• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 394
  • 76
  • 30
  • 30
  • 22
  • 16
  • 13
  • 13
  • 12
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • Tagged with
  • 772
  • 772
  • 178
  • 178
  • 144
  • 130
  • 115
  • 99
  • 98
  • 96
  • 88
  • 80
  • 78
  • 76
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
181

French nuclear strategy in an age of terrorism

Rehm, Braxton D. 12 1900 (has links)
This study treats the character of French nuclear policy since September 11, 2001; as such this work adds the most recent episode to a theme that, since the late-1950s, has concerned alliance statecraft faced with French â exceptionalismâ in trans-Atlantic relations. In the post-Cold War era, the changes in the strategic environment have led to a further evolution in French nuclear deterrent policy which forms the heart of this study. In 2001 and 2006, French President Chirac made policy speeches which specifically discussed nuclear strategy and clarified the shift in French thought and the justification for deterrence. In 2001, the most important element addressed dissuasion of regional powers and â rogueâ states with WMD that may attack France. The 2006 speech incorporated the threat of statesponsored terrorism into the nuclear dissuasion strategy. The thesis investigates past and present developments in French nuclear strategy, with chief emphasis on the period from the end of the Cold War to the beginning of the twenty-first century; it highlights the forces that have shaped French doctrine and analyzes the viability of the nuclear strategy as seen by a U.S. observer. A review of French Cold War doctrine provides the necessary backdrop for an evaluation of new elements in French nuclear strategy and should act as a guide to students of same in U.S. and NATO policy circles.
182

Democracy - a tree without roots on the steppes of Central Asia

Quillen, Brian G. 12 1900 (has links)
Approved for public release; distribution is unlimited / This thesis combines transitology and structural analyses to examine the obstacles to democracy in Kyrgyzstan and Uzbekistan. The transitology approach analyzes the impact of domestic political factors (clan politics, corruption, and political Islam) and external influences on each countryâ s transition to post-communist rule. The structural analysis focuses on those economic and societal factors that impact the countryâ s ability to foster and sustain democratic reforms. For both countries, the complex interplay of clan politics and rampant corruption is the dominant factor in stifling democratic reforms. External influences were important in the case of Kyrgyzstan, though not determining, but were basically inconsequential in Uzbekistan. In each country, economic underdevelopment has stifled the emergence of a large middle class and served as a catalyst for societal dissatisfaction. The United States must continue to assist Kyrgyzstan in completing its economic reform agenda and play a greater role in helping guide amendments to the constitution. In Uzbekistan, the United States must rely on economic reform incentives tied to concrete milestones and look to engage the next generation of leaders with targeted assistance to achieve political and economic reforms. / Outstanding Thesis
183

Pakistan, madrassas, and militancy

Colbert, Jason M. 12 1900 (has links)
Following the terrorist attacks of September 11th, 2001, the US government has become increasingly concerned with madrassas, Islamic schools of religious education in Central and South Asia. U.S. Secretary of Defense Donald Rumsfeld and Secretary of State Colin Powell denounced these religious seminaries as radical institutions which produce Islamic jihadists capable of threatening U.S. national security and interests. This thesis examines the history and current evidence available on madrassas. Specifically, it analyzes their historical evolution and reaction to domestic, regional and international developments. It finds that there is little evidence to connect madrassas to transnational terrorism, and that they are not a direct threat to the United States. However, Pakistani madrassas do have ties to domestic and regional violence, particularly Sunni-Shia sectarian violence in Pakistan and the Pakistani-Indian conflict in Kashmir, making them a regional security concern. This thesis argues that the best path for combating religious militancy in madrassas is by helping to create better alternatives to madrassa education, including state run and private schools, and not by targeting madrassas directly.
184

Honduras' national security strategy to combat terrorism

Funes Ponce, Raynel E. 12 1900 (has links)
After the September 11 attacks, Honduras committed to support the GWOT, but priorities in national objectives other than terrorism have kept the Honduran government from developing a strategy and the necessary counterterrorism infrastructure to combat this emerging threat. This research examines current threats in Latin America and Honduras in particular. It also suggests a developmental strategy to enhance the country[alpha]s capabilities to combat terrorism by the employment of instruments of national power in a multidimensional way capable to prevent, deter, and respond to terrorist acts. This study uses a brief analysis based on the concepts of suitability, feasibility, and acceptability in order to identify the risk that the proposed strategy could incur. The study concludes by proposing a series of recommendations that should minimize risk and make this strategy feasible for supporting the GWOT.
185

The Mayaguez incident an organizational theory analysis

Tyynismaa, Michael D. 09 1900 (has links)
Applying selected concepts of organizational theory to the Mayaguez incident of 1975 leads to a more comprehensive understanding of events and more accurate lessons learned. Application of organizational theory to the Mayaguez incident demonstrates the decision processes at the executive level left the military operation vulnerable to failure. Henry Mintzberg's structural contingency model and Lee Bowman and Terrence Deal's frames model are used and are applied to executive-level decisions. The rationale behind focusing on the executive level is twofold: first, it is where final critical decisions are made and second, military operations cannot take place without an executive-level authorization. The Mayaguez crisis was rife with potential pitfalls and, though President Ford was equipped with an organization of intelligent, competent personnel, the result was unnecessary loss of life. Publicly, the operation was a success and President Ford the savior of the Mayaguez crew. To the military, the operation was an embarrassment because of failures in the organizational structure and decision making. Application of organizational theory provides an avenue for analysis of the military operation within the Mayaguez rescue.
186

China's Muslims separatism and prospects for ethnic peace

McKinney, Evan W. 09 1900 (has links)
The Uighur issue is of vital regional and global security importance to China. Although minority separatists are not well armed and seem to be largely disorganized, the violence poses a very real threat to China's ability to develop Xinjiang. The Chinese Communist Party (CCP)'s behavior toward its Muslims has received renewed Western attention in the aftermath of 9/11. China's Uighurs have responded to CCP policies with violence and separatist activity, but the Hui (ethnic Chinese who are Muslim) have reacted with relatively high levels of accommodation. Some have blamed Uighur separatism on external influences (such as transnational terror) and Islam. However, the puzzle is, why do the Uighurs engage in separatism where the Hui do not? This study contributes to existing literature by directly comparing the Uighurs and Hui in order to determine the reasons behind Uighur separatism and Hui accommodation. This thesis argues that the Uighurs and Hui have faced different social and economic realities which have led to different perceptions of inequality and thus, different reactions to CCP policy. Also, unlike Uighur ethnic identity, Hui identity stems from and is compatible with the PRC and Chinese society. This study uses primary sources including interviews with Uighurs, Hui and Han Chinese conducted in western China during June and July of 2006.
187

Commercial off The Shelf (COTS) security issues and approaches

Doan, Dung. 09 1900 (has links)
Custom built products do not always meet the new Department of Defense (DoD) requirements. Their high cost and lengthy development cycle does not suit the Information Age where communication information and technology develop rapidly. To adapt to this new environment, Commercial off The Shelf (COTS) software products have become the core for Military systems. This is the only way to approach the readiness requirements for armed forces. Like any other products, COTS software brings a lot of advantages but also carries side effects for military systems. One of the most serious issues for military use of a COTS software product is its security. This thesis provides an analysis of approaches to identify the security vulnerabilities and recommends an acquisition approach to minimize the issue. It is not the intent of this thesis to find a universal approach to solve the security issue of COTS products.
188

Evaluating the effectiveness of waterside security alternatives for force protection of Navy ships and installations using X3D graphics and agent-based simulation

Sullivan, Patrick Joseph 09 1900 (has links)
Approved for public release, distribution unlimited / The individuals charged with the task of planning, developing and implementing force protection measures both at the unit and installation level must consider numerous factors in formulating the best defensive posture. Currently, force protection professionals utilize multiple sources of information regarding capabilities of systems that are available, and combine that knowledge with the requirements of their installation to create an overall plan. A crucial element missing from this process is the ability to determine, prior to system procurement, the most effective combination of systems and employment for a wide range of possible terrorist attack scenarios. This thesis is inspired by the work done by James Harney, LT, USN (2003). The thesis will expand the Anti-Terrorism Force Protection Tool developed during the original thesis by including the capability of testing force protection measures in multiple scenarios by utilizing models of force protection equipment and forces, virtual worlds of existing naval facilities, and terrorist agents that exhibit intent and behavioral characteristics which can test the effectiveness of the force protection equipment used. The result of this work is a scalable and repeatable methodology for generating large-scale, agent-based simulations for AT/FP problem domains providing 3D visualization, report generation, and statistical analysis.
189

Organizing the fight technological determinants of coalition command and control and combat operations

Sine, Jack L. 09 1900 (has links)
Approved for public release; distribution is unlimited / Despite the political impetus for greater multilateralism in international military operations, recent coalitions including U.S. forces reflect a trend toward increasing U.S. dominance and decreasing allied participation. As the United States continues to invest in its military with research, development and acquisition budgets at least double that of any other nation, it fields technologies so advanced with respect to its allies as to leave them incompatible for combined operations. Recent coalition operations suggest that there is a close relationship between technological asymmetries created by partner contributions and the structures formed as the coalition assembles. Using Desert Storm and Operation Allied Force as case studies, this thesis identifies a systemic relationship between technological advantage and coalition dominance. As a coalition seeks to reduce aggregate risk, it relies on technologies that offer the greatest effectiveness. This reliance causes the coalition to divert combat burden to the technologically dominant partner which, in turn, imposes its operational culture. This thesis concludes that the technological transformation currently underway in the U.S. Department of Defense conflicts with U.S. political initiatives to promote greater multilateralism in combat operations by forcing allies to rely on U.S. technologies thereby creating more unilateral operations. / Outstanding Thesis
190

The use of Special Operations Forces in combating terrorist financing

Newell, Thomas. 06 1900 (has links)
With United States Special Operations Command (USSOCOM) being given the role as the lead Combatant Command in fighting the Global War on Terrorism (GWOT) USSOCOM must examine ways to engage terrorists on a global scale. USSOCOM must look at means other than direct action to defeat these terrorist networks. It must also look at the entire network and not just the cells that carry out the terrorist operations. Terrorist Financing is an integral part of the GWOT, though; thus far it has mostly been pursued by law enforcement agencies rather than the U.S. Military. This is due to the perception that terrorist financing is criminal in nature and relegated to law enforcement agencies rather a threat to national security that would be the responsibility military. This thesis serves two purposes. The first is to analyze whether the U.S. military and Special Operations Forces (SOF) in particular should look at terrorist financing as part of the militaryâ s role in the GWOT and what that possible role could be. The second is to look at how SOF could organize itself in order to carry out such a role should it be necessary to do so. Ironically, during the time this thesis was being written DoD has determined that SOF does have a role in terrorist financing and that USSOCOM will be the executive agent for the DoD with regards to terrorist financing.

Page generated in 0.0272 seconds