Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
In: Public administration: an international quarterly, Band 84, Heft 3, S. 673-692
ISSN: 0033-3298
SSRN
Working paper
SSRN
Working paper
SSRN
Working paper
In: Between Hierarchies and Markets, S. 149-188
In: The journal of conflict resolution: journal of the Peace Science Society (International), Band 54, Heft 2, S. 262-281
ISSN: 0022-0027, 0731-4086
In: Policy studies journal: an international journal of public policy, Band 36, Heft 4, S. 497-524
ISSN: 0190-292X
In: Vantaggiato , F P 2020 , ' Networks as First Best? Network Entrepreneurship and Venue Shifting in the Establishment of the Network of Euro–Mediterranean Energy Regulators ' , JOURNAL OF COMMON MARKET STUDIES , vol. 58 , no. 3 , pp. 654-671 . https://doi.org/10.1111/jcms.12956
Regulators often play a leading role in establishing their informal networks yet regulatory networks are usually considered a second-best instrument of policy integration. They have no decision-making powers and unclear policy impact. Why then do regulators initiate networks? The article shows that regulators form networks to shift the venue of policy discussion from a formal setting, dominated by policy-makers, to an informal one, where they share agenda-setting power with their peers only. Regulators forming networks are network entrepreneurs, for whom the establishment of the network is a policy goal in itself. Bolstered by previous positive networking experiences, network entrepreneurs consider networks the best instrument for influencing policy. The article analyses the empirical case of the network of energy regulators of the Euro–Mediterranean (MedReg, established in 2006) using elite interviews with 20 stakeholders. The findings hold implications for our understanding of informal regulatory collaboration in the EU and beyond.
BASE
SSRN
Working paper
In: IOP concise physics
Order from chaos is simultaneously a mantra of physics and a reality in biology. Physicist Norman Packard suggested that life developed and thrived at the edge of chaos. Questions remain, however, as to how much practical knowledge of biology can be traced to existing physical principles, and how much physics has to change in order to address the complexity of biology. Phil Anderson, a physics Nobel laureate, contributed to popularizing a new notion of the end of 'reductionism'. In this view, it is necessary to abandon the quest of reducing complex behavior to known physical results, and to identify emergent behaviors and principles. In the present book, however, we have sought physical rules that can underlie the behavior of biota as well as the geochemistry of soil development. We looked for fundamental principles, such as the dominance of water flow paths with the least cumulative resistance, that could maintain their relevance across a wide range of spatial and temporal scales, together with the appropriate description of solute transport associated with such flow paths. Thus, ultimately, we address both nutrient and water transport limitations of processes from chemical weathering to vascular plant growth. The physical principles guiding our effort are established in different, but related concepts and fields of research, so that in fact our book applies reductionist techniques guided by analogy. The fact that fundamental traits extend across biotic and abiotic processes, i.e., the same fluid flow rate is relevant to both, but that distinctions in topology of the connected paths lead to dramatic differences in growth rates, helps unite the study of these nominally different disciplines of geochemistry and geobiology within the same framework. It has been our goal in writing this book to share the excitement of learning, and one of the most exciting portions to us has been the ability to bring some order to the question of the extent to which soils can facilitate plant growth, and what limitations on plant sizes, metabolism, occurrence, and correlations can be formulated thereby. While we bring order to the soil constraints on growth, we also generate some uncertainties in the scaling relationships of plant growth and metabolism. Although we have made a first attempt to incorporate edaphic constraints into allometric scaling, this is but an initial foray into the forest.
In: Applications of Information Systems to Homeland Security and Defense, S. 79-106
In: Applications of Information Systems to Homeland Security and Defense
In: In Sven Horak (ed) Informal Networks in International Business (Emerald Publishing), Forthcoming
SSRN
Network Forensics is fairly a new area of research which would be used after an intrusion in various organizations ranging from small, mid-size private companies and government corporations to the defence secretariat of a country. At the point of an investigation valuable information may be mishandled which leads to difficulties in the examination and time wastage. Additionally the intruder could obliterate tracks such as intrusion entry, vulnerabilities used in an entry, destruction caused, and most importantly the identity of the intruder. The aim of this research was to map the correlation between network security and network forensic mechanisms. There are three sub research questions that had been studied. Those have identified Network Security issues, Network Forensic investigations used in an incident, and the use of network forensics mechanisms to eliminate network security issues. Literature review has been the research strategy used in order study the sub research questions discussed. Literature such as research papers published in Journals, PhD Theses, ISO standards, and other official research papers have been evaluated and have been the base of this research. The deliverables or the output of this research was produced as a report on how network forensics has assisted in aligning network security in case of an intrusion. This research has not been specific to an organization but has given a general overview about the industry. Embedding Digital Forensics Framework, Network Forensic Development Life Cycle, and Enhanced Network Forensic Cycle could be used to develop a secure network. Through the mentioned framework, and cycles the author has recommended implementing the 4R Strategy (Resistance, Recognition, Recovery, Redress) with the assistance of a number of tools. This research would be of interest to Network Administrators, Network Managers, Network Security personnel, and other personnel interested in obtaining knowledge in securing communication devices/infrastructure. This research provides a ...
BASE