• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 394
  • 76
  • 30
  • 30
  • 22
  • 16
  • 13
  • 13
  • 12
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • Tagged with
  • 772
  • 772
  • 178
  • 178
  • 144
  • 130
  • 115
  • 99
  • 98
  • 96
  • 88
  • 80
  • 78
  • 76
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

The Statue of Liberty is under attack derogation of human rights in the age of terrorism /

Juhasz-Nagy, Monika, January 2004 (has links) (PDF)
Thesis (M.S. in Intl. Aff.)--Sam Nunn School of International Affairs, Georgia Institute of Technology, 2004. Directed by Sylvia Maier. / Includes bibliographical references (leaves 82-85).
162

Spaces and geographers of the 'Smart Border" : technologies and discourses of Canada's post 911 borders

Gordon, Aaron Andrew. January 2006 (has links)
This study investigates Canada's border security policy, practices and technologies and the discourses in which they function, to better understand the U.S-Canadian "Smart Border" and the post-9/11 geographies of the nation-state. With the erasure of economic and military borders and the erection of new security-oriented police borders, Canada's "Smart Border" is no longer at the edges of territory but is a series of spaces reproduced in and outside of Canada through technologies such as the passport, immigration and anti-terrorism legislation, security agencies, monuments, and maps. The "Smart Border" perpetuates colonial distinctions and projects as a site of tension between the national construction of Canadian identities, policing technologies and the enforcement of a global apartheid that restricts access to political and economic resources by enforcing a regime of differential access to mobility. As a site of resistance, the "Smart Border" is also a space from which to displace colonial-national genealogies.
163

Pacific regional order

Peebles, Dave. January 2005 (has links)
Thesis (Ph.D.)--University of Melbourne, Dept. of Criminology, 2005. / Also presented as the author's thesis (Ph.D.)--University of Melbourne, Dept. of Criminology, 2005. Includes bibliographical references and index. Also available in a print form.
164

The effects of alternative energy on Saudi Arabia and the implications for U.S. national security /

Yaggi, Danielle Nicole, January 1900 (has links)
Thesis (M.S.)--Missouri State University, 2008. / "May 2008." Includes bibliographical references (leaves 128-136). Also available online.
165

Countering NATO expansion : a case study of Belarus-Russia rapprochement /

Szyszlo, Peter, January 1900 (has links)
Thesis (M.A.)--Carleton University, 2001. / Includes bibliographical references (p. 134-158). Also available in electronic format on the Internet.
166

Homeland security collaboration catch phrase or preeminent organizational construct? /

Kay, Raymond L. January 2009 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Brannan, David. "September 2009." Description based on title screen as viewed on 6 November 2009. Author(s) subject terms: Collaboration, guidance, smart practices, community based collaboration, Business Executives for National Security (BENS), ChicagoFIRST, Texas Association of Regional Councils (TARC), Responsibility, Authority, and Expertise (RAE). Includes bibliographical references (p. 103-110). Also available in print.
167

Consistent threat, political-economic institutions, and Northeast Asian developmentalism

Zhu, Tianbiao. January 2000 (has links)
Thesis (Ph. D.)--Cornell University, 2000. / Includes bibliographical references (leaves 296-328).
168

Spaces and geographers of the "Smart Border" : technologies and discourses of Canada's post 911 borders

Gordon, Aaron Andrew. January 2006 (has links)
No description available.
169

Regional organizations and regional security: the role of regional organizations in conflict management : the caseof ASEAN

Anthony, Mely Caballero. January 1999 (has links)
published_or_final_version / Politics and Public Administration / Doctoral / Doctor of Philosophy
170

Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack

Culpepper, Anna M. 09 1900 (has links)
Approved for public release; distribution is unlimited / As the United States continues to develop plans and policies to counter the threat of terrorism, it becomes increasingly more vital to understand the entire spectrum of the threat. Realistically assessing the capability of possible and probable terrorist groups helps federal and state agencies to establish potential methods and procedures for defense and maritime domain awareness. Yet, the avenues of attack and the varieties of terrorists far outnumber the available resources of most agencies concerned. Moreover, there have been no attacks on homeland U.S. targets since September 11. The red team concept provides an innovative method to examine these vulnerabilities from the terrorist perspective. The effectiveness of a red team can be measured in various ways and is dependent on key organizational and situational elements. In the end, the determination of effectiveness is based on the original intentions of the host enterprise, whether it is training, research, strategy, or analysis or a combination. We conducted a case study to utilize the red team concept as a tool for bringing a fresh awareness to a critical issue within the National Strategy for Combating Terrorism. The red teams identified vulnerabilities of possible targets, raised the awareness on the nature of terrorists, researched potential tactics and tools, and examined existing assumptions about maritime security. In applying the red team concept, the case study used military officers as surrogate terrorists planning a campaign to attack port cities. The case study effectively demonstrated the anticipated functions, while the follow-on actions ensured that the results were distributed to the appropriate agencies. Furthermore, civilian officials and the agencies concerned valued the red team reports as positive insights into the current situation. / Lieutenant, United States Navy

Page generated in 0.0404 seconds