Artykuły w czasopismach na temat „Australian Security and Intelligence Organisation”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Australian Security and Intelligence Organisation”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Lee, H. P. "The Australian Security Intelligence Organisation—New Mechanisms for Accountability". International and Comparative Law Quarterly 38, nr 4 (październik 1989): 890–905. http://dx.doi.org/10.1093/iclqaj/38.4.890.
Pełny tekst źródłaIreland-Piper, Danielle, i Jonathan Crowe. "Whistleblowing, National Security and the Constitutional Freedom of Political Communication". Federal Law Review 46, nr 3 (wrzesień 2018): 341–65. http://dx.doi.org/10.1177/0067205x1804600301.
Pełny tekst źródłaMcKnight, David. "Australian Film and the Cultural Cold War". Media International Australia 111, nr 1 (maj 2004): 118–30. http://dx.doi.org/10.1177/1329878x0411100112.
Pełny tekst źródłaMcCulloch, Jude, i Joo-Cheong Tham. "Secret State, Transparent Subject: The Australian Security Intelligence Organisation in the Age of Terror". Australian & New Zealand Journal of Criminology 38, nr 3 (grudzień 2005): 400–415. http://dx.doi.org/10.1375/acri.38.3.400.
Pełny tekst źródłaMcGarrity, Nicola, i Keiran Hardy. "Digital surveillance and access to encrypted communications in Australia". Common Law World Review 49, nr 3-4 (26.02.2020): 160–81. http://dx.doi.org/10.1177/1473779520902478.
Pełny tekst źródłaHead, Michael. "ASIO’s ‘official history’: More unanswered questions". Alternative Law Journal 42, nr 4 (27.11.2017): 304–9. http://dx.doi.org/10.1177/1037969x17732710.
Pełny tekst źródłaShanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia". Australian Journal of Telecommunications and the Digital Economy 6, nr 4 (31.12.2018): 109–40. http://dx.doi.org/10.18080/ajtde.v6n4.167.
Pełny tekst źródłaShanapinda, Stanley. "Privacy versus the Use of Location Information for Law Enforcement and Security in Australia". Journal of Telecommunications and the Digital Economy 6, nr 4 (31.12.2018): 109–40. http://dx.doi.org/10.18080/jtde.v6n4.167.
Pełny tekst źródłaWilliams, George. "The Legal Assault on Australian Democracy". QUT Law Review 16, nr 2 (17.06.2016): 19. http://dx.doi.org/10.5204/qutlr.v16i2.651.
Pełny tekst źródłaMcKnight, David. "‘Not Attributable to Official Sources’: Counter-Propaganda and the Mass Media". Media International Australia 128, nr 1 (sierpień 2008): 5–17. http://dx.doi.org/10.1177/1329878x0812800103.
Pełny tekst źródłaGray, Geoffrey. "‘In my file, I am two different people’: Max Gluckman and A.L. Epstein, the Australian National University, and Australian Security Intelligence Organisation, 1958–60". Cold War History 20, nr 1 (2.04.2019): 59–76. http://dx.doi.org/10.1080/14682745.2019.1575367.
Pełny tekst źródłaBoda, József. "The Situation of National Security Studies". Nemzetbiztonsági Szemle 10, nr 3 (11.11.2022): 13–24. http://dx.doi.org/10.32561/nsz.2022.3.2.
Pełny tekst źródłaWitczak, Maciej. "Biały wywiad w zarządzaniu bezpieczeństwem informacji". Przegląd Bezpieczeństwa Wewnętrznego 16, nr 30 (2024): 213–40. http://dx.doi.org/10.4467/20801335pbw.24.009.19611.
Pełny tekst źródłaKoller, Marco. "Recommendations for Safety-Conscious Smart Device Use by Military Professionals". Academic and Applied Research in Military and Public Management Science 21, nr 2 (30.11.2022): 5–14. http://dx.doi.org/10.32565/aarms.2022.2.1.
Pełny tekst źródłaMay, Lauren, i Tim Lane. "A Model for Improving e-Security in Australian Universities". Journal of Theoretical and Applied Electronic Commerce Research 1, nr 2 (1.08.2006): 90–96. http://dx.doi.org/10.3390/jtaer1020016.
Pełny tekst źródłaSharma, Gaurav, Stilianos Vidalis, Catherine Menon, Niharika Anand i Somesh Kumar. "Analysis and Implementation of Threat Agents Profiles in Semi-Automated Manner for a Network Traffic in Real-Time Information Environment". Electronics 10, nr 15 (31.07.2021): 1849. http://dx.doi.org/10.3390/electronics10151849.
Pełny tekst źródłaHENIGMAN, ŽARKO, i ANŽE RODE. "SMERNICE RAZVOJA OBVEŠČEVALNO- VARNOSTNE DEJAVNOSTI 21. STOLETJA". PROFESIONALIZACIJA SLOVENSKE VOJSKE / PROFESSIONALIZATION OF THE SLOVENIAN ARMED FORCES, VOLUME 2012/ ISSUE 14/1 (30.05.2012): 69–87. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.14.1.5.
Pełny tekst źródłaColbran, Richard, Robyn Ramsden, Karen Stagnitti i Samantha Adams. "Measures to assess the performance of an Australian non-government charitable non-acute health service: A Delphi Survey of Organisational Stakeholders". Health Services Management Research 31, nr 1 (17.08.2017): 11–20. http://dx.doi.org/10.1177/0951484817725681.
Pełny tekst źródłaMills, Richard. "John Howard, weapons of mass destruction and the public’s right to know". Pacific Journalism Review : Te Koakoa 14, nr 2 (1.09.2008): 37–48. http://dx.doi.org/10.24135/pjr.v14i2.943.
Pełny tekst źródłaHarrison, Mark, Patrick F. Walsh, Shane Lysons-Smith, David Truong, Catherine Horan i Ramzi Jabbour. "Tradecraft to Standards—Moving Criminal Intelligence Practice to a Profession through the Development of a Criminal Intelligence Training and Development Continuum". Policing: A Journal of Policy and Practice 14, nr 2 (6.08.2018): 312–24. http://dx.doi.org/10.1093/police/pay053.
Pełny tekst źródłaBolto, Richard. "Accountability and secrecy in the Australian Intelligence Community: the Parliamentary Joint Committee on Intelligence and Security". International Review of Administrative Sciences 85, nr 1 (17.03.2017): 137–53. http://dx.doi.org/10.1177/0020852316687646.
Pełny tekst źródłaBraat, Eleni. "Loyalty and Secret Intelligence: Anglo‒Dutch Cooperation during World War II". Politics and Governance 6, nr 4 (28.12.2018): 159–67. http://dx.doi.org/10.17645/pag.v6i4.1556.
Pełny tekst źródłaLaundon, Melinda, i Penny Williams. "Flexible Work: Barrier to Benefits?" Financial Planning Research Journal 4, nr 2 (1.12.2018): 51–68. http://dx.doi.org/10.2478/fprj-2018-0007.
Pełny tekst źródłaČRNČEC, DAMIR, i JANEZ URBANC. "STREAMLINING THE INTELLIGENCE AND SECURITY STRUCTURES IN NATO AND THE EUROPEAN UNION". CONTEMPORARY MILITARY CHALLENGES, VOLUME 2014/ ISSUE 16/3 (30.09.2014): 63–75. http://dx.doi.org/10.33179//bsv.99.svi.11.cmc.16.3.4.
Pełny tekst źródłaZhao, Yue. "Australian Anti-encryption Legislation and Its Impacts on Security and Privacy". Lecture Notes in Education Psychology and Public Media 53, nr 1 (6.06.2024): 145–49. http://dx.doi.org/10.54254/2753-7048/53/20240056.
Pełny tekst źródłaPamulatsih, Heni Yekti, i Anak Agung Banyu Perwita. "Bhayangkara and Platypus: The Cooperation between Indonesian National Police (Polri) and Australian Federal Police (AFP) in Dealing With Terrorism Threat in the Post of Lombok Treaty". Indonesian Perspective 5, nr 2 (17.09.2020): 119–37. http://dx.doi.org/10.14710/ip.v5i2.33957.
Pełny tekst źródłaJones, David Martin. "Intelligence and the management of national security: the post 9/11 evolution of an Australian National Security Community". Intelligence and National Security 33, nr 1 (17.11.2016): 1–20. http://dx.doi.org/10.1080/02684527.2016.1259796.
Pełny tekst źródłaChivurugwi, Josphat. "The Overarching Mission of an Intelligence Security Organisation in the Defence of the National Security Goals: The Case of Zimbabwe". Journal of Public Administration 58, nr 2 (czerwiec 2023): 509–24. http://dx.doi.org/10.53973/jopa.2023.58.2.a19.
Pełny tekst źródłaGhaffari, Shahram, Terri J. Jackson, Christopher M. Doran, Andrew Wilson i Chris Aisbett. "Describing Iranian hospital activity using Australian Refined DRGs: A case study of the Iranian Social Security Organisation". Health Policy 87, nr 1 (lipiec 2008): 63–71. http://dx.doi.org/10.1016/j.healthpol.2007.09.014.
Pełny tekst źródłaFarneubun, Petrus K. "China’s Rise and its Implications for Australian Foreign Policy". Papua Journal of Diplomacy and International Relations 2, nr 2 (7.08.2022): 142–62. http://dx.doi.org/10.31957/pjdir.v2i2.2234.
Pełny tekst źródłaCox, James W., Michele Akeroyd i Danielle P. Oliver. "Integrated water resource assessment for the Adelaide region, South Australia". Proceedings of the International Association of Hydrological Sciences 374 (17.10.2016): 69–73. http://dx.doi.org/10.5194/piahs-374-69-2016.
Pełny tekst źródłaZheng, Chaoliang. "Web-based Financial Shared Service Platform Construction Research". Frontiers in Business, Economics and Management 10, nr 3 (22.08.2023): 24–27. http://dx.doi.org/10.54097/fbem.v10i3.11204.
Pełny tekst źródłaClarke, Marilyn. "Building employability through graduate development programmes". Personnel Review 46, nr 4 (5.06.2017): 792–808. http://dx.doi.org/10.1108/pr-12-2015-0321.
Pełny tekst źródłaRoffey, Paul, i Michelle Gahan. "Responses to Security Sensitive Biological Agents (SSBA) risks by the Australian Federal Police". Microbiology Australia 41, nr 3 (2020): 128. http://dx.doi.org/10.1071/ma20034.
Pełny tekst źródłaCrooks, David, James Acris, Liam Atherton, Paul Clark, Pau Cutrina, David Jordan, Shawn McKee i Liviu Vâlsan. "Collaborative Operational Security: The future of Cybersecurity for Research and Education". EPJ Web of Conferences 295 (2024): 04013. http://dx.doi.org/10.1051/epjconf/202429504013.
Pełny tekst źródłaMason, Claire M., Melanie Ayre i Shanae M. Burns. "Implementing Industry 4.0 in Australia: Insights from Advanced Australian Manufacturers". Journal of Open Innovation: Technology, Market, and Complexity 8, nr 1 (15.03.2022): 53. http://dx.doi.org/10.3390/joitmc8010053.
Pełny tekst źródłaGlennie, Miriam, Michael O’Donnell, John Benson i Michelle Brown. "Work as a government ‘scientist’: Professional status security during organisational change and downsizing". Journal of Sociology 55, nr 2 (18.06.2018): 252–69. http://dx.doi.org/10.1177/1440783318781271.
Pełny tekst źródłaDrach, Iryna, Olha Petroye, Oleksandra Borodiyenko, Iryna Reheilo, Oleksandr Bazeliuk, Nataliia Bazeliuk i Olena Slobodianiuk. "The Use of Artificial Intelligence in Higher Education". International Scientific Journal of Universities and Leadership, nr 15 (7.07.2023): 66–82. http://dx.doi.org/10.31874/2520-6702-2023-15-66-82.
Pełny tekst źródłaTrystan, A., D. Zhukov i A. Bеrеzhnyi. "MODELS OF THE SYSTEM OF COLLECTIVE SELF-ORGANISATION OF UNMANNED AERIAL VEHICLES USING ARTIFICIAL INTELLIGENCE". Системи управління, навігації та зв’язку. Збірник наукових праць 2, nr 76 (30.04.2024): 47–52. http://dx.doi.org/10.26906/sunz.2024.2.047.
Pełny tekst źródłaFerguson, Megan, Emma Tonkin, Julie Brimblecombe, Amanda Lee, Bronwyn Fredericks, Katherine Cullerton, Catherine L. Mah i in. "Communities Setting the Direction for Their Right to Nutritious, Affordable Food: Co-Design of the Remote Food Security Project in Australian Indigenous Communities". International Journal of Environmental Research and Public Health 20, nr 4 (8.02.2023): 2936. http://dx.doi.org/10.3390/ijerph20042936.
Pełny tekst źródłaBonilla, Diego Navarro. "Information Management professionals working for intelligence organizations: ethics and deontology implications". Security and Human Rights 24, nr 3-4 (30.04.2014): 264–79. http://dx.doi.org/10.1163/18750230-02404005.
Pełny tekst źródłaSarre, Rick, i Alikki Vernon. "Access to Safe Justice in Australian Courts: Some Reflections upon Intelligence, Design and Process". International Journal for Crime, Justice and Social Democracy 2, nr 2 (11.09.2013): 133–47. http://dx.doi.org/10.5204/ijcjsd.v2i2.116.
Pełny tekst źródłaDaneshgar, Farhad, i Jim Wang. "Validation of the awareness net model for the Australian security investment processes". Knowledge-Based Systems 20, nr 8 (grudzień 2007): 736–44. http://dx.doi.org/10.1016/j.knosys.2006.10.005.
Pełny tekst źródłaSharif, Mohd Hisham Mohd, Indrit Troshani i Robyn Davidson. "Determinants of Social Media Impact in Local Government". Journal of Organizational and End User Computing 28, nr 3 (lipiec 2016): 82–103. http://dx.doi.org/10.4018/joeuc.2016070106.
Pełny tekst źródłaStewart, Jonathon, Juan Lu, Nestor Gahungu, Adrian Goudie, P. Gerry Fegan, Mohammed Bennamoun, Peter Sprivulis i Girish Dwivedi. "Western Australian medical students’ attitudes towards artificial intelligence in healthcare". PLOS ONE 18, nr 8 (31.08.2023): e0290642. http://dx.doi.org/10.1371/journal.pone.0290642.
Pełny tekst źródłaBelfanti, Charmaine. "Emotional capacity in the public sector – an Australian review". International Journal of Public Sector Management 30, nr 5 (10.07.2017): 429–46. http://dx.doi.org/10.1108/ijpsm-10-2016-0182.
Pełny tekst źródłaVelicof, Mihai. "The Importance of Intelligence in Biosecurity and Bioterrorism". International conference KNOWLEDGE-BASED ORGANIZATION 26, nr 1 (1.06.2020): 163–66. http://dx.doi.org/10.2478/kbo-2020-0025.
Pełny tekst źródłaAli, Hisham, Jawad Ahmad, Zakwan Jaroucheh, Pavlos Papadopoulos, Nikolaos Pitropakis, Owen Lo, Will Abramson i William J. Buchanan. "Trusted Threat Intelligence Sharing in Practice and Performance Benchmarking through the Hyperledger Fabric Platform". Entropy 24, nr 10 (28.09.2022): 1379. http://dx.doi.org/10.3390/e24101379.
Pełny tekst źródłaBADEA, Dorel, i Diana Elena RANF. "The Impact of Technological Development on Managerial Resilience in the Military Organisation". Romanian Military Thinking 2021, nr 4 (listopad 2021): 260–71. http://dx.doi.org/10.55535/rmt.2021.4.15.
Pełny tekst źródłaHunter, Benjamin, Sumeet Hindocha i Richard W. Lee. "The Role of Artificial Intelligence in Early Cancer Diagnosis". Cancers 14, nr 6 (16.03.2022): 1524. http://dx.doi.org/10.3390/cancers14061524.
Pełny tekst źródła