285 results
Search Results
2. Court Papers Offer Glimpse of Trump’s Defense in Classified Documents Case
- Author
-
Feuer, Alan
- Subjects
National security ,Public prosecutors -- Planning ,Ex-presidents -- Planning ,Company business planning ,News, opinion and commentary - Abstract
The former president’s lawyers may question whether the documents he took from the White House were related to national defense and whether the country’s security was damaged. Lawyers for former [...]
- Published
- 2024
3. Paper ‘turned radical after Lai US trip’; Staff were excited about high-level Washington meeting, ex-publisher says
- Author
-
Wong, Brian
- Subjects
National security ,Publishing industry ,Publishing industry ,News, opinion and commentary - Abstract
The now-defunct Apple Daily tabloid newspaper turned “radical” after its founder Jimmy Lai Chee-ying met top US leaders such as Mike Pence and Mike Pompeo to seek their support for [...]
- Published
- 2024
4. Tycoon ‘started English paper to win U.S. support’; Court told how Lai wanted American politicians to subscribe to digital outlet as this would offer ‘political protection’ against Beijing crackdown
- Author
-
Wong, Brian and Wong, Natalie
- Subjects
National security ,Security guards ,News, opinion and commentary - Abstract
An English language edition of the now-closed Apple Daily tabloid was created at founder Jimmy Lai Chee-ying’s request in a bid to drum up international support and head off a [...]
- Published
- 2024
5. Government Cloud Computing and National Security
- Author
-
Abd Al Ghaffar, Hedaia-t-Allah Nabil
- Published
- 2024
- Full Text
- View/download PDF
6. Multi-faceted US uncertainty connectedness with domestic and global geopolitical risk
- Author
-
Kyriazis, Nikolaos A. and Economou, Emmanouil M.L.
- Published
- 2024
- Full Text
- View/download PDF
7. Wargaming for Learning: How Educational Gaming Supports Student Learning and Perspectives
- Author
-
Amanda M. Rosen and Lisa Kerr
- Abstract
To what extent does educational gaming add value to more traditional instructional models in learning core concepts of national security and warfighting? This paper presents the results from a quasi-experimental, cross-sectional, and longitudinal study of students taking two standardized courses in the Joint Military Operations department at the US Naval War College. Split into wargaming and non-wargaming sections by instructor preference, subject learning is measured through self-reported and objective measures at three points: prior to the start of the content block on "Operational Art"; after the case study of the WW2 battle of Leyte Gulf but prior to any wargaming; and for subjects in wargaming course sections, after participating in the Leyte Gulf scenario of the "War at Sea" wargame. The results support the hypotheses that wargaming increases learning and alter student preferences in favor of learning through gaming but fail to find evidence that students recognize the value of the debriefing phase of educational gaming. This article adds to existing studies by focusing on an understudied practitioner population--graduate-level career military officers at a professional military education (PME) institution--and mitigating several of the methodological challenges facing many scholarly projects in the study of educational gaming in political science.
- Published
- 2024
- Full Text
- View/download PDF
8. National Security or Trade Openness? The Balancing Act in Contemporary Trade Relations.
- Author
-
Ul Mansoor, Sheikh Inam
- Subjects
NATIONAL security ,SECURITIES trading ,INTERNATIONAL trade ,COLLATERAL security ,INTERNATIONAL law - Abstract
The intersection of trade openness and national security in the realm of international trade law constitutes a nuanced and intricate landscape. This paper endeavors to unravel the complexities inherent in this delicate equilibrium, examining legal frameworks within the General Agreement on Tariffs and Trade (GATT)/World Trade Organization (WTO), Regional Trade Agreements (RTAs), and emerging global trends. The foundational principles outlined in GATT, particularly Article XXI, acknowledge the sovereign right of nations to take actions necessary for their essential security interests. However, the broad and permissive nature of this provision introduces challenges related to potential misuse and a lack of robust scrutiny mechanisms. The proliferation of RTAs, each housing unique national security clauses, adds layers of complexity to the overarching legal framework. Divergent standards, conflicting obligations, and the risk of fragmentation highlight the intricate balancing act that nations must perform to reconcile regional commitments with the principles of the global trade governance structure. The paper delves into practical applications and case studies, dissecting the challenges nations face as they navigate the fine line between economic integration and strategic safeguarding. [ABSTRACT FROM AUTHOR]
- Published
- 2024
9. Advancing the Emergency Industry: Policy, Innovation, and Implications for National Security
- Author
-
Shen, Yanmei and Zhang, Bin
- Published
- 2024
- Full Text
- View/download PDF
10. Principles of Cloud Computing Infrastructure IaaS.
- Author
-
Alhazeem, Housam Ghanim
- Subjects
CLOUD computing ,INFORMATION technology ,NATIONAL security ,DIGITAL technology ,DATA analysis - Abstract
Copyright of Journal of Engineering Sciences & Information Technology is the property of Arab Journal of Sciences & Research Publishing (AJSRP) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
11. Anti-unmanned aerial vehicle detection system for airports: aviation and national security perspective.
- Author
-
Anghuwo, John Shivute, Imanuel, Peter, and Nangolo, Sam Shimakeleni
- Abstract
Unmanned Aerial Vehicles gained significant popularity in the last decade as demonstrated by their wide usage in various fields. From around the year 2001, the usage of unmanned aerial vehicles' technology was mainly confined to law enforcement agencies such as the military, police, and customs. In the contemporary, terrorists have also been observed to be using unmanned aerial vehicles to attack aviation facilities. The current paper examines the levels of vulnerability of the Namibian airports to possible intrusion and attack from unmanned aerial vehicles, a situation that could pose a serious threat to aviation and national security. Adopting a qualitative research approach, the study made use of a questionnaire and semi-structured interview guide to collect primary data from the participants. Microsoft Excel was used to analyse the data. The study establishes that Namibian airports are prone to attacks from unmanned aerial vehicles as there are no anti-unmanned aerial vehicle detection systems installed at all airports in the country. Thus, there is clear evidence that the Namibia Civil Aviation Authority and the Namibian Airport Company's regulations and policies on aviation safety and security did not prioritise the installation of anti-unmanned aerial vehicle detection systems at all airports in Namibia. The paper suggests that, in order to enhance aviation safety and security, a joint civil/military Information Technology Unit, responsible for spoofing, detection, and the monitoring of illicit unmanned aerial vehicle operations should be set up and operations activated at all airports and other public infrastructures in Namibia. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
12. 数智赋能国家安全教育现代化的概念、内涵与 机制.
- Author
-
王 秉 and 赵 桉
- Abstract
Copyright of Modern Educational Technology is the property of Editorial Board of Modern Educational Technology, Tsinghua University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
13. The Long-run Impact of Childhood Wartime Violence on Preferences for Nuclear Proliferation.
- Author
-
Kim, James D.
- Subjects
NUCLEAR nonproliferation ,VIOLENCE ,NUCLEAR weapons ,REGIONAL differences ,BABY boom generation ,INDIVIDUALS' preferences - Abstract
How do childhood experiences of wartime violence affect individuals' preferences for nuclear proliferation? This paper argues that individuals who experienced severe war violence during childhood are more likely to value the security-enhancing aspects of nuclear weapons. These individuals are more concerned about being exposed to additional wartime violence, so they view nuclear weapons as a deterrent against large-scale invasions. By utilizing the geographic variation of violence intensity during the Korean War, this paper compares the pre-war and post-war cohorts who resided in severely damaged regions and relatively safe areas. Within the pre-war cohort, I find that individuals who resided in war-torn areas are more supportive of nuclear proliferation than those who were exposed to less violence. This regional difference, however, is not substantial in the post-war generation. The results suggest that direct exposure to wartime violence during childhood increases public demand for nuclear weapons when confronted with security threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
14. Towards Demystifying Trade Dependencies: At What Point do Trade Linkages Become a Concern?
- Author
-
Arriola, Christine, Cai, Mattia, Kowalski, Przemyslaw, Miroudot, Sébastien, and van Tongeren, Frank
- Subjects
SUPPLY chain disruptions ,GEOPOLITICS ,NATIONAL security ,INTERNATIONAL trade ,INPUT-output analysis - Abstract
Supply chain disruptions related to natural events or geopolitical tensions have in recent years prompted policy makers to identify potential vulnerabilities related to critical trade dependencies -- commercial links that could potentially impose significant economic or societal harm, be a source of coercion, a risk to national security, or disrupt strategic activities. Using three complementary methodologies -- detailed trade data analysis, input output data techniques, and computable general equilibrium (CGE) modelling -- this paper examines the nature and evolution of trade dependencies between the OECD countries and major non-OECD economies (MNOE). It shows that global production has become increasingly concentrated at the product level, with China representing 15% of import dependencies in strategic products for OECD countries in 2020-21 compared to 4% in 1997-99. The methodologies used in this paper unanimously demonstrate a high degree of trade interdependency between OECD and MNOE countries. The current debate on "de-risking" international trade, therefore, needs to carefully consider the possible costs and benefits of different policy choices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
15. Industry Day: Make Personal Protective Equipment (ppe) In America Act
- Subjects
United States. Department of Health and Human Services ,United States. Department of Homeland Security ,United States. Department of Veterans Affairs ,Protective clothing ,National security ,Business, international - Abstract
Special notice (original): industry day: make personal protective equipment (ppe) in america act you are cordially invited to attend an industry convening event on wednesday may 1, 2024, at 2:00-2:45 [...]
- Published
- 2024
16. Violation of territorial integrity as a tool for waging long-term hybrid warfare (against the backdrop of power games in the South Caucasus region).
- Author
-
Iskandarov, Khayal Ibrahim, Gawliczek, Piotr, and Soboń, Andrzej
- Subjects
POLITICAL realism ,NATIONAL security ,IRREGULAR warfare ,INTERNATIONAL relations - Abstract
This paper seeks to examine the violation of territorial integrity as a stage of hybrid warfare. Grounded in the theoretical framework of neoclassical realism, this study analyses nations' foreign policy strategies considering both global and domestic factors. Employing primarily qualitative research, this study concentrates on a case study of the South Caucasus region. Against the backdrop of the war which broke out in the early 2022 between Russia and Ukraine, the preservation of territorial integrity emerges as an imperative aspect of national security policy. Despite the longstanding recognition of territorial integrity as a fundamental tenet of international law over the centuries, this war has galvanised all nations with regard to the violation of territorial integrity. The paper delineates the principles of territorial integrity vis-à-vis the national security of the South Caucasus countries, substantiating the assertion that violation of the territorial integrity of the particular countries in this region serves the interests of external actors, either directly or indirectly, and is employed as a strategic tool in the pursuit of protracted hybrid warfare. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. An Assessment on Internal Security Threat to Pakistan and Impacts of Terrorism on Economy.
- Author
-
Iqbal, Muhammad
- Subjects
INTERNAL security ,HUMAN security ,DOMESTIC terrorism ,NATIONAL security ,TERRORISM ,TWENTY-first century ,SECTARIANISM - Abstract
This paper focuses on internal security threat to Pakistan and impacts of Terrorism on Economy. The multifarious threats to the security of Pakistan whether external or internal, have intensified in the 21st century. Previously, security was conceived in military terms alone. No longer true, in the matrix of national security, military threat is merely one constant. Other factors like law and order, economy, terrorism etc are all now reckonable constituents which, either alone or in combination, can trigger internal security catalysts or cause destabilization of a country. Whereas external and ideological dimensions of threat are being handled aptly by the government with appropriate responses, it is the internal dimension of national security that presents a daunting challenge to our policy makers. In this context, this paper addresses various forms of sectarianism and its impact on Pakistan's economy in line with the US relations with Pakistan and reflections on its economy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
18. Shanghai Cooperation Organization: Opportunities for Pakistan.
- Author
-
Khan, Mehran and Jamal, Ferdos
- Subjects
INTERNATIONAL economic relations ,SOCIOECONOMIC factors ,ECONOMIC development ,NATIONAL security - Abstract
This research paper explores Pakistan's potential advantages within the Shanghai Cooperation Organization (SCO). It focuses on three main areas: energy sector collaboration, economic cooperation, and joint military exercises. The paper uses qualitative research methodology to provide a comprehensive overview of the opportunities the SCO presents for Pakistan. It suggests that Pakistan can harness economic, security, and diplomatic benefits through increased trade, infrastructure development, and regional cooperation, provided it engages proactively and aligns with SCO objectives. The paper also highlights the strategic implications of joint military exercises between Pakistan and SCO member states, addressing shared security concerns. The paper offers valuable insights for policymakers and stakeholders interested in promoting regional cooperation. By recommendations, Pakistan can further leverage its membership in the SCO to realize the full spectrum of opportunities for socioeconomic growth and regional cooperation, contributing to a more integrated and prosperous Eurasian region. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. Food Acquirability: An Unexplored Component of Food Security?
- Author
-
Okpala, Emeka Franklin, Korir, Lilian, and Manning, Louise
- Subjects
FOOD security ,FOOD preferences ,SOCIOECONOMIC factors ,NATIONAL security ,DATA analysis - Abstract
The key elements, or pillars, of food security are stated as food availability, food access, food utilization, and stability. These food security pillars are often linked to food security interventions at the national, community or household level. However, if the urban 'household' is the unit of interest for any food security intervention, this research asks if a more holistic element, or pillar, is needed. The aim of this research has been to explore the socio-economic aspects of food security/insecurity that we have termed as a result of the research "food acquirability". Through the use of structured questionnaires (n = 120), and analysis of the data derived from local market and supermarket settings in the city of Awka, Nigeria, the concept of food acquirability has emerged and been conceptualized and critiqued. The contribution of this paper is to frame the concept of acquirability with regard to food security in Nigeria in order to develop a better understanding of the factors that impact household urban food security/insecurity and how they can be effectively mitigated. Factors of acquirability that emerged were culture, time poverty, resource availability and cooking skills, and household food preference and meal choice. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. An Encyclopedic Compendium on Chemosensing Supramolecular Metal‐Organic Gels.
- Author
-
Sharma, Arun, Kaur, Navneet, and Singh, Narinder
- Subjects
- *
METAL ions , *ENVIRONMENTAL monitoring , *RESEARCH personnel , *SCIENTIFIC community , *NATIONAL security - Abstract
Chemosensing, an interdisciplinary scientific domain, plays a pivotal role ranging from environmental monitoring to healthcare diagnostics and (inter)national security. Metal‐organic gels (MOGs) are recognized for their stability, selectivity, and responsiveness, making them valuable for chemosensing applications. Researchers have explored the development of MOGs based on different metal ions and ligands, allowing for tailored properties and sensitivities, and have even demonstrated their applications as portable sensors such as paper‐based test strips for practical use. Herein, several studies related to MOGs development and their applications in the chemosensing field via UV‐visible or luminance along with electrochemical approach are presented. These papers explored MOGs as versatile materials with their use in sensing bio or environmental analytes. This review provides a foundational understanding of key concepts, methodologies, and recent advancements in this field, fostering the scientific community. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
21. The Predicament of Security: Tracing Two Years of Taliban Rule.
- Author
-
Verma, Mithila Bagai
- Subjects
- *
NATIONAL security , *FORCED migration , *TERRORIST organizations - Abstract
The paper is an overall assessment of the security situation in Afghanistan that includes both traditional and non-traditional aspects. The paper highlights the deteriorating internal security that is bolstering Pashtunisation in Afghanistan and causing the forced displacement of non-Pashtuns. The implication of this grim development in India's neighbourhood has severely impacted the peace and security of the Central Asian Region, Russia, China, Iran, India and Pakistan. The victory of the Taliban has resuscitated myriad terrorist groups who want to establish Islamic Caliphate in neighbouring countries, therefore leading to the gradual Talibanisation of the Asian region. The paper also delves into how the departure of foreign forces has created a power vacuum in Afghanistan that has led to the revival of a New Great Game with the addition of regional actors. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
22. Parallel Multi-core Implementation of the Optimized Speck Cipher.
- Author
-
Fanfakh, Ahmed, Abduljalil, Nihad, and Al-Qurabat, Ali Kadhum M.
- Subjects
CIPHERS ,MULTICORE processors ,BLOCK ciphers ,CRYPTOGRAPHY ,NATIONAL security - Abstract
Lightweight cryptographic algorithms like Speck, which are a family of block ciphers developed by the US National Security Agency (NSA), have become popular because of their efficient performance and small operational size. This paper introduces the execution on a parallel multi-core processor of the optimized version of the Speck cipher. However, this proposition fulfils the increased demand for developing quick and ultra-lightweight ciphers. In this work, this is addressed by optimizing the speck128/128 cipher by reducing its number of rounds to five. The optimization is accomplished by adding the dynamic substitution layer to increase the randomness of the cipher, which allows us to reduce the speck rounds. We conducted tests such as statistical, randomness, and cryptanalysis tests for linear and differential attacks on the optimized speck. The security results show that the optimized speck overcomes the original speck security level. The conducted experiments show that the new version of the speck runs faster than the original one in terms of execution time and throughput. The parallel execution over a multicore processor is applied, and its speedup ratio is equal to 2.64 when it's compared to the parallel execution of the original speck. Different message sizes and thread configurations are used in this work. The sequential execution of both speck ciphers is computed in terms of execution time and throughput, and the acceleration ratio of the optimized speck in this case is equal to 2.63. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
23. Military Criminal Sanctions and the Peculiarities Related to their Execution in Hungary (1930 - 1948).
- Author
-
Pallo, József
- Subjects
LEGAL documents ,COURTS-martial & courts of inquiry ,MILITARY reform ,MILITARY law ,JUSTICE administration ,MILITARY personnel ,ACHIEVEMENT - Abstract
The goal of the author is to investigate a slightly obscure topic: the practice of interwar military justice in Hungary and its related questions, with an emphasis on matters concerning the peculiarities on how to implement them. The bill - which came into effect in 1930 - was born amidst uncommon historical conditions, since the Trianon Peace Treaty basically degraded Hungary into a quasi-numb entity. It is without a doubt that the decade-long consolidation - and its achievements - that came after can be regarded as one of the most prominently successful periods of the era's political history. The historical pressure, the necessity of being able to defend ourselves along with the importance of national security demanded that our army remained intact, despite the prohibitions that surrounded its existence. This called for ensuring that the legal environment was modernized enough to be capable of supporting this goal. The system of regulations inherited from the Austro-Hungarian monarchy was subjected to scrutiny and as a result ended up as a state-of-the art framework that even surpassed the European standards it aimed to match. This paper, putting emphasis on the most important dogmatic junctions, will further review these regulations - substantive or procedural contents alike -. After a brief diversion towards taking a glimpse into the historical situation, we will introduce the system of sanctions and punishments pertaining to military personnel, and proceed with the regulations related to their implementation, which in turn will offer a glimpse into the contemporary philosophy that surrounded military justice and procedure. In accordance, further regulations containing provisions regarding infrastructure, personnel, accommodation, and institution security in general would emerge. The author of the article provides a summary of the most important current relevant legal provisions. It touches upon the military justice system and its subsystems, introduces the more substantive procedural rules, and concludes with an argument on practical implementation. It will also raise the theoretical question on a future independent regulation which would take place in accordance with the reforms of the Hungarian military and the national strategy on defense. [ABSTRACT FROM AUTHOR]
- Published
- 2024
24. 总体国家安全观视域下辐射安全监管的“位”与“为”.
- Author
-
梁云平
- Abstract
Copyright of Nuclear Safety is the property of Nuclear & Radiation Safety Center and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
25. Call for law clarity to avoid ‘chilling effect’
- Author
-
Chan, Kahon and Wong, Natalie
- Subjects
Bar associations ,National security ,News, opinion and commentary - Abstract
The Hong Kong Bar Association has called for clearer provisions in the city’s home-grown national security legislation, warning that greater uncertainty about its implementation may increase the likelihood of “a [...]
- Published
- 2024
26. The Historic Missions of the People's Liberation Army under Xi Jinping: The Military's Role in the "New Era".
- Author
-
Heath, Timothy R.
- Subjects
GREAT powers (International relations) ,MILITARY policy ,GRAND strategy (Political science) ,NATIONAL security ,ANXIETY - Abstract
China's leadership has modified the military's formal role in national strategy, which is known as its "historic missions." The change reflects an appreciation of both the opportunities and the perils posed by China's rise as a great power as well as by anxiety about the intensifying domestic political vulnerabilities that stem from economic deceleration and persistent official malfeasance. Paradoxically, the government's expanded view of national security has meant a diminution in the role of the military in security policy toward one of "strategic support." As non-military threats intensify, the role of the People's Liberation Army in national strategy will likely focus on modernization and assistance to non-military efforts to protect an expanding array of interests along China's periphery and beyond. [ABSTRACT FROM AUTHOR]
- Published
- 2024
27. S Korea to restart anti-Pyongyang loudspeaker relays after rubbish balloons
- Subjects
National security ,General interest ,News, opinion and commentary - Abstract
South Korea says it will restart anti-North Korean propaganda loudspeaker broadcasts in border areas in response to continuing North Korean campaigns to (https://www.aljazeera.com/news/2024/6/4/why-did-north-korea-launch-rubbish-laden-balloons-into-south-korea) drop rubbish on the South with balloons. [...]
- Published
- 2024
28. Is Bank-verified Digital Identity the Missing Link in Solving Payment Fraud?
- Subjects
National security ,Banks (Finance) ,Fraud ,Business, international - Abstract
London: techUK has issued the following press release: In this latest white paper from techUK member OneID(r), it points the financial services and payments industry to an effective solution to [...]
- Published
- 2024
29. Subcontract Audit Services
- Subjects
National security ,Marketing research ,Business, international - Abstract
Sources sought (original): subcontract audit services the independent audit & ethics department (iaed) for lawrence livermore national security, llc (llns), the management & operations contractor for lawrence livermore national laboratory [...]
- Published
- 2024
30. Strategic Communication in Countering Disinformation Campaigns in Pakistan.
- Author
-
Imran, Muhammad, Rashid, Jannat, and Naseeb, Jannat
- Subjects
STRATEGIC communication ,DISINFORMATION ,MEDIA literacy ,NATIONAL security - Abstract
This paper aims to analyze the effects of disinformation campaigns and importance of strategic communication by creating public awareness to counter disinformation campaigns in Pakistan. Neglecting strategic communication can leave room for external powers to influence narratives and divert attention from important social, economic, and political issues and creates a threat to human and national security in the country. By examining the impact of these campaigns on public sentiment and internal matters, the research offers suggestions for addressing disinformation through strategic communication. This research incorporates exploratory research because it deals with the casual relationship between disinformation campaigns and Strategic Communication. The Secondary form of research was conducted through articles, journals, books and newspaper for the fulfilment purpose of this study. The results emphasize the requirement for a holistic strategy in strategic communication, encompassing media literacy, public knowledge, and policy actions to nurture an informed and resilient society in Pakistan. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. South Asian Perspectives on the Nuclear Weapons Ban: Challenges and Prospects for Disarmament.
- Author
-
Mir, Mohd Amin and Nazir, Thseen
- Subjects
- *
NUCLEAR weapons , *NUCLEAR disarmament , *QUALITATIVE research , *NATIONAL security - Abstract
This research paper explores the nuanced perspectives of South Asian nations, primarily India and Pakistan, on the global efforts toward nuclear disarmament. Against a complex regional security landscape, historical conflicts, and evolving nuclear doctrines, this study employs a qualitative research design, drawing on document analysis and existing literature. The findings reveal divergent views between India and Pakistan, often shaped by intricate factors of security considerations, regional dynamics, and domestic political influences. The paper discusses the implications of South Asian stances on global disarmament efforts. It proposes potential pathways for fostering dialogue and cooperation in pursuing nuclear disarmament in the region. Through an in-depth examination of South Asian perspectives, this research contributes valuable insights to the broader discourse on nuclear disarmament. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. استناد به امنیت ملی در رویۀ حقوقی بینالمللی.
- Author
-
عباسعلی کدخدایی and سیدرضا جلیلی
- Abstract
Since the 1980s, due to the emergence of complex threats and the increasingly intertwined relationship of internal and external issues, the concept of national security has become common in international parlence. In such a situation, the need to address the concept of national security, which became a universal concept, was an essential step from the perspective of international law. The International Court of Justice (ICJ) began the process with three judgments issued in the Nicaragua case in 1986, and the Nuclear Weapons case in 1996, and the Oil Platforms case in 2003, which introduced national security concepts such as "fundamental interests, vital interests, and emergencies" into the international law literature. The first manifestations of this practice appeared in international human rights law and then international disarmament law in the form of treaty terms. By analyzing the above-mentioned views, practices and sources, this paper will examine the formation of a "national security regime" in international law. A coherent and basic regime of specific rules and norms on national security, which is developing [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. TURKISH-RUSSIAN RELATIONS FROM THE COLD WAR TO 2002 AS THE BEGINNING OF CURRENT RELATIONS.
- Author
-
ŞEKER, Burak Şakir
- Subjects
COLD War & politics ,ECONOMIC development ,MILITARY service ,NATIONAL security - Abstract
Copyright of Akademik Hassasiyetler is the property of Huzeyfe Suleyman Arslan and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
34. GLOBALIZATION AND THE DYNAMICS OF NATIONAL SECURITY IN THE 21ST CENTURY.
- Author
-
Sunday, Adejoh
- Subjects
- *
GLOBALIZATION , *NATIONAL security , *COMPUTER crimes , *INFORMATION & communication technologies , *INTERNATIONAL security - Abstract
Globalization and the increasing interconnectivity of the international system has brought about changes in the nature of state relations and newer trends in security threats within the international system. Security threats that hitherto did not exist are now made manifest with the aid of globalization particularly as a result of advancement in information, communication and transportation technologies. Cyber-crime, transnational crimes, money laundry, human trafficking, terrorism financing, proliferation of small arms and light weapons amongst several other security threats now characterize the global system. This paper therefore attempts to interrogate globalization as a driver for insecurity. It is the position of this paper that national and international security dynamics have changes because of globalization. It is desk research and relies basically on secondary data. The paper therefore recommends the need for states to adopt security strategies that are in line with global trends so as to address security challenges. It also recommends the application of technology in addressing national security challenges. [ABSTRACT FROM AUTHOR]
- Published
- 2024
35. Make room for me! A study of how climate change and environment landed on Spanish national security.
- Author
-
Ruiz-Campillo, Xira and del Río, Carlos
- Subjects
NATIONAL security ,CLIMATE change ,ENVIRONMENTAL degradation ,SECURITIES analysts ,ENVIRONMENTAL literacy ,INSTITUTIONAL environment - Abstract
This paper examines how climate change and the environment have been incorporated into Spain's security documents and policymaking. We have examined forty-plus documents issued by Spain's National Security Department to identify the evolution of the climate and environmental discourse. A keyword filter helped to single out the eleven most environmentally relevant documents, which have been qualitatively analysed to better understand the context in which environmental language is used. In our work we identify how both common practices of security analysts and policy-makers different level policies have been strongly influenced by environmental knowledge, and, therefore, incorporated new considerations into security policies as well as. Our findings suggest that climate is not the only challenge incorporated into security documents. Other environmental issues such as desertification, access to water, energy transition or loss of biodiversity are also included, which implies that they are part of a broader concept of national security more in line with the new challenges of the twentity-first century. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Balancing National Security and Individual Privacy Rights & The Role of Accountability and Transparency in Signals Intelligence (SIGINT) Activities.
- Author
-
Gallatin, Eric R.
- Subjects
ELECTRONIC surveillance ,NATIONAL security ,RIGHT of privacy ,INTELLIGENCE service ,COMMUNITY involvement - Abstract
Copyright of Global Security & Intelligence Studies is the property of Policy Studies Organization and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
37. Geographically small but not weak: comparing the national security policies of Israel and Singapore.
- Author
-
Kassab, Hanna Samir
- Subjects
NATIONAL security ,MILITARY strategy - Abstract
This paper offers a comparative study of Israel and Singapore to understand the national security policies of geographically smaller states. These states are militarily powerful, geographically small, and in close proximity with much larger potential adversaries. These states are also different in terms of their relationship with that much larger state as well as their independence narratives. Israel remains in a state of conflict with Iran through Syria and through terrorist groups like Hamas and Hezbollah. Israel was created through war. On the other hand, Singapore has a complicated relationship with Malaysia based on suspicious cooperation. Malaysia also allowed Singapore independence given differences in the voting behavior of Singaporeans. Both states share a military strategy of preemption or prevention. Since these states are geographically small, striking first may offer Israel and Singapore a better chance at avoiding annihilation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. Outsourcing national defense: an impediment to the US strategy of great power competition.
- Author
-
Bruneau, Thomas
- Subjects
GREAT powers (International relations) ,NATIONAL security ,CONTRACTING out ,TECHNOLOGICAL innovations ,CIVIL-military relations - Abstract
My goals in this paper are to elaborate further an approach to civil-military relations going beyond control to include effectiveness; and, to argue that outsourcing by the Department of Defense (DoD) results in opportunity costs making very difficult the implementation of the national security strategy of "great power competition." The current acquisition authority for outsourcing impedes DoD accessing cutting-edge technology generated by "startups." In an earlier era of strategic competition, the main US response was to create the National Aeronautics and Space Agency with a new acquisition authority – "other transaction authority" (OTA). In the National Defense Authorization Act of FY 2018 Congress stipulated that OTAs should be the preference for DoD in science and technology and prototyping, and education in OTAs be provided. This education has not been implemented. Consequently, a key element of the US great power competition strategy, which is the acquisition of new technology, goes wanting. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. The il/liberal paradox: conceptualising immigration policy trade-offs across the democracy/autocracy divide.
- Author
-
Natter, Katharina
- Subjects
- *
IMMIGRATION policy , *DEMOCRACY , *DICTATORSHIP , *ECONOMIC development , *NATIONAL security - Abstract
This paper compares immigration reforms across democratic and autocratic states. Mobilising two large-scale datasets, it first challenges the prevailing notion that political regime types inherently dictate immigration policy outputs. The analysis shows that although immigration is central to political debates worldwide, reforms are not that frequent and, when enacted, their restrictiveness does not consistently differ by regime type. Instead, restrictions focus on border controls and openings on entry and integration policies regardless of the political regime in place. The paper then mobilises case studies from around the globe to delve into the policy dynamics underpinning immigration reforms across regimes. It shows that while all migration states grapple with the multifaceted challenges that immigration raises, autocratic politics offers a broader toolkit to resolve the trade-offs between cultural, rights-based, economic and security issues. This creates unexpected opportunities for open immigration reforms under autocratic politics, a dynamic I call the 'illiberal paradox' as a counterpart to the 'liberal paradox' observed under democratic politics. To advance theory-building across the democracy/autocracy divide, the paper concludes by arguing that the liberal and illiberal paradox concepts are not exclusive to democratic or autocratic regimes, respectively, but are valuable analytical tools to understand immigration politics across the political regime spectrum. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. Exposure of the UK's critical national infrastructure to cyber attacks and ransom demands.
- Author
-
Chapman, R. J.
- Subjects
INFRASTRUCTURE (Economics) ,CYBERTERRORISM ,RANSOM ,INFORMATION technology ,AUTOMATED teller machines ,RUSSIAN invasion of Ukraine, 2022- ,NATIONAL security - Published
- 2024
41. Theoretical approach and practice of "National Spatial Planning Theory": how Chinese cities and towns precisely adapt to nature and culture.
- Author
-
Wang, Kai, Xu, Hui, and Zhou, Yajie
- Subjects
URBANIZATION ,CULTURAL property ,REGIONAL disparities ,NATIONAL security - Abstract
Over the past 40 years, China has witnessed the world's largest urbanization process. In light of its natural and cultural conditions featuring resource scarcity, frequent natural disasters, rich cultural heritage and regional disparities and dynamics, this process aggravates the complex and severe problems faced by urban areas, including resource and environmental damage, security risks and cultural degradation. To address these issues, a shift in national and regional urban spatial layouts from improving economic competitiveness to balancing protection and development as well as security and development is needed. Related theories and research methods should also be adjusted accordingly. Therefore, given China's specific conditions and regional spatial layouts, the paper introduces the "national spatial planning theory," which aims to create a sound living environment. The core concept is "precise adaptation," which ensures the adaption of urban development to natural and cultural conditions. It is the first theory that proposes to develop the national urban spatial layout based on the analysis of ecological environment. It also suggests shifting the focus from eco-environment to security and culture as urbanization progresses and problems change constantly. In addition, a method framework and technical system of "precise analysis, adaptive distribution and dynamic evaluation" is formulated to build an adaptive urban spatial layout on the basis of quantitative analysis of the capacity of spatial resources. The practices of regional planning processes on varying scales in the past 20 years are to illustrate the specific applications of the theoretical approach. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
42. National President's Column.
- Author
-
Irving, Paul
- Subjects
NATIONAL security ,SCHOLARLY publishing - Abstract
The document is a publication called "United Service," which is the journal of the Royal United Services Institute for Defence and Security Studies - Australia. The journal aims to inform the defense and national security debate in Australia and internationally. It publishes papers, opinion pieces, letters to the editor, biographies, obituaries, and book reviews related to defense and national security issues. The second issue of the journal in 2024 includes articles on the strategic implications of the 2022-23 Defense Strategic Review, the ADF Reserves, the career of Sir Thomas Blamey, and the role of the Indian Army in the Gallipoli Campaign. The journal also mentions the release of the 2024 National Defense Strategy and the 2024 Integrated Investment Program by the Australian Government. The National Defense Strategy focuses on a "Strategy of Denial" and transitioning the ADF to an integrated focused force. However, there has been criticism of deficiencies in the strategy and investment program, including the cancellation of planned air and missile defenses for northern airbases and the cancellation of the Navy's Mine Countermeasures and Military Survey project. Additionally, the proposed growth of the ADF has not been realized, with the number of full-time personnel decreasing. The National President of the Royal United Services Institute, Paul Irving, provides a column in the journal discussing these issues. [Extracted from the article]
- Published
- 2024
43. Butter or Guns: Taiwan's Economic Policy Toward China.
- Author
-
Hsieh, John Fuh-sheng and Lin, Yi-Tzu
- Subjects
- *
ECONOMIC policy , *EXPORT controls , *NATIONAL security , *NATIONALISM , *DEMOCRATIZATION , *DEPENDENCY theory (International relations) ,CHINA-Taiwan relations - Abstract
Tensions between China and Taiwan have been heightened significantly lately. This paper is aimed at investigating the cross-Strait relations from Taiwan's perspective concerning, in particular, Taiwan's economic policy toward China. Indeed, China has long been Taiwan's largest trading partner; yet, political relationship between the two has fluctuated over time. On the one hand, China has been an attractive market for Taiwanese businesses, but one the other hand, there have also been economic and security concerns about Taiwan's dependence on China. This paper shows the connections between political and economic factors which jointly affect Taiwan's economic policy toward China. It argues that there may be a general equilibrium—a median voter—but it has often been distorted by the institutional constraints in Taiwan's political process. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. The argumentative function of rescue narratives: Trump's national security rhetoric as a case study.
- Author
-
Elnakkouzi, Rania
- Subjects
NATIONAL security ,INTERVENTION (International law) ,NARRATIVES ,RHETORIC - Abstract
A pervasive feature of populism is the use of rescue narratives to stimulate emotional adherence with audience predicated on evoking fear versus hope for salvation. This paper argues that restricting the rhetorical appeal of rescue narratives to the affective domain obscures the argumentative function that these narratives partake in constructing political arguments. It, thus, claims that rescue narratives can perform as arguments when used to provide reasons to justify political action. The paper examines the way(s) Donald Trump employs rescue narratives as arguments to justify military interventions in Iraq and Syria. The analytical framework supplements the argumentative strategies of the Discourse-Historical Approach to Critical Discourse Studies with pragma-dialectics' argumentation schemes. The analysis shows that the different elements of the narrative construct premises for argument schemes adduced to justify the rightness of claims. Conceptualizing Trump's rescue narratives as arguments prompts a reflection on the possibility of narrative discourse to be associated with the domain of reason. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. A NEW FRONTIER IN RELATIONS BETWEEN TÜRKIYE AND TURKIC REPUBLICS: COOPERATION IN DEFENSE INDUSTRY.
- Author
-
Bazarbayev, K., Zhanaltay, Z., and Amirbek, A.
- Subjects
DEFENSE industries ,NATIONAL security ,INTERNATIONAL relations - Abstract
Copyright of International Relations & International Law Journal / Seriâ Meždunarodnye Otnošeniâ & Meždunarodnoe Pravo is the property of Al-Farabi Kazakh National University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
46. Hybrid Cyber Threats: Lithuanian Context.
- Author
-
Štitilis, D., Laurinaitis, M., and Warren, M.
- Subjects
CYBERTERRORISM ,INTERNET security ,DISINFORMATION ,NATIONAL security - Abstract
This academic paper conducts a comprehensive analysis of hybrid cyber threats within the Lithuanian context, focusing on the examination of national strategies formulated to address and mitigate these complex challenges. Hybrid cyber threats, characterized by the amalgamation of traditional cyber methods with elements of disinformation, psychological warfare, and geopolitical manipulation, present unique challenges to national security. This study explores how Lithuania's national strategies have evolved to counteract these multifaceted threats, offering insights into the effectiveness of current approaches, and identifying potential areas for improvement. The research employs a comparative analysis of Lithuania's historical and contemporary national cybersecurity strategies, examining their alignment with the evolving nature of hybrid cyber threats. By evaluating the integration of cybersecurity measures with broader national security policies, the study aims to uncover the strengths and weaknesses in Lithuania's preparedness and response mechanisms. [ABSTRACT FROM AUTHOR]
- Published
- 2024
47. Preventing international threats in the context of improving the legal framework for national and regional security.
- Author
-
Vilks, Andrejs, Kipane, Aldona, and Krivins, Anatolijs
- Subjects
NATIONAL security ,WAR crimes ,ESPIONAGE ,LEGAL liability ,RUSSIAN invasion of Ukraine, 2022- - Abstract
Geopolitical challenges and potential integral threats have put the issue of developing strategies and tools to counter risks and strengthen security on the agenda. The purpose of the study is to conduct a comprehensive assessment of the areas of criminal law development in the context of increasing national and international security. The study uses generalisation, analysis, systematisation, and deduction methods. The study assesses the impact of the Russian invasion of Ukraine, which, using the example of specific illegal actions in Latvia, revealed real risks for the national security of Latvia and the Baltic region. The paper considers crimes related to the violation of bans on participation in armed conflicts, organisation and conduct of military-tactical exercises, and the inadmissibility of assisting a foreign state in an act aimed against another state. Ultimately, such a review reveals the importance and real threat of these criminal offences to state security and identifies approaches for improving legislation in this area. The crime of "espionage" is investigated, which ultimately outlines the structure of such an illegal act and its danger. Considerable attention is given to the examination of torture as a crime against humanity, which is done based on national and international legislation. As a result, the evolution of this criminal offence is considered, various approaches to defining this phenomenon are evaluated, sadism as a particular form of torture is investigated, a classification of similar acts is created, and various types of consequences that could be caused during such a crime are formulated. The practical value of the study lies in the possibility of law enforcement agencies using the findings to form effective strategies for developing modern political and legal tools to prevent international threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Legislation ‘needs to avoid overseas negative examples’; Experts warn against borrowing laws that are considered ‘overbroad’ in their jurisdictions
- Author
-
Cheng, Lilian
- Subjects
Jurisdiction ,National security ,Security management ,News, opinion and commentary - Abstract
Certain overseas national security-related laws referenced by the Hong Kong government in a proposal for the city’s Article 23 legislation are considered “overbroad” and “excessive” in their home countries, legal [...]
- Published
- 2024
49. Yemen NIAC review 2014 until January 2022 (Updated May 29, 2024)
- Subjects
National security ,Health ,Science and technology - Abstract
2024 JUN 14 (NewsRx) -- By a News Reporter-Staff News Editor at Science Letter -- According to news reporting based on a preprint abstract, our journalists obtained the following quote [...]
- Published
- 2024
50. Can de-risking avert supply chain precarity in the face of China-U.S. geopolitical tensions? From sanctions to semiconductor resilience and national security
- Author
-
Bu, Qingxiu
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.