{"title":"Economic Security: Conceptual and Operational Intersection of Trade Policy and National Security","authors":"J. Lash","doi":"10.1007/978-3-319-51761-2_50-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_50-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128966668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Societal Security and COVID-19","authors":"Jennifer D. Osetek, Keith W. Ludwick","doi":"10.1007/978-3-319-51761-2_51-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_51-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124810599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Physical Security, Cyber Security, and Critical Infrastructure: An Introduction","authors":"M. Martellini, Stanislav Abaimov","doi":"10.1007/978-3-319-51761-2_58-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_58-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"250 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114076646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Evolution of Salafi-Jihadism","authors":"Vicken Cheterian","doi":"10.1007/978-3-319-51761-2_74-1","DOIUrl":"https://doi.org/10.1007/978-3-319-51761-2_74-1","url":null,"abstract":"","PeriodicalId":228553,"journal":{"name":"Handbook of Security Science","volume":"84 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124694037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}