Articles/Publications Repository LIST

Sr # Articles/Publications Repository LIST Published By Piblished By
1 Needs or Interests: Drivers of China’s Peace Engagement in Conflict-affected Countries Yeonju Jung & Karina Shyrokykh
2 Security knowledges: circulation, control, and responsible research and innovation in EU border management Bruno Oliveira Martins
3 Matters of care or matters of security: feminist reflections on prosecuting terrorism financing Tasniem Anwar & Sarah Klosterkamp
4 Shock and awe: Military response to armed banditry and the prospects of internal security operations in Northwest Nigeria Folahanmi Aina,;John Sunday Ojo & Samuel Oyewole
5 Managing the Interface: Regional Security and Substate Politics in Africa Alice Hills
6 Locating the local police in Iraq’s security arena: community policing, the ‘three Ps’ and trust in Ninawa Province Jessica Watkins;Abdulkareem al-Jerba & Mahdi al-Delaimi
7 The Dayton Peace Process: A Keyhole into Russian and Chinese Engagement with Liberal Peacebuilding Mateja Peter & Kasia A. Houghton
8 Repositioning African states to prudently engage the global (dis)order and advance peace, security and development Teboho Josiah Lebakeng
9 Nuclear Threats Under International Law Part I: The Legal Framework Anna Hood & Monique Cormier
10 Exploring the human dimension of nuclear security: the history, theory, and practice of security culture Christopher Hobbs & Matthew Moran
11 The ASEAN Regional Forum: from dialogue to practical security cooperation? Jürgen Haacke
12 Beyond Arms Control: Cooperative Nuclear Weapons Reductions – A New Paradigm to Roll Back Nuclear Weapons and Increase Security and Stability William M. Moon
13 The construction of threats by intelligence agencies: analysing the language of official documents in Slovakia Martin Kovanic
14 “Taming the Storm” of Hybridity: The EU-NATO Relationship on Countering Hybrid Threats – From Functional Overlap to Functional Cooperation Dimitrios Anagnostakis
15 Singapore’s relations with the Gulf: from defensive to positive engagement Li-Chen Sim
16 Conflict, gender and ontological security-seeking between Eritrea and Tel Aviv Conflict, Security & Development
17 Report of Panel on Peace and Security of Northeast Asia (PSNA) 2018 Tatsujiro Suzuki & Satoshi Hirose
18 Making cyber security more resilient: adding social considerations to technological fixes Myriam Dunn Cavelty;Christine Eriksen & Benjamin Scharte
19 Cyber Security in East Asia: Governing Anarchy Nicholas Thomas
20 The transnationalisation of military leaders in Central and Eastern Europe and EURO-Atlantic integration Tomas Kucera
21 The Security Dilemma: A Conceptual Analysis Shiping Tang
22 The rise of responsible behavior: Western commercial reports on Western cyber threat actors Lior Yoffe, ;vEviatar Matania & Udi Sommer
23 ‘Chifley spells security’: Tracing the Origins of Contemporary Australian Security Discourse Carolyn Holbrook
24 ‘Crocodiles in the Corridors’: Security Vetting, Race and Whitehall, 1945–1968 Daniel W. B. Lomas
25 Security Cooperations and Human Rights Violations: The African Israeli Case Yaron Salman
26 Occupational security: A holistic values-based framework for supporting occupations and safety , Susan Forwell, W. Ben Mortenson & Saori Ogura
27 sing ISAF’s security involvement in Afghanistan as an example, this article asks: Does the perceived provision of goods and services affect the empirical legitimacy attributed to external governance actors in areas of limited statehood? The study applie Suzie Thomas & Iain Banks
28 “Gulf Security is Our Security”: Global Britain and UK Gulf Strategy, 2010-20 Joe Devanny & Philip Berry
29 Repercussions of a weak ocean governance and a non-existent maritime security policy: The resurgence of piracy and Armed Robbery in the Gulf of MexicoJournal of International Maritime Safety, Environmental Affairs, and Shipping Adriana Ávila-Zúñiga Nordfjeld & D. Dalaklis
30 Securing Legitimacy? Perceptions of Security and ISAF’s Legitimacy in Northeast Afghanistan Eric Stollenwerk
31 Violent Peace: Local Perceptions of Threat and Insecurity in Post-Conflict Colombia Manuela Nilsson & Lucía González Marín
32 Determinants of rural-urban migration and its impact on migrant-sending households’ livelihood security in Gurage zone, Ethiopia Mesfin Agza;Bamlaku Alamirew & Admasu Shibru
33 Peace and the security sector in Sudan, 2002–11 Alex de Waal
34 Cyberspace is used, first and foremost, to wage wars: proliferation, security and stability in cyberspace Frédérick Douzet & Aude Gery
35 The role of security assistance in reconfiguring Tunisia’s transition Rosa Maryon
36 Hybridity and Friction in Organizational Politics: New Perspectives on the African Security Regime Complex Louise Wiuff Moe & Anna Geis
37 Child Responsive Conflict Early Warning: Prioritizing Children in Peace and Security Catherine Baillie Abidi & Laura Cleave
38 increased attention to racialized knowledge and methodological whiteness has swept the political science discipline, especially international relations. yet an important dimension of race and racism continues to be ignored: the presence and status of scho Frédérick Douzet & Aude Gery
39 Race and Racial Exclusion in Security Studies: A Survey of Scholars Kelebogile Zvobgo;Arturo C. Sotomayor;Maria Rost Rublee;Meredith Loken;George Karavas & Constance Duncombe
40 Civilian at Sea: Understanding Fisheries’ Entanglement with Maritime Border Security vAndrew M. Song
41 The regulatory security state in Europe Andreas Kruck & Moritz Weiss
42 Prototyping Usable Privacy and Security Systems: Insights from Experts Kami Vaniea & Mohamed Khamis;Florian Mathis,
43 Cultural and symbolic capital in the market for security: police-private security relations in Mexico and the United Kingdom Logan Puck & Adam White
44 Introduction: The Politics of European Security Policies Xymena Kurowska & Patryk Pawlak
45 Strategic leadership in cyber security, case Finland Martti Lehto & Jarno Limnéll
46 The Politics of STEMM Collaboration between Australia and China: National Security, Geopolitics, and Academic Freedom Diarmuid Cooney-O’Donoghue
47 Under the radar: Ireland, maritime security capacity, and the governance of subsea infrastructure Robert McCabe & Brendan Flynn
48 Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review Mohammed Al-Khalidi & Rabab Al-Zaidi;Tarek Ali
49 Touristic security: not a ‘win-win’ global security practice Sarah Becklake
50 The dual-use security dilemma and the social construction of insecurity Amir Lupovici