• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 394
  • 76
  • 30
  • 30
  • 22
  • 16
  • 13
  • 13
  • 12
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • Tagged with
  • 772
  • 772
  • 178
  • 178
  • 144
  • 130
  • 115
  • 99
  • 98
  • 96
  • 88
  • 80
  • 78
  • 76
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
311

An Assessment of the 2002 National Security Strategy of the United States: Continuity and Change.

Prince, Troy Jason January 2009 (has links)
The 2002 National Security Strategy of the US (NSS 2002) appeared to have presented a momentous approach to self-defense. To many, the doctrine of preemptive selfdefense seemed to challenge the legal and political foundations of the post-World War II international order. Some saw in the US stated reliance on preemption a direct threat to the international system embodied in the UN Charter. The prima facie case that the US position was novel and even dangerous appeared persuasive. This thesis attempts to assess the exceptionality of NSS 2002 in its formulation and implications. This question of exceptionality is broadly divided into two sections. The first section deals with internal exceptionality, in terms of means (the deliberation and drafting processes) and ends (the US defense posture). The second section deals with external exceptionality in the broader terms of possible consequences outside the US. Section One begins by establishing the grounds for looking into the formulation of NSS 2002, and provides the background for that Strategy's mandated precursors. After exploring how National Security Strategy documents are conceived and framed, Section One discusses the Strategy as it was published, and examines a sampling of contemporaneous reactions to its publication. Section Two concentrates on the second part of the research question, and utilizes a thematic approach ¿ in terms of the use of force, the international security environment, and international law. Possible consequences of the proposed US response to contemporary security challenges are considered in these three key areas.
312

Is Microsoft a Threat to National Security? Policy, Products, Penetrations, and Honeypots

Watkins, Trevor U. 11 June 2009 (has links)
No description available.
313

Transnational organised crime, immigration and security : a study of Norwegian immigration Policy

Thompson, Erik 04 1900 (has links)
Thesis (MA)--Stellenbosch University, 2015. / ENGLISH ABSTRACT: This research study discusses the extent to which transnational organised crime (TOC) has had an impact on Norwegian immigration policy. There has been a public debate in Norway about the involvement of asylum seekers in various forms of organised crime, leading immigration authorities to lament their insufficient resources and means to tackle the problem. Simultaneously, restrictive amendments have been made to the Norwegian Immigration Act, suggesting that immigration law is applied against TOC. The aim of the study is to understand why there has been a change in Norwegian immigration policy, and to discuss the effects and implications of the change. The study is a single-case study using qualitative methods, as the study seeks to provide a detailed description of Norwegian immigration policy and the context in which the changes in the immigration policy have been made. The case of Norway has been chosen because of the increasing focus that TOC has been receiving from Norwegian immigration authorities, accompanied by broad media coverage and restrictive amendments to the Immigration Act. The theories that are applied – criminologies of the self and the other, crimmigration, and securitisation theory – are all chosen because they address different aspects of “us” and “them” thinking. The study argues that the increased focus on transnational organised crime in Norwegian crime statistics reflects the narrative of the criminal other, found in criminologies of the self and the other. Within this narrative the criminal others are distinctly different from ordinary citizens of society and must be excluded for our own security and protection. This contributes to reinforcement of a discourse in which asylum seekers and illegal immigrants become difficult to distinguish from suspicious others and criminals. Accordingly, there is support for the claim that Norwegian immigration policy has been subject to a process of crimmigration. Further, it is found that Norwegian immigration policy has been securitised. It is concluded that although there might be a connection between transnational organised crime and a shift in immigration policy, the change in immigration policy is rather a result of the larger issue of immigration in general. The theoretical framework shows how immigration becomes framed within a security and criminal context, leading to a narrative where the other becomes a potential threat to members of society. This is problematic in a world where inequality is on the rise, and international conventions on human rights are at odds with punitive populism. / AFRIKAANSE OPSOMMING: Hierdie navorsingstudie bespreek tot watter mate transnasionale georganiseerde misdaad ʼn impak gehad het op Noorweë se immigrasiebeleid. ʼn Openbare debat is in Noorweë gevoer oor die betrokkenheid van asielsoekers by verskeie vorme van georganiseerde misdaad, wat daartoe gelei het dat immigrasie-owerhede beswaar gemaak het teen die onvoldoende hulpbronne en middele wat tot hul beskikking is om die probleem aan te spreek. Terselfdertyd is beperkende wysigings in Noorweë se immigrasiewet aangebring wat aandui dat immigrasiereg teen transnasionale georganiseerde misdaad aangewend moet word. Die doel van hierdie studie was om te verstaan waarom ʼn verandering in Noorweë se immigrasiebeleid aangebring is en om die gevolge en implikasies van hierdie verandering te ondersoek. ʼn Enkele gevallestudie is in hierdie studie onderneem en daar is gebruik gemaak van kwalitatiewe metodes om die navorser in staat te stel om ʼn gedetailleerde beskrywing te gee van Noorweë se immigrasiebeleid en die konteks waarbinne die veranderinge in hierdie beleid aangebring is. Noorweë is as gevallestudie gekies as gevolg van die toenemende fokus wat deur Noorweegse immigrasieowerhede op transnasionale georganiseerde misdaad geplaas word, vergesel van omvattende mediadekking, en die beperkende wysigings wat in die immigrasiewet aangebring is. Die teorieë wat in hierdie studie aangewend is – kriminologie oor die “self” en die “ander”, “krimigrasie” (crimmigration) en sekerheidsteorie – is gekies op grond daarvan dat hulle verskillende aspekte van denke oor “ons” (die “self”) en “hulle” (die “ander”) aanspreek. In hierdie studie word daar geargumenteer dat die toenemende fokus op transnasionale georganiseerde misdaad in Noorweegse misdaadstatistiek die narratief van die kriminele “ander” reflekteer, waarna daar in die kriminologie oor die “self” en die “ander” verwys word. In hierdie narratief word ʼn duidelike onderskeid tussen die kriminele “ander” en die “gewone” burgers getref en die kriminele moet ter wille van hierdie burgers se veiligheid en beskerming uitgesluit word van die samelewing. Dit dra by tot die versterking van ʼn diskoers waarin dit moeilik word om asielsoekers en onwettige immigrante van verdagtes en kriminele te onderskei. Dienooreenkomstig daarmee is daar steun vir die bewering dat Noorweë se immigrasiebeleid onderworpe is aan ʼn krimigrasieproses. Verder is daar bevind dat Noorweë se immigrasiebeleid aangepas is deur dit binne ʼn sekerheidsraamwerk te plaas. Daar is tot die gevolgtrekking gekom dat alhoewel daar ʼn verband tussen transnasionale georganiseerde misdaad en ʼn verskuiwing in immigrasiebeleid mag wees, die verandering in immigrasiebeleid eerder ʼn gevolg is van die groter kwessie rondom immigrasie in die algemeen. Die teoretiese raamwerk dui aan hoe immigrasie geskets word in ʼn sekuriteits- en kriminele konteks, wat lei tot ʼn narratief waar die “ander” ʼn potensiële bedreiging vir lede van die samelewing word. Dit is problematies in ʼn wêreld waar ongelykheid toeneem en internasionale konvensies oor menseregte strydig is met strafbare populisme.
314

A possible framework for analysing national security : the Saudi Arabian perspective

Nasif, Mahmoud Abdullah January 2014 (has links)
This study will focus on explaining the dynamics of Saudi Arabia’s national security. In explaining these dynamics, the study will consider two of Buzan’s frameworks for analysing national security. Further enhancement will be given by conceptualising specific assumptions about Saudi Arabia’s national security – these will be based on the manner in which certain features are utilised within the Saudi state. Semistructured interviews will be utilised to examine the findings from the adapted frameworks. By studying the state’s domestic, regional and international concerns, as well as the specific threats that each level pose with regards to several security sectors (including the: social, political, economic, militant and environmental), this study will provide a distinctive analysis of national security within the Saudi state. Initially, this study acknowledges that only a few studies have been conducted into Saudi Arabia’s national security; furthermore, these have focused on the internal perspective by considering Saudi national security in terms of its military and strategic partnerships. Secondly, the study proposes that Saudi Arabia is unique (and unlike any other state) as it holds various important social and religious aspects that are not fully understood by external sources. Consequently, this study conceptualises Saudi national security from the internal perspective by considering the Saudi state’s specific features.
315

Fighting Al Qaeda in the Arabian Peninsula on all fronts : a U.S. counterterrorism strategy in Yemen

Sharkey, Kaitlin Kelly 02 October 2014 (has links)
The United States needs a long-term counterterrorism strategy in Yemen. Nearly three years in, the faltering Yemeni transition threatens to fall apart in the face of an economic crisis, ongoing internal conflict, and al Qaeda attacks. Unchecked, a failed Yemeni state will provide al Qaeda with a larger recruiting base and an expanded area for operations. To prevent this nightmare scenario, the United States should integrate military restructuring, political reform, and economic development policies into its greater strategy to counter al Qaeda in the Arabian Peninsula (AQAP). This report describes the dynamics of the 2011 Yemeni uprising, the subsequent political transition, and the simultaneous evolution of AQAP. The report then analyzes these phenomena in the context of U.S. national security policy to determine a long-term counterterrorism strategy in Yemen. To succeed in defeating AQAP and stabilizing Yemen, the U.S. government must engage with its Yemeni partners and regional actors; invest in Yemen's military restructuring, political transition, and economic reforms; and continue to attack AQAP through direct action operations and in tandem with Yemeni armed forces. / text
316

Imigracijos poveikis nacionaliniam saugumui Šengeno erdvėje: Lietuvos atvejis / Immigration’s impact on national security in the Schengen area: the case of Lithuania

Galvanauskaitė, Edita 12 June 2009 (has links)
Tyrimo problema: iki šiol Lietuvoje laikomasi nuomonės, kad migracija nacionaliniam saugumui grėsmės nekelia, nes imigracija į šalį yra nedidelė ir valstybė nėra potencialiu teroristinių išpuolių taikiniu. Viena vertus, būdama skurdesnė už Vakarų Europos valstybes, Lietuva išties vis dar nėra imigracijos traukos objektu. Tačiau nuo 2007 metų gruodžio 21 d. padėtis pradėjo keistis – dabar Lietuva yra viena iš Šengeno erdvės šalių, kuriose yra panaikinta vidaus sienų kontrolė ir saugomos tiktai išorinės sienos. Tai reiškia, kad turėdama dešimtadalį Šengeno erdvės sausumos sienos, Lietuva nelegaliems migrantams ir žmonių kontrabandininkams tampa patrauklia tranzito šalimi į Vakarų valstybes, ir todėl šalis neišvengiamai susidurs su didesnėmis migracijos keliamomis grėsmėmis saugumui. Antra vertus, klaidinga manyti, kad pagrindinės migracijos keliamos grėsmės saugumui yra susijusios su terorizmu ar socialiniais neramumais. Tai tik pora iš daugelio migracijos keliamų grėsmių saugumui. Todėl dabar yra tinkamas laikas nagrinėti, kokį poveikį migracija turi Lietuvos nacionaliniam saugumui Šengeno erdvėje. Darbo objektu yra imigracijos daromas poveikis nacionaliniam saugumui. Šio darbo tikslas yra aprašius migracijos ir saugumo sąvokų raidą, išskyrus jų tarpusavio ryšį ir įvertinus iš šio ryšio kylančias grėsmes bei išanalizavus Šengeno erdvę, kaip Europos Sąjungos priemonę tinkamai užtikrinti piliečių judėjimo laisvę ir saugumą, nustatyti, kokią įtaką buvimas išorine Šengeno erdvės... [toliau žr. visą tekstą] / Problem of the study: According to public opinion, migration is not a threat to national security in Lithuania mainly because of to reasons. Firstly, Lithuania does not suffer from immigration flows. Secondly, as threat to national security, immigration is seen only in direct connection with terrorism. On one hand, being poorer than the Western European countries, Lithuania has not been one of the migration target countries. But from 2007 on 21 December situation has changed - now Lithuania is one of the Schengen Area States, where control on internal borders is completely removed and safety of the area is guaranteed by control of external borders. This means, that with a tenth of the Schengen Area external land border, Lithuania is becoming an attractive transit country to Western countries for illegal migrants. Therefore, it will inevitably face with greater immigration threats to security. On the other hand, terrorism is only one of the many immigration threats to security. Because of all this, now is the best time to examine the immigration’s impact to national security of Lithuanian in the Schengen area. The subject of this study is immigration’s impact on national security. The aim of this study is by describing development of the migration and security concepts, finding migration-security nexus and assessing threats arising from this nexus to national security, together with analysis of the Schengen area, as a tool to ensure free movement of citizens and security the... [to full text]
317

The similarities and differences in the national security strategies of Sweden, Russia and the Czech Republic

Gabert, Antoine January 2014 (has links)
This thesis is a comparative study of the national security strategies of Sweden, Russia and the Czech Republic. The analysis investigates the contextual analysis made by each country and the identified security threats. To compare and find out the similarities and differences two theoretical approaches are used: realism and liberalism. To compare and identify the threats a five factor model is used, originating of general military threat assessment. / <p>Erasmus</p>
318

An approach to vulnerability assessment for Navy Supervisory Control and Data Acquisition (SCADA) system

Hart, Dennis 09 1900 (has links)
Approved for public release; distribution is unlimited / The unfortunate events of September 11, 2001 have caused a renewed effort to protect our Nation's Critical Infrastructures. SCADA systems are relied upon in a large number of the sectors that make up the critical infrastructure and their importance was reinforced during the massive power outage that occurred in August 2003. Growing reliance upon the Internet has emphasized the vulnerability of SCADA system communications to cyber attack. Only through diligent and continuous vulnerability assessment and certification and accreditation of these systems will the United States be able to mitigate some of the vulnerabilities of these systems. A case study presented here has validated the need for continued focus in this area. This thesis consolidates some of the research that has already been done in the area of SCADA vulnerability assessment and applies it by developing an initial vulnerability assessment checklist for Department of the Navy systems. This checklist can and should also be used in the certification and accreditation of DoN SCADA systems. A promising technology was also discovered during this research that should be explored further to secure SCADA communications. This will be touched on briefly. / Major, United States Marine Corps
319

Al Qaeda in Iraq demobilizing the threat

Kraner, Timothy A. 12 1900 (has links)
The war in Iraq is neither won, nor lost. To achieve US objectives in Iraq it is critical to understand not only the Iraqi Sunni components of the ongoing conflict, but also the Salafi-Jihadist elements as well. This thesis uses a social mobilization approach to study of the Salafi-Jihadi insurgent group, Al Qaeda in Iraq (AQI) describing the group's political opportunities, mobilizing structures, frames and repertoires of action. The result of this analysis shows an internationally-supported ideologically-motivated, militant group with few Iraqi-specific political or social strengths. This thesis applies this knowledge to established counterinsurgency methods to highlight organizational strengths and weaknesses in comparison to a normative counterinsurgency effort. This relational analysis views the conflict through a six dimensional framework to examine where the insurgents have significant strength and where they are vulnerable to counterinsurgency actions. We then examine the current status of the counterinsurgency operations and stabilization effort in Iraq. Trend-analysis tracks changes in key indicators through time underscoring areas for concern and areas of positive movement. Based on the nature of AQI and the current trends, this thesis will draw general conclusions and provide recommendations based on the AQI threat designed to undercut its strengths and exploit its weaknesses.
320

China in the South China Sea genuine multilateralism or a wolf in sheep's clothing?

Jackson, John W. 12 1900 (has links)
The South China Sea claimants base their claims on ancient documentation and archeological evidence. However, they largely ignored the territories until the 1960s, when natural resources speculations began. The 1982 UNCLOS magnified interest as claimants hoped to extend exclusive economic rights from their claims rather than continental coastlines. Another possible factor behind Chinese claims is the theory that Beijing desires to establish Chinese hegemony in the region. Beijing's shift from bilateral diplomacy and military aggression to multilateral diplomacy has created debate among Sinologists. Many argue China lacked the power necessary to assert its claims and now can finally attempt assertion again, thus the naval buildup. Others argue that natural resources drive China's SCS policy and still others believe bureaucratic infighting drives policy. Economic data shows a possible causal relationship between trade and China's political behavior. The 1996 U.S. Presidential campaign slogan, "It's the economy stupid," apparently applies to Beijing's SCS approach as well. The U.S. approach to the disputes remains one of ambivalence. As long as the United States maintains freedom of navigation through the area, Washington should remain concerned but uninvolved. Beijing largely feels the same way, with the important addition of guaranteeing access to the region's natural resources.

Page generated in 0.0363 seconds