Providing for National Security: A Comparative Analysis

被引:0
|
作者
Tovar, Juan [1 ]
机构
[1] Univ Burgos, Dept Publ Law, Burgos, Spain
来源
DEMOCRACY & SECURITY | 2015年 / 11卷 / 01期
关键词
D O I
10.1080/17419166.2015.1006440
中图分类号
D0 [政治学、政治理论];
学科分类号
0302 ; 030201 ;
摘要
引用
收藏
页码:93 / 95
页数:3
相关论文
共 50 条
  • [1] A Comparative Analysis of Information and Artificial Intelligence Toward National Security
    Al-Suqri, Mohammed Nasser
    Gillani, Maryam
    [J]. IEEE ACCESS, 2022, 10 : 64420 - 64434
  • [2] A Comparative Analysis of the National Cyber Security Strategies of Leading Nations
    Tatar, Unal
    Calik, Orhan
    Celik, Minhac
    Karabacak, Bilge
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 211 - 218
  • [3] Providing Security Assurance in Line with National DBT Assumptions
    Bajramovic, Edita
    Gupta, Deeksha
    [J]. ADVANCING NUCLEAR SCIENCE AND ENGINEERING FOR SUSTAINABLE NUCLEAR ENERGY KNOWLEDGE, 2017, 1799
  • [4] Corruption Risks as a threat to the national security: A comparative analysis of their prevention and minimization
    Lipinsky, Dmitry A.
    Musatkina, Aleksandra A.
    Stankin, Aleksey N.
    Chuklova, Elena, V
    [J]. AMAZONIA INVESTIGA, 2019, 8 (20): : 354 - 364
  • [5] Comparative Analysis of National Cyber Security Strategies using Topic Modelling
    Song, Minkyoung
    Kim, Dong Hee
    Bae, Sunha
    Kim, So-Jeong
    [J]. International Journal of Advanced Computer Science and Applications, 2021, 12 (12): : 62 - 69
  • [6] Comparative Analysis of National Cyber Security Strategies using Topic Modelling
    Song, Minkyoung
    Kim, Dong Hee
    Bae, Sunha
    Kim, So-Jeong
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (12) : 62 - 69
  • [7] EU and NATO cybersecurity strategies and national cyber security strategies: a comparative analysis
    Stitilis, Darius
    Pakutinskas, Paulius
    Malinauskaite, Inga
    [J]. SECURITY JOURNAL, 2017, 30 (04) : 1151 - 1168
  • [8] EU and NATO cybersecurity strategies and national cyber security strategies: a comparative analysis
    Darius Štitilis
    Paulius Pakutinskas
    Inga Malinauskaitė
    [J]. Security Journal, 2017, 30 : 1151 - 1168
  • [9] The 2008 National Security Council Transition: Providing Continuity in a Bipartisan Environment
    Kumar, Martha
    [J]. PRESIDENTIAL STUDIES QUARTERLY, 2013, 43 (03) : 490 - 522
  • [10] Mercenary intervention in Sierra Leone: providing national security or international exploitation?
    Francis, DJ
    [J]. THIRD WORLD QUARTERLY, 1999, 20 (02) : 319 - 338