Results for 'Security policy'

1000+ found
Order:
  1.  1
    National security policy in Switzerland.Oliver Bakreski - 2019 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 72:245-256.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  2.  3
    National security policy of Italy.Oliver Bakreski - 2020 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 73:235-246.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  3.  3
    National security policy in Switzerland.Оливер Бакрески - 2019 - Годишен зборник на Филозофскиот факултет/The Annual of the Faculty of Philosophy in Skopje 72:231-256.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  11
    The Politics of Local Security Policy. Ideas for a Sociological Analysis.D’Albergo Ernesto - 2017 - Governare la Paura. Journal of Interdisciplinary Studies 10 (1).
    The article proposes some ideas for a sociological analysis of security policies, with specific regard to urban contexts and focusing especially on the intersection between policy and politics. The main questions concern the way in which security has been studied as a public good construed as a collective problem and an object of political action, as well as how to develop further perspectives and conceptual tools within this approach. Some other questions are also asked and provisionally answered, (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  5.  22
    Agriculture development and food security policy in eritrea - an analysis.Ravinder Rena - unknown
    The main economic activity of the people of Eritrea is agriculture: crop production and livestock herding. Agriculture mainly comprises mixed farming and some commercial concessions. Most agriculture is rain-fed. The main rain-fed crops are sorghum, millet and sesame, and the main irrigated crops are all horticultural crops like bananas, onions and tomatoes and cotton. The major livestock production constraints are disease, water and feed shortages and agricultural expansion especially in the river frontages. The agricultural sector employs eighty percent of the (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  18
    British Security Policy, 1934–1938. Studies of the Decision Process in Security and Foreign Policy[REVIEW]Michael Geyer - 1978 - Philosophy and History 11 (2):220-221.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  7.  8
    4. Privacy and Security Policy: The Historical Situation.Gregory J. Walters - 2001 - In Human Rights in an Information Age a Philosophical Analysis. University of Toronto Press. pp. 117-149.
    Direct download  
     
    Export citation  
     
    Bookmark  
  8.  30
    Russia’s Foreign Security Policy in the Twenty-First Century: Putin, Medvedev and Beyond.Richard Sakwa - 2014 - The European Legacy 19 (4):522-523.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  9.  20
    Jurisdiction of the European Court of Justice over Issues Relating to the Common Foreign and Security Policy under the Lisbon Treaty.Loreta Saltinyte - 2010 - Jurisprudencija: Mokslo darbu žurnalas 119 (1):261-279.
    Although the Lisbon Treaty maintained the general exclusion of Common Foreign and Security Policy (CFSP) matters from ECJ jurisdiction, it introduced a number of changes into this area, including an explicit statement that the Court is competent to review the legality of the Council decisions imposing restraining measures on persons. The article analyzes the nature and origin of those changes and considers the legal implications for the level of the protection of fundamental rights in the European Union. For (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  10. Security and Policy Based Management-ZERO-Conflict: A Grouping-Based Approach for Automatic Generation of IPSec/VPN Security Policies.Kuong-Ho Liu Chen & Tzong-Jye Dow Liu - 2006 - In O. Stock & M. Schaerf (eds.), Lecture Notes in Computer Science. Springer Verlag. pp. 197-208.
     
    Export citation  
     
    Bookmark  
  11.  7
    Conditions of Poland’s foreign and security policy within the EU and NATO environment.Anna Antczak- Barzan - 2014 - Journal for Perspectives of Economic Political and Social Integration 20 (1-2):135-152.
    The article is an attempt to answer the question about the state of Poland’s security after the first decade of the twenty-first century, what are its determinants, what kind of challenges Poland faces and which of them may turn into a threat and which into an opportunity, or what Polish potential is and which of its components determine its position on the international arena. It is achieved through a detailed analysis of actions undertaken by Poland in the international arena (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  25
    How Norms Die: Torture and Assassination in American Security Policy.Christopher Kutz - 2014 - Ethics and International Affairs 28 (4):425-449.
    A large and impressive literature has arisen over the past fifteen years concerning the emergence, transfer, and sustenance of political norms in international life. The presumption of this literature has been, for the most part, that the winds of normative change blow in a progressive direction, toward greater or more stringent normative control of individual or state behavior. Constructivist accounts detail a spiral of mutual normative reinforcement as actors and institutions discover the advantages of normative self- and other evaluation. There (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  13.  12
    A certain idea of France: French security policy and the gaullist legacy.Edwina S. Campbell - 1995 - History of European Ideas 21 (4):551-553.
  14.  35
    Japan's Parliamentary Confrontation on the Post-Cold War National Security Policies.Tomohito Shinoda - 2009 - Japanese Journal of Political Science 10 (3):267-287.
    In the fall 2007 Diet session, the largest opposition Democratic Party of Japan (DPJ) showed strong opposition against the government's proposal to continue the Self-Defense Forces (SDF) refueling operations to support maritime inspections in the Indian Ocean. In order to evaluate this parliamentary confrontation, the article compares the handling of this issue with the six past major post-Cold War national security policies. The DPJ constantly presented its own legislative proposals in order to participate in Diet deliberation. DPJ's counter proposals, (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  15.  88
    Writing Security: United States Foreign Policy and the Politics of Identity.David Campbell - 1992 - U of Minnesota Press.
    Since the collapse of the Soviet Union, the United States has faced the challenge of reorienting its foreign policy to address post-Cold War conditions. In this new edition of a groundbreaking work -- one of the first to bring critical theory into dialogue with more traditional approaches to international relations -- David Campbell provides a fundamental reappraisal of American foreign policy, with a new epilogue to address current world affairs and the burgeoning focus on culture and identity in (...)
    Direct download  
     
    Export citation  
     
    Bookmark   20 citations  
  16.  9
    The Federal Trade Commission and Electronic Commerce Security Policy: A Viable Solution?Thomas A. Hemphill - 2001 - Business and Society Review 106 (2):161-169.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  32
    Review of Edward Shils: The Torment of Secrecy the Background and Consequences of American Security Policies_; Morton Grodzins: _The Loyal and the Disloyal[REVIEW]Webb S. Fiser - 1956 - Ethics 66 (4):295-297.
  18.  12
    The Beginnings of West German Security Policy 1945–1956. Vol. 1. [REVIEW]Michael Salewski - 1984 - Philosophy and History 17 (1):76-78.
  19.  2
    The Beginnings of West German Security Policy 1945–1956. Vol. 1. [REVIEW]Michael Salewski - 1984 - Philosophy and History 17 (1):76-78.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  20.  2
    Common Foreign, Security, and Defense Policy.Ramses A. Wessel - 2015 - In Dennis Patterson (ed.), A Companion to European Union Law and International Law. Wiley-Blackwell. pp. 394–412.
    The Common Foreign and Security Policy (CFSP) objectives are an integral part of the overall objectives of the European Union and the policy area has developed from a purely intergovernmental form of cooperation in the days of the European political cooperation to an area in which the member states have increasingly accepted new forms of institutionalization. CFSP decisions are taken by the General Affairs Council, consisting of the ministers for foreign affairs of the member states. In spite (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  21.  32
    Privacy, Security and Accountability: Ethics, Law and Policy.Adam D. Moore (ed.) - 2015 - New York: Rowman & Littlefield International.
    This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  22.  36
    Women Peace and Security: Adrift in Policy and Practice.Laura Davis - 2019 - Feminist Legal Studies 27 (1):95-107.
    This comment reflects on how the Women, Peace and Security agenda has been translated into policy and put into practice by the European Union and the Democratic Republic of Congo. Although the WPS agenda has enabled many gains by women peacebuilders, this comment identifies important challenges from these two very different contexts. First, situating WPS policy areas within a broader feminist political economy analysis demonstrates how little influence the WPS agenda has across government. Second, the WPS agenda (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   3 citations  
  23.  20
    Private Military and Security Companies: Ethics, Policies and Civil-Military Relations.Andrew Alexandra, Deane-Peter Baker & Marina Caparini (eds.) - 2008 - Routledge.
    Over the past twenty years, Private Military and Security Companies (PMSCs) have become significant elements of national security arrangements, assuming many of the functions that have traditionally been undertaken by state armies. Given the centrality of control over the use of coercive force to the functioning and identity of the modern state, and to international order, these developments clearly are of great practical and conceptual interest. This edited volume provides an interdisciplinary overview of PMSCs: what they are, why (...)
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  24. Secure and sustainable? Examining the rhetoric and potential realities of UK food and agriculture policy.T. MacMillan & E. Dowler - forthcoming - Journal of Agricultural and Environmental Ethics.
     
    Export citation  
     
    Bookmark  
  25.  5
    Human Security and Non-Citizens: Law, Policy and International Affairs by Alice Edwards and Carla Ferstman, eds.: Cambridge: Cambridge University Press, 2010.Bronwen Manby - 2015 - Human Rights Review 16 (2):189-191.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  26.  6
    Security Issue In The Mediterranean And The Policy Of Great Powers.Mehmet Sait Di̇lek - 2012 - Journal of Turkish Studies 7:1519-1540.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  27.  8
    Foucauldian security and the threat to democratic policy-making.Richard Togman - 2018 - Critical Review of International Social and Political Philosophy:1-23.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  28.  7
    Foucauldian security and the threat to democratic policy-making.Richard Togman - 2021 - Critical Review of International Social and Political Philosophy 24 (2):230-252.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  29.  65
    Values, public policy, and community food security.David L. Pelletier, Vivica Kraak, Christine McCullum & Ulla Uusitalo - 2000 - Agriculture and Human Values 17 (1):75-93.
    Values and beliefs regarding communityfood security were investigated among participants in2–3 day participatory planning events related to thelocal food system in six rural counties from oneregion of upstate New York. The results of Qmethodology reveal three distinct viewpoints: a) theSocial Justice viewpoint, which is primarily concernedwith hunger and the potential harm caused by welfarereform; b) the Pragmatist viewpoint, which values thecontributions agriculture makes to local communitiesand is not concerned about environmental or socialexternalities of the dominant food system; and c) (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  30.  17
    Security, Equality, and the Clash of Ideas: Sweden's Evolving Anti-Trafficking Policy[REVIEW]Gregg Bucken-Knapp, Johan Karlsson Schaffer & Karin Persson Strömbäck - 2012 - Human Rights Review 13 (2):167-185.
    Seeking to explain the emergence of anti-trafficking initiatives, scholars have explored two sets of ideas—national security and gender equality—thought to shape policy. In this study, we examine whether such ideational influence accounts for Sweden's evolving anti-trafficking policy over the past decade. As powerful domestic ideas about gender inequality informed the adoption of an abolitionist prostitution policy in the 1990s, one would expect similar ideas to influence domestic responses to the related issue of cross-border trafficking.However, our case (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  31.  28
    European Security. The European Powers in Soviet Foreign Policy 1966 to 1972. [REVIEW]Dieter Boden - 1975 - Philosophy and History 8 (2):303-305.
  32.  10
    Harm Reduction Policies Where Drugs Constitute a Security Issue.Monica Andrea Narvaez-Chicaiza - 2020 - Health Care Analysis 28 (4):382-390.
    There is strong evidence suggesting that harm reduction policies are able to reduce the adverse health and social consequences of drug use. However, in this article I will compare two different countries to demonstrate that some social aspects lead to the adoption or rejection of harm reduction policies. In this case, countries where drugs are seen as a security concern are less likely to adopt these harm reduction policies. For that purpose, I will compare Colombia and Uruguay’s political, normative, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  33.  14
    Information systems for national security in Thailand: ethical issues and policy implications.Krisana Kitiyadisai - 2008 - Journal of Information, Communication and Ethics in Society 6 (2):141-160.
    PurposeThe purpose of this paper is to explicate the influence of US national security approach on the Thai Government's national security, the criticisms on the US and Thai intelligence communities and ethical debates on national databases, including the introduction of the concepts of “spiritual computing” and Buddhism to the ethical aspect of intelligence databases.Design/methodology/approachThe methodology of this paper is based on the interpretative approach which includes literature survey and interviews of the intelligence community in Thailand. The relevant literature (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark  
  34.  75
    Human Experiments and National Security: The Need to Clarify Policy.Jonathan D. Moreno - 2003 - Cambridge Quarterly of Healthcare Ethics 12 (2):192-195.
    On September 4, 2001, press reports indicated that the Defense Intelligence Agency of the U.S. Department of Defense planned to reproduce a strain of anthrax virus suspected of being held in Russian laboratories. According to the same reports, the Central Intelligence Agency, under the auspices of Project Clear Vision, is engaged in building replicas of bomblets believed to have been developed by the former Soviet Union. These small bombs were designed to disperse biological agents, including anthrax. Government attorneys were said (...)
    Direct download (8 more)  
     
    Export citation  
     
    Bookmark  
  35.  35
    New approaches to security and defense policy.Hans-Georg Knoche - 1990 - World Futures 29 (3):197-198.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  36.  16
    Climate Change and Global Energy Security: Technology and Policy Options.Marilyn A. Brown & Benjamin K. Sovacool - 2011 - MIT Press.
    An exploration of commercially available technologies that can enhance energy security and address climate change and public policy options crucial to their adoption.
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  37.  67
    Advancing the human right to food in Canada: Social policy and the politics of hunger, welfare, and food security[REVIEW]Graham Riches - 1999 - Agriculture and Human Values 16 (2):203-211.
    This article argues that hunger in Canada, while being an outcome of unemployment, low incomes, and inadequate welfare, springs also from the failure to recognize and implement the human right to food. Food security has, however, largely been ignored by progressive social policy analysis. Barriers standing in the way of achieving food security include the increasing commodification of welfare and the corporatization of food, the depoliticization of hunger by governments and the voluntary sector, and, most particularly, the (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   8 citations  
  38.  45
    Integrating food security into public health and provincial government departments in British Columbia, Canada.Barbara Seed, Tim Lang, Martin Caraher & Aleck Ostry - 2013 - Agriculture and Human Values 30 (3):457-470.
    Food security policy, programs, and infrastructure have been incorporated into Public Health and other areas of the Provincial Government in British Columbia, including the adoption of food security as a Public Health Core Program. A policy analysis of the integration into Public Health is completed by merging findings from 48 key informant interviews conducted with government, civil society, and food supply chain representatives involved in the initiatives along with relevant documents and participant/direct observations. The paper then (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  39.  28
    Human Security Analysis as a Framework for Value-Oriented Governance: The Example of Climate Change. Des Gasper - 2014 - International Journal of Social Quality 4 (2):6-27.
    “Good governance” may be viewed as governance that effectively promotes human rights, human security and human development. This article discusses human security analysis, which in certain ways offers an integration of these “human” perspectives together with a “social” orientation, by combining a person-focus with systematic investigation of the environing systems of all sorts: physical, cultural, organizational. The importance of such analysis is illustrated through the example of climate change impacts and adaptation. The article presents applications of a human (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  40.  8
    Problems of implementing the import substitution policy in the context of ensuring the food security of the state.Oleg Yurievich Borisov, Nataliya Nikolaevna Krizhevskaya & Ruslan Konstantinovich Lavrichenko - 2021 - Kant 39 (2):26-30.
    The purpose of the study is to analyze the processes of implementing the import substitution policy, based on the use of techniques and methods of influencing participants in market relations used by public authorities, which make it possible to identify its strengths and weaknesses and build the author's vision of directions for its stabilization. The authors focus on the prevailing opinion on the phased implementation of the import substitution policy, as well as on its application as a retaliatory (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  41. Energy security issues in contemporary Europe.Josef Abrhám, Igor Britchenko, Marija Jankovic & Kristina Garškaitė-Milvydienė - 2018 - Journal of Security and Sustainability Issues 7 (3):388-398.
    Throughout the history of mankind, energy security has been always seen as a means of protection from disruptions of essential energy systems. The idea of protection from disorders emerged from the process of securing political and military control over energy resources to set up policies and measures on managing risks that affect all elements of energy systems. The various systems placed in a place to achieve energy security are the driving force towards the energy innovations or emerging trends (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  42.  15
    Responding to the problem of ‘food security’ in animal cruelty policy debates: building alliances between animal-centred and human-centred work on food system issues.Brodie Evans & Hope Johnson - 2020 - Agriculture and Human Values 37 (1):161-174.
    Research on ethical issues within food systems is often human-centric. As a consequence, animal-centric policy debates where regulatory decisions about food are being made tend to be overlooked by food scholars and activists. This absence was notable in the recent debates around Australia’s animal live export industry. Using Foucault’s tools, we explore how ‘food security’ is conceptualised and governed within animal cruelty policy debates about the live export trade. The problem of food security produced in these (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  46
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert van der Torre - 2009 - Studia Logica 92 (3):395-436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  44.  36
    A security framework for dynamic collaborative working environments.Matthias Assel, Stefan Wesner & Alexander Kipp - 2009 - Identity in the Information Society 2 (2):171-187.
    Moving away from simple data sharing within the science community towards cross-organizational collaboration scenarios significantly increased challenges related to security and privacy. They need to be addressed in order to make cross-organizational applications such as collaborative working environments a business proposition within communities such as eHealth, construction or manufacturing. Increasingly distributed scenarios where many different types of services need to be combined in order to implement semantically enriched business processes demand new approaches to security within such dynamic Virtual (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark  
  45.  23
    Health Security and Risk Aversion.Jonathan Herington - 2016 - Bioethics 30 (7):479-489.
    Health security has become a popular way of justifying efforts to control catastrophic threats to public health. Unfortunately, there has been little analysis of the concept of health security, nor the relationship between health security and other potential aims of public health policy. In this paper I develop an account of health security as an aversion to risky policy options. I explore three reasons for thinking risk avoidance is a distinctly worthwhile aim of public (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  46.  43
    Printing Insecurity? The Security Implications of 3D-Printing of Weapons.Gerald Walther - 2015 - Science and Engineering Ethics 21 (6):1435-1445.
    In 2013, the first gun printed out of plastic by a 3D-printer was successfully fired in the US. This event caused a major media hype about the dangers of being able to print a gun. Law enforcement agencies worldwide were concerned about this development and the potentially huge security implications of these functional plastic guns. As a result, politicians called for a ban of these weapons and a control of 3D-printing technology. This paper reviews the security implications of (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  47.  42
    Not just what, but how: Creating agricultural sustainability and food security by changing Canada's agricultural policy making process. [REVIEW]Rod MacRae - 1999 - Agriculture and Human Values 16 (2):187-202.
    Agriculture has been enormously productive in recent decades. The main problem is that fragmentation of issues, knowledge, and responsibilities has hidden the costs associated with this success. These are mainly environmental, social, and health costs, which have been assigned to other ministries, with their own histories unconnected to agriculture. Now that agricultural policy has achieved its success, its costs are becoming apparent. The current system is preoccupied with traditional views of competitiveness and efficiency. Policies, programs, and regulations are organized (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  48.  14
    Fibred Security Language.Guido Boella, Dov M. Gabbay, Valerio Genovese & Leendert Van Der Torre - 2009 - Studia Logica 92 (3):395 - 436.
    We study access control policies based on the says operator by introducing a logical framework called Fibred Security Language (FSL) which is able to deal with features like joint responsibility between sets of principals and to identify them by means of first-order formulas. FSL is based on a multimodal logic methodology. We first discuss the main contributions from the expressiveness point of view, we give semantics for the language (both for classical and intuitionistic fragment), we then prove that in (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  49.  19
    Contextualizing Security Innovation: Responsible Research and Innovation at the Smart Border?Frederik C. Huettenrauch & Nina Klimburg-Witjes - 2021 - Science and Engineering Ethics 27 (1):1-19.
    Current European innovation and security policies are increasingly channeled into efforts to address the assumed challenges that threaten European societies. A field in which this has become particularly salient is digitized EU border management. Here, the framework of responsible research and innovation (RRI) has recently been used to point to the alleged sensitivity of political actors towards the contingent dimensions of emerging security technologies. RRI, in general, is concerned with societal needs and the engagement and inclusion of various (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  50.  17
    Information security risks and sharing behavior on OSN: the impact of data collection awareness.Thi Huyen Pham, Thuy-Anh Phan, Phuong-Anh Trinh, Xuan Bach Mai & Quynh-Chi Le - forthcoming - Journal of Information, Communication and Ethics in Society.
    Purpose This study aims to ascertain the impact of data collecting awareness on perceived information security concerns and information-sharing behavior on social networking sites. Design/methodology/approach Based on communication privacy management theory, the study forecasted the relationship between information-sharing behavior and awareness of data collecting purposes, data collection tactics and perceived security risk using structural equation modeling analysis and one-way ANOVA. The sample size of 521 young social media users in Vietnam, ages 18 to 34, was made up of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
1 — 50 / 1000