Toggle navigation
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Publications
Profiles
Research Groups
Indexes
Help and information
Eesti keeles
Intranet
Databases
Publications
Searching
My bookmarks
0
political and security cultures (keyword)
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
All fields
Source search
Author search
Subject term search
Title search
starts with
containes
exact match
—
Add criteria
Advanced search
filter
Clear
×
types of item
book
..
journal article
..
newspaper article
..
book article
..
dissertation
..
Open Access
..
Scientific publications
..
year
year of publication
Loading..
author
Loading..
TalTech department
Loading..
subject term
Loading..
series
Loading..
name of the person
Loading..
keyword
Loading..
Clear
Number of records
1
Look more..
(2/159)
Export
export all inquiry results
(1)
Save TXT fail
print
Open for editing with marked entries
my bookmarks
display
Bibliographic view
Short view
sort
author ascending
author descending
year of publication ascending
year of publication descending
title ascending
title descending
1
book
Producing cultural change in political communities : the impact of populism and extremism on the international security environment
2023
https://doi.org/10.1007/978-3-031-43440-2
book
Number of records 1, displaying
1 - 1
keyword
156
1.
political and security cultures
2.
political cultures
3.
Security and political science
4.
continuous cultures
5.
high context and low context cultures
6.
non-dairy starter cultures
7.
organizational cultures
8.
vegan starter cultures
9.
constitutional political economy
10.
critical political economy
11.
Estonian political parties
12.
international relations and international political economy
13.
local political decision-making behaviour
14.
political and ideological conflict
15.
political and judicial oversight
16.
political communities
17.
political community
18.
political conflict
19.
political crisis
20.
political culture
21.
political debates
22.
political decision-making
23.
political ecology
24.
political economy
25.
political extremism
26.
political ideology
27.
political integration
28.
political leaders
29.
political leadership
30.
political methodology
31.
political orientation
32.
political participation
33.
political regime
34.
political robustness
35.
political science
36.
political trilemma
37.
socio‐political implications
38.
ad-hoc sensor networks security
39.
Automatic Security Verification
40.
Blockchain security
41.
cache security
42.
communication system security
43.
comprehensive system of economic security
44.
computer security
45.
cooperative security dilemma
46.
cyber security
47.
cyber security education
48.
cyber security exercises
49.
cyber security monitoring
50.
cyber security strategies
51.
cyber-security
52.
data and information security
53.
data security
54.
development of security cameras
55.
digital security practices
56.
drinking water security
57.
economic security
58.
economic security of enterprise
59.
emotional security
60.
energy security
61.
energy security indicator
62.
Estonian information security standard
63.
graded security
64.
hardware security
65.
hardware security primitive
66.
high level of security
67.
Homeland security
68.
human security
69.
information security
70.
information security and privacy
71.
initial level of security
72.
internal security
73.
international security
74.
investment and innovation security
75.
IPv6 security
76.
IT security
77.
IT security management
78.
job security
79.
long-term security
80.
maritime cyber security
81.
maritime cyber security operations centers
82.
Maritime Security Operations Center (M-SOC)
83.
medium level of security
84.
metadata model for security measures
85.
Middle Eastern security
86.
Mobile security
87.
national cyber security strategy
88.
national security
89.
NATO. Science for Peace and Security Program
90.
network security
91.
network security monitoring
92.
OSCE (Organization for Security and Co-operation in Europe)
93.
passenger’s security
94.
policy-based routing security
95.
post-quantum security
96.
power system security
97.
quantitative security
98.
regional security
99.
RISC-V Security Verification
100.
Safety and Security in Sea Transportation
101.
safety and security testing
102.
security
103.
security adaptation
104.
security alert prioritization
105.
security analysis
106.
security and justice (AFSJ)
107.
security and privacy
108.
security and privacy in smart grids
109.
Security Assertion Mining
110.
security closure
111.
Security Coverage
112.
security dataset
113.
security dilemma
114.
Security evaluation
115.
security evaluation instruments
116.
Security Level Evaluation
117.
Security limitations
118.
security log analysis
119.
security management
120.
security model
121.
security monitoring
122.
security notion
123.
security objectives
124.
security of data
125.
security of supply
126.
security operation center
127.
security operations center
128.
security patterns
129.
security policy
130.
security problem definition
131.
security proof
132.
security protocols
133.
security requirements
134.
security requirements engineering
135.
security research
136.
security risk assessment
137.
security risk management
138.
security risks
139.
security science and technology
140.
security strategies
141.
security systems for military objects
142.
security testing
143.
security training
144.
security verification
145.
security-by-design
146.
social security planning
147.
societal security
148.
software security
149.
software security level
150.
software security subcharacteristics
151.
sufficient level of security
152.
system of economic security
153.
system security
154.
terrorism security
155.
transmission System Security
156.
voting privacy and security
subject term
3
1.
European Consortium for Political Research (ECPR)
2.
National Computer Security Incident Response Teams (N-CSIRTs)
3.
USS Security Eesti AS
×
match
starts with
ends with
containes
sort
Relevance
ascending
descending
year of publication
author
TalTech department
subject term
series
name of the person
keyword
Otsing
Valikud
0
year of publication
AND
OR
NOT
author
AND
OR
NOT
TalTech department
AND
OR
NOT
subject term
AND
OR
NOT
series
AND
OR
NOT
name of the person
AND
OR
NOT
keyword
AND
OR
NOT