Security
Description
Security is protection from, or resilience against, potential harm. Beneficiaries of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or phenomenon vulnerable to unwanted change.
– syndicated content from Wikipedia
Second Level Subjects
Organizations relating to Security
CARICOM Implementation Agency for Crime and Security / Port-of-Spain, Trinidad-Tobago / Est. 2006
African Security Sector Network / Accra, Ghana / Est. 2003
Forum Regional Security Committee / Suva, Fiji / Est. 1991
ASEAN Institutes for Strategic and International Studies / Jakarta, Indonesia / Est. 1988
European Institute for Futures Studies / Est. 1990
Collective Security Treaty Organization / Moscow, Russia / Est. 2002
Allied Command Operations / Shape, Belgium / Est. 1951
United Nations Standing Advisory Committee on Security Questions in Central Africa / New York NY, USA / Est. 1992
European Aviation Security Training Institute / Brussels, Belgium / Est. 1997
United Nations University Institute for Environment and Human Security / Bonn, Germany / Est. 2003
Council for Peace and Security in Central Africa / Libreville, Gabon / Est. 1999
International Multilateral Partnership Against Cyber Threats / Cyberjaya, Malaysia
European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice / Tallinn, Estonia / Est. 2011
NGO Working Group on the Security Council / New York NY, USA / Est. 1997
G5 Sahel / Nouakchott, Mauritania / Est. 2014
Organization for Security and Cooperation in Europe / Vienna, Austria / Est. 1975
Le Cercle
Proliferation Security Initiative / Est. 2003
Union for the International Registration of Audiovisual Works / Geneva, Switzerland / Est. 1991
KFOR / Pristina, Kosovo / Est. 1999
ECHELON Network / Est. 1971
Five Power Defence Arrangements / Est. 1971
Kangaroo Group - Free Movement and Security / Brussels, Belgium / Est. 1979
International Action Network on Small Arms / Est. 1998
ASEAN Troika / Jakarta, Indonesia / Est. 2000
Information Security Forum / London, UK / Est. 1989
Institute for Strategic Dialogue / London, UK
Caribbean Aviation Safety and Security Oversight System / Kingston, Jamaica / Est. 2008
Global Nuclear Safety and Security Network / Vienna, Austria
Institute for International Relations, Hamburg / Hamburg, Germany
Institute on Global Conflict and Cooperation / La Jolla CA, USA / Est. 1983
Institute for Environmental Security / The Hague, Netherlands / Est. 2002
Wisconsin Institute for Peace and Conflict Studies / Stevens-Point WI, USA / Est. 1985
Global Security Institute / New York NY, USA / Est. 1999
Instituto Português de Relações Internacionais e Segurança / Lisbon, Portugal
Olof Palme Memorial Fund for International Understanding and Common Security / Stockholm, Sweden / Est. 1986
Institute for Defence Studies and Analyses / Delhi, India / Est. 1965
Institute of Security and International Studies, Bangkok / Bangkok, Thailand
Research Institute for Peace and Security, Tokyo / Tokyo, Japan / Est. 1978
Galizan Institute for International Security and Peace Studies / La Coruña, Spain / Est. 2005
Foundation for Research on International Environment, National Development and Security / Rawalpindi, Pakistan / Est. 1991
Institute for Peace Research and Security Policy, Hamburg / Hamburg, Germany / Est. 1971
Center for International Trade and Security / Athens GA, USA / Est. 1987
Stanley Center for Peace and Security / Muscatine IA, USA / Est. 1956
Ford Institute for Human Security / Pittsburgh PA, USA / Est. 2003
Liu Institute for Global Issues / Vancouver BC, Canada
Western Hemisphere Institute for Security Cooperation / Fort Benning GA, USA / Est. 2000
Center for International Security and Cooperation / Stanford CA, USA / Est. 1983
HURPEC International Network / Mississauga ON, Canada / Est. 1998
Commission on Security and Cooperation in Europe / Washington DC, USA / Est. 1976
View all profiles (420 total) in the Yearbook of International Organizations
← return to your search page to find additional profiles.
UIA allows users to access and make use of the information contained in its Databases for the user’s internal use and evaluation purposes only. A user may not re-package, compile, re-distribute or re-use any or all of the UIA Databases or the data* contained therein without prior permission from the UIA.
Data from database resources may not be extracted or downloaded in bulk using automated scripts or other external software tools not provided within the database resources themselves. If your research project or use of a database resource will involve the extraction of large amounts of text or data from a database resource, please contact us for a customized solution.
UIA reserves the right to block access for abusive use of the Database.
* Data shall mean any data and information available in the Database including but not limited to: raw data, numbers, images, names and contact information, logos, text, keywords, and links.