Mozambique’s security challenges: Routinised response or broader approach?

2021 ◽  
pp. 1-16
Author(s):  
Albert K. Domson-Lindsay
Keyword(s):  
2018 ◽  
Vol 42 ◽  
pp. 316-321
Author(s):  
Boris I. Ananyev ◽  
Daniil A. Parenkov

The aim of the article is to show the role of parliament in the foreign policy within the framework of the conservative school of thought. The authors examine both Russian and Western traditions of conservatism and come to the conclusion that the essential idea of “the rule of the best” has turned to be one of the basic elements of the modern legislative body per se. What’s more, parliament, according to the conservative approach, tends to be the institution that represents the real spirit of the nation and national interests. Therefore the interaction of parliaments on the international arena appears to be the form of the organic communication between nations. Parliamentary diplomacy today is the tool that has the potential to address to the number of issues that are difficult to deal with within the framework of the traditional forms of IR: international security, challenges posed by new technologies, international sanctions and other.


2012 ◽  
Vol 3 (2) ◽  
pp. 419-423
Author(s):  
JARUPULA RAJESHWAR ◽  
Dr G NARSIMHA

A freely moving nodes forming as group to communicate among themselves are called as Mobile AdHoc Networks (MANET). Many applications are choosing this MANET for effective commutation due to its flexible nature in forming a network. But due to its openness characteristics it is posing many security challenges. As it has highly dynamic network topology security for routing is playing a major role. We have very good routing protocols for route discovery as well as for transporting data packers but most of them lack the feature of security like AODV. In this paper we are studying the basic protocol AODV and identify how it can be made secure. We are studying a protocol S-AODV which is a security extension of AODV which is called Secure AODV (S-AODV) and we are studying enhanced version of S-AODV routing protocol a Adaptive Secure AODV (A-SAODV). Finally we have described about the parameter to be taken for performance evaluation of different secure routing protocols


2018 ◽  
Vol 6 (7) ◽  
pp. 981-985
Author(s):  
Dinesh Singh ◽  
Dayanand . ◽  
Arushi Arya
Keyword(s):  
Big Data ◽  

2018 ◽  
Vol 6 (5) ◽  
pp. 906-915
Author(s):  
Swati Agarwal ◽  
◽  
◽  
◽  
Rupinder Kaur ◽  
...  

2018 ◽  
Vol 28 (6) ◽  
pp. 1855-1864
Author(s):  
Olga Zoric ◽  
Katarina Jonev ◽  
Ivan Rancic

The author starts from the informational dimension of the operational environment in a strategic reality and deal with the problem of defining informational power from the theoretical and practical aspect of information warfare.The deliberations in the work are aimed to initiate a procedure for auditing of the security documents in order to create a legal basis for the operationalization of the content of information security, as one of the aspects of integral security of the Republic of Serbia. The paper deals with the conceptual determinations and importance of information, information warfare and information operations, as well as the content of information warfare, pointing out the strategic and doctrinal definitions of the information warfare of the United States of America, the Russian Federation and the Republic of Serbia. It is necessary to accurately and objectively observe world achievements in the field of national security and the relation of the most powerful world powers to the problem of information warfare. Based on a comparative analysis of world trends and the state of the theoretical and practical aspects of information security of the Republic of Serbia, the focus is on work, where measures are proposed to improve the security function in the fourth unit of work.


2020 ◽  
Vol 20 (1-2) ◽  
pp. 25-33
Author(s):  
Gordan Akrap

New security challenges are looking for new security paradigms in order that state and societies can successfully face with them on preventive level. Due to the rapid influence of hybrid threats to almost all areas of our lives today, we must change our attitude toward those problems and introduce and transform existing intelligence and security studies as a separate science in order to prepare our societies for security challenges that are already here.


Sign in / Sign up

Export Citation Format

Share Document