z-logo
open-access-imgOpen Access
Security theory: Security as a multidimensional phenomenon
Author(s) -
Radoslav Ivančík,
AUTHOR_ID
Publication year - 2021
Publication title -
vojenské reflexie
Language(s) - English
Resource type - Journals
ISSN - 1336-9202
DOI - 10.52651/vr.a.2021.3.32-53
Subject(s) - security studies , critical security studies , security through obscurity , phenomenon , politics , security engineering , political science , sociology , engineering ethics , epistemology , security service , computer security , cloud computing security , computer science , security information and event management , law , information security , software security assurance , engineering , network security policy , cloud computing , philosophy
People have been developing and continue to make enormous efforts, energy, and resources to ensure their safety since the beginning of their existence. The security and existence of people have been interconnected since time immemorial, and the history of mankind is, to a certain extent, also the history of the struggle for its security. That is also why the term security is one of those terms that we encounter almost daily and that we use very often throughout our lives. The term itself has several different meanings and dimensions, and with the development and ongoing changes in human society it is constantly gaining new ones. This is proof not only of the fact that the development of the security agenda is in constant progress, especially in the first two decades of the 21st century, but also that the approach of politicians, political scientists, academics, soldiers, security, and other experts to security is many times very different. Based on the above, the primary goal of the author, using relevant scientific methods within interdisciplinary research, is to contribute to the development of security science and expand the theoretical and perceptual basis of security and offer readers from the professional and lay public the opportunity to get acquainted with relevant theoretical sources and approaches to researching individual dimensions of security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here