Security Policy and Developments in Central Asia: Security Documents Compared with Security Challenges

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

supply and demand security of energy in central asia and the caucasus

امنیت انرژی به معنی عرضه مداوم و پایدار همراه با قیمت های معقول در حامل های انرژی، که تهدیدات امنیتی، سیاسی، اقتصادی، محیط زیستی و روانی را کاهش دهد. امروزه نفت و گاز تنها، کالای تجاری نیست بلکه بعنوان ابزار سیاسی مورد استفاده قرار می گیرد.اختلاف میان روسیه و اکراین بر سر انرژی در ژانویه 2006، تهدیدی برای امنیت انرژی اروپا ایجاد کرد. در این تحقیق ما تلاش کردیم که نقش انرژی آسیای میانه و قفقاز ر...

15 صفحه اول

china's security relations with central asia: from security ties to “regional security complexes”

termination of the cold war was followed by considerable developments in international relations, including the emergence and gradual empowerment of new political actors. china was one of these actors whose process of empowerment, which actually started many years before the end of the cold war, has drawn attention from many analysts. central asia is one of the regions with which china has had ...

متن کامل

Security Challenges in South Asia

Former President Bill Clinton described South Asia as the most dangerous place on earth. We in Pakistan agree with this characterization. It is indeed ironic that the extremely enterprising and hard working people of South Asia, who have achieved such success in their endeavors abroad, have been unable to resolve their mutual differences in order to harness the immense economic potential of the...

متن کامل

nato and security of central asia

the disappearance of bipolar system following the disintegration of the soviet union, has also changed many strategic concepts. central asia, as a part of the soviet empire, has become an arena for regional and global challenges after these transformations. the region, already faced with various political, economic, social and cultural problems, soon became a location for the activities of isla...

متن کامل

Security Challenges in Fog Computing in Healthcare

Background and Aim: The Fog Computing is a highly virtualized platform that provides storage, computing and networking services between the Cloud data centers and end devices. Fog computing fits the characteristics of real-time health monitoring systems. In such systems, a large amount of data is acquired from a multitude of bio and environmental sensors. On the other hand, its distribution and...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: The Journal of Slavic Military Studies

سال: 2016

ISSN: 1351-8046,1556-3006

DOI: 10.1080/13518046.2016.1168123