Australia's 'New Security' Challenges
This paper is in two parts. The first part undertakes a survey and critique of the theoretical foundations of the new security agenda, using the work of Professor Buzan and his collaborators Ole Waever and Jaap de Wilde as a sounding board in addressing several important and fundamental concerns abo...
| Main Author: | Hubbard, Christopher |
|---|---|
| Format: | Conference Paper |
| Published: |
2004
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/33563 |
Similar Items
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013)
by: Hui, K., et al.
Published: (2013)
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011)
by: Abdullah, Mohd Amin
Published: (2011)
The performance of New Zealand initial public offerings (IPOs): 1995-2000 / Arizza Sapuan
by: Sapuan, Arizza
Published: (2004)
by: Sapuan, Arizza
Published: (2004)
A study on determinants of bond yield in Malaysia / Nurul Jannah Arifin and Nurul Atikah Yaacob
by: Arifin, Nurul Jannah, et al.
Published: (2018)
by: Arifin, Nurul Jannah, et al.
Published: (2018)
Two level security approaches for secure XML database centric web services against xpath injections
by: Asmawi, Aziah
Published: (2016)
by: Asmawi, Aziah
Published: (2016)
An efficient identity-based group signature scheme over elliptic curves
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
The impact of security to Indonesian foreign policy / Adnan Nasution Seniwati
by: Adnan Nasution, Seniwati
Published: (2010)
by: Adnan Nasution, Seniwati
Published: (2010)
Social sukuk: a new mechanism to fund social services / Saadiah Mohamad … [et al.]
by: Mohamad, Saadiah, et al.
Published: (2017)
by: Mohamad, Saadiah, et al.
Published: (2017)
Forecast Errors and the Effect of Underwriter Reputation and Auditor Influence During Listing on IPOs
by: Mahussin, Norlida
Published: (2003)
by: Mahussin, Norlida
Published: (2003)
A systematic mapping on risks and techniques to enhance security in multi-cloud environments
by: Gonzalez Alberto, Ana Y
Published: (2017)
by: Gonzalez Alberto, Ana Y
Published: (2017)
Examining the factors influence bond market performance in Malaysia / Muhammad Syukri Mohd Jefri
by: Mohd Jefri, Muhammad Syukri
Published: (2018)
by: Mohd Jefri, Muhammad Syukri
Published: (2018)
Future directions for behavioral information security research
by: Crossler, R., et al.
Published: (2013)
by: Crossler, R., et al.
Published: (2013)
An attack on undeniable partially blind signatures
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
The Securities Industry in Malaysia: Special Reference to KLSE and the Regulatory Functions of the Securities Commission
by: Yong, Soon Ching
Published: (1997)
by: Yong, Soon Ching
Published: (1997)
The types of bank that influencing the higher fixed deposit return for MD Tampin / Muhammad Hairee Ismail and Sharifah Zainab Qubra Al Attas
by: Ismail, Muhammad Hairee, et al.
Published: (2016)
by: Ismail, Muhammad Hairee, et al.
Published: (2016)
A new encryption algorithm over elliptic curve
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Design of a lightweight virtual honeynet based on linux container virtualization
by: Memari, Nogol
Published: (2014)
by: Memari, Nogol
Published: (2014)
Fake review annotation model and classification through reviewers' writing style
by: Shojaee, Somayeh
Published: (2019)
by: Shojaee, Somayeh
Published: (2019)
Information security policy compliance model for government agency
by: Ramli, Muhamad Amirnazmi
Published: (2018)
by: Ramli, Muhamad Amirnazmi
Published: (2018)
Russia
by: Muraviev, Alexey
Published: (2022)
by: Muraviev, Alexey
Published: (2022)
A study on the implementation of emergency (essential powers) Ordinance No.22 1970 in Anwar Ibrahim's trial / Arif Aizuddin Alwi, Farhana Mohd Amin and Muhamad Abu Hassan Ramli
by: Alwi, Arif Aizuddin, et al.
Published: (2006)
by: Alwi, Arif Aizuddin, et al.
Published: (2006)
Jordan's National Security Under King Hussein
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
by: Abu Shariah, Hamzeh Ismail Ibrahim
Published: (2000)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
Critically Reviewing the Theory and Practice of Secured-by-design for Residential New-build Housing in Britain.
by: Cozens, Paul, et al.
Published: (2007)
by: Cozens, Paul, et al.
Published: (2007)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
by: Mohamed, Amir Mohamed Talib
Published: (2012)
by: Mohamed, Amir Mohamed Talib
Published: (2012)
Survey on economics of information security
by: Aminnezhad, Asou, et al.
Published: (2016)
by: Aminnezhad, Asou, et al.
Published: (2016)
Human security application: the study of media safety in humanitarian missions / Siti Nurbaini Khairi and Noor Nirwandy Mat Noordin
by: Khairi, Siti Nurbaini, et al.
Published: (2014)
by: Khairi, Siti Nurbaini, et al.
Published: (2014)
Platform Property Certificate for Property-Based Attestation Model
by: Borhan, Nazanin
Published: (2011)
by: Borhan, Nazanin
Published: (2011)
Capital control regime and capital structure determinants : a Malaysian case / Mohd Nazam Dzolkarnaini
by: Dzolkarnaini, Mohd Nazam
Published: (2006)
by: Dzolkarnaini, Mohd Nazam
Published: (2006)
A study on the Islamic Bond (SUKUK) and securitization process / Patricia Carolyn Latit
by: Latit, Patricia Carolyn
Published: (2009)
by: Latit, Patricia Carolyn
Published: (2009)
Steganography in webpages using CSS color attributes enhanced by rule-based system
by: Nehzati, Seyedeh Sheida
Published: (2016)
by: Nehzati, Seyedeh Sheida
Published: (2016)
Effects of population on food security, health care and education expenditure in China and India
by: Nordin, Nurhaiza
Published: (2016)
by: Nordin, Nurhaiza
Published: (2016)
An architecture framework for enhanced wireless sensor network security
by: Radmand, Pedram
Published: (2012)
by: Radmand, Pedram
Published: (2012)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Security interests under the UNIDROIT Convention on International Interests in Mobile Equipment 2001
by: Saidova, Sanam
Published: (2012)
by: Saidova, Sanam
Published: (2012)
A study of the factors influencing yield spread of Malaysian Bond / Fatin Nadia Fatihah Ramli
by: Ramli, Fatin Nadia Fatihah
Published: (2011)
by: Ramli, Fatin Nadia Fatihah
Published: (2011)
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
by: Hadi, Ahmed Adnan
Published: (2022)
by: Hadi, Ahmed Adnan
Published: (2022)
US-Pakistan cooperation and Pakistan's security post 9/11
by: Tamana, Aazar
Published: (2010)
by: Tamana, Aazar
Published: (2010)
A Foucauldian governmentality analysis of security sector reform in Tunisia
by: Keskes, Hanen
Published: (2023)
by: Keskes, Hanen
Published: (2023)
Similar Items
-
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025) -
Information Security Outsourcing with System Interdependency and Mandatory Security Requirement
by: Hui, K., et al.
Published: (2013) -
A study on the factors effecting yield spread of 10 years Malaysian Government Securities / Mohd Amin Abdullah
by: Abdullah, Mohd Amin
Published: (2011) -
The performance of New Zealand initial public offerings (IPOs): 1995-2000 / Arizza Sapuan
by: Sapuan, Arizza
Published: (2004) -
A study on determinants of bond yield in Malaysia / Nurul Jannah Arifin and Nurul Atikah Yaacob
by: Arifin, Nurul Jannah, et al.
Published: (2018)