From Security Provider to a Security Risk?
نویسندگان
چکیده
This paper aims to offer an overview of a unique and decade-long Ethiopian peacekeeping deployment in Abyei, where contingents comprise almost the entire force, ended ungraceful manner because disapproval from government Sudan. The reveals that Tigray conflict which resulted desertion peacekeepers Egyptian pressure on Sudan GERD have contributed withdrawal Ethiopia–Sudan border dispute brought dark shadow their relations addition disruption deployment. concludes unless Ethiopia makes progress internal stability reboots its with neighbours, Ethiopia’s role as peace mediator peacekeeper region becomes ignominy.
منابع مشابه
SDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملSDN Security: A Survey
The pull of Software-Defined Network- ing (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the mark...
متن کاملchina's security relations with central asia: from security ties to “regional security complexes”
termination of the cold war was followed by considerable developments in international relations, including the emergence and gradual empowerment of new political actors. china was one of these actors whose process of empowerment, which actually started many years before the end of the cold war, has drawn attention from many analysts. central asia is one of the regions with which china has had ...
متن کاملFrom information security to ... business security?
This short opinion paper argues that information security, the discipline responsible for protecting a company's information assets against business risks, has now become such a crucial component of good Corporate Governance, that it should rather be called Business Security instead of Information Security. During the last year or two, driven by developments in the field of Corporate Governance...
متن کاملFrom information security to cyber security
The term cyber security is often used interchangeably with the term information security. This paper argues that, although there is a substantial overlap between cyber security and information security, these two concepts are not totally analogous. Moreover, the paper posits that cyber security goes beyond the boundaries of traditional information security to include not only the protection of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Hadtudományi szemle
سال: 2022
ISSN: ['2060-0437', '2676-9816']
DOI: https://doi.org/10.32563/hsz.2022.4.5