Connections the quarterly journal

Search form

  • Like Connections page on Facebook
  • Follow us on Twitter
  • Find connections on Istagram
  • Connect with us on LinkedIN
  • Subscribe to Connections RSS
  • English
  • Русский
  • Journal
    • Previews
    • Archive
    • Top papers
    • Athena Award
  • Submissions
    • Guidelines
    • Copyright information
    • Conflict of interest
    • Ethics in publishing
    • Themes
    • Calls for articles
    • Submit a paper
  • About
    • Mission
    • Editorial policy
    • Disclaimer
    • Editorial Board
    • Advisers
    • Author Index
    • Indexing & Archiving
    • Contact Us
    • Privacy policy
Share/Save

Caspian Oil and Regional Security

02.1.02_shonbayev.pdf

Publication Type:

Journal Article

Authors:

Malik Shonbayev

Source:

Connections: The Quarterly Journal, Volume 2, Issue 1, p.9-14 (2003)
  • 12277 reads
  • Google Scholar
  • DOI
  • RTF
  • EndNote XML

References

Vygoda – nash rulevoy” In Prot is Our Guide. Rambler.ru, 2001.
Novaya bitva za Kaspiy” In New Battle for the Caspian Sea. Rambler.ru, 2002.
Pyat stran – pyat pozitsyi” In Five Countries–Five Positions. Rambler.ru, 2002.

Check also our Google Scolar profile

  • Downloads
  • Cited in
  • How to cite
  • File Name: 02.1.02_shonbayev.pdf
    Size: 88.42 KB
    Number of Downloads: 5033
Atay, Deniz. Environmental Effectiveness Analysis Of Caspian Hydrocarbon Development. Middle East Technical University, 2009.
Bayraktar, Gökhan. "Hazar’dak‹ Jeopol‹T‹K Mücadelen‹N Türk‹Ye’n‹N Enerj‹ Güvenl‹⁄‹ne, Etk‹Ler‹ / The Effects of Energy Security in Turkey's Japanese Strategy in Hazar." Stratej‹K Öngörü 11 (2007).
APA style: Shonbayev, M. (2003).  Caspian Oil and Regional Security. Connections: The Quarterly Journal. 2(1), 9-14.
Chicago style: Shonbayev, Malik. "Caspian Oil and Regional Security." Connections: The Quarterly Journal 2, no. 1 (2003): 9-14.
IEEE style: Shonbayev, M., "Caspian Oil and Regional Security", Connections: The Quarterly Journal, vol. 2, issue 1, pp. 9-14, Spring 2003.
DOI http://dx.doi.org/10.11610/Connections.02.1.02
  • Trending
  • Latest
  • Most cited
  • Corruption as a Cybersecurity Threat in the New World Order (3,024)
  • Disinformation: Policy Responses to Building Citizen Resiliency (3,021)
  • Social Media – Hate Speech – Hate Crime (3,000)
  • Future Development of Quantum Computing and Its Relevance to NATO (2,925)
  • Cyber Skills Gaps – A Systematic Review of the Academic Literature (2,825)
view all
  • Maritime Cyber(in)security: A Growing Threat Imperils EU Countries
  • Security Aspects of Hybrid War, COVID-19 Pandemic and Cyber-Social Vulnerabilities
  • Neo-Authoritarianism and Leadership: Outcomes for Modern Ukraine
  • How Networks of Social Cooperation Scale into Civilizations
  • Chains, Continuums, and Virtuous Cycles: Parsing Taiwan’s Strategic Narratives and Soft Power Leadership in the Indo-Pacific
view all
Introduction to Program-based Defense Resource Management (8)
The Art of Shaping Defense Policy: Scope, Components, Relationships (but no Algorithms) (6)
NATO and the South Caucasus: Armenia, Azerbaijan, and Georgia on Different Tracks (5)
Terror-Crime Nexus? Terrorism and Arms, Drug, and Human Trafficking in Georgia (4)
Terrorist Routes in Central Asia: Trafficking Drugs, Humans, and Weapons (4)
view all

© Partnership for Peace Consortium of Defense Academies and Security Studies Institutes, 2012-2022
This site was designed and is maintained by Procon Ltd., Publisher of Connections: The Quarterly Journal