"IT Security and Threats"
Prüm: A Model 'Prêt-à-Exporter'?
Author: Rocco Bellanova
Centre for European Policy Studies (CEPS)
This study analyzes the position of relevant actors and their capacity to increase their powers or to quell resistance during the process of extra-territorialisation of security measures based on data access.
More on «Prüm: A Model 'Prêt-à-Exporter'?»
IT, Emerging Commercial Capabilities, Terrorism
Author: Maura Conway, George Handy, John Kimball, Jeffrey Winbourne, Hussein H. Fakhry, Benedict Bernard Cardozo, Krassimir Kuzmanov, Plamen Torlakov, Bojan Mednikarov, Kiril Kolev
ProCon Ltd. /
International Relations and Security Network (ISN)
This volume of Information & Security discusses several aspects of information technology and terrorism and also analyzes the response to terrorism by armed forces.
More on «IT, Emerging Commercial Capabilities, Terrorism»
Open Source Software
UK Parliamentary Office of Science and Technology (POST)
This brief explains how open source software works, outlines current and prospective uses and examines recent policy developments.
More on «Open Source Software»