Programming China: the Communist Party’s autonomic approach to managing state security
Programming China: The Communist Party’s Autonomic Approach to Managing State Security, introduces the new analytical framework called China's “Autonomic Nervous System” (ANS). The ANS framework applies complex systems management theory to explain the process the Chinese Communist Party calls “...
| Main Author: | Hoffman, Samantha R. |
|---|---|
| Format: | Thesis (University of Nottingham only) |
| Language: | English |
| Published: |
2017
|
| Subjects: | |
| Online Access: | https://eprints.nottingham.ac.uk/48547/ |
Similar Items
China’s governance model: flexibility and durability of
pragmatic authoritarianism
by: Lai, Hongyi
Published: (2016)
by: Lai, Hongyi
Published: (2016)
V. I. Lenin on democracy
by: Pateman, Joe
Published: (2021)
by: Pateman, Joe
Published: (2021)
China’s Weibo: is faster different?
by: Sullivan, Jonathan
Published: (2013)
by: Sullivan, Jonathan
Published: (2013)
Effects of population on food security, health care and education expenditure in China and India
by: Nordin, Nurhaiza
Published: (2016)
by: Nordin, Nurhaiza
Published: (2016)
The Communist party
by: Phelps, Christopher
Published: (2017)
by: Phelps, Christopher
Published: (2017)
Leninism, scientific socialism, and democracy
by: Pateman, Joe
Published: (2017)
by: Pateman, Joe
Published: (2017)
Opposition subnational strongholds in dominant party authoritarian regimes (DPARS) : the Pakatan coalition in Selangor and Penang from 2008 to 2018
by: Yeoh, Tricia
Published: (2022)
by: Yeoh, Tricia
Published: (2022)
The Indian Ocean Region: Security, Stability and Sustainability in the 21st Century
by: Brewster, D., et al.
Published: (2013)
by: Brewster, D., et al.
Published: (2013)
Parties between thresholds: state subsidies and party behaviour in post-communist democracies
by: Casal Bertoa, Fernando, et al.
Published: (2017)
by: Casal Bertoa, Fernando, et al.
Published: (2017)
Louis Althusser’s critique of the Communist Party and the question of the postrevolutionary state
by: Nowak, Jörg
Published: (2017)
by: Nowak, Jörg
Published: (2017)
MOTIVATING CHINESE MILLENNIALS: POST-80S AND -90S EMPLOYEES IN STATE-OWNED BANKS IN NANNING, CHINA
by: Liao, Shi Zhu
Published: (2016)
by: Liao, Shi Zhu
Published: (2016)
Regional protest and electoral fraud: evidence from analysis of new data on Russian protest
by: Lankina, Tomila, et al.
Published: (2017)
by: Lankina, Tomila, et al.
Published: (2017)
Sourcing complexity factors on contractual relationship: Chinese suppliers’ perspective
by: Subramanian, Nachiappan, et al.
Published: (2014)
by: Subramanian, Nachiappan, et al.
Published: (2014)
Understanding China’s fintech sector: development, impacts and risks
by: Hua, Xiuping, et al.
Published: (2020)
by: Hua, Xiuping, et al.
Published: (2020)
Commerce, corruption and control: Bolshevik approaches to trade, 1917-1923
by: Nicholson, Joseph
Published: (2019)
by: Nicholson, Joseph
Published: (2019)
Capital, state and labour in the enigma of Baltic 'post-Communist' transformation
by: Salyga, Jokubas
Published: (2020)
by: Salyga, Jokubas
Published: (2020)
An empirical examination on the determinants of IPO underpricing in China
by: He, Wanqiu
Published: (2018)
by: He, Wanqiu
Published: (2018)
An empirical examination on the determinants of IPO underpricing in China
by: He, Wanqiu
Published: (2018)
by: He, Wanqiu
Published: (2018)
The effects of instruction and environmental demand on state anxiety, driving performance and autonomic activity: Are ego-threatening manipulations effective?
by: Barnard, Megan Patricia, et al.
Published: (2018)
by: Barnard, Megan Patricia, et al.
Published: (2018)
A tool for modeling software security requirements using security patterns
by: Maher, Zulfikar Ahmed
Published: (2016)
by: Maher, Zulfikar Ahmed
Published: (2016)
Stability Analysis of a Class of Nonlinear Discrete Systems with Impulsive Effects
by: Chen, Y., et al.
Published: (2010)
by: Chen, Y., et al.
Published: (2010)
A study on security of mosque / Nor Hasnida Ab Halim
by: Ab Halim, Nor Hasnida
Published: (2013)
by: Ab Halim, Nor Hasnida
Published: (2013)
A place branding framework for tourism based on visual urban perception in Yinchuan City, Ningxia Hui Autonomous Region, China
by: Ji, Guangyao
Published: (2024)
by: Ji, Guangyao
Published: (2024)
China: an East Asian alternative to neoliberalism?
by: Horesh, Niv, et al.
Published: (2016)
by: Horesh, Niv, et al.
Published: (2016)
Non-traditional security in contemporary Chinese international relations thought
by: Stieber, Sabine
Published: (2017)
by: Stieber, Sabine
Published: (2017)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Researching state rescaling in China: methodological reflections
by: Lim, Kean Fan
Published: (2017)
by: Lim, Kean Fan
Published: (2017)
Factors influencing the rate of degradation of Amoxycillin sodium and potassium clavulanate in the liquid and frozen states.
by: Vahdat, Laleh
Published: (2000)
by: Vahdat, Laleh
Published: (2000)
Lyapunov approach on a homogeneous family of controllers for robotic manipulator
by: Jang, Wilson
Published: (2019)
by: Jang, Wilson
Published: (2019)
Development of Security Identification and Monitoring System for Web Application
by: Dani, Norizawati
Published: (1999)
by: Dani, Norizawati
Published: (1999)
Comrades in Arms: The Military-Strategic Aspects of China-Russia Relations
by: Muraviev, Alexey
Published: (2014)
by: Muraviev, Alexey
Published: (2014)
Australia's 'New Security' Challenges
by: Hubbard, Christopher
Published: (2004)
by: Hubbard, Christopher
Published: (2004)
The influence of usable security on security culture
by: Fallatah, Wesam
Published: (2025)
by: Fallatah, Wesam
Published: (2025)
State rescaling, policy experimentation and path dependency in post-Mao China: a dynamic analytical framework
by: Lim, Kean Fan
Published: (2017)
by: Lim, Kean Fan
Published: (2017)
The Financial System in China: Determinants and Future
by: Teng, Xiaowen
Published: (2007)
by: Teng, Xiaowen
Published: (2007)
Design of a repetitive controller as a feed-forward
disturbance observer
by: Tang, Mi, et al.
Published: (2016)
by: Tang, Mi, et al.
Published: (2016)
Exponential stability analysis and impulsive tracking control of uncertain time-delayed systems
by: Chen, Yuanqiang, et al.
Published: (2012)
by: Chen, Yuanqiang, et al.
Published: (2012)
Internet - Based Security and Monitoring System
by: Suliman, Isameldin Mohammed
Published: (1998)
by: Suliman, Isameldin Mohammed
Published: (1998)
Ehancing security and privacy in local area network with TORVPN using : raspberry pi as access point / Mohamad AfiqHakimi Rosli
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
by: Rosli, Mohamad AfiqHakimi
Published: (2019)
Learning a lesson from Taiwan? A comparison of changes and continuity of labour policies in Taiwan and China
by: Lee, Chun-Yi
Published: (2014)
by: Lee, Chun-Yi
Published: (2014)
Similar Items
-
China’s governance model: flexibility and durability of
pragmatic authoritarianism
by: Lai, Hongyi
Published: (2016) -
V. I. Lenin on democracy
by: Pateman, Joe
Published: (2021) -
China’s Weibo: is faster different?
by: Sullivan, Jonathan
Published: (2013) -
Effects of population on food security, health care and education expenditure in China and India
by: Nordin, Nurhaiza
Published: (2016) -
The Communist party
by: Phelps, Christopher
Published: (2017)