1,801,111 research outputs found

    Who do you think you are? Intimate pasts made public

    Get PDF
    This is the official published version of the Article - Copyright @ 2011 University of Hawaii Pres

    If you Love me, you will Keep my Commandments

    Get PDF

    Are you Ready?

    Full text link

    Who Bears Responsibility for the Provision of Security: The State or You?

    Get PDF
    When defining the absence of a threat as an economic good, it is necessary to define this good using the standard economic typology: is security a private, public, club or common good? We argue in this Policy Briefing that security provision can display characteristics belonging to any of these types of goods. In recent years, we can observe a change from more publicly oriented security provision to privately provided security. That does not, however, take away the responsibility of the state to provide a basic level of security. In addition to that, it is the responsibility of the state to coordinate internationally to deliver international security.

    The F-Word

    Full text link
    I’m thinking of a word. Can you guess it? This word is considered negative and harsh. It’s generally avoided in everyday conversations. You wouldn’t normally hear this word spoken by professors or sophisticated celebrities. It starts with an F
 Do you know it? That’s right folks! It’s “feminist”. [excerpt

    Where you live affects what you think about trade

    Get PDF
    Free trade ; Globalization

    IPv6 Network Mobility

    Get PDF
    Network Authentication, Authorization, and Accounting has been used since before the days of the Internet as we know it today. Authentication asks the question, “Who or what are you?” Authorization asks, “What are you allowed to do?” And fi nally, accounting wants to know, “What did you do?” These fundamental security building blocks are being used in expanded ways today. The fi rst part of this two-part series focused on the overall concepts of AAA, the elements involved in AAA communications, and highlevel approaches to achieving specifi c AAA goals. It was published in IPJ Volume 10, No. 1[0]. This second part of the series discusses the protocols involved, specifi c applications of AAA, and considerations for the future of AAA
    • 

    corecore