Why Security Forces Do Not Deliver Security

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Why Mobile Security is not Like Traditional Security

We argue that traditional security solutions do not necessarily work for mobile environments, but that suitable solutions can and must be developed to address the needs of mobile platforms. To support this, we describe how the differences are likely to affect security and describe mobile-friendly solutions for CAPTCHAs, user authentication, and malware protection.

متن کامل

Why do women deliver in facilities, or not?

A key strategy promoted by international organizations to reduce maternal mortality is skilled birth attendance. This should be a provider trained in the essential elements of delivery care, typically a midwife, who could deliver at home or in an institution. In recognition that this skilled provider on her own can often do little if complications arise, the next extension of the strategy is to...

متن کامل

Why Private Browsing Modes Do Not Deliver Real Privacy∗

Over the past few years, all of the major web browser vendors have embraced the concept of Privacy Enhancing Technologies (PETs), and added “private browsing” modes to their products. Publicly, the companies describe this feature as useful for consumers “shopping for a gift on a family PC” [14] or someone wishing to “to plan surprises like gifts or birthdays” [7]. The private browsing features ...

متن کامل

The problem of redundancy problem: why more nuclear security forces may produce less nuclear security.

After the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon, many scholars, journalists, and public officials expressed fear about the security of nuclear facilities in the United States. Terrorists could attack military bases, weapons in transit, or nuclear weapons production and dismantlement plants in order to steal a weapon or its components. Terrorists might a...

متن کامل

Draft - Do Not Publish ! Security Architectures

This article briefly describes the most important security protocols of the Bluetooth security architecture for Wireless Personal Area Networks (WPAN). We mainly focus on the key agreement protocol, which is the most critical part of this security architecture. The strengths and weaknesses of these solutions are discussed and perspectives on improvements are pre-

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Armed Forces & Society

سال: 2010

ISSN: 0095-327X,1556-0848

DOI: 10.1177/0095327x10390468