297 results found (page 2 of 20)
https://www.academia.edu/45650165/Authoritarian_resilience_through_securitization_an_Islam…

…-opted party. The article also contributes to the securitization theory debates about the role of securitizing actors and their audiences, as well as the “right” of functional actors in securitizing an issue, despite their initial non- decisive authority. ARTICLE HISTORY Received…

https://www.academia.edu/114613570/Canada_and_the_Camp_David_Principles_Assessing_Bilatera…

… while the latter is designed to in- tunity. Now the priority was to strategize about crementally refine and reiterate a theme that Can- adian diplomacy has enthused over since the late 2 The recent revelation of Michael Kovrig’s involvement with Global 1980’s to muted and scepti…

https://www.academia.edu/126727616/Climate_change_and_marketing_a_bibliometric_analysis_of…

…g honest and transparent messages through advertising by providing information about the positive impact of advertising on brand trust. When customers see ads, they gain a sense of trust and extend brand expectations (Fernandes et al. 2020). Most scholars agree on the Environment…

https://www.academia.edu/45303814/Authoritarian_resilience_through_securitization_an_Islam…

…-opted party. The article also contributes to the securitization theory debates about the role of securitizing actors and their audiences, as well as the “right” of functional actors in securitizing an issue, despite their initial non- decisive authority. ARTICLE HISTORY Received…

https://www.academia.edu/89690141/Multi_platform_Process_Flow_Models_and_Algorithms_for_Ex…

…ondents had a positive view extraction process for mobile devices. On the other about the model’s ease of use. In the same way 8.5% hand, only 13.4% of the participants disagreed on of the participants confirmed independence among the applicability of this model in digital forens…

https://www.academia.edu/610550/Audited_credential_delegation_a_usable_security_solution_f…

…CD provides weaken the security of the environment, such as the shar- assurance about the confidentiality and integrity of ing of the private key of a single personal certificate, to patient data because only authorized scientists and get on with their tasks. clinicians are able to…

http://www.newsecuritybeat.org/2012/03/food-security-in-a-climate-altered-future-part-one

…ity More Than a Supply Problem March 20, 2012 By Kathleen Mogelgaard Small talk about the weather with my Malawian taxi driver became serious very quickly. “We no longer know when the rains are coming,” he said as we bumped along the road toward the Lilongwe airport last November…