Listing 1 - 10 of 2830 | << page >> |
Sort by
|
Choose an application
This is the first in a new series of biennial reports that aim to map social security coverage globally, to presenting various methods and approaches for assessing coverage, and to identifying gaps in coverage. Backed by much comparative statistical data, this first report takes a comprehensive look at how countries are investing in social security, how they are financing it, and how effective their approaches are. The report examines the ways selected international organizations (the EU, OECD and ADB) monitor social protection and the correlation of social security coverage and the ILO Decent
Choose an application
Choose an application
"An exploration of the roles that pro- and anti-government militias, private armed groups, vigilantes, and gangs play in local communities in the new democracies of Southeast Asia. Scholars have typically characterized irregular forces as spoilers and infiltrators in post-conflict peacebuilding processes. The contributors to this book challenge this conventional understanding of irregular forces in Southeast Asia, demonstrating that they often attract solid support from civilians and can be major contributors to the building of local security - a process by which local residents, in the absence of an effective police force, develop, partner or are at least included in the management of community crimes and other violence. They analyze irregular forces' dealings with political actors at the community level, explaining why and how forces are incorporated in and collaborate with legitimate institutions without using violence against them. Offering a new approach to dealing with irregular forces in Southeast Asia, contributors explore new theoretical frameworks that are better suited for evaluating irregular forces' relationship to different security providers and the political environments in the region. Specifically, they examine case studies from Indonesia, Timor-Leste, the Philippines, and Thailand. A valuable resource for researchers, students and practitioners in the areas of conflict resolution, peacebuilding, and security governance, especially those with a focus on Southeast Asia. This book will also be of great interest to scholars of the sociology and anthropology of the region"-- Provided by publisher.
Choose an application
Discovering the Total Cost of Security to the Enterprise is a video presentation. Length: 29 minutes. In Discovering the Total Cost of Security to the Enterprise, presenter Richard Lefler discusses what security actually costs an organization in terms of operating, variable, and mandatory costs. Each of the three types of security costs are defined and expanded upon in this presentation. Lefler also explains how certain industry sectors have increasing variable and operating costs, along with the reasons behind these trends. The presentation also covers mandatory spend versus discretionary
Choose an application
Choose an application
A free open access ebook is available upon publication. Learn more at www.luminosoa.org.The Scarcity Slot is the first book to critically examine food security in Africa’s deep past. Amanda L. Logan argues that African foodways have been viewed through the lens of ‘the scarcity slot,’ a kind of Othering based on presumed differences in resources. Weaving together archaeological, historical, and environmental data with food ethnography, she advances a new approach to building long-term histories of food security on the continent in order to combat these stereotypes. Focusing on a case study in Banda, Ghana that spans the past six centuries, The Scarcity Slot reveals that people thrived during a severe, centuries-long drought just as Europeans arrived on the coast, with a major decline in food security emerging only recently. This narrative radically challenges how we think about African foodways in the past with major implications for the future.
Choose an application
Choose an application
Cybersecurity problems don't always relate to technological faults. Many can be avoided or mitigated through improved cybersecurity awareness, behaviour and culture change (ABCs). This book guides organisations looking to create an enhanced security culture through improved understanding and practice of cybersecurity at an individual level.
Choose an application
Choose an application
Listing 1 - 10 of 2830 | << page >> |
Sort by
|