LEADER 08594nam 22004573 450 001 9910502999403321 005 20211214151245.0 010 $a3-030-53494-4 035 $a(CKB)4100000012037527 035 $a(MiAaPQ)EBC6736364 035 $a(Au-PeEL)EBL6736364 035 $a(OCoLC)1281983582 035 $a(EXLCZ)994100000012037527 100 $a20211214d2021 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Palgrave Handbook of National Security 210 1$aCham :$cSpringer International Publishing AG,$d2021. 210 4$d©2022. 215 $a1 online resource (421 pages) 311 $a3-030-53493-6 327 $aIntro -- Contents -- Notes on Contributors -- List of Figures -- 1 National Security: Theories, Actors, Issues -- Part I Theories -- 2 Understanding National Security: The Promises and Pitfalls of International Relations Theory -- The National Security Landscape: Changing Definitions, Themes and Processes -- Statehood, Securitisation and National Security -- National Interests -- Sovereignty and International Law -- Power, Influence and International Order -- Making National Security Policy in an Age of Globalisation and Shifting Power: Balancing Risk and Resilience -- Theories of International Relations and National Security Choices -- Realist Approaches -- Liberal Approaches -- Constructivist Approaches -- From Theory to Practice: Case Studies on Major National Security Issues -- The Global War on Terror -- Climate Change -- Shifts in Global Order: The Rise of China and the Relative Decline of the United States -- Conclusions -- 3 National Security and Public Policy: Exceptionalism Versus Accountability -- What Is Public Policy? -- A Brief History of Public Policy -- Public Policy in Liberal Democracies -- National Security and Public Policy in Liberal Democracy -- Methodological Challenges of National Security Evaluation -- Exceptionalized Policy-Making in Liberal Democracies -- Scrutiny, Accountability and Exceptionalism -- Exempting National Security from Public Policy Imperatives -- The Expanding Remit of National Security Policy -- National Security and the Shadow of Illiberalism -- Conclusions -- 4 Ethics and National Security: A Case for Reasons in Decision-Making -- Introduction -- The Problem: Ethics and National Security -- On Ethics, National Security and Liberal Democracies -- Ethics -- Nations and States16 -- Security -- An Open Question: Pluralism Versus Anything Goes33 -- A Dynamic Space. 327 $aWhere To? A Guide for Ethical Decision Making in National Security -- Part II Actors -- 5 Nothing to Fear but Fear Itself: The National Security Policy of the United States -- Free Security -- What Are We Afraid Of? Issues and Debates in Twenty-First-Century U.S. National Security -- Traditional Threats: Peer Competitors -- Nontraditional Threats: Terrorism, Rogue, and Failed States -- Technological Threats: Nuclear, Cyber!, Killer Robots -- Nuclear Weapons States, 1988 and 2018 -- Imagined Threats: Unknown Unknowns -- Structure and Insecurity -- Conclusions -- 6 Chinese National Security: New Agendas and Emerging Challenges -- The End of the Cold War and Emerging Security Challenges -- National Security: Emerging Challenges -- Reconceptualizing Security: New Structures -- Conclusion -- 7 Russia's National Security Posture -- The Roots of Russian Conduct -- Understanding Russian National Security Policy -- Constructivist Approaches -- Neoliberal Approaches -- Realist Approaches -- Power and Weakness: Enablers and Constraints -- Military Power -- Information Operations and Hybrid Warfare Capabilities -- Energy: Encouraging Vulnerable Over-Dependencies -- Institutional Underdevelopment, Sub-regional Weakness, and Political Vulnerability -- Conclusions -- 8 Between Aspiration and Reality: Evolution of Japanese National Security Policy -- Background: Basic Elements of Japan's National Security Policy -- A Framework Challenged: Japan's Security Policy in Post-Cold War and Post-9/11 Years -- Japan Transformed? Changes Made Under the Second Abe Cabinet (December 2012-Present) -- Conclusion: A Glass Ceiling for Japan's National Security Policy -- 9 India's National Security Challenges and the State Response -- A Gradual Evolution in Indian National Security Policy -- India's Relationship with Pakistan -- Sino-Indian Tensions -- Left Wing Extremism. 327 $aState Responses to LWE -- Insurgency in the Northeast -- Indian Responses to Insurgencies in the Northeast -- Terrorism in Punjab -- Terrorism in Jammu and Kashmir -- Conclusion -- 10 Turkey: The Security Policy of a 'Lonely' State -- Introduction: With a Neighbourhood like Turkey's, Who Needs Enemies? -- Turkey, Existentially: Who Are Turks and What Is Turkey?1 -- The Inter-War Years: Security Policy Foundations16 -- The Security Policy of the Pre-AKP Republic: The Cold War Years -- Turkish Security Policy, the End of the Cold War and the Rise of the AKP -- The Kurdish Issue, Again -- The KRG -- Conclusion: Turkey's Loneliness -- 11 Securing Iran in the Internet age -- Security in the Founding Moments of the Islamic Republic -- Key Events and Issues -- Iranian Regime Security and the Internet: A Double-Edged Sword -- Conclusions -- 12 Brazil: In Search of a Security Space -- Introduction -- From Independence to Globalization: The Pathway Toward Autonomy -- Re-democratization: From Great Power to Middle Power -- An Exhausted Democracy: Back to Pre-autonomy Days? -- Conclusion -- Part III Issues -- 13 Nuclear Weapons and National Security: From the Cold War to the "Second Nuclear Age" and Beyond -- The Evolution of Nuclear Politics: Between MAD and "Nuclear Abstinence" -- Nuclear Weapons and the Cold War: Toward MAD -- Nuclear Non-Proliferation Treaty: An Imperfect Nuclear Abstinence? -- The Post-Cold War Nuclear Interregnum and the "Second Nuclear Age" -- Nuclear Postures of Major Powers -- United States -- Russia -- China -- Nuclear Flashpoints -- Nuclear Instability on the Korean Peninsula -- The South Asian Nuclear Triangle -- Testing Transatlantic Cohesion: Russian Adventurism in Ukraine and the Baltics -- Conclusions -- 14 Maritime Security: Problems and Prospects for National Security Policymakers -- Introduction. 327 $aSituating 'Maritime Security' -- Protecting National (Maritime) Security-The Navies -- Contemporary National Security Threats: The Maritime Sphere -- National Security and Non-Traditional Maritime Security Threats -- Safeguarding National Security: Addressing Non-Traditional Maritime Security Threats -- Defending National Security? the Rise of Non-State Actors -- Conclusion -- 15 Intelligence and National Security: The National Security Problematique -- Approaches to the Intelligence Cycle -- Direction -- Planning -- Collection and Collation -- Analysis and Processing -- Evaluation -- Dissemination -- Intelligence Gaps and Failures -- Politicisation of Intelligence -- Conclusion -- 16 Machine Learning, Mass Surveillance, and National Security: Data, Efficacy, and Meaningful Human Control -- Introduction -- Machine Learning for Mass Surveillance -- Facial Recognition / Smart Surveillance Cameras -- Voice Recognition -- Attack Prediction -- Financial Fraud -- Propaganda on Social Media -- Societal Implications of the Training Data -- The Source -- Dual Use -- Legitimacy -- Security -- Labeling -- Biases of the Past -- Disparate Impact -- The Effectiveness of ML for Mass Surveillance -- Not Enough Data -- Precision vs Recall -- Past vs. Future -- Meaningful Human Control over ML for Mass Surveillance -- Veto Power -- Explainability -- Moral Machines -- Conclusion -- 17 Information as an Evolving National Security Concern -- Introduction -- Terrorist Exploitation of Social Media -- Foreign Influence Operations -- Oligopologisation of Epistemic Power -- National Security and State Responsibility: What is at Stake? -- Index. 608 $aElectronic books. 676 $a355.03 700 $aClarke$b Michael$098883 701 $aHenschke$b Adam$01072506 701 $aSussex$b Matthew$01072507 701 $aLegrand$b Tim$01072508 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910502999403321 996 $aThe Palgrave Handbook of National Security$92568793 997 $aUNINA LEADER 03719nam 22006975 450 001 9910787403803321 005 20230823004241.0 010 $a0-8047-9431-6 024 7 $a10.1515/9780804794312 035 $a(CKB)3710000000365609 035 $a(EBL)1981231 035 $a(SSID)ssj0001440217 035 $a(PQKBManifestationID)12627111 035 $a(PQKBTitleCode)TC0001440217 035 $a(PQKBWorkID)11404907 035 $a(PQKB)10469149 035 $a(DE-B1597)564460 035 $a(DE-B1597)9780804794312 035 $a(MiAaPQ)EBC1981231 035 $a(OCoLC)1178768883 035 $a(EXLCZ)993710000000365609 100 $a20200723h20202015 fg 0 101 0 $aeng 135 $aur||#|||||||| 181 $ctxt 182 $cc 183 $acr 200 10$aFeminine Capital $eUnlocking the Power of Women Entrepreneurs /$fCatherine Elliott, Barbara Orser 210 1$aStanford, CA :$cStanford University Press,$d[2020] 210 4$d©2015 215 $a1 online resource (241 p.) 300 $aDescription based upon print version of record. 311 $a0-8047-8378-0 327 $t1 Reframing Entrepreneurship --$t2 Intention, Success, and Identity --$t3 Getting to Go --$t4 Enterprise Growth --$t5 Social Capital --$t6 Money Matters --$t7 Power in Policy --$t8 Never Underestimate the Underestimated Woman. 330 $aToday, there are over 200,000,000 women business owners around the world. Many of these entrepreneurs are not doing business as usual, nor are they simply leaning in. Rather, they are tapping into feminine capital?the unique skills and sensibilities that they have cultivated as women?to create enviable successes. Drawing on four decades of award-winning research, Feminine Capital reveals how women are harnessing different approaches to doing business. Barbara Orser and Catherine Elliott detail the pillars of feminine capital and offer new insight into the ways that gender can influence entrepreneurial decision-making. They find that leveraging feminine capital can help women to create distinctive brands, build new markets, and drive profits?all while leveling the playing field in business. In doing so, women are changing our social and economic landscape, one venture at a time. Dispelling myths and misperceptions that can undermine women-owned ventures, this book takes a fresh look at how female entrepreneurs can leverage their skills, knowledge, and values. Case studies of women entrepreneurs bring key concepts and lessons to life, while learning aids, diagnostic tools, and checklists help readers to construct innovative business models, refine start-up plans, and hone growth strategies. 606 $aBusinesswomen 606 $aEntrepreneurship 606 $aSelf-employed women 606 $aWomen-owned business enterprises 606 $aBusinesswomen 606 $aWomen-owned business enterprises 606 $aSelf-employed women 606 $aEntrepreneurship 615 4$aBusinesswomen. 615 4$aEntrepreneurship. 615 4$aSelf-employed women. 615 4$aWomen-owned business enterprises. 615 0$aBusinesswomen 615 0$aWomen-owned business enterprises 615 0$aSelf-employed women 615 0$aEntrepreneurship 676 $a338 .04082 700 $aOrser$b Barbara, $4aut$4http://id.loc.gov/vocabulary/relators/aut$01521399 702 $aOrser$b Barbara$4aut$4http://id.loc.gov/vocabulary/relators/aut 702 $aElliott$b Catherine$4aut$4http://id.loc.gov/vocabulary/relators/aut 801 0$bDE-B1597 801 1$bDE-B1597 906 $aBOOK 912 $a9910787403803321 996 $aFeminine Capital$93760514 997 $aUNINA