 constitution vested strong executive powers in the president, who is directly elected for a six-year term and can dissolve Parliament. The prime minister heads the leading party in Parliament but otherwise has limited powers. The 225-member unicameral legislature is elected for a six-year term through a mixed proportional-representation system. Elections are open to multiple parties, and fair electoral laws and equal campaigning opportunities ensure a competitive political process. Despite the war’s completion and an improvement in security throughout Sri Lanka, the situation of political security remained grim. Some observers’ charge that centralizes approach of the ruling party of the Government of Sri Lanka has led to a lack of protection of political security. In this broader context, there is an argument that the situation of political security of Sri Lankan remains grim.
APA, Harvard, Vancouver, ISO, and other styles
47

Kovalenko, Olha, and Liudmyla Yashchenko. "Diagnostics of the State of Agricultural Enterprises Financial Security." Accounting and Finance, no. 1(91) (2021): 52–60. http://dx.doi.org/10.33146/2307-9878-2021-1(91)-52-60.

Full text
Abstract:
In the conditions of rapid changes in the modern market environment, it is extremely important for agricultural enterprises to respond in a timely manner to threats to their financial security. Therefore, economic diagnostics is of significant methodological importance, and makes it possible to learn about economic problems and interpret the results of enterprises activity that have certain deviations from the norm or the state required for the enterprise. The subject of the study is a set of theoretical, methodological and practical aspects of diagnosing the state of financial security of enterprises. The purpose of the article is to diagnose the state of financial security of agricultural enterprises on the basis of the proposed methodological approach and to substantiate proposals for its improvement. The methodological basis of the diagnostics used in the study was: methods of theoretical generalizations, financial analysis, scoring method, analysis of dynamics and structure, linear programming. The article reveals the tasks and areas of management of Ukrainian agricultural enterprises with an emphasis on the protection of their specific financial interests – ensuring liquidity, solvency, financial stability, autonomy and others. For research purposes all Ukrainian agricultural enterprises were classified on the size of the net income. The system of indicators for diagnostics of financial security of the agricultural enterprises was offered. The basic structural elements of the mechanism of financial security management were substantiated. According to the diagnosis results, it was found that the state of financial security of large enterprises in 2018-2019 has deteriorated and it has had a negative impact on their solvency. Instead, the financial security of small and medium-sized enterprises has improved. Based on the experience of developed countries, proposals for public policy instruments to promote financial security of agricultural enterprises were proposed.
APA, Harvard, Vancouver, ISO, and other styles
48

Filobokova, Ludmila Yu, and Victoria A. Nyarginen. "Economic security of small and medium-sized businesses: substantive essence, approaches to management." Market economy problems, no. 1 (2022): 144–58. http://dx.doi.org/10.33051/2500-2325-2022-1-144-158.

Full text
Abstract:
Small and medium business in Russia is a significant element in the system of the national economy of Russia, the functional role of which, in the process of its evolution at the present stage of development, has been transformed into a factor in the formation of a competitive environment. The presence of a developed competitive environment is considered as one of the basic conditions for ensuring sustainable socio-economic development of the country and improving the quality of life of its population. A competitive environment is possible to be formed in conditions of a high level of competitiveness of the «Small and Medium Business» system and its economic security. The problems of economic security are insufficiently studied and the relevance of such research is growing when it comes to small and medium-sized businesses, for the safe and sustainable development of which a scientific and methodological justification of management is necessary. This article presents the main results of a study on the development and justification of such provision: an interpretation of the definition of «economic security» and its local components by system levels is given, the need for institutional changes is proved, and a model of institutional changes of the innovation-integration type is proposed. The purpose of the study is the theoretical and methodological substantiation of the content essence of the category «economic security of small and medium-sized businesses», the establishment of links and relationships (elements of local security) of the state of security, considered as a result of the integration of local states of security, as well as the development of one of the alternative models of strategic management of economic business security in small organizational and economic forms of management. As part of the researching, the authors used an information-methodological approach, the methodology of strategic analysis and planning. The results of the study presented in the article should be considered as intermediate.
APA, Harvard, Vancouver, ISO, and other styles
49

Filobokova, Ludmila Yu, and Victoria A. Nyarginen. "Economic security of small and medium-sized businesses: substantive essence, approaches to management." Market economy problems, no. 1 (2022): 144–58. http://dx.doi.org/10.33051/2500-2325-2022-1-144-158.

Full text
Abstract:
Small and medium business in Russia is a significant element in the system of the national economy of Russia, the functional role of which, in the process of its evolution at the present stage of development, has been transformed into a factor in the formation of a competitive environment. The presence of a developed competitive environment is considered as one of the basic conditions for ensuring sustainable socio-economic development of the country and improving the quality of life of its population. A competitive environment is possible to be formed in conditions of a high level of competitiveness of the «Small and Medium Business» system and its economic security. The problems of economic security are insufficiently studied and the relevance of such research is growing when it comes to small and medium-sized businesses, for the safe and sustainable development of which a scientific and methodological justification of management is necessary. This article presents the main results of a study on the development and justification of such provision: an interpretation of the definition of «economic security» and its local components by system levels is given, the need for institutional changes is proved, and a model of institutional changes of the innovation-integration type is proposed. The purpose of the study is the theoretical and methodological substantiation of the content essence of the category «economic security of small and medium-sized businesses», the establishment of links and relationships (elements of local security) of the state of security, considered as a result of the integration of local states of security, as well as the development of one of the alternative models of strategic management of economic business security in small organizational and economic forms of management. As part of the researching, the authors used an information-methodological approach, the methodology of strategic analysis and planning. The results of the study presented in the article should be considered as intermediate.
APA, Harvard, Vancouver, ISO, and other styles
50

Mbah, Stella, and Jeffery Obiezekwem. "Electronic Banking and Performance of Small and Medium Scale Enterprises in Anambra State, Nigeria." International Journal of Business and Management 14, no. 6 (May 20, 2019): 173. http://dx.doi.org/10.5539/ijbm.v14n6p173.

Full text
Abstract:
This study aims to identify the relationship between electronic banking and performance of small and medium scale enterprises in Anambra state; one of the states with the highest number of SMEs, entrepreneurial skills, informal enterprises and a suitable business environment in Nigeria. To achieve this, the researcher examined performance of SMEs and their association with components of electronic banking; automated teller machine, point of sale services, transaction alerts via short message services (SMS) and mobile banking, through a questionnaire. Three hundred and seventy (73.1% response rate) copies of questionnaire issued to five hundred and six sampled respondents of 50 SMEs in Anambra state were properly filled and found relevant to the study. The study used SPSS and Excel to identify the descriptive characteristics of the variables of the study and analyze the data. Regression analysis was used to test the hypotheses of the study. Study results concluded that there is positive relationship between; automated teller machine, point of sale services, transaction alerts via short message services (SMS), mobile banking and performance of SMEs in Anambra State, Nigeria. The result also showed that SMEs continuous usage of electronic banking services could be attributed to cost effectiveness, convenience, security, accessibility and diversity of the services. The study recommends among others that, security of electronic banking services should be upgraded by a conjunction between SMEs and banks and that government should provide adequate regulatory framework to protect customers and security of transaction. Furthermore, policy makers in Nigeria should take advantage of the positive revelation of this study to make policies that will increase number of SMEs in Anambra state and Nigeria at large especially from the large number of informal enterprises in Anambra state and Nigeria.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography