• No results found

[PDF] Top 20 Human security in Cambodia: Far from over

Has 10000 "Human security in Cambodia: Far from over" found on our website. Below are the top 20 most common "Human security in Cambodia: Far from over".

Human security in Cambodia: Far from over

Human security in Cambodia: Far from over

... However, the post-election violence led to the death of seven people and to dozens more being injured. A bystander was shot in the head by police during the clash between protesters and police on Monivong Bridge on 15 ... See full document

44

HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIA

HUMAN SECURITY AND DEVELOPMENT: THE CASE OF CAMBODIA

... of security and the place of the ...that security is about individuals and groups and not only about states and an international balance of ...basic human security of individuals and ...on ... See full document

255

Report of the Special Rapporteur on the situation of human rights in Cambodia

Report of the Special Rapporteur on the situation of human rights in Cambodia

... of Cambodia and Australia for Cambodia to receive refugees who aimed to claim asylum in Australia, but were intercepted by Australian authorities, then transferred, detained and processed in ...asylum ... See full document

21

A pair of opposite security issues in the horn of Africa: Human security versus regime security in Ethiopia and Sudan

A pair of opposite security issues in the horn of Africa: Human security versus regime security in Ethiopia and Sudan

... external security’ (Pausewang, 2002a, ...Apart from the other role entrusted to the police during elections, it served the regime by ‘arresting and incarcerate unwanted opposition candidates, beat up their ... See full document

10

Cambodia’s patient zero: The political economy of foreign aid and avian influenza

Cambodia’s patient zero: The political economy of foreign aid and avian influenza

... amongst such groups, and in particular the opportunities for rent-seeking. While there are many well-intentioned, committed and skilled people involved, the overall political economy of the policy process often ... See full document

33

Security, identity, and the discourse of conflation in far right violence

Security, identity, and the discourse of conflation in far right violence

... ‘outside.’”[45] In places of melding cultures, labour migration, asylum seeking, and great human flows, this is a very disturbing idea. Extreme violence emerges when social trust erodes and the very existence of ... See full document

12

Top athletes: who is leading the field? Europe: Magazine of the European Union No. 418, July-August 2002

Top athletes: who is leading the field? Europe: Magazine of the European Union No. 418, July-August 2002

... As far as history is concerned and as far as the security of the world is concerned." -Silvio Berlusconi, Italian prime minister, on NATO "I remember, more than half a century ago, human[r] ... See full document

56

Cambodia’s Strategic Relationship with China and the United States: Implications for Cambodia’s Development Aid

Cambodia’s Strategic Relationship with China and the United States: Implications for Cambodia’s Development Aid

... recovered from decades of civil conflict, and remains one of the poorest countries in the Association of South East Asian Nations ...to Cambodia for national ...in Cambodia, and the wider South East ... See full document

15

Security on Voice over Internet Protocol from Spoofing Attacks

Security on Voice over Internet Protocol from Spoofing Attacks

... Two kind of spoofing attacks are possible: IP spoofing attack and URI spoofing attack. IP spoofing attack is to make a way for IP source addresses in order to feign a trusted user and IP spoofing having the intrinsic ... See full document

9

Differential  Cryptanalysis   and  Linear  Distinguisher   of  Full-Round  Zorro

Differential Cryptanalysis and Linear Distinguisher of Full-Round Zorro

... Abstract. Zorro is an AES-like lightweight block cipher proposed in CHES 2013, which only uses 4 S-boxes per round. The designers showed the resistance of the cipher against various attacks and concluded the cipher has a ... See full document

10

Economic planning in West Africa

Economic planning in West Africa

... latex from Thailand Car mania: The legacy of the Industrial Revolution Careers in travel: Working with currency exchange A child's day: Cambodia A child's day: Vietnam East Asian trading ships Economic ... See full document

5

Melioidosis: It is not Far from here

Melioidosis: It is not Far from here

... This case is the first bacteremic case of melioidosis reported from Iran. Southeast Asia has increasing numbers of travelers from all over the world including Iran. Therefore, regarding the ... See full document

5

A Decentralized Accountability Framework for Enhancing Secure Data Sharing Through ICM in Cloud

A Decentralized Accountability Framework for Enhancing Secure Data Sharing Through ICM in Cloud

... services over the internet. It stands that the resources are accessed from unknown ...access over the shared data on ...more security over the shared data on cloud, the proposed work ... See full document

7

AN EFFECTIVE TECHNIQUE FOR BRAIN TUMOUR SEGMENTATION AND DETECTION USING 
CUCKOO BASED NEURO FUZZY CLASSIFIER

AN EFFECTIVE TECHNIQUE FOR BRAIN TUMOUR SEGMENTATION AND DETECTION USING CUCKOO BASED NEURO FUZZY CLASSIFIER

... The contribution of this study is a framework for mitigating an internal threat for data centre in the public sector based on the ISMS standard. Even though the development of this framework is based on one specific ... See full document

8

Volume 5, Issue 1 (2019)

Volume 5, Issue 1 (2019)

... and human right abuses in trying to travel to migration destinations and upon arrival, by brokers, smugglers, agencies, in detention centers and by ...to human rights watch, of the estimated 10 million ... See full document

11

Political party development in post war societies: the institutionalization of parties and party systems in El Salvador and Cambodia

Political party development in post war societies: the institutionalization of parties and party systems in El Salvador and Cambodia

... have over key state institutions and access to economic resources ensures their dominant role in the post-war party ...receive from the population indicates that significant parts of the population identify ... See full document

403

Download
			
			
				Download PDF

Download Download PDF

... are generating criticism with regards to the often hidden (linguistically [Stibbe], visibly [Pachirat]) and externalized (in terms of true cost accounting [Daly]) role played by cows in precipitating environmental damage ... See full document

16

Human Security:  Evolution and Conceptualization

Human Security: Evolution and Conceptualization

... The Security and safety with the protection and upkeep of individual rights is the prime concern of human ...Freedom from want such as poverty, diseases, hunger and Freedom from fear such as ... See full document

32

The Dynamics of Human  and National Security in Nigeria:  Lessons from the Boko Haram Insurgency

The Dynamics of Human and National Security in Nigeria: Lessons from the Boko Haram Insurgency

... between human security and the dynamics of national security in ...calls from scholar, security experts and analyst for a total overhaul of Nigeria‟s national security objectives ... See full document

16

Vulnerability assessment on the computer network security

Vulnerability assessment on the computer network security

... all over that open ports and available services that exist on ...report, security holes are referring to the weaknesses or possible exploits that are very important to analysis in this ... See full document

5

Show all 10000 documents...