Query Result Set
Skip Navigation Links
   ActiveUsers:1319Hits:19438824Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
DECISION (6) answer(s).
 
SrlItem
1
ID:   165220


Citizen participation in Saudi Arabia: a study of the ministry of labour / Alshaikh, Ala'a Bakur   Journal Article
Alshaikh, Ala'a Bakur Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The effects of Arab Spring led to widespread dissent among Saudi citizens, culminating in governmental fear of civil revolt. Thus, the Ministry of Labour introduced many developmental policies such as localisation, women employment that aimed to develop the country and satisfy the needs of citizens to offset rising inflation. These policies were said to be in the best interests of Saudi citizens. This study has therefore intended to investigate the extent to which the Ministry of Labour engaged and consulted with its citizens prior to the introduction of those policies. This study found that Saudi citizens participated via social dialogues, together, social media and digital communication in democratic governance. However, there is a gap in the perceptions of the Saudi elite and citizens regarding the significance of citizen participation in Saudi governance. It was discussed that complete democratic governance cannot be adopted due to autocratic nature of Saudi Arabia.
        Export Export
2
ID:   130659


Cyberspace in military operations today / Kuznetsov, V.I; Donskov, Yuye; Nikitin, O.G   Journal Article
Kuznetsov, V.I Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract The authors examine the relationship between battlespace, cyberspace, and information environment from the perspective of combat actions conducted by tactical military formations in our day.
        Export Export
3
ID:   157100


Decisions at the data border: : Discretion, discernment and security / Hall, Alexandra   Journal Article
Hall, Alexandra Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity – that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors.
Key Words Security  Decision  Border  Data  Discretion 
        Export Export
4
ID:   029877


Games of strategy: theory and applications 1961  Book
Dresher Melvin Book
0 Rating(s) & 0 Review(s)
Publication New Jersey, Prentice-Hall Inc., 1961.
Description xii, 186p.
Series Prentice-Hall applied mathematic series.
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
008629658.40353/DRE 008629MainWithdrawnGeneral 
5
ID:   025264


Management: modern approach / Starr, Martin K. 1971  Book
Starr, Martin K. Book
0 Rating(s) & 0 Review(s)
Publication New York, Harcourt Brace Jovanovich, Inc., 1971.
Description xxi,716p.Hbk
Standard Number 0155546813
Key Words Management  Decision 
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
007207658/STA 007207MainOn ShelfGeneral 
6
ID:   151188


Securing with algorithms: knowledge, decision, sovereignty / Amoore, Louise ; Raley, Rita   Journal Article
Amoore, Louise Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Amid the deployment of algorithmic techniques for security – from the gathering of intelligence data to the proliferation of smart borders and predictive policing – what are the political and ethical stakes involved in securing with algorithms? Taking seriously the generative and world-making capacities of contemporary algorithms, this special issue draws attention to the embodied actions of algorithms as they extend cognition, agency and responsibility beyond the conventional sites of the human, the state and sovereignty. Though focusing on different modes of algorithmic security, each of the contributions to the special issue shares a concern with what it means to claim security on the terrain of incalculable and uncertain futures. To secure with algorithms is to reorient the embodied relation to uncertainty, so that human and non-human cognitive beings experimentally generate and learn what to bring to the surface of attention for a security action.
Key Words Violence  Security  Technology  Decision  Algorithms 
        Export Export