Why Security Forces Do Not Deliver Security
نویسندگان
چکیده
منابع مشابه
Why Mobile Security is not Like Traditional Security
We argue that traditional security solutions do not necessarily work for mobile environments, but that suitable solutions can and must be developed to address the needs of mobile platforms. To support this, we describe how the differences are likely to affect security and describe mobile-friendly solutions for CAPTCHAs, user authentication, and malware protection.
متن کاملWhy do women deliver in facilities, or not?
A key strategy promoted by international organizations to reduce maternal mortality is skilled birth attendance. This should be a provider trained in the essential elements of delivery care, typically a midwife, who could deliver at home or in an institution. In recognition that this skilled provider on her own can often do little if complications arise, the next extension of the strategy is to...
متن کاملWhy Private Browsing Modes Do Not Deliver Real Privacy∗
Over the past few years, all of the major web browser vendors have embraced the concept of Privacy Enhancing Technologies (PETs), and added “private browsing” modes to their products. Publicly, the companies describe this feature as useful for consumers “shopping for a gift on a family PC” [14] or someone wishing to “to plan surprises like gifts or birthdays” [7]. The private browsing features ...
متن کاملThe problem of redundancy problem: why more nuclear security forces may produce less nuclear security.
After the September 11, 2001 terrorist attacks on the World Trade Center and the Pentagon, many scholars, journalists, and public officials expressed fear about the security of nuclear facilities in the United States. Terrorists could attack military bases, weapons in transit, or nuclear weapons production and dismantlement plants in order to steal a weapon or its components. Terrorists might a...
متن کاملDraft - Do Not Publish ! Security Architectures
This article briefly describes the most important security protocols of the Bluetooth security architecture for Wireless Personal Area Networks (WPAN). We mainly focus on the key agreement protocol, which is the most critical part of this security architecture. The strengths and weaknesses of these solutions are discussed and perspectives on improvements are pre-
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Armed Forces & Society
سال: 2010
ISSN: 0095-327X,1556-0848
DOI: 10.1177/0095327x10390468