Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Advanced search
My bookmarks
0
political and security cultures (keyword)
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
source
author
DOI
year of publication
location of publication
supervisor
category
publisher
classifier
conference location
quartile
availibility
subject term
title
series
name of the person
TalTech subject term
TalTech department
url
keyword
All fields
author
co-contibutor
commentator
compiler
corporate author
editor
expert
interviewer
supervisor
translator
series variant title
title
translation of title
variant title
source
special issue
name of the institution
subject of form
subject of location
subject of time
subject term
series
series variant title
availibility
Open Access
category (general)
category (sub)
starts with
containes
exact match
—
Add criteria
Simple search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/163)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Producing cultural change in political communities : the impact of populism and extremism on the international security environment
2023
https://doi.org/10.1007/978-3-031-43440-2
book
Number of records 1, displaying
1 - 1
keyword
160
1.
political and security cultures
2.
political cultures
3.
Security and political science
4.
continuous cultures
5.
high context and low context cultures
6.
non-dairy starter cultures
7.
organizational cultures
8.
vegan starter cultures
9.
constitutional political economy
10.
critical political economy
11.
Estonian political parties
12.
international relations and international political economy
13.
local political decision-making behaviour
14.
political and ideological conflict
15.
political and judicial oversight
16.
political communities
17.
political community
18.
political conflict
19.
political crisis
20.
political culture
21.
political debates
22.
political decision-making
23.
political ecology
24.
political economy
25.
political extremism
26.
political ideology
27.
political integration
28.
political leaders
29.
political leadership
30.
political methodology
31.
political orientation
32.
political participation
33.
political regime
34.
political robustness
35.
political science
36.
political trilemma
37.
socio‐political implications
38.
ad-hoc sensor networks security
39.
Automatic Security Verification
40.
Blockchain security
41.
cache security
42.
cloud security
43.
communication system security
44.
comprehensive system of economic security
45.
computer security
46.
cooperative security dilemma
47.
cyber security
48.
cyber security education
49.
cyber security exercises
50.
cyber security monitoring
51.
cyber security monitoring in maritime
52.
cyber security strategies
53.
cyber-physical system security
54.
cyber-security
55.
data and information security
56.
data security
57.
development of security cameras
58.
digital security practices
59.
drinking water security
60.
economic security
61.
economic security of enterprise
62.
emotional security
63.
energy security
64.
energy security indicator
65.
Estonian information security standard
66.
graded security
67.
hardware security
68.
hardware security primitive
69.
high level of security
70.
Homeland security
71.
human security
72.
information security
73.
information security and privacy
74.
initial level of security
75.
internal security
76.
international security
77.
investment and innovation security
78.
IPv6 security
79.
IT security
80.
IT security management
81.
job security
82.
long-term security
83.
maritime cyber security
84.
maritime cyber security operations centers
85.
Maritime Security Operations Center (M-SOC)
86.
medium level of security
87.
metadata model for security measures
88.
Middle Eastern security
89.
Mobile security
90.
national cyber security strategy
91.
national security
92.
NATO. Science for Peace and Security Program
93.
network security
94.
network security monitoring
95.
OSCE (Organization for Security and Co-operation in Europe)
96.
passenger’s security
97.
policy-based routing security
98.
post-quantum security
99.
power system security
100.
quantitative security
101.
regional security
102.
RISC-V Security Verification
103.
Safety and Security in Sea Transportation
104.
safety and security testing
105.
security
106.
security adaptation
107.
security alert prioritization
108.
security analysis
109.
security and justice (AFSJ)
110.
security and privacy
111.
security and privacy in smart grids
112.
Security Assertion
113.
Security Assertion Mining
114.
security closure
115.
Security Coverage
116.
security dataset
117.
security dilemma
118.
Security evaluation
119.
security evaluation instruments
120.
Security Level Evaluation
121.
Security limitations
122.
security log analysis
123.
security management
124.
security model
125.
security monitoring
126.
security notion
127.
security objectives
128.
security of data
129.
security of supply
130.
security operation center
131.
security operations center
132.
security patterns
133.
security policy
134.
security problem definition
135.
security proof
136.
security protocols
137.
security requirements
138.
security requirements engineering
139.
security research
140.
security risk assessment
141.
security risk management
142.
security risks
143.
security science and technology
144.
security strategies
145.
security systems for military objects
146.
security testing
147.
security training
148.
security verification
149.
security-by-design
150.
social security planning
151.
societal security
152.
software security
153.
software security level
154.
software security subcharacteristics
155.
sufficient level of security
156.
system of economic security
157.
system security
158.
terrorism security
159.
transmission System Security
160.
voting privacy and security
subject term
3
1.
European Consortium for Political Research (ECPR)
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT