• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6562
  • 1927
  • 919
  • 814
  • 686
  • 373
  • 179
  • 161
  • 154
  • 105
  • 93
  • 81
  • 79
  • 77
  • 76
  • Tagged with
  • 14837
  • 2974
  • 2027
  • 1876
  • 1454
  • 1382
  • 1345
  • 1298
  • 1264
  • 1169
  • 1155
  • 1149
  • 1075
  • 1030
  • 952
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
761

Perceptions and Strategic Concerns of Gender in Terrorism

Rudee, Eliana 01 January 2014 (has links)
This thesis argues that women are increasingly recruited by terrorist organizations because they are perceived as high benefit and low cost perpetrators. Female terrorism is an increasing trend, as it is particularly effective and becoming more effective over time. Its effectiveness results from cross-cultural, deeply imbedded stereotypes of female behavior. Women are seen as nonviolent in the cultures from which female terrorists emerge and in which they perpetrate their attacks, and are therefore given more lenient security measures at security barriers. In addition, security policies reflect these stereotypes, as some only apply to men. The literature on the topic of gender and terrorism often addresses individual motivations for terrorism and misses the practical element of group strategy that is vital to understand in order to effectively defend against the trends of female terrorism. I found that terrorist groups are rational actors and thus choose to deploy women because they are low cost and high benefit. Terrorist groups learn through interactive exchanges with the target population or government and act accordingly. While the goal of gender equality may be used in secular terrorist organizations’ rhetoric, women’s involvement in terrorism does not necessarily equate to western-style feminism or gender equality. I illustrate the racial implications that are upheld and replicated through stereotypes about terrorism. Muslims are portrayed as terrorists to bolster the government’s interest in securing votes for its foreign policy agenda. I argue that stereotypes persist because of the media’s drive for profit as well as the perceived need for narrative fidelity, although this type of reporting benefits terrorist groups and impairs the target state’s security. If understood and addressed properly, this trend of female terrorist lethality can be undermined through policy recommendations. International organizations that adopt these policy recommendations together may effectively reduce female terrorist lethality, terrorism in general, and increase global security.
762

Utrikespolitiskt beslutsfattande : En studie om hur en militär intervention kunde godkännas av FN / Foreign policy decision-making : A study of how a military intervention could be authorized by the UN

Sahlberg, Josefine January 2015 (has links)
This study in political science examines the UN adopted resolution 1970 (2011) and resolution 1973 (2011) on the basis of foreign policy decision-making. The study aims to explain how the UN principle of Responsibility to Protect came to be legitimized for the first time by the UN Security Council in the Libya conflict in 2011. By a poliheuristic perspective the study attempt to explain Russia and China’s acting in the voting of resolution 1970 and resolution 1973. The background to the conflict in Libya 2011 is presented in the study as well as the Security Council’s actions during the conflict, from the beginning of the conflict until the adoption of resolution 1973. The study is based on an argument analysis to crystallize the most important arguments from Russia and China’s statements regarding resolution 1970 and resolution 1973. The results of the research shows that the adoption of resolution 1973 and therefore a military intervention in Libya in 2011 can be explained, from a poliheuristic perspective, primarily by the few political options and decision-making dimensions actors have to choose from when making decisions.
763

An exploration of the domains of work insecurity /

Milton-Feasby, Christine January 2003 (has links)
This thesis explores insecurity about four types of involuntary work transition. These are labeled here domain insecurities and include job facet insecurity, job loss insecurity, occupation insecurity and employment insecurity. The primary purpose was to distinguish the insecurities conceptually and demonstrate their independence empirically. The domain insecurities were defined and their features identified from a review of literature on various work attitudes. Viable cognitive and affective measures of insecurity were suggested from the conceptual discussion. Data were collected through a self-report questionnaire distributed using a snowball methodology. Validation of the proposed insecurity measures against reliable correlates of insecurity (pessimism and anxiety) supported operationalizing insecurity by affect alone. Correlation analysis clearly distinguished the domain insecurities. The secondary purpose of the thesis was to explore the content and nomological network of the domain insecurities. To this end, key features of the domain insecurities were scrutinized. This analysis particularly set employment insecurity apart from the other insecurities. Data were collected on antecedents and coping with the insecurities. Multiple regression analysis using a repeated-measures design yielded common antecedents of the four insecurities. A significant interaction emerged between age and domain, reflecting different occupational and employment concerns across age groups. Factor analysis with varimax rotation of the coping checklist developed for this thesis supported the formation of four coping scales: palliation, job search, self-development through education, and withdrawal. Multiple regression analysis using a repeated-measures design revealed that people cope with all insecurities through palliation, withdrawal and self-development activities. Significant interactions emerged that confirmed the targeted use of job search activities in
764

An Approach For Defensive Information Warfare In The Turkish Land Forces Command

Ozcan, Fuzuli 01 January 2003 (has links) (PDF)
In this study, Information Warfare (IW) and Information System (IS) security concept in the Turkish Land Forces Command (TLFC) are investigated. An approach that will enhance the success for a secure Information System to alleviate experienced risks is proposed. Starting with the general overview of the literature about IW and IS security, the relation between the concepts, the future, advantages and disadvantages of security development approaches, and the requirements for security are reviewed. Then the specific problems, security risks and IW threats of the TLFC are considered. After reviewing the specific problems, a proposal for IS security in Defensive Information Warfare process in the TLFC is presented and partially applied. The proposal is evaluated within the framework of a case study. The stronger points of the proposal are reviewed by comparing the proposed approach with some other approaches actually applied.
765

Information System Security

Yucel, Okan 01 January 2003 (has links) (PDF)
This thesis analyzes the physical, communicational, and organizational dimensions of information system security process by taking the four-layer approach, which is composed of the policy, model, architecture, and mechanisms into account. Within this scope, according to the results of the security analysis of information systems in METU Informatics Institute, the policy, model, architecture, and mechanisms necessary to prepare a new security process were proposed. As a subcomponent of this proposed security process, the network security of the IS100 course was partially established, and the generated results were evaluated.
766

A proposed security protocol for data gathering mobile agents

Al-Jaljouli, Raja, Computer Science & Engineering, Faculty of Engineering, UNSW January 2006 (has links)
We address the security issue of the data which mobile agents gather as they are traversing the Internet. Our goal is to devise a security protocol that truly secures the data which mobile agents gather. Several cryptographic protocols were presented in the literature asserting the security of gathered data. Formal verification of the protocols reveals unforeseen security flaws, such as truncation or alteration of the collected data, breaching the privacy of the gathered data, sending others data under the private key of a malicious host, and replacing the collected data with data of similar agents. So the existing protocols are not truly secure. We present an accurate security protocol which aims to assert strong integrity, authenticity, and confidentiality of the gathered data. The proposed protocol is derived from the Multi-hops protocol. The protocol suffers from security flaws, e.g. an adversary might truncate/ replace collected data, or sign others data with its own private key without being detected. The proposed protocol refines the Multi-hops protocol by implementing the following security techniques: utilization of co-operating agents, scrambling the gathered offers, requesting a visited host to clear its memory from any data acquired as a result of executing the agent before the host dispatches the agent to the succeeding host in the agent???s itinerary, and carrying out verifications on the identity of the genuine initiator at the early execution of the agent at visited hosts, in addition to the verifications upon the agent???s return to the initiator. The proposed protocol also implements the common security techniques such as public key encryption, digital signature, etc. The implemented security techniques would rectify the security flaws revealed in the existing protocols. We use STA, an infinite-state exploration tool, to verify the security properties of a reasonably small instance of the proposed protocol in key configurations. The analysis using STA reports no attack. Moreover, we carefully reason the correctness of the security protocol for a general model and show that the protocol would be capable of preventing or at least detecting the attacks revealed in the existing protocols.
767

Security in the hospitality industry

Niblo, Diane Mead Unknown Date (has links) (PDF)
Problems and perceptions of crime and security have grown dramatically in recent decades. Organisations feel the need to protect their investment, their employees and the general public from crime. There are not sufficient public police to provide adequate response and protection to businesses; therefore, private security agents have grown in number as a response to this perceived need. This thesis examines private security and surveillance in the hotel industry. There is a general introduction to contemporary security issues in society. The specific nature of these problems is examined within the context of the hotel industry. These issues are analysed in relationship to recent scholarly literature. Since so little has been written about problems of security in the hotel industry, it was decided to conduct in-depth interviews, using multiple case studies and field observations. The thesis examines issues of security in seven major hotels in Australia. Although there are many alternative ways that security can be organised, this thesis examines the application of a differentiated model of security as contrasted to an imbedded model in which all employees are involved with security procedures.
768

The effects of the War on Terror on U.S. and Latin American security policies

Giffin, Jessica L. January 2007 (has links)
Thesis (M.A.)--Ohio University, August, 2007. / Title from PDF t.p. Includes bibliographical references.
769

Deportation on national security grounds within a culture of legal justification.

Thwaites, Rayner. January 2004 (has links)
Thesis (LL. M.)--University of Toronto, 2004. / Adviser: Kent Roach.
770

The experiences of people with psychiatric disabilities in disability income and employment support programs /

Alexander, Michelle M. January 2007 (has links) (PDF)
Thesis (Ph.D.) in Individualized Ph.D. Program--University of Maine, 2007. / Includes vita. Includes bibliographical references (leaves 160-173).

Page generated in 0.0446 seconds