"The role of ict in peace and security" Essays and Research Papers

Sort By:
Satisfactory Essays
Good Essays
Better Essays
Powerful Essays
Best Essays
Page 46 of 50 - About 500 Essays
  • Powerful Essays

    6 Path of Peace

    • 1772 Words
    • 8 Pages

    Six Paths to Peace 1. PURSUIT OF SOCIAL‚ ECONOMIC AND POLITICAL REFORMS. This component involves the vigorous implementation of various policies‚ reforms‚ programs and projects aimed at addressing the root causes of internal armed conflicts and social unrest. This may require administrative action‚ new legislation‚ or even constitutional amendments. 2. CONSENSUS-BUILDING AND EMPOWERMENT FOR PEACE. This component includes continuing consultations on both national and local levels to build consensus

    Free Philippines Ferdinand Marcos Imelda Marcos

    • 1772 Words
    • 8 Pages
    Powerful Essays
  • Powerful Essays

    Ict Module Level 3

    • 1441 Words
    • 6 Pages

    for researching your Theme and describe and justify research methods used and any ICT resources used for collecting data for your Theme. After I made the decision to do this themes‚ I took the feasibility and operability into my consideration. After sifting through a variety of

    Premium Scientific method Coffee Research

    • 1441 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Computer Security

    • 810 Words
    • 4 Pages

    difference between laws and ethics is laws are mandated and ethics are the basis of laws and the “right or wrongs” a person believes in. Civil law is a body of laws established by a state or nation for its own regulation. It helps keep order and peace and prevent criminals from acting without a consequence. Primary examples of public law are administrative‚ constitutional and criminal. An example of a public law is like a speed limit. Something that pertains to all people. The law that amended

    Premium Law USA PATRIOT Act Copyright

    • 810 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Contents CONTENTS 4 EXECUTIVE SUMMARY 6 RESPONSIBLE PERSONNEL 7 CHIEF SECURITY OFFICER 7 ELECTRONIC SECURITY MANAGER 7 PHYSICAL SECURITY MANAGER 7 RISK MANAGEMENT OFFICER 7 ASSESSMENT OF RISK 8 PHYSICAL 8 ELECTRONIC 9 DATA ACCESS SECURITY 10 GENERAL SECURITY 10 USER AUTHORISATION 10 USER AUTHENTICATION 11 SECURE DATABASE 11 PHYSICAL FILES 11 ELECTRONIC INTRUDER DETERRENCE – VIRUSES AND MALWARE 12 SOCIAL ENGINEERING 12 FILE SHARING 12 WIRELESS NETWORKS 13 STAFF VETTING AND SEPARATION

    Premium Security Information security Computer security

    • 4348 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    Data Security

    • 15434 Words
    • 62 Pages

    Master Thesis Electrical Engineering November 2011 Security Techniques for Protecting Data in Cloud Computing Venkata Sravan Kumar Maddineni Shivashanker Ragi School of Computing Blekinge Institute of Technology SE - 371 79 Karlskrona Sweden i This thesis is submitted to the School of Computing at Blekinge Institute of Technology in partial fulfillment of the requirements for the degree of Master of Science in Software Engineering. The thesis is equivalent to 40 weeks of full time studies.

    Premium Cloud computing

    • 15434 Words
    • 62 Pages
    Good Essays
  • Good Essays

    peace an elusive dream

    • 725 Words
    • 3 Pages

    Peace an Elusive Dream omen the violated‚ [i] the reality is far more nuanced. Peace‚ then‚ must be gendered too. Women and men experience war differently; gendered thinking considers the multiple experiences and perspectives of each. Gender mainstreaming is a process of inclusion‚ enabling sustained peace that considers the needs of all stakeholders‚ especially women who suffer disproportionately during and after war. [ii] Gender mainstreaming requires more than just talking

    Premium War World War II Gender role

    • 725 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Concept of Security

    • 11613 Words
    • 47 Pages

    concept of security* DAV I D A . B A L D W I N Redefining ‘security’ has recently become something of a cottage industry.1 Most such efforts‚ however‚ are more concerned with redefining the policy agendas of nation-states than with the concept of security itself. Often‚ this takes the form of proposals for giving high priority to such issues as human rights‚ economics‚ the environment‚ drug traffic‚ epidemics‚ crime‚ or social injustice‚ in addition to the traditional concern with security from external

    Premium National security Security

    • 11613 Words
    • 47 Pages
    Powerful Essays
  • Powerful Essays

    Democratic Peace Theory

    • 1706 Words
    • 7 Pages

    Critically assess the tenets of democratic peace theory The impression that democratic countries are known to be more peaceful than non- democratic countries have been argued by most theorists‚ who have brought about the liberal understanding of international politics. This is understood by Immanuel Kant’s edition of democratic peace theory; DPT (Shimko 2009). This composition critically analyses the democratic peace theory that is comprehensively argued by theorists and academics‚ studied by

    Premium Democracy United States Liberal democracy

    • 1706 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Firewall Security

    • 2313 Words
    • 10 Pages

    FIREWALL SECURITY This reports looks at what a firewall is‚ and how it works. It also looks at what security risks can be stopped by a firewall in a computer system. Most people think that a firewall is where all data traffic on the internet has to go through between networks‚ as shown in Figure 1.1 [pic] What is a firewall? In network security‚ firewall is considered a first line of defense in protecting private information. "A firewall sits at the junction point‚ or gateway‚ between the two

    Premium Access control Computer security

    • 2313 Words
    • 10 Pages
    Better Essays
  • Powerful Essays

    Database Security

    • 7064 Words
    • 29 Pages

    Practice Volume 9‚ 2010 Database Security: What Students Need to Know Meg Coffin Murray Kennesaw State University‚ Kennesaw‚ GA‚ USA mcmurray@kennesaw.edu Executive Summary Database security is a growing concern evidenced by an increase in the number of reported incidents of loss of or unauthorized exposure to sensitive data. As the amount of data collected‚ retained and shared electronically expands‚ so does the need to understand database security. The Defense Information Systems Agency

    Premium SQL Database

    • 7064 Words
    • 29 Pages
    Powerful Essays
Page 1 42 43 44 45 46 47 48 49 50