Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "proxy" wg kryterium: Temat


Tytuł:
Alternatywne techniki głosowania a frekwencja wyborcza
Alternative voting methods and voter turnout
Autorzy:
Korycki, Krzysztof
Powiązania:
https://bibliotekanauki.pl/articles/585318.pdf
Data publikacji:
2017
Wydawca:
Łódzkie Towarzystwo Naukowe
Tematy:
frekwencja wyborcza
głosowanie przez pełnomocnika
głosowanie korespondencyjne
elektroniczne głosowanie
voter turnout
proxy voting
postal voting
e-voting
Opis:
W artykule zostały wskazane przyczyny, trwającej od wielu lat, niskiej frekwencji wyborczej w Polsce. Przedstawione zostały trzy alternatywne techniki oddania głosu, które oprócz realizacji gwarancji powszechności wyborów mogą przyczynić się do podwyższenia frekwencji wyborczej. Głosowanie przez pełnomocnika oraz głosowanie korespondencyjne występują już w polskim prawie wyborczym. Głosowanie elektroniczne analizowane jest na podstawie wyników wyborów w Estonii, gdzie od 2005 roku jest ono wykorzystywane. W swym artykule szukam odpowiedzi na pytanie: która z zaprezentowanych technik oddania głosu najbardziej przyczynia się do podwyższenia frekwencji wyborczej.
Article indicates the cause, lasting many years, the low voter turnout in Poland. They presented three alternative techniques to vote, which in addition to the guarantee of universal suffrage can help to increase turnout. Voting by proxy and postal vote are already in the Polish electoral law. Electronic voting is analyzed on the basis of the election results in Estonia, where since 2005 it is used. In his article, I am looking for answers to the question: which of the presented techniques voting contributes most to the increase turnout.
Źródło:
Studia Wyborcze; 2017, 23; 83-105
1898-0082
Pojawia się w:
Studia Wyborcze
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Automatic proxy generation and load-balancing-based dynamic choice of services
Autorzy:
Dąbrowski, J.
Feduniak, S.
Baliś, B.
Bartyński, T.
Funika, W.
Powiązania:
https://bibliotekanauki.pl/articles/305465.pdf
Data publikacji:
2012
Wydawca:
Akademia Górniczo-Hutnicza im. Stanisława Staszica w Krakowie. Wydawnictwo AGH
Tematy:
proxy
load-balancer
load balancing
automatic generation
Opis:
The paper addresses the issues of invoking services from within workflows which are becoming an increasingly popular paradigm of distributed programming.The main idea of our research is to develop a facility which enables load balancing between the available services and their instances. The system consists of three main modules: a proxy generator for a specific service according to its interface type, a proxy that redirects requests to a concrete instance of the service and load-balancer (LB) to choose the least loaded virtual machine (VM) which hosts a single service instance. The proxy generator was implemented as a bean (in compliance to EJB standard) which generates proxy according to the WSDL service interface description using XSLT engine and then deploys it on a GlassFish application server using GlassFish API, the proxy is a BPEL module and load-balancer is a stateful Web Service.
Źródło:
Computer Science; 2012, 13 (3); 45-59
1508-2806
2300-7036
Pojawia się w:
Computer Science
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Changes in habitat conditions in a Late Glacial fluviogenic lake in response to climatic fluctuations (Warta River valley, central Poland)
Autorzy:
Forysiak, Jacek
Okupny, Daniel
Obremska, Milena
Antczak-Orlewska, Olga
Płóciennik, Mateusz
Pawłowski, Dominik
Baradyn, Daria
Kotrys, Bartosz
Luoto, Tomi P.
Nevalainen, Liisa
Borówka, Ryszard K.
Powiązania:
https://bibliotekanauki.pl/articles/13955341.pdf
Data publikacji:
2023
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
multi-proxy analysis
Late Weichselian
denudation processes
palaeoclimate
central European river
Opis:
The Warta River valley was greatly influenced by the ice sheet of the Last Glacial Maximum (LGM). A small peatland located in the Warta drainage system is here used as a palaeoarchive of climatic and habitat changes during the Late Glacial (Weichselian). The Ługi sediment profile was investigated using multi-proxy (pollen, Chironomidae, Cladocera and geochemistry) analyses that recorded changes in a fluviogenic sedimentary depression. After the Poznań Phase (LGM), Ługi functioned as an oxbow lake that was cut off from the active river channel as a result of fluvial erosion. Since that time, the Warta River has flowed only along the section now occupied by the Jeziorsko Reservoir. Sedimentation of lacustrine deposits started at the beginning of the Late Glacial. Summer temperature reconstructions indicate cool Oldest and Younger Dryas, but no clear cooling in the Older Dryas. During the Younger Dryas the palaeolake was completely occupied by a peatland (fen), which periodically dried out during the Holocene. Investigation of this site has tracked the reaction of the habitat to climatic, hydrological and geomorphological changes throughout the Late Weichselian.
Źródło:
Geological Quarterly; 2023, 67, 1; art. no. 1
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Changing the character of proxy warfare and its consequences for geopolitical relationships
Autorzy:
Ivanov, Zoran
Powiązania:
https://bibliotekanauki.pl/articles/1194383.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
state
Proxy force
technologic empowerment
political relationships
geopolitical environment
Opis:
The main purpose of the article is to examine the causal relationship between key elements of the geostrategic environment (i.e. political, military, and technological) and the changes in the characteristics of proxy force. Qualitative data analysis is used to identify the geopolitical environment conditions, actors, and their relationship. The causal analysis between key elements of the geopolitical environment, such as politics, military, and technological, therefore influences how proxy forces change character. The findings imply that the contemporary geopolitical environment is changing the character of the proxies. They can be used as multipurpose forces depending on the desired strategic outcome. The results advocate that proxies have a global reach beyond the traditional battlefield. These capabilities allow proxies to be used in a wide range of political, economic, and military activities, especially in peacetime, and, therefore, influencing, changing, and damaging the state’s mutual relationships. Despite differences between several theoretical perspectives of security theories, many concur on the low desirability of proxy force. The changing characteristics of proxy war allow state and non-state actors to wage war with a minimal use of force, or none at all, beyond the traditional battlefield. Political violence demonstrated through proxy force to fulfil foreign policy goals has become even more violent. In such action, disregarding the sustainable strategic goal can easily damage the state’s international relations and threaten international and regional stability. The overall findings show the urgency for a more holistic approach in the analysis of proxy warfare as part of security studies and military operations.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 37-51
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Climate change and human impact in the southern Baltic during the last millennium reconstructed from an ombrotrophic bog archive
Autorzy:
Lamentowicz, Mariusz
Gałka, Mariusz
Pawlyta, Jacek
Lamentowicz, Łukasz
Goslar, Tomasz
Miotk-Szpiganowicz, Grażyna
Powiązania:
https://bibliotekanauki.pl/articles/2026706.pdf
Data publikacji:
2011
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
Baltic bog
last millennium
multi-proxy
Polska
peatlands
raised bog
Opis:
We pres ent the last mil len nium of his tory of a peatland lo cated in north ern Po land. Our re sults are based on two rep li - cate mono liths taken from a Bal tic raised bog. We ap plied a high-res o lu tion ap proach and ra dio car bon dat ing to the peat ma te rial to ob tain a de tailed palaeoenvironmental re con struc tion. To re con struct past peatland mois ture, we used three prox ies: tes tate amoe bae, plant macrofossils and pol len. De spite dif fer ent peat ac cu mu la tion and ex ten sive hi a tus in the for merly stud ied core, both mono liths show a sim i lar pat tern of changes. How ever, the core from this study pro - vides us with more de tailed data on S. fuscum dis ap pear ance which cor re lates well with the data from the other Bal tic bog, S³owiñskie B³oto. Our re search shows that pris tine Bal tic bogs can be dated to AD 1350. S³owiñskie B³oto palaeohydrology con firms AD 1300 as the be gin ning of the hy dro log i cal dis tur bance. In the case of the St¹¿ki and S³owiñskie B³oto bogs, the Lit tle Ice Age (LIA) is re corded be tween AD 1500 and AD 1800. How ever, this cli ma tic change might have been blurred by hu man im pact. In the case of the Bal tic bogs, their ref er ence vir gin state can be dated to AD 1200. Af ter this date, we ob served in creas ing hu man im pact and cli ma tic in sta bil ity con nected with the LIA. How ever, be tween AD 1800 and 1900, bogs were wet, most pos si bly due to cli ma tic forc ing. This fact sug gests that de spite hu man im pact, re cent peat de pos its can still re flect cli mate. Our re search pro vided in for ma tion re lated to the time of ex is tence, lo ca tion and char ac ter is tics of the nat u ral/pris tine state. High-res o lu tion peatland palaeo ec ol ogy is cru cial for res to ra tion ac tiv i ties, e.g., rewetting and en vi ron men tal man age ment. The palaeohydrological con text (sup ported by other prox ies) of the last 1000 years pro vides a re li able an swer to the ques tion: ‘To rewet or not to rewet?’
Źródło:
Studia Quaternaria; 2011, 28; 3-16
1641-5558
2300-0384
Pojawia się w:
Studia Quaternaria
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Countering terrorism in the shadows: The role of private security and military companies
Autorzy:
Hlouchova, Iveta
Powiązania:
https://bibliotekanauki.pl/articles/1194366.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
regulations
privatization
counterterrorism
proxy
Opis:
The article identifies the main features of the PSMCs’ involvement in counterterrorism operations and outlines what their future involvement might look like with its implications for international peace and security. The main methods used to gather data and to draw inferences are a content analysis of relevant primary and secondary sources, and a discourse analysis, used as a method of examining the prevailing discourse surrounding the activities of PSMCs, seeking to understand the level of transparency, accountability and attributability of these actors. So far, the PSMCs’ potential for counterterrorism has not been fully exploited. There are many challenges surrounding the existence and operations of PSMCs, mainly lack of transparency and accountability, the continuous significance of the plausible deniability and political expediency PSMCs provide to nation governments, and an insufficient and inadequate international regulatory and control framework with no sanction or enforcement mechanisms. Most recently, the tendency to re-legitimise PSMCs’ activities can be identified. There will most probably be an expansion of PSMCs’ activities in the near future, as climate change consolidates security as a commodity, not a right. Therefore, there is a renewed urgency for adequate and effective international regulatory and control mechanisms on their activities on the international level.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 155-169
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
CZY ALTERNATYWNE METODY GŁOSOWANIA I INNE UŁATWIENIA WYBORCZE MOGĄ ROZWIĄZAĆ PROBLEM PRZYMUSOWEJ ABSENCJI WYBORCZEJ? REFLEKSJE I SPOSTRZEŻENIA OSOBY NIEPEŁNOSPRAWNEJ W ŚWIETLE WYBORÓW SAMORZĄDOWYCH 2014
CAN ALTERNATIVE VOTING METHODS AND OTHER FACILITIES SOLVE THE PROBLEM OF FORCED VOTER ABSENCE? INSIGHTS FROM A DISABLED PERSON REGARDING THE LOCAL ELECTIONS OF 2014
Autorzy:
Jankowska, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/513039.pdf
Data publikacji:
2015
Wydawca:
Uniwersytet Rzeszowski. Wydawnictwo Uniwersytetu Rzeszowskiego
Tematy:
Electoral Code
alternative voting methods
postal voting
proxy voting
local elections
Opis:
The fundamental claim which accompanied the implementation of alternative vot-ing methods into the Polish Law was the guarantee of the fullest realization of the uni-versal suffrage. The current regulations of the Electoral Code allow people with disabili-ties to vote by mail or by proxy. This deviation from the rule of voting personally in a polling station and enfranchising people with disabilities is a clear sign of the adapta-tion of Polish reality to Western European standards. The enactment of the law and implementation of additional legal solutions are only the first step to a greater change. The current challenges of electoral law are both perfect-ing the new voting methods and educating voters to compel them to vote; that is to exer-cise their constitutional privilege.
Źródło:
Polityka i Społeczeństwo; 2015, 13, 3; 69-81 (13)
1732-9639
Pojawia się w:
Polityka i Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design of a rule based monetary policy in a Central Bank Digital Currency System
Autorzy:
Wijngaard, Jacob
Van Hee, Kees
Powiązania:
https://bibliotekanauki.pl/articles/14110259.pdf
Data publikacji:
2021-12-28
Wydawca:
Wyższa Szkoła Bankowa we Wrocławiu
Tematy:
Design
CBDC
Rule-based
Monetary policy
Inflation correction
Domestic product proxy
Opis:
Aim: This paper presupposes a purely Central Bank Digital Currency (CBDC) based system. Its aim is to describe how such a system facilitates complete new possibilities to design a suitable monetary policy. More specifically, the purpose is to show that the available monetary tools can be used to design a rule-based monetary policy that guarantees stability of purchasing power and interest rates. Research methods: The paper is design oriented. It describes how the monetary system could function The important monetary variables are defined and their relationship is described. To illustrate these variables and their relationship, simulation results of their behavior are added. Conclusions: It is shown that it is indeed possible to design a monetary policy that is rule based and guarantees stability of purchasing power and interest rates. Crucial elements in the design are linking the balances of the CBDC-accounts to a proxy of the domestic product and replacing the use of government bonds by allowing the government to borrow from the Central Bank and giving households and businesses the opportunity to open a savings account at the Central Bank. Originality: The approach is completely new. It is the result of rethinking the possibilities of a complete transition of bank money to CBDC. Implications: The paper shows that a more absolute transition to the use of CBDC makes it possible to establish a clearer and more stable monetary practice, and that it is necessary therefore to revise monetary theory.
Źródło:
Central European Review of Economics and Management; 2021, 5, 4; 61-95
2543-9472
Pojawia się w:
Central European Review of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Differentiated Service Model-Supported Cluster-Based Routing in Wireless Sensor Networks
Autorzy:
Agarkhed, Jayashree
Dattatraya, Patil Yogita
Patil, Siddarama
Powiązania:
https://bibliotekanauki.pl/articles/307674.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
clustering
energy efficiency
proxy server
TDMA
wireless sensor networks
Opis:
Wireless Sensor Network finds its extensive use in healthcare applications for the transfer of time-critical data through wireless connectivity. The primary cause of network failure is the transfer of time-critical multimedia data. The article presents a new dfferentiated service modelsupported (DSM) cluster-based routing in wireless sensor networks (WSNs) that overcomes the above issue. DSM prioritizes the transfer of dfferent flow types based on packet type and packet size. The employment of computational offlading minimizes delay for critical and small-sized data packets and by carrying out data reduction of large-sized packets at proxy server. It outperforms the existing protocols in terms of energy efficiency, throughput, and reliability by prioritizing the transfer of time-critical health application data.
Źródło:
Journal of Telecommunications and Information Technology; 2020, 3; 1-9
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Enhance performance of web proxy cache cluster using cloud computing
Autorzy:
Alsaiari, N. O.
Fayoumi, A. G.
Powiązania:
https://bibliotekanauki.pl/articles/102085.pdf
Data publikacji:
2013
Wydawca:
Stowarzyszenie Inżynierów i Techników Mechaników Polskich
Tematy:
Web proxy cache cluster
resource utilization
load balancing
cloud computing
Opis:
Web caching is a crucial technology in Internet because it represents an effective means for reducing bandwidth demands, improving web server availability and reducing network latencies. However, Web cache cluster, which is a potent solution to enhance web cache system’s capability, still, has limited capacity and cannot handle tremendous high workload. Maximizing resource utilization and system capability is a very important problem in Web cache cluster. This problem cannot be solved efficiently by merely using load balancing strategies. Thus, along with the advent of cloud computing, we can use cloud based proxies to achieve outstanding performance and higher resource efficiency, compared to traditional Web proxy cache clusters. In this paper, we propose an architecture for cloud based Web proxy cache cluster (CBWPCC) and test the effectiveness of the proposed architecture, compared with traditional one in term of response time ,resource utilization using CloudSim tool.
Źródło:
Advances in Science and Technology. Research Journal; 2013, 7, 20; 2-10
2299-8624
Pojawia się w:
Advances in Science and Technology. Research Journal
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine
Autorzy:
Kozera, Cyprian A.
Bernat, Paweł
Gürer, Cüneyt
Popławski, Błażej
Sözer, Mehmet A.
Powiązania:
https://bibliotekanauki.pl/articles/1194387.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Proxy Forces
Libya
Mali
Syria
Ukraine
Central African Republic
Opis:
The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject, governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently, the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict’s outcome.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 77-97
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
GŁOSOWANIE PER PROCURA W WYBORACH DO PARLAMENTU EUROPEJSKIEGO (NA PRZYKŁADZIE POLSKI)
VOTING PER PROCURA IN ELECTIONS TO THE EUROPEAN PARLIAMENT (THE EXAMPLE OF POLAND)
Autorzy:
Kowalczyk, Tomasz
Powiązania:
https://bibliotekanauki.pl/articles/441502.pdf
Data publikacji:
2013
Wydawca:
Sopocka Akademia Nauk Stosowanych
Tematy:
wybory
głosowanie
alternatywne metody głosowania
podstawowe zasady prawa wyborczego
głosowanie przez pełnomocnika
elections
voting
alternative voting methods
the general principles of elector law
voting by proxy
Opis:
W powyższym artykule została przedstawiona instytucja głosowania przez pełnomocnika w wyborach do Parlamentu Europejskiego. Zaprezentowane jest ono głównie na przykładzie polskiego prawa wyborczego, ale autor odnosi się również do systemów takich państw jak: Wielka Brytania, Francja czy Belgia. Głosowanie per procura zostało przedstawione w kontekście prawa do głosowania bezpośredniego i wykazane czy jest ono z nim zgodne czy nie. W ostatniej części tego artykułu autor odnosi się do różnych rodzajów głosowania przez pełnomocnika i daje odpowiedź na pytanie, czy pełnomocnik odgrywa swoją rolę, a może jego rola została zmieniona.
This paper presents an institution of voting by a proxy in the elections to the European Parliament. It is presented taking into consideration mainly Polish law system, but other systems, for example, British, French or Belgian are also described. Per procura voting will be presented in the context of the voting right, it will show if it is congruous with this right or not. In the end of this paper theauthor refers to different types of voting by a proxy and gives the answer to the question if the proxy plays its role or perhaps its role has been changed.
Źródło:
Przestrzeń, Ekonomia, Społeczeństwo; 2013, 3/1; 53-62
2299-1263
2353-0987
Pojawia się w:
Przestrzeń, Ekonomia, Społeczeństwo
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Granice instytucjonalnej interwencji wobec rodziny. Diagnoza syndromu zastępczego zespołu Münchhausena w Niemczech – prezentacja przypadków
Autorzy:
Jonda, Bernadette
Powiązania:
https://bibliotekanauki.pl/articles/652030.pdf
Data publikacji:
2014
Wydawca:
Uniwersytet Łódzki. Wydawnictwo Uniwersytetu Łódzkiego
Tematy:
dzieci pozbawione rodziców
Münchhausen-by-proxy-Syndrom
Aktion Rechte für Kinder e.V.
Jugendamt
Opis:
Artykuł nawiązuje do kontrowersyjnych i stosunkowo częstych decyzji niemieckich sądów pozbawiających obywateli praw rodzicielskich, a przez to odbierających dzieciom szansę na życie we własnej rodzinie. Nie dotyczy to sytuacji, w których rozłąka z rodzicami z powodu ich winy jest konieczna (np. w związku z zaniedbaniami, znęcaniem się), lecz sytuacji, które powstają w wyniku błędnych diagnoz lekarskich. W artykule szczególną uwagę zwrócono na decyzje sądowe, które opierają się na diagnozie lekarskiej określanej terminem Münchhausen-by-proxy-Syndrom (MSBP). Wyjaśniając to zjawisko, autorka przytacza przykłady ilustrujące los dzieci, które niemieckie urzędy do spraw młodzieży (Jugendamt) i sądy rodzinne pozbawiły dzieciństwa z rodzicami, oraz pokazuje, jak istotne jest społeczne wsparcie dla ludzi dotkniętych tym losem. Przykładem obywatelskiej samoorganizacji na rzecz ochrony rodziny i interesów dzieci jest działalność stowarzyszenia Aktion Rechte für Kinder e.V.
Źródło:
Acta Universitatis Lodziensis. Folia Sociologica; 2014, 49
0208-600X
2353-4850
Pojawia się w:
Acta Universitatis Lodziensis. Folia Sociologica
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ID-based, Proxy, Threshold Signature Scheme
Autorzy:
Pomykała, Jacek
Kułakowski, Henryk
Sapiecha, Piotr
Grela, Błażej
Powiązania:
https://bibliotekanauki.pl/articles/1844644.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
ID-based
proxy
threshold
signature
scheme
Opis:
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 201-205
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Jemen - the Proxy War
Autorzy:
El Ghamari, Magdalena
Powiązania:
https://bibliotekanauki.pl/articles/527005.pdf
Data publikacji:
2015
Wydawca:
Collegium Civitas
Tematy:
Yemen Crisis
Global Proxy Wars
International Politics
Arab Middle East
Persian Gulf
Disintegration
Arabism
Houthism
Wahhabism
Opis:
The military operation in Yemen is significant departure from Saudi Arabia's foreign policy tradition and customs. Riyadh has always relied on three strategies to pursue its interests abroad: wealth, establish a global network and muslim education and diplomacy and meadiation. The term "proxy war" has experienced a new popularity in stories on the Middle East. A proxy war is two opposing countries avoiding direct war, and instead supporting combatants that serve their interests. In some occasions, one country is a direct combatant whilst the other supporting its enemy. Various news sources began using the term to describe the conflict in Yemen immediately, as if on cue, after Saudi Arabia launched its bombing campaign against Houthi targets in Yemen on 25 March 2015. This is the reason, why author try to answer for following questions: Is the Yemen Conflict Devolves into Proxy War? and Who's fighting whom in Yemen's proxy war?" Research area includes the problem of proxy war in the Middle East. For sure, the real problem of proxy war must begin with the fact that the United States and its NATO allies opened the floodgates for regional proxy wars by the two major wars for regime change: in Iraq and Libya. Those two destabilising wars provided opportunities and motives for Sunni states across the Middle East to pursue their own sectarian and political power objectives through "proxy war".
Źródło:
Securitologia; 2015, 2 (22); 43-56
1898-4509
Pojawia się w:
Securitologia
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies