1 |
Needs or Interests: Drivers of China’s Peace Engagement in Conflict-affected Countries |
Yeonju Jung & Karina Shyrokykh
|
|
2 |
Security knowledges: circulation, control, and responsible research and innovation in EU border management |
Bruno Oliveira Martins
|
|
3 |
Matters of care or matters of security: feminist reflections on prosecuting terrorism financing |
Tasniem Anwar & Sarah Klosterkamp
|
|
4 |
Shock and awe: Military response to armed banditry and the prospects of internal security operations in Northwest Nigeria |
Folahanmi Aina,;John Sunday Ojo & Samuel Oyewole
|
|
5 |
Managing the Interface: Regional Security and Substate Politics in Africa |
Alice Hills
|
|
6 |
Locating the local police in Iraq’s security arena: community policing, the ‘three Ps’ and trust in Ninawa Province |
Jessica Watkins;Abdulkareem al-Jerba & Mahdi al-Delaimi
|
|
7 |
The Dayton Peace Process: A Keyhole into Russian and Chinese Engagement with Liberal Peacebuilding |
Mateja Peter & Kasia A. Houghton
|
|
8 |
Repositioning African states to prudently engage the global (dis)order and advance peace, security and development |
Teboho Josiah Lebakeng
|
|
9 |
Nuclear Threats Under International Law Part I: The Legal Framework |
Anna Hood & Monique Cormier
|
|
10 |
Exploring the human dimension of nuclear security: the history, theory, and practice of security culture |
Christopher Hobbs & Matthew Moran
|
|
11 |
The ASEAN Regional Forum: from dialogue to practical security cooperation? |
Jürgen Haacke
|
|
12 |
Beyond Arms Control: Cooperative Nuclear Weapons Reductions – A New Paradigm to Roll Back Nuclear Weapons and Increase Security and Stability |
William M. Moon
|
|
13 |
The construction of threats by intelligence agencies: analysing the language of official documents in Slovakia |
Martin Kovanic
|
|
14 |
“Taming the Storm” of Hybridity: The EU-NATO Relationship on Countering Hybrid Threats – From Functional Overlap to Functional Cooperation |
Dimitrios Anagnostakis
|
|
15 |
Singapore’s relations with the Gulf: from defensive to positive engagement |
Li-Chen Sim
|
|
16 |
Conflict, gender and ontological security-seeking between Eritrea and Tel Aviv |
Conflict, Security & Development
|
|
17 |
Report of Panel on Peace and Security of Northeast Asia (PSNA) 2018 |
Tatsujiro Suzuki & Satoshi Hirose
|
|
18 |
Making cyber security more resilient: adding social considerations to technological fixes |
Myriam Dunn Cavelty;Christine Eriksen & Benjamin Scharte
|
|
19 |
Cyber Security in East Asia: Governing Anarchy |
Nicholas Thomas
|
|
20 |
The transnationalisation of military leaders in Central and Eastern Europe and EURO-Atlantic integration |
Tomas Kucera
|
|
21 |
The Security Dilemma: A Conceptual Analysis |
Shiping Tang
|
|
22 |
The rise of responsible behavior: Western commercial reports on Western cyber threat actors |
Lior Yoffe, ;vEviatar Matania & Udi Sommer
|
|
23 |
‘Chifley spells security’: Tracing the Origins of Contemporary Australian Security Discourse |
Carolyn Holbrook
|
|
24 |
‘Crocodiles in the Corridors’: Security Vetting, Race and Whitehall, 1945–1968 |
Daniel W. B. Lomas
|
|
25 |
Security Cooperations and Human Rights Violations: The African Israeli Case |
Yaron Salman
|
|
26 |
Occupational security: A holistic values-based framework for supporting occupations and safety |
, Susan Forwell, W. Ben Mortenson & Saori Ogura
|
|
27 |
sing ISAF’s security involvement in Afghanistan as an example, this article asks: Does the perceived provision of goods and services affect the empirical legitimacy attributed to external governance actors in areas of limited statehood? The study applie |
Suzie Thomas & Iain Banks
|
|
28 |
“Gulf Security is Our Security”: Global Britain and UK Gulf Strategy, 2010-20 |
Joe Devanny & Philip Berry
|
|
29 |
Repercussions of a weak ocean governance and a non-existent maritime security policy: The resurgence of piracy and Armed Robbery in the Gulf of MexicoJournal of International Maritime Safety, Environmental Affairs, and Shipping |
Adriana Ávila-Zúñiga Nordfjeld & D. Dalaklis
|
|
30 |
Securing Legitimacy? Perceptions of Security and ISAF’s Legitimacy in Northeast Afghanistan |
Eric Stollenwerk
|
|
31 |
Violent Peace: Local Perceptions of Threat and Insecurity in Post-Conflict Colombia |
Manuela Nilsson & Lucía González Marín
|
|
32 |
Determinants of rural-urban migration and its impact on migrant-sending households’ livelihood security in Gurage zone, Ethiopia |
Mesfin Agza;Bamlaku Alamirew & Admasu Shibru
|
|
33 |
Peace and the security sector in Sudan, 2002–11 |
Alex de Waal
|
|
34 |
Cyberspace is used, first and foremost, to wage wars: proliferation, security and stability in cyberspace |
Frédérick Douzet & Aude Gery
|
|
35 |
The role of security assistance in reconfiguring Tunisia’s transition |
Rosa Maryon
|
|
36 |
Hybridity and Friction in Organizational Politics: New Perspectives on the African Security Regime Complex |
Louise Wiuff Moe & Anna Geis
|
|
37 |
Child Responsive Conflict Early Warning: Prioritizing Children in Peace and Security |
Catherine Baillie Abidi & Laura Cleave
|
|
38 |
increased attention to racialized knowledge and methodological whiteness has swept the political science discipline, especially international relations. yet an important dimension of race and racism continues to be ignored: the presence and status of scho |
Frédérick Douzet & Aude Gery
|
|
39 |
Race and Racial Exclusion in Security Studies: A Survey of Scholars |
Kelebogile Zvobgo;Arturo C. Sotomayor;Maria Rost Rublee;Meredith Loken;George Karavas & Constance Duncombe
|
|
40 |
Civilian at Sea: Understanding Fisheries’ Entanglement with Maritime Border Security |
vAndrew M. Song
|
|
41 |
The regulatory security state in Europe |
Andreas Kruck & Moritz Weiss
|
|
42 |
Prototyping Usable Privacy and Security Systems: Insights from Experts |
Kami Vaniea & Mohamed Khamis;Florian Mathis,
|
|
43 |
Cultural and symbolic capital in the market for security: police-private security relations in Mexico and the United Kingdom |
Logan Puck & Adam White
|
|
44 |
Introduction: The Politics of European Security Policies |
Xymena Kurowska & Patryk Pawlak
|
|
45 |
Strategic leadership in cyber security, case Finland |
Martti Lehto & Jarno Limnéll
|
|
46 |
The Politics of STEMM Collaboration between Australia and China: National Security, Geopolitics, and Academic Freedom |
Diarmuid Cooney-O’Donoghue
|
|
47 |
Under the radar: Ireland, maritime security capacity, and the governance of subsea infrastructure |
Robert McCabe & Brendan Flynn
|
|
48 |
Information Security Risk Assessment Methods in Cloud Computing: Comprehensive Review |
Mohammed Al-Khalidi & Rabab Al-Zaidi;Tarek Ali
|
|
49 |
Touristic security: not a ‘win-win’ global security practice |
Sarah Becklake
|
|
50 |
The dual-use security dilemma and the social construction of insecurity |
Amir Lupovici
|
|