The Security Imaginary: Explaining Military Isomorphism
نویسندگان
چکیده
منابع مشابه
Explaining Users' Security Behaviors with the Security Belief Model
Information security is often viewed as a technological matter. However, security professionals will readily admit that without safe practices by users, no amount or type of technology will be effective at preventing unauthorized intrusions. By paralleling the practices of information security and health prevention, a rationale for employing constructs from existing models of health behavior is...
متن کاملApplying military grade security to the Internet
The explosive growth witnessed in the Internet over the last few years has encouraged companies to connect to it and to offer services to their customers over it. Concerns about security are holding them back from all but the most restrictive connectivity. This paper explores the use of a military development, the Compartmented Mode Workstation, in a commercial setting, as a platform that is se...
متن کاملMilitary veterans and Social Security.
There are 9.4 million military veterans receiving Social Security benefits, which means that almost one out of every four adult Social Security beneficiaries has served in the United States military. In addition, veterans and their families make up almost 40 percent of the adult Social Security beneficiary population. Policymakers are particularly interested in military veterans and their famil...
متن کاملExplaining the Improving Strategies of the Disaster Risk Management in Military Hospitals
Background and Aim: The disasters and emergencies can pose major challenges to the health infrastructure. Hospitals are the main units for providing health services in response to disasters. Considering the vital role of military hospitals in responding to disasters, the present study was conducted with the aim of explaining the improving strategies of disaster risk management in military hospi...
متن کاملMedical Ethics Education for Military, Police and Security Forces
Background: Confidentiality is a core value in medicine and public health, yet, like other core values, it is not absolute. Medical ethics has typically allowed the breach of confidentiality when there is a credible threat of significant harm to an identifiable third party. Applied medical ethics may vary in cases related to military or civil environments in matter such as medical confiden...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security Dialogue
سال: 2008
ISSN: 0967-0106,1460-3640
DOI: 10.1177/0967010607086825