Results for 'Ministry of Interior and National Security'

978 found
Order:
  1. The Reality of Digital Transformation in the Palestinian Ministry of Interior and National Security.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Management Science Research (IJAMSR) 6 (11):148-165.
    This study aimed to identify the reality of digital transformation in the Palestinian Ministry of Interior and National Security from the point of view of workers in computer and information technology units. ) employees, and the study tool (the questionnaire) was distributed, and the comprehensive survey method was used, where (61) questionnaires were retrieved with a percentage of (87.1%), and they were unloaded and analyzed using the statistical packages SPSS. The study reached several results, including: The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2. The Extent of Cyber Security Application at the Ministry Of Interior and National Security in Palestine.Mahmoud T. Al Najjar, Mazen J. Al Shobaki & Suliman A. El Talla - 2022 - International Journal of Academic Information Systems Research (IJAISR) 6 (11):9-43.
    This study aimed to identify the extent of the application of Cyber Security at the Ministry of Interior and National Security from the point of view of workers in the computer and information technology units. 70 employees, and the study tool (questionnaire) was distributed, and the comprehensive survey method was used, as (61) questionnaires were retrieved at a rate of (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study reached several (...)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Digital Transformation and Its Impact on the Application of Cyber Security in the Ministry Of Interior and National Security in Palestine.Mazen J. Al Shobaki, Suliman A. El Talla & Mahmoud T. Al Najjar - 2022 - International Journal of Engineering and Information Systems (IJEAIS) 6 (11):92-115.
    This study aimed to identify the digital transformation and its impact on the application of Cyber Security in the Palestinian Ministry of Interior and National Security. The study used the analytical descriptive approach. The study tool (questionnaire), and the comprehensive survey method was used, where (61) questionnaires were retrieved (87.1%), and they were unloaded and analyzed using the SPSS statistical package. The study found several results, including that there is a statistically significant correlation between all (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Prospects for sustainable development and ensuring the security of economic systems in the new geostrategic realities.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Kosice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring sustainable development and security of economic systems in the new geostrategic realities requires the use of mechanisms for state protection of national economic interests, innovative outsourcing and digital technologies, and environmental protection. Basic research focuses on assessment the economic security of insurance companies, logistics processes, farms, healthcare organisations, retail and e-commerce, and tourist destinations. The research results have been implemented in the different decision-making models (...)
    Download  
     
    Export citation  
     
    Bookmark  
  5. Is Terrorism a Serious Threat to International and National Security? NO: The Myth of Terrorism as an Existential Threat.Jessica Wolfendale - 2012 - In Richard Jackson & Samuel Justin Sinclair (eds.), Contemporary Debates on Terrorism. Routledge. pp. 80-87.
    In contemporary academic, political, and media discourse, terrorism is typically portrayed as an existential threat to lives and states, a threat driven by religious extremists who seek the destruction of Western civilization and who are immune to reason and negotiation. In many countries, including the US, the UK, and Australia, this existential threat narrative of terrorism has been used to justify sweeping counterterrorism legislation, as well as military operations and even the use of tactics such as torture and indefinite detention. (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. Transformation of international economic relations: modern challenges, risks, opportunities and prospects: collective monograph.M. Bezpartochnyi - 2017 - ISMA University.
    The authors of the book have come to the conclusion that it is necessary to effectively use the methodological tools for assessing the competitiveness of financial and insurance markets, methodological approaches to assessing the effectiveness of regional policy, internal audit of resources. Basic research is aimed at researching the main trends in the international economy, socialization of global economic development, investment aspects of development countries, functioning of consumer market in the international economic system, trends of international population migration, processes of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7. Artificial Intelligence in Intelligence Agencies, Defense and National Security.Nicolae Sfetcu - 2024 - Bucharest, Romania: MultiMedia Publishing.
    This book explores the use of artificial intelligence by intelligence services around the world and its critical role in intelligence analysis, defense, and national security. Intelligence services play a crucial role in national security, and the adoption of artificial intelligence technologies has had a significant impact on their operations. It also examines the various applications of artificial intelligence in intelligence services, the implications, challenges and ethical considerations associated with its use. The book emphasizes the need for (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Nollywood in Diversity: New Dimensions for Behaviour Change and National Security in Nigeria.Stanislaus Iyorza - 2017 - International Journal of Communication 21.
    This paper sets out to demystify the nature of Nollywood movies existing in diversity and to propose new dimensions for using film to achieve behaviour change and a dependable national security in Nigeria. The paper views national security as the art of ensuring national safety of the government. Nollywood has naturally diversified along ethnic dimensions including the Hausa movies (Kannywood) in the North, the Yoruba movies in the West and the Ibo movies in the Eastern (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  9. Ethical Concerns in Computational Linguistic Field National Defense: A Philosophical Investigation of Language and Security.Mhd Halkis Malkis4 - 2024 - Linguistic and Philosophical Investigations 23 (1):386–396.
    This research examines ethical issues in computational linguistics that can be applied to national defense by analyzing philosophical and security language. The increasing use of language contexts, such as intelligence and communication data analysis, raises ethical and philosophical challenges related to privacy, control, and accuracy. This research aims to identify and analyze ethical issues, especially in the use of computational linguistics in defense applications, as well as their implications for the protection of individual rights and privacy. This method (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10. Education System Transformation of the Indonesia Defense University in supporting scientific literacy.Halkis Mhd - 2021 - Library Philosophy and Practice (E-Journal) 1 (1):1-14.
    Abstract -/- Aim: The present study aims of this study is to evaluate the Defense University's education policy by examining how the use of libraries in supporting scientific literacy. -/- Methodology: This research method is qualitative by using phenomenology approach. It means that in understanding something has an objective and subjective side, unlike the positivism of separating between the two (subject-object), for science to be objective. -/- Result: Apparently there is a process of transformation of values and symbolism of the (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11. Management of socio-economic transformations of business processes: current realities, global challenges, forecast scenarios and development prospects.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Sofia: Professor Marin Drinov Publishing House of Bulgarian Academy of Sciences.
    The authors of the scientific monograph have come to the conclusion that мanagement of socio-economic transformations of business processes requires the use of mechanisms to support of entrepreneurship, sectors of the national economy, the financial system, and critical infrastructure. Basic research focuses on assessment the state of social service provision, analysing economic security, implementing innovation and introducing digital technologies. The research results have been implemented in the different models of costing, credit risk and capital management, tax control, use (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. The Role of Information Technology in Enhancing National Security in Nigeria (2001 -2020).E. Offiong Ekwutosi, Eke Nta Effiong & Etim Bassey Inyang - 2021 - Pinisi Journal of Art, Humanity and Social Studies 1 (1):44-53.
    The security problems of Nigeria have continued to stare at her very ominously and intermittently harass her, both within and outside her shores. These have lingered on and have created a clog on the wheel of the country's progress, indeed dramatically stagnating, and to say the least, truncating the mainstay of the country's survival. Several interpretations, theories, analyses, syntheses, and jingoistic conceptualization have been propagated, all producing the same result. From scientific to technological approach, religious to ritualist approach, political (...)
    Download  
     
    Export citation  
     
    Bookmark  
  13. Considering the Human Implications of New and Emerging Technologies in the Area of Human Security.Emilio Mordini - 2014 - Science and Engineering Ethics 20 (3):617-638.
    This special issue of Science and Engineering Ethics is devoted to the ethical, societal and political implications of new and emerging technologies in the area of Human Security. Its aim is to address the wider implications of an altered security landscape. Specifically, and in accordance with SEE’s main area of interest, contributions to this special issue focus on those ethical considerations warranted by scientific and technological advances in the field of human security. This includes, but is not (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. Impact of Applying Fraud Detection and Prevention Instruments in Reducing Occupational Fraud: Case study: Ministry of Health (MOH) in Gaza Strip.Faris M. Abu Mouamer, Youssef M. Abu Amuna, Mohammed K. H. A. L. I. Khalil & Abedallh Aqel - 2020 - International Journal of Academic Accounting, Finance and Management Research (IJAAFMR) 4 (6):35-45.
    The study aimed to identify the effect of applying detection and prevention tools for career fraud in combating and preventing fraud and reducing its risks through an applied study on Palestinian Ministry of Health in Gaza Strip, Palestine. To achieve the objectives of the study, the researchers used the questionnaire as a main tool to collect data, and the descriptive and analytical approach to conducting the study. The study population consisted of (501) supervisory employees working at MOH in Gaza (...)
    Download  
     
    Export citation  
     
    Bookmark  
  15. State Management Mechanisms for the Exchange of Information Regarding Cyberattacks, Cyber Incidents and Information Security Incidents.Myroslav Kryshtanovych, Igor Britchenko, Peter Lošonczi, Tetiana Baranovska & Ulyana Lukashevska - 2022 - IJCSNS International Journal of Computer Science and Network Security 22 (4):33-38.
    The main purpose of the study is to determine the key aspects of the mechanisms of state management of the exchange of information about cyberattacks, cyber incidents, and information security incidents. The methodology includes a set of theoretical methods. Modern government, on the one hand, must take into account the emergence of such a new weapon as cyber, which can break various information systems, can be used in hybrid wars, influence political events, pose a threat to the national (...)
    Download  
     
    Export citation  
     
    Bookmark  
  16. Arrow’s impossibility theorem and the national security state.S. M. Amadae - 2005 - Studies in History and Philosophy of Science Part A 36 (4):734-743.
    This paper critically engages Philip Mirowki's essay, "The scientific dimensions of social knowledge and their distant echoes in 20th-century American philosophy of science." It argues that although the cold war context of anti-democratic elitism best suited for making decisions about engaging in nuclear war may seem to be politically and ideologically motivated, in fact we need to carefully consider the arguments underlying the new rational choice based political philosophies of the post-WWII era typified by Arrow's impossibility theorem. A distrust of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  17. Misuse made plain: Evaluating concerns about neuroscience in national security.Kelly Lowenberg, Brenda M. Simon, Amy Burns, Libby Greismann, Jennifer M. Halbleib, Govind Persad, David L. M. Preston, Harker Rhodes & Emily R. Murphy - 2010 - American Journal of Bioethics Neuroscience 1 (2):15-17.
    In this open peer commentary, we categorize the possible “neuroscience in national security” definitions of misuse of science and identify which, if any, are uniquely presented by advances in neuroscience. To define misuse, we first define what we would consider appropriate use: the application of reasonably safe and effective technology, based on valid and reliable scientific research, to serve a legitimate end. This definition presents distinct opportunities for assessing misuse: misuse is the application of invalid or unreliable science, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  18. Anthropology of Security and Security in Anthropology: Cases of Counterterrorism in the United States.Meg Stalcup & Limor Samimian-Darash - 2017 - Anthropological Theory 1 (17):60-87.
    In our study of U.S. counterterrorism programs, we found that anthropology needs a mode of analysis that considers security as a form distinct from insecurity, in order to capture the very heterogeneity of security objects, logics and forms of action. This article first presents a genealogy for the anthropology of security, and identifies four main approaches: violence and State terror; military, militarization, and militarism; para-state securitization; and what we submit as “security analytics.” Security analytics moves (...)
    Download  
     
    Export citation  
     
    Bookmark  
  19. Translating the Idiom of Oppression: A Genealogical Deconstruction of FIlipinization and the 19th Century Construction of the Modern Philippine Nation.Michael Roland Hernandez - 2019 - Dissertation, Ateneo de Manila University
    This doctoral thesis examines the phenomenon of Filipinization, specifically understood as the ideological construction of a “Filipino identity” or ‘Filipino subject-consciousness” within the highly determinate context provided by the Filipino ilustrado nationalists such as José Rizal, Marcelo H. del Pilar and their fellow propagandists inasmuch as it leads to the nineteenth (19th) century construction of the modern Philippine nation. Utilizing Jacques Derrida’s deconstructive thinking, this study undertakes a genealogical critique engaged on the concrete historical examination of what is meant by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  20. Human Security Law in Iraq: Reforming Rules, Practices, and Urban Spaces.Hannibal Travis - manuscript
    This article addresses a few moments in the evolution of human security law in Iraq, focusing in particular on the Coalition Provisional Authority, the new Iraqi Constitution, Iraqi High Tribunal (successor to the Iraqi Special Tribunal), and the International Criminal Court. It synthesizes the results of some existing research on ongoing impunity for certain crimes against political candidates, journalists, anti-corruption activists, and ethnic and religious minorities, a situation which may have tainted Iraq’s transition to a more democratic republic, while (...)
    Download  
     
    Export citation  
     
    Bookmark  
  21. Automated Influence and the Challenge of Cognitive Security.Sarah Rajtmajer & Daniel Susser - forthcoming - HoTSoS: ACM Symposium on Hot Topics in the Science of Security.
    Advances in AI are powering increasingly precise and widespread computational propaganda, posing serious threats to national security. The military and intelligence communities are starting to discuss ways to engage in this space, but the path forward is still unclear. These developments raise pressing ethical questions, about which existing ethics frameworks are silent. Understanding these challenges through the lens of “cognitive security,” we argue, offers a promising approach.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Security and the shaping of identity for nuclear specialists.Sean F. Johnston - 2011 - History and Technology 27 (2):123-153.
    Atomic energy developed from 1940 as a subject shrouded in secrecy. Identified successively as a crucial element in military strategy, national status and export aspirations, the research and development of atomic piles (nuclear chain-reactors) were nurtured at isolated installations. Like monastic orders, new national laboratories managed their specialist workers in occupational environments that were simultaneously cosseted and constrained, defining regional variants of a new state-managed discipline: reactor technology. This paper discusses the significance of security in defining the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. TRANSPORT SECURITY AS A FACTOR OF TRANSPORT AND COMMUNICATION SYSTEM OF UKRAINE SELF-SUSTAINING DEVELOPMENT.Igor Britchenko & Tetiana Cherniavska - 2017 - Науковий Вісник Полісся 1 (9):16-24.
    In the present article, attention is focused on the existing potential to ensure national self-sufficiency, the main challenges to its achievement and future prospects. According to the authors, transportation and communication system of the country can become the dominant model for self-sufficient development, due to its geostrategic location which allows it to be an advantageous bridge for goods, and passengers transit transportation between the states of Europe, Asia and the Middle East. To date, the transport and communication system is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. I, Spy Robot: The Ethics of Robots in National Intelligence Activities.Patrick Lin & Shannon Brandt Ford - 2016 - In Jai Galliott & Warren Reed (eds.), Ethics and the Future of Spying: Technology, National Security and Intelligence Collection. Routledge. pp. 145-157.
    In this chapter, we examine the key moral issues for the intelligence community with regard to the use of robots for intelligence collection. First, we survey the diverse range of spy robots that currently exist or are emerging, and examine their value for national security. This includes describing a number of plausible scenarios in which they have been (or could be) used, including: surveillance, attack, sentry, information collection, delivery, extraction, detention, interrogation and as Trojan horses. Second, we examine (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  25. The UN Security Council, normative legitimacy and the challenge of specificity.Antoinette Scherz & Alain Zysset - 2020 - Critical Review of International Social and Political Philosophy:371-391.
    This paper discusses how the general and abstract concept of legitimacy applies to international institutions, using the United Nations Security Council as an example. We argue that the evaluation of the Security Council’s legitimacy requires considering three significant and interrelated aspects: its purpose, competences, and procedural standards. We consider two possible interpretations of the Security Council’s purpose: on the one hand, maintaining peace and security, and, on the other, ensuring broader respect for human rights. Both of (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  26. Rodin on Self-Defense and the "Myth" of National Self-Defense: A Refutation.Uwe Steinhoff - 2013 - Philosophia 41 (4):1017-1036.
    David Rodin denies that defensive wars against unjust aggression can be justified if the unjust aggression limits itself, for example, to the annexation of territory, the robbery of resources or the restriction of political freedom, but would endanger the lives, bodily integrity or freedom from slavery of the citizens only if the unjustly attacked state actually resisted the aggression. I will argue that Rodin's position is not correct. First, Rodin's comments on the necessity condition and its relation to an alleged (...)
    Download  
     
    Export citation  
     
    Bookmark   7 citations  
  27. United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century.Vladimir Rogozhin - 2018 - Academia.
    The conceptual model of United Nations reform - "UN 3.0" includes the General Program of Action on UN Reform, consisting of two stages. The first stage for 2020-2025 envisages the transformation of the main organs of the UN - the General Assembly and the Security Council with measures to improve the effectiveness of the management system, address the "veto problem", problem of financing, improve staff work and administrative and financial control, strengthen UN media, improvement of work with the global (...)
    Download  
     
    Export citation  
     
    Bookmark  
  28. Analysis of Institutional Capacity of National Social Protection Policy Framework.Narith Por - 2018 - World Journal of Research and Review 6 (4):66-71.
    Cambodians are still vulnerable. To reverse those conditions, National Social Protection Strategy (N.S.P.S) was developed for the poor and vulnerable people to promote their livelihoods. Royal Government of Cambodia (R.G.C) has paid attention to social assistance. In strategic plans, highlights on strengthening, and collectively developing social security, consistent and effective. With these issues, the government establishes a national social protection policy framework to help all people in particular poor and vulnerable people (M.o.E.F, 2017, p.1). The research aims (...)
    Download  
     
    Export citation  
     
    Bookmark  
  29. Casteism, Social Security and Violation of Human Rights.Desh Raj Sirswal - 2012 - In Manoj Kumar (ed.), Human Rights for All. CPPIS Pehowa. pp. 128-131.
    The consciousness of social security comes to a man when he feels that he is getting his basic rights. Human Rights are related to those rights which are related to man’s life, freedom, equality and self-esteem, are established by Indian constitution or universal declaration of human rights and implemented by Indian judiciary system. In other words, “Human rights are rights inherent to all human beings, whatever our nationality, place of residence, sex, national or ethnic origin, color, religion, language, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  30. The “same bed, different dreams” of Vietnam and China: how (mis)trust could make or break it.Hong-Kong T. Nguyen, Quan-Hoang Vuong, Manh-Tung Ho & Thu- Trang Vuong - manuscript
    The relationship between Vietnam and China could be captured in the Chinese expression of “同床异梦”, which means lying on the same bed but having different dreams. The two countries share certain cultural and political similarities but also diverge vastly in their national interests. This paper adds to the extant literature on this topic by analyzing the element of trust/mistrust in their interactions in trade-investment, tourism, and defense-security. The analysis shows how the relationship is increasingly interdependent but is equally (...)
    Download  
     
    Export citation  
     
    Bookmark  
  31. Igwebuike Philosophy and the Issue of National Development.Kanu Ikechukwu Anthony & Ikechukwu Anthony Kanu - 2017 - Igwebuike: An African Journal of Arts and Humanities 6 (3):16-50.
    Right from traditional African philosophy, down to its modern and contemporary era, there has been a strong link between African philos ophy and language, underlined by the principle of complementarity. This is not disconnec ted with Placid Tempels’ employment of force to explain being, and Alexis Kagame’s NTU, as the underlying principle of reality. Pantaleon Iroegbu explained being as belon gingness. In the thoughts of Innocent Asouzu, Ibuanyidanda, was used to explain the compl ementary nature of reality. In the face (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  32. Preventive Wars, Just War Principles, and the United Nations.John W. Lango - 2005 - The Journal of Ethics 9 (1-2):247-268.
    This paper explores the question of whether the United Nations should engage in preventive military actions. Correlatively, it asks whether UN preventive military actions could satisfy just war principles. Rather than from the standpoint of the individual nation state, the ethics of preventive war is discussed from the standpoint of the UN. For the sake of brevity, only the legitimate authority, just cause, last resort, and proportionality principles are considered. Since there has been disagreement about the specific content of these (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  33. Balancing Food Security & Ecological Resilience in the Age of the Anthropocene.Samantha Noll - 2018 - In Erinn C. Gilson & Sarah Kenehan (eds.), Food, Environment, and Climate Change: Justice at the Intersections. Rowman & Littlefield International.
    Climate change increasingly impacts the resilience of ecosystems and agricultural production. On the one hand, changing weather patterns negatively affect crop yields and thus global food security. Indeed, we live in an age where more than one billion people are going hungry, and this number is expected to rise as climate-induced change continues to displace communities and thus separate them from their means of food production (Internal Displacement Monitoring Centre 2015). In this context, if one accepts a humancentric ethic, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  34. Management of data in higher education and the quality of academic research of university lecturers : A case study in South-South Nigeria.Francisca Nonyelum Odigwe & Valentine Joseph Owan - 2020 - International Journal of Innovative Business Strategies (IJIBS) 6 (1):378-387.
    The existing body of knowledge has witnessed gaps arising from the paucity of research literature on the quality of educational research output in higher education. This study shows how the management of data in higher education affects the quality of academic research conducted by university lecturers in South-South Nigeria. The study adopted a factorial research design. The population of this study includes all the Faculty of Education academic staff in both public and private universities situated in South-South Nigeria. Using results (...)
    Download  
     
    Export citation  
     
    Bookmark  
  35. Vietnam’s Security Challenges: Priorities, Policy Implications and Prospects for Regional Cooperation.Tran Truong Thuy & Nguyen Minh Ngoc - 2013 - In Tran Truong Thuy & Nguyen Minh Ngoc (eds.), The Fourth International Workshop on Asia-Pacific Security, Tokyo, Japan. Tokyo, Japan: NIDS Ministry of Defense, Japan. pp. 93-112.
    The historic end of the Cold War and the rising tide of globalization have significantly changed the nature of threats and security discourses in Asia. There is a notable shift of attention from military power as the core determinant of national security to several non-traditional sectors with a much enhanced role of economic, political, and societal forces. Non-traditional security issues—such as climate change, natural disasters, transnational crimes, and terrorism—require both policymakers and military strategists to deal with (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. Current issues of security management during martial law.Maksym Bezpartochnyi, Igor Britchenko, Olesia Bezpartochna, Kostyantyn Afanasyev, Mariia Bahorka, Oksana Bezsmertna, Olena Borschevska, Liliana Chyshynska-Hlybovych, Anna Dybała, Darya Gurova, Iryna Hanechko, Petro Havrylko, Olha Hromova, Tetiana Hushtan, Iryna Kadyrus, Yuri Kindzerski, Svіtlana Kirian, Anatoliy Kolodiychuk, Oleksandr Kovalenko, Andrii Krupskyi, Serhii Leontovych, Olena Lytvyn, Denys Mykhailyk, Oleh Nyzhnyk, Hanna Oleksyuk, Nataliia Petryshyn, Olha Podra, Nazariy Popadynets, Halyna Pushak, Yaroslav Pushak, Oksana Radchenko, Olha Ryndzak, Nataliia Semenyshena, Vitalii Sharko, Vladimir Shedyakov, Olena Stanislavyk, Dmytro Strikhovskyi, Oksana Trubei, Nataliia Trushkina, Sergiy Tsviliy, Leonid Tulush, Liudmyla Vahanova, Nataliy Yurchenko, Andrij Zaverbnyj & Svitlana Zhuravlova (eds.) - 2022 - Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the book have come to the conclusion that toensuring the country’s security in the conditions of military aggression, it is necessary to use the mechanisms of protection of territories and population, support of economic entities, international legal levers of influence on the aggressor country. Basic research focuses on assessment the resource potential of enterprises during martial law, the analysis of migration flows in the middle of the country and abroad, the volume of food exports, marketing and (...)
    Download  
     
    Export citation  
     
    Bookmark  
  37. Food security: modern challenges and mechanisms to ensure.Maksym Bezpartochnyi, Igor Britchenko & Olesia Bezpartochna - 2023 - Košice: Vysoká škola bezpečnostného manažérstva v Košiciach.
    The authors of the scientific monograph have come to the conclusion that ensuring food security during martial law requires the use of mechanisms to support agricultural exports, diversify logistics routes, ensure environmental safety, provide financial and marketing support. Basic research focuses on assessment the state of agricultural producers, analysing the financial and accounting system, logistics activities, ensuring competitiveness, and environmental pollution. The research results have been implemented in the different decision-making models during martial law, international logistics management, digital audit, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  38. Internal Instability as a Security Challenge for Vietnam.Nguyen Hoang Tien, Nguyen Van Tien, Rewel Jimenez Santural Jose, Nguyen Minh Duc & Nguyen Minh Ngoc - 2020 - Journal of Southwest Jiaotong University 55 (4):1-13.
    National security is one of the most critical elements for Vietnam society, economy and political system, their stability, sustainability and prosperity. It is unconditionally the top priority for Vietnamese government, State, Communist Party and military forces. In the contemporary world with advanced technology and rapid globalization process taking place, beside many extant economic, social and political benefits there are many appearing challenges and threats that could endanger and destabilize the current socio-economic and political system of any country, including (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Abundance of words versus Poverty of mind: The hidden human costs of LLMs.Quan-Hoang Vuong & Manh-Tung Ho - manuscript
    This essay analyzes the rise of Large Language Models (LLMs) such as GPT-4 or Gemini, which are now incorporated in a wide range of products and services in everyday life. Importantly, it considers some of their hidden human costs. First, is the question of who is left behind by the further infusion of LLMs in society. Second, is the issue of social inequalities between lingua franca and those which are not. Third, LLMs will help disseminate scientific concepts, but their meanings' (...)
    Download  
     
    Export citation  
     
    Bookmark  
  40. UN75 ↔ Towards Security Council Reform ↔ Metaphysical, Ontological, and Existential Statuses of the Veto Right (1).Vladimir Rogozhin - manuscript
    Development of ideas on UN reform presented in the essay "United Humanity: from "UN 2.0" to "UN 3.0" The conceptual model of the United Nations for the XXI century" (2017).
    Download  
     
    Export citation  
     
    Bookmark  
  41. Comparative views on research productivity differences between major social science fields in Vietnam: Structured data and Bayesian analysis, 2008-2018.Quan-Hoang Vuong, La Viet Phuong, Vuong Thu Trang, Ho Manh Tung, Nguyen Minh Hoang & Manh-Toan Ho - manuscript
    Since Circular 34 from the Ministry of Science and Technology of Vietnam required the head of the national project to have project results published in ISI/Scopus journals in 2014, the field of economics has been dominating the number of nationally-funded projects in social sciences and humanities. However, there has been no scientometric study that focuses on the difference in productivity among fields in Vietnam. Thus, harnessing the power of the SSHPA database, a comprehensive dataset of 1,564 Vietnamese authors (...)
    Download  
     
    Export citation  
     
    Bookmark  
  42.  89
    OLD AGE POVERTY AND ACTIVE AGEING IN ASEAN: Trends and Opportunities.The Association of Southeast Asian Nations - 2023
    In support to the development and implementation of the Regional Plan of Action to implement the Kuala Lumpur Declaration on Ageing: Empowering Older Persons in ASEAN (2015), the ASEAN Secretariat under the guidance of the Senior Officials Meeting on Social Welfare and Development (SOMSWD) commissioned a study to identify the trends and opportunities on poverty and active ageing in ASEAN, as endorsed during the 14th Senior Officials Meeting on Social Welfare and Development (SOMSWD) held in September 2018, Singapore. The focus (...)
    Download  
     
    Export citation  
     
    Bookmark  
  43. Evaluation of healthcare usage rate in HIV/AIDS patients in Isfahan, Iran in 2018.Neda Moein, Reza Khadivi, Zahra Amini & Marjan Meshkati - 2020 - HIV and AIDS Review 19 (1):34-38.
    Introduction: Universal health coverage (UHC) was introduced in Iran in 2014. The aim of this study was to evaluate the usage rate of health services by human immunodeficiency virus (HIV)/acquired immunodeficiency syndrome (AIDS) patients after UHC implementation. Material and methods: In 2018, in a cross-sectional study, we evaluated the outpatients’ needs (within its previous month) and inpatients’ needs (within its previous 6 months) of HIV/AIDS patients in Isfahan province (the center of Iran). Concurrently, we estimated the essential health care services (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. The Requirements of Computerized Management Information Systems and Their Role in Improving the Quality of Administrative Decisions in the Palestinian Ministry of Education and Higher Education.Mazen J. Al Shobaki & Samy S. Abu-Naser - 2017 - International Journal of Information Technology and Electrical Engineering 6 (6):7-35.
    The purpose of this study is to identify the requirements of computerized Management Information Systems and their role in improving the quality of administrative decisions in the Palestinian Ministry of Education and Higher Education. The authors used the descriptive analytical method and the questionnaire method to collect the data. (247) questionnaires were distributed on the study sample and (175) questionnaires were collected back with a recovery rate of (70.8). The study showed a number of results, the most important of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45. An Analytical Study of the Reality of Electronic Documents and Electronic Archiving in the Management of Electronic Documents in the Palestinian Pension Agency (PPA).Mohammed Khair I. Kassab, Samy S. Abu Naser & Mazen J. Al Shobaki - 2017 - European Academic Research 4 (12):10052-10102.
    The study aims to identify the reality of management of electronic documents and electronic archiving retirement in the Palestinian Pension Agency -analytical study, as well as to recognize the reality of the current document management system in the Palestinian Pension Agency. The study found the following results: that the reality of the current system for the management of documents in the agency is weak and suffers from many jams. Employee in the agency understand the importance and benefits of the management (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  46. Bulk Collection, Intrusion and Domination.Tom Sorell - 2018 - In Andrew I. Cohen (ed.), Philosophy and Public Policy. New York, USA: Rowman & Littlefield International. pp. 39-61.
    Bulk collection involves the mining of large data sets containing personal data, often for a security purpose. In 2013, Edward Snowden exposed large scale bulk collection on the part of the US National Security Agency as part of a secret counter-terrorism effort. This effort has mainly been criticised for its invasion of privacy. I argue that the right moral argument against it is not so much to do with intrusion, as ineffectiveness for its official purpose and the (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  47. (1 other version)Data management practices and educational research effectiveness of university lecturers in South-South Nigeria.Valentine Joseph Owan & Francisca N. Odigwe - 2019 - In Charles A. Shoniregun (ed.), Proceedings of the London International Conference on Education (LICE-2019). pp. 86-94.
    The dishonest practices in the conduct of educational research in South-South region particularly, and Nigeria generally, has called for urgent intervention. This study assessed data management practices and educational research effectiveness of University Lecturers in South-South Nigeria. A sample of 602 lecturers that were accessible during data collection responded to two questionnaires (Data Management Practices Questionnaire – DMPQ and "Educational Research Effectiveness Questionnaire – EREQ). Multiple regression was employed in the analysis of data. Findings revealed amongst others that; data storage, (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  48. The Level of Leadership Characteristics among Palestinian Police Employees In Light Of the Corona Pandemic.Yaser A. Al Shorafa, Muhammad K. Hamdan, Mazen J. Al Shobaki, Samy S. Abu-Naser & Suliman A. El Talla - 2021 - International Journal of Academic Accounting, Finance and Management Research(IJAAFMR) 5 (3):44-53.
    Abstract: The study aimed to identify the level of leadership characteristics among Palestinian police employees in Gaza Strip in light of the Corona pandemic, and to achieve the objectives of the study, the researchers used the descriptive approach in its analytical method, using a questionnaire applied to the police officers at the Central Governorate Police Station, whose number is (113) individuals, they were Selected using stratified randomly method, and the study resulted in a set of results, the most important of (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49. The Sniper and the Psychopath: A Parable in Defense of the Weapons Industry.Duncan MacIntosh - 2023 - In Daniel Schoeni, Tobias Vestner & Kevin Govern (eds.), Ethical Dilemmas in the Global Defense Industry. Oxford University Press. pp. 47-78.
    This chapter discusses the fundamental question of the defense industry’s role and legitimacy for societies. It begins with a parable of a psychopath doing something self-serving that has beneficial moral consequences. Analogously, it is argued, the defense industry profiting by selling weapons that can kill people makes it useful in solving moral problems not solvable by people with ordinary moral scruples. Next, the chapter argues that while the defense industry is a business, it is also implicated in the security (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Liberty, Authority, and Trust in Burke's Idea of Empire.Richard Bourke - 2000 - Journal of the History of Ideas 61 (3):453-471.
    In lieu of an abstract, here is a brief excerpt of the content:Journal of the History of Ideas 61.3 (2000) 453-471 [Access article in PDF] Liberty, Authority, and Trust in Burke's Idea of Empire Richard Bourke When Edmund Burke first embarked upon a parliamentary career, British political life was in the process of adapting to a series of critical reorientations in both the dynamics of party affiliation and the direction of imperial policy. During the period of the Seven Years' War, (...)
    Download  
     
    Export citation  
     
    Bookmark   5 citations  
1 — 50 / 978