Srl | Item |
1 |
ID:
165220
|
|
|
Summary/Abstract |
The effects of Arab Spring led to widespread dissent among Saudi citizens, culminating in governmental fear of civil revolt. Thus, the Ministry of Labour introduced many developmental policies such as localisation, women employment that aimed to develop the country and satisfy the needs of citizens to offset rising inflation. These policies were said to be in the best interests of Saudi citizens. This study has therefore intended to investigate the extent to which the Ministry of Labour engaged and consulted with its citizens prior to the introduction of those policies. This study found that Saudi citizens participated via social dialogues, together, social media and digital communication in democratic governance. However, there is a gap in the perceptions of the Saudi elite and citizens regarding the significance of citizen participation in Saudi governance. It was discussed that complete democratic governance cannot be adopted due to autocratic nature of Saudi Arabia.
|
|
|
|
|
|
|
|
|
|
2 |
ID:
130659
|
|
|
Publication |
2014.
|
Summary/Abstract |
The authors examine the relationship between battlespace, cyberspace, and information environment from the perspective of combat actions conducted by tactical military formations in our day.
|
|
|
|
|
|
|
|
|
|
3 |
ID:
157100
|
|
|
Summary/Abstract |
Discussions about the legitimacy of private security companies (PSCs) in multilateral military interventions abound. This article looks at how the United States has sought to legitimize the outsourcing of security services to PSCs through performance-based contracting and performance assessments. Both mechanisms aim to demonstrate the effective provision of publicly desirable outcomes. However, the immaterial and socially constructed nature of security presents major problems for performance assessments in terms of observable and measurable outcomes. Performance has therefore given way to performativity – that is, the repetitive enactment of particular forms of behaviour and capabilities that are simply equated with security as an outcome. The implications of this development for the ways in which security has been conceptualized, implemented and experienced within US interventions have been profound. Ironically, the concern with performance has not encouraged PSCs to pay increased attention to their impacts on security environments and civilian populations, but has fostered a preoccupation with activities and measurable capabilities that can be easily assessed by government auditors.
|
|
|
|
|
|
|
|
|
|
4 |
ID:
029877
|
|
|
Publication |
New Jersey, Prentice-Hall Inc., 1961.
|
Description |
xii, 186p.
|
Series |
Prentice-Hall applied mathematic series.
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
008629 | 658.40353/DRE 008629 | Main | Withdrawn | General | |
|
|
|
|
5 |
ID:
025264
|
|
|
Publication |
New York, Harcourt Brace Jovanovich, Inc., 1971.
|
Description |
xxi,716p.Hbk
|
Standard Number |
0155546813
|
|
|
|
|
|
|
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession# | Call# | Current Location | Status | Policy | Location |
007207 | 658/STA 007207 | Main | On Shelf | General | |
|
|
|
|
6 |
ID:
151188
|
|
|
Summary/Abstract |
Amid the deployment of algorithmic techniques for security – from the gathering of intelligence data to the proliferation of smart borders and predictive policing – what are the political and ethical stakes involved in securing with algorithms? Taking seriously the generative and world-making capacities of contemporary algorithms, this special issue draws attention to the embodied actions of algorithms as they extend cognition, agency and responsibility beyond the conventional sites of the human, the state and sovereignty. Though focusing on different modes of algorithmic security, each of the contributions to the special issue shares a concern with what it means to claim security on the terrain of incalculable and uncertain futures. To secure with algorithms is to reorient the embodied relation to uncertainty, so that human and non-human cognitive beings experimentally generate and learn what to bring to the surface of attention for a security action.
|
|
|
|
|
|
|
|
|
|