Search Results

1 - 10 of 4,949 items :

Clear All

References Andreasen, S., Lunn, S., Williams, I. (2016). Post-Warsaw analysis: what NATO said (or didn’t say) about nuclear weapons. NTI Analysis. Andžāns, M., Veebel, V. (2017). Deterrence dilemma in Latvia and Estonia: finding the balance between external military solidarity and territorial. Defence, Journal on Baltic Security, 3 (2), 29–42. Antczak, A:, Śliwa, Z. (2018). Security dilemmas of the Baltic region. http

References Archer, C., Bailes, A. J. K., Wivel, A., 2014. Small States and International Security: Europe and Beyond. Abingdon: Routledge. Archer, C., 2014. The Nordic States and Security. In: Bailes, A.J.,Wivel, A., Clive, A. ed. Small States and International Security: Europe and Beyond. Routledge, pp. 95-112. Bailes, A. J. K., Thayer, B. A., Thorhallsson, B., 2016. Alliance theory and alliance ‘Shelter’: the complexities of small state alliance behavior. Third World Thematics: A TWQ Journal, Vol1, p.9-26. Bailes, A. J. K., Rickli, J. M., Thorhallsson, B

-futuro-dellafrica-tra-leuropa-che-guarda-la-cina-che-investe-e-gli-stati-uniti-che (January 7, 2018) Cirpac (2016). Africa Report.draft. Pisa: Cirpac. Engel, U., Gomes Porto (eds) (2010). Africa’s New Peace and Security Architecture: Promoting Norms, Institutionalizing Solution. Journal of Conflict & Security Law. Oxford: Oxford University Press. Ercolesi, M.C. (2014). L’Africa, tra crisi globali e sfide locali. Atlante Geopolitico. Treccani. Reference to a web source [Online] Available: (June 20, 2018). Federici M.C. (2013). La sicurezza umana

Bibliography Bajc, Vida. 2013. “Sociological reflections on security through surveillance” in Sociological Forum , Vol. 28, No.3, pp. 615–623. Buzan, Barry.1983. People, States and Fear: The National Security Problem in International Relations . Wheatsheaf Books (UK). Buzan, Barry. 1991. “New patterns of Global Security in the Twenty-First Century” in International Affairs , Vol. 67, No.3, pp. 431–451. Buzan, Barry. 2007. People, States and Fear: An Agenda for International Security studies in Post-cold War Era . ECPR Press (UK). Buzan, Barry, Wæver, Ole and

1 Hybrid threats to Euro-Atlantic security before and after COVID-19: a game-changer virus? At the beginning of the 20th century, an Italian philosopher, Antonio Gramsci, wrote the lines that perfectly described the existing state of affairs in his times – ‘old world is dying, and the new world struggles to be born: now is the time of monsters’. Perhaps, this quote applies to the 21st century even more. During the past decade, politicians and experts have repeatedly stated that the security environment is experiencing unprecedented pressure due to the complexity

Bibliography Białorskórski R. (2016) Białoruś–jaka polityka bezpieczeństwa i obrony?, Doctrina Studia Społeczno -Polityczne, nr 13, Bohdan S. (2014) Belarusian Army: Its Capacities and Role in the Region, Bohdan S., Isaev G. (2016) Elements of Neutrality in Belarusian Foreign Policy and National Security Policy, Brążkiewicz D., Śliwa Z., (2010) Organizacja Układu o Bezpieczeństwie Zbiorowym, Kwartalnik Bellona no 3 (662), p. 102-111, Carik Y, Sivickij Y. (2016) Belarus’ v kontekste protivostojanija Rossija–NATO, Ciupiński A., Malak K. (2004) Bezpieczeństwo

(LNG), which gradually changes the energy architecture in the CEE region, helping to restrain the Russian dominant position on the hydrocarbon market. Third, high-level bilateral dialogue between Poland and US has been developed, allowing for expansion of the bilateral agenda to regional and global issues (i.e. Warsaw Process – see Section 5 ). Fourth, Washington and Warsaw have strengthened soft security collaboration with the historic decision of including Poland into the Visa Waiver Program, which has been a primary and sensitive subject for the Polish public for

the study of security communities”, în Emanuel Adler, Barnett, Michael, (eds.), Security Communities ,Cambridge, UK: Cambridge University Press. [4] Walt, Stephen M. (1985), “Alliance Formation and the Balance of World Power”, International Security , 9(4). [5] Navari, Cornelia (2008), “Liberalism”, în Paul D. Williams, (ed.), Security Studies – An introduction , Abingdon: Routledge, pp. 29-43. [6] Lindley-French, Julien (2007), A Chronology of European Security and Defence 1945-2007 ,Oxford: Oxford University Press. [7] Eriksson, Arita (2006), “The Building of

References Aiello, C. (2018, March 30). Under Armour says data breach affected about 150 million MyFitnessPal accounts. Retrieved September 27, 2018, from Abagail, A. (2015, August). Design and Validation of Information Security Culture Framework. Computers in Human Behavior, 49 , pp. 567-575. Basu, E. (2015). Forbes Welcome . . Retrieved 28 December 2016, from

REFERENCES European Network and Information Security Agency (ENISA). (2012). National Cyber Security Strategies Practical Guide on Development and Execution, available at: , accessed on: 29 May 2018. European Network and Information Security Agency (ENISA). (2016). NCSS Good Practice Guide Designing and Implementing National Cyber Security Strategies, available at: https