<p><p>This book interrogates the ways in which new technological advances impact the thought and practices of humanism. Chapters investigate the social, political, and cultural implications of the creation and use of advanced forms of technology, examining both defining benefits and potential danger
Human Security in Pakistan: Challenges and Opportunities
โ Scribed by Akshay K. Singh
- Publisher
- Centre for Central, South East Asian and South West Pacific Studies, Jawaharlal Nehru University (JN
- Year
- 2010
- Tongue
- English
- Leaves
- 350
- Category
- Library
No coin nor oath required. For personal study only.
๐ SIMILAR VOLUMES
<span>Since the Soviet invasion of Afghanistan in 1979, Pakistan has faced the threat of terrorism in different forms and shapes. Yet in recent years the threat has taken on a new dimension. After 9/11 the US campaign against Osama bin Laden, al-Qaeda and the Taliban in Afghanistan led to a surge in
<span>Since the Soviet invasion of Afghanistan in 1979, Pakistan has faced the threat of terrorism in different forms and shapes. Yet in recent years the threat has taken on a new dimension. After 9/11 the US campaign against Osama bin Laden, al-Qaeda and the Taliban in Afghanistan led to a surge in
Since the Soviet invasion of Afghanistan in 1979, Pakistan has faced the threat of terrorism in different forms and shapes. Yet in recent years the threat has taken on a new dimension. After 9/11 the US campaign against Osama bin Laden, al-Qaeda and the Taliban in Afghanistan led to a surge in unres
<p><span>Transformative Digital Humanities</span><span> takes a two-pronged approach to the digital humanities: it examines the distinct kinds of work currently being undertaken in the field, while also addressing current issues in the digital humanities, including sustainability, accessibility, int
This book explores and analyses the evolving African security paradigm in light of the multitude of diverse threats and challenges facing the continent and the international community. It challenges current thinking and traditional security constructs as woefully inadequate to meet the real security