Query Result Set
Skip Navigation Links
   ActiveUsers:1598Hits:18400188Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
SECURITY APPLICATIONS (3) answer(s).
 
SrlItem
1
ID:   154525


Application of social media in crisis management: advanced sciences and technologies for security applications / Akhgar, Babak (ed.); Staniforth, Andrew (ed.); Waddington, David (ed.) 2017  Book
Akhgar, Babak (ed.) Book
0 Rating(s) & 0 Review(s)
Publication Switzerland, Springer Nature, 2017.
Description xvi, 236p.hbk
Series Transactions on Computational Science and Computational Intelligence
Standard Number 9783319524184
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
059142303.4833/AKH 059142MainOn ShelfGeneral 
2
ID:   132262


Invisible guards / Mekala, Dilip Kumar   Journal Article
Mekala, Dilip Kumar Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract A wide variety of state-of-the-art UGS systems are now available in the market The use of unattended ground sensors (UGS) for border security applications has gained momentum in recent times across the world. For India, where the border guarding forces face significantly large number of challenges manning the open and porous borders, the UGS could provide a perfect solution. It is no surprise that Indian armed forces are now in the process of procuring these advanced sensors. The ministry of home affairs (MHA) had issued an expression of interest (EoI) in 2013 to procure UGS systems for Border Security Force (BSF). This initiative from the MHA came after the reports of a 400 metre long tunnel was found in Jammu and Kashmir close to the international border. "Hand-held control receiver and variety of sensors like, passive infrared sensor to detect movement of object in a narrow field of view, magnetic sensors to monitor movement of metallic objects such as weapons or vehicles and seismic sensors to identify ground vibration caused by vehicles or pedestrians (should be encompassed in the device)," stated the qualitative requirements floated by the Paramilitary.
        Export Export
3
ID:   128233


Security governance in Europe: a return to system / Sperling, James; Webber, Mark   Journal Article
Webber, Mark Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The security governance literature has developed in four waves: the first is dedicated to matters of definition; the second to conceptual debate; the third to matters of application in the European setting and the fourth to how well the concept works in extra-European regions and at the global level. For all this effort, security governance as a concept remains problematic: it still has some way to go before it obtains clear definitional precision, conceptual clarity and a secure standing as concept in Security Studies. We address some of the theoretical and methodological difficulties common to the literature and argue that security governance has become overly preoccupied with agency and has thereby neglected structure. It has, in other words, obtained an actor-centered focus and so tended to conflate security governance as an analytical category with the specific actions of security actors. It has thus moved forward little in its ability to determine how and why security actors behave in the aggregate and whether that behavior reflects wider systemic properties. We thus ask in a third section whether it is worth returning to systemic thinking on security governance especially in the European context where the concept has had its most sophisticated application.
        Export Export