نتایج جستجو برای: critical security studies

تعداد نتایج: 1986502  

Constructivism theory by employing a humanistic vision to issues has provided the  the opportunity of considering the special characters of human in political studies.  Therefore factors such as identity, benefits, purposes, intentions, and many other issues  found important role in  security Studies. Ontological Security employed this approach to  security matters. This theory seeks to clarify...

2005
Boon-Yuen Ng Mohammad Rahim

Home computer users play a crucial role in securing the cyberspace, but the protection of home computers is left to the initiative of the users. In this study, we focus on the socio-behavioral perspective, as the behavior of home computer users on security issues is one of the most important factors in securing the cyberspace. The decomposed Theory of Planned Behavior is adapted to investigate ...

2015
Yier Jin Dhananjay S. Phatak

Hardware security has become a hot topic recently with more and more researchers from related research domains joining this area. However, the understanding of hardware security is often mixed with cybersecurity and cryptography, especially cryptographic hardware. For the same reason, the research scope of hardware security has never been clearly defined. To help researchers who have recently j...

Journal: :iranian journal of public health 0
vanja rokvić zoran jeftić vladimir ajzenhamer

background: in recent years, the concept of health security has received an international dimension. however, despite evident links between health and security the concept of health security is not used in either academic or political discourse in serbia. it comes as no surprise then that even though the issue of security challenges is present in serbian legislation, it has not been incorporate...

Journal: :Poiesis & Praxis 2006
Sarah Spiekermann Frank Pallas

Ubiquitous Computing technologies will have a wide impact on our daily lives in the future. Currently, most debates about social implications of these technologies concentrate on different aspects of privacy and data security. However, the authors of this paper argue that there is more to consider from a social perspective: In particular, the question is raised how people can maintain control i...

Journal: :International Journal of Critical Infrastructures 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید