Information & Security logo

Peer-reviewed open-access journal
published since 1998 by Procon Ltd.

Volume
53

ISIJ 53: Enhanced Collaboration for Cyber Security and Resilience

  • Browse list of volumes
  • Submit an article

Search form

  • Follow us on Twitter
  • Connect with us on LinkedIN
  • Like us on Facebook
  • Get content alerts
No files have yet been downloaded.
65
Citations
See all citations

Preview articles

Maritime Cyber(in)security: A Growing Threat Imperils EU Countries

Security Aspects of Hybrid War, COVID-19 Pandemic and Cyber-Social Vulnerabilities

How Networks of Social Cooperation Scale into Civilizations

View all
  • News
  • Aims and scope
  • Instructions for authors
  • Fees
  • Journal information
  • Ethics in Publishing
  • Editorial Board
  • Calls for Articles

Advertising banner

Connection the Quarterly journal

IT for Security Department

  • Facebook
  • LinkedIn
  • Twitter

Security: A New Framework for Analysis

Publication Type:

Book

Authors:

Barry Buzan; Jaap de Wilde; Ole Waeve

Source:

Lynne Rienner Publishers, Boulder, Colorado (1998)
  • 16243 reads
  • Google Scholar
  • RTF
  • EndNote XML
Share/Save
  • Cited by:
Benesch, Thomas, Johannes Goellner, Andreas Peer, Johann Hoechtl, and Walter Seboeck. "Scenario Space for Alternative Futures of Security Research." Information & Security: An International Journal 29, no. 2 (2013): 111-119.
Burnashev, Rustam. "Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons." Connections: The Quarterly Journal 6, no. 1 (2007): 65-70.
Chernykh, Irina, and Rustam Burnashev. "Conditions for Securitization of International Terrorism in Central Asia." Connections: The Quarterly Journal 4, no. 1 (2005): 131-142.
Sundelius, Bengt. "A Brief on Embedded Societal Security." Information & Security: An International Journal 17 (2005): 23-37.
Forster, Anthony. "New Civil-Military Relations and its Research Agendas." Connections: The Quarterly Journal 1, no. 2 (2002): 71-87.
Matsaberidze, David. "Russia vs. EU/US through Georgia and Ukraine." Connections: The Quarterly Journal 14, no. 2 (2015): 77-86.
Sweijs, Tim, and Milos Jovanovic. "Assessing Comprehensive Security Approaches in Action: An Introduction." Information & Security: An International Journal 33, no. 1 (2015): 5-9.
"Россия против ЕС/США в случаях Грузии и Украины." Connections: The Quarterly Journal 14, no. 2 (2015): 83-94.
Causevic, Amar. "Facing an Unpredictable Threat: Is NATO Ideally Placed to Manage Climate Change as a Non-Traditional Threat Multiplier?" Connections: The Quarterly Journal 16, no. 2 (2017): 59-80.
"Лицом к лицу с непредсказуемыми угрозами: является ли позиция НАТО идеальной для менеджмента изменения климата в качестве нетрадиционного мультипликатора угроз?" Connections: The Quarterly Journal 16, no. 2 (2017): 67-92.

Field of application

  • Cybersecurity
  • Defence
  • Internal security
  • Intelligence
  • Terrorism
  • Operations
  • Critical Infrastructures
  • Emergency Management
  • Supply chains
  • Education & Training

Concepts and Implementation

  • Policy, strategy and doctrine
  • C2 and coordination
  • Hybrid Threats
  • Resilience
  • IT Governance
  • Process Improvement
  • Foresight
  • Risk Management
  • Innovation

Technologies

  • C4ISR
  • Architectures
  • Modelling and Simulation
  • OR & Systems Analysis
  • Cryptography
  • Data mining
  • Deep Learning & AI
  • Emerging Technologies

Connection the Quarterly journal

IT for Security Department

  • Back to top

Information for

  • Authors
  • Editors
  • Reviewers

Help & Info

  • Ethical Guidelines
  • Indexing & Archiving
  • Permissions
  • Privacy Policy and Cookies

Subscribe

Contact us

  • Like us on Facebook
  • Connect with us on LinkedIN
  • Follow us on Twitter
  • Submit an inquiry

Contact us

Information & Security:
An International Journal
ISSN 0861-5160
e-ISSN 1314-2119

© 1998-2021 Procon Ltd.

EIC: 831834672
3, Razluka Str., ap. 20
Sofia 1111,  Bulgaria