Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Academia's responses to crisis: A bibliometric analysis of literature on online learning in higher education during COVID‐19
This paper aimed to provide a holistic view of research that investigated online learning in
higher education around the globe during COVID‐19 utilizing a bibliometric analysis. The …
higher education around the globe during COVID‐19 utilizing a bibliometric analysis. The …
[HTML][HTML] Unbundling barriers to electricity security in Uganda: A review
Electricity propels economic development through improvement in the quality of life. Even
though government's strategy to increase power generation and supply exists, Uganda …
though government's strategy to increase power generation and supply exists, Uganda …
The securitisation of migration in the European Union: Frontex and its evolving security practices
This article investigates the evolving security practices of one of the key actors in the
handling of asylum-seekers and migrants at the external borders of the European Union …
handling of asylum-seekers and migrants at the external borders of the European Union …
Agents without agency: Assessing the role of the audience in securitization theory
A Côté - Security dialogue, 2016 - journals.sagepub.com
This article assesses the role of the audience in securitization theory. The main argument is
that in order to accurately capture the role of the securitization audience, it must be theorized …
that in order to accurately capture the role of the securitization audience, it must be theorized …
[책][B] Politics of last resort: Governing by emergency in the European Union
J White - 2020 - books.google.com
Prominent in the EU's recent transformations has been the tendency to advance
extraordinary measures in the name of crisis response. From emergency lending to macro …
extraordinary measures in the name of crisis response. From emergency lending to macro …
Huawei, 5G and security: Technological limitations and political responses
How did Chinese 5G providers, such as Huawei, become a security concern in the USA and
Europe? Were the security concerns related to 5G and Chinese suppliers based upon …
Europe? Were the security concerns related to 5G and Chinese suppliers based upon …
The securitization of the EU's digital tech regulation
D Mügge - Journal of European Public Policy, 2023 - Taylor & Francis
Regulation is a prominent tool in what Kruck and Weiss call the Regulatory Security State.
Safeguarding security entails sha** tech companies' behaviour through arms-length rules …
Safeguarding security entails sha** tech companies' behaviour through arms-length rules …
Hacking humans? Social Engineering and the construction of the “deficient user” in cybersecurity discourses
Today, social engineering techniques are the most common way of committing cybercrimes
through the intrusion and infection of computer systems. Cybersecurity experts use the term …
through the intrusion and infection of computer systems. Cybersecurity experts use the term …
[PDF][PDF] Introduction.–The Refugee Reception Crisis in Europe. Polarized Opinions and Mobilizations
In spite of various legislative efforts to ban discrimination, 1 xenophobic statements are
structurally present in the European public sphere, and incidents of racially motivated …
structurally present in the European public sphere, and incidents of racially motivated …