• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 394
  • 76
  • 30
  • 30
  • 22
  • 16
  • 13
  • 13
  • 12
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • Tagged with
  • 772
  • 772
  • 178
  • 178
  • 144
  • 130
  • 115
  • 99
  • 98
  • 96
  • 88
  • 80
  • 78
  • 76
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
331

Cups, cowbells, medals, and flags sport and national identity in Germany, 1936-2006

Burkel, Laurel M. 12 1900 (has links)
The present study addresses the role of sport in the evolution of modern German nationalism. This work contains: a.) an historical analysis of nationalism, culture and sport from the late eighteenth until the mid-twentieth century; b.) a case study of the 1936 Garmisch/Berlin Olympics as an example of virulent nationalism and racism; c.) a case study of the 2006 World Cup in Germany as an example of national identity in twenty-first century Germany in the wake of reunification and globalization. Sport has been central to how Germans see themselves from the end of the eighteenth century until the present. This work argues that an analysis of sports, domestic politics and diplomacy can offer those interested in nationalism in contemporary Europe a helpful means of analysis of a force that remains powerful, despite the construction of the European Union. While an analysis of the evolution of mass sport indicates that Germans no longer apply the kind of racist blood and soil nationalism so virulent in the early twentieth century, sport has shown a remarkable continuity as a mirror of German aspirations for their nation, which has changed fundamentally in the realms of culture, society, and economy in the twenty-first century.
332

The bioterrorism threat by non-state actors hype or horror?

Thompson, Christopher M. 12 1900 (has links)
This thesis provides a capabilities-based approach to assessing the bioterrorism threat from non-state actors. Through comparative case study, prior bioterrorism attacks are analyzed to assess capability in the three areas necessary to complete a biological weapons attack: obtaining or isolating a pathogen, weaponizing the agent, and employing or disseminating the weapon. The three cases are the Rajneeshee cult in 1984, the Aum Shinrikyo cult in the early 1990's, and the United States Postal System anthrax attacks of 2001. In contrast to current wisdom that employing biological weapons is too difficult for non-state actors, this thesis reveals a broad spectrum of capability in all studies in the areas necessary to culminate an attack. Applications of these findings must be used to assess risk generally rather than against specific groups because capability is deemed to be exptremely difficult to track. The these finds that a significant threat exists but not large enough to be over-hyped above other national security concerns. In light of this, recommendations are provided for U.S. biodefense policy emphasis in the areas of the nonproliferation regime, attribution capabilities, and defending against the changing nature of future attacks with a particular emphasis on the public health system.
333

Why the United States underestimated the Soviet BW threat

Jaehnig, James S. 09 1900 (has links)
Biological weapons have the ability to inflict mass casualties while keeping existing infrastructure intact. They are inexpensive to manufacture, difficult to detect, and have a low signature for attribution. In the 1970s, the Soviet Union began amassing the largest stockpile of biological weapons worldwide. The U.S. Intelligence community repeatedly failed to detect the scope and character of this large-scale Soviet development effort despite implausible explanations for outbreaks of unexplained disease, credible ground reports from informants, and strange behavior patterns viewed through reconnaissance efforts. Toward the end of the Cold War, the U.S. Intelligence realized its grave error. Unfortunately, the majority of these weapons are unaccounted for today. By examining the reasons the Soviet Unionâ s biological weapons program went undetected, the United States may gain a better advantage for future assessments and prevent the large-scale stockpiling and development of biological weapons.
334

Rapidly deployable, self forming, wireless networks for maritime interdiction operations

Stavroulakis, Georgios. 09 1900 (has links)
The term "Maritime Interdiction Operations" usually refers to Visit, Board, Search and Seizure (VBSS) operations executed today all over the world. These operations are conducted as a part of the maritime law enforcement policy of each country inside their respective territorial waters or as a part of the homeland security requirements as they are mandated today by the global war against terrorism. Very often lately, they are conducted by allied maritime forces in international waters as well. Although such operations might seem quite simple in execution, the global war against terrorism has dramatically increased their level of complexity. In the past, searching cargo ships for illegal or contraband cargo was not that complicated or that important for national security, but now, searching for non-proliferation, radiological or bio-chemical material, as well as for possible terrorists among the crew members of a ship, is a very complex operation that cannot tolerate mistakes or omissions. This thesis examines the requirements posed by a boarding team, either from the navy or the law enforcement community, on information flow from and to them, in order to enhance their situational awareness and decision making capability during Maritime Interdiction Operations. That information flow is provided by several wireless network technologies, implemented during field trials, as part of the NPS CENETIX (Center for Network Innovation and Experimentation) lab s maritime subset of experimentation. During these field trials, a wireless extension of the internet is deployed to the sea, allowing the boarding team to access information and collaborate with remotely located experts and respective operational commands, the technical aspects, the benefits and shortcomings of the utilized technologies and collaborative tools are screened against the maritime war fighter's operational requirements.
335

Applying network theory to develop a dedicated national intelligence network

Tindall, James A. 09 1900 (has links)
CHDS State/Local / Adaptive terrorist organizational structure and the lack of intelligence sharing were to blame for terrorist attacks on September 11, 2001. Because terrorist groups are moving toward a less predictable, but more diverse, dynamic, and fluid structure, effective combativeness of terrorism requires fighting terrorists with a network. This network must be capable of collecting and sharing credible, reliable and corroborative information on an unprecedented scale, transcending geographic, agency, and political boundaries. This thesis demonstrates utilization of a network-theory approach for sharing information, which will be argued, can provide insight into the system dynamics of the U.S. IC because it allows a systematic, comparative analysis of the system representation and fundamental problems associated with information sharing. The problems associated with past intelligence failures can be overcome with such a system because the use of a dedicated, nationally networked system will allow completion of three primary tasks: (1) examination of the strength of criminal/terrorist connections, (2) identification of suspects and mapping of networks, and (3) prediction of future behavior and better likelihood of prevention, response, and prosecution. A dedicated national networked intelligence-sharing system called DNIN (Dedicated National Intelligence Network), including geographic areas, regional centers, personnel, computer IT networks, and policy options is discussed. / Scientist, U.S. Department of the Interior
336

Collaborative network evolution the Los Angeles terrorism early warning group

Rust, Sunchlar M. 03 1900 (has links)
This study bridges the narrow divide between collaboration theory and networking and views organizations as a source of collaborative processes. Social network analysis is applied to determine how the Los Angeles Terrorism Early Warning Group (TEW) evolved from a small group of actors to a diverse, county-wide network bridging public-private, local-state-federal, and functional divides. The TEW demonstrates an example of organizational problem solving where a network facilitated collaboration in a wickedly complex and uncertain environment. The network's consensus-based innovation, collaborative processes, and meta-leadership helped the network evolve. These factors strengthened the collaborative ethos of the network and set the stage for success as the network meets current and future challenges. The TEW's bottom-up, consensus-based network expansion contrasts sharply with top-down collaborative approaches, such as the creation of the National Counterterrorism Center and Department of Homeland Security. Lessons from the TEW's well-paced evolution provide insight into how to facilitate collaborative action and build collaborative capacity for the future.
337

Approximate dynamic programming and aerial refueling

Panos, Dennis C. 06 1900 (has links)
Aerial refueling is an integral part of the United States military's ability to strike targets around the world with an overwhelming and continuous projection of force. However, with an aging fleet of refueling tankers and an indefinite replacement schedule the optimization of tanker usage is vital to national security. Optimizing tanker and receiver refueling operations is a complicated endeavor as it can involve over a thousand of missions during a 24 hour period, as in Operation Iraqi Freedom and Operation Enduring Freedom. Therefore, a planning model which increases receiver mission capability, while reducing demands on tankers, can be used by the military to extend the capabilities of the current tanker fleet. Aerial refueling optimization software, created in CASTLE Laboratory, solves the aerial refueling problem through a multi-period approximation dynamic programming approach. The multi-period approach is built around sequential linear programs, which incorporate value functions, to find the optimal refueling tracks for receivers and tankers. The use of value functions allows for a solution which optimizes over the entire horizon of the planning period. This approach varies greatly from the myopic optimization currently in use by the Air Force and produces superior results. The aerial refueling model produces fast, consistent, robust results which require fewer tankers than current planning methods. The results are flexible enough to incorporate stochastic inputs, such as: varying refueling times and receiver mission loads, while still meeting all receiver refueling requirements. The model's ability to handle real world uncertainties while optimizing better than current methods provides a great leap forward in aerial refueling optimization. The aerial refueling model, created in CASTLE Lab, can extend the capabilities of the current tanker fleet. / Contract number: N00244-99-G-0019 / US Navy (USN) author.
338

Climate change-related human security threats to border integrity and safeguarding for South Africa

Vorster, Magriet 11 July 2014 (has links)
Climate change is a very current and contentious issue that has received a lot of attention during the past two decades because of its global influence and impact. Climate change affects the entire globe and the impact is mostly continental and regional and is not limited along state borders. Whether a person or group believe in the existence of global warming or not, the scientific evidence leaves no doubt that the climate is changing (Mazo, 2010: 9). Climate change influence the environment people live in and have a direct impact on all aspects of their daily lives. In a globalized world almost all problems cross borders, and environmental issues have long been recognized as among the most international and the most transnational of all (Parsons, 2009: 5). Climate change acts as a “threat multiplier” by exacerbating existing vulnerabilities, and must be analysed in relation to the adaptive capacity of those affected (individuals, communities and states), taking account of the wider political, socio-economic and demographic context (ACCES, 2011: 9). Although climate change has a global impact, the African continent is likely to be more severely affected than other regions of the globe and it will have a profound negative impact on all facets of human security. Long-term shifts in the climate seem likely to catalyse conflict by creating or exacerbating food, water and energy scarcities, triggering population movements, and placing larger groups of people in competition for more and more limited resources. Increased climate variability, including the greater frequency of extreme weather events, will also complicate access to resources, thereby exacerbating conditions that are conducive to promoting conflict. Southern Africa is described as a predominantly semi-arid region with high intra- seasonal and inter-annual rainfall variability, with extreme events such as droughts and floods occurring frequently. In Southern Africa, there has been an increase in inter-annual variability of rainfall over the past 40 years, with more intense and widespread droughts. Floods and droughts in Southern Africa are gradually increasing in number and frequency as well and already the entire region is considered a climate change "hotspot". As can be seen from the findings of the various chapters, climate change has a very complex predicted impact on all the dimensions of human security and a few major key issues in this regard came to light. These issues include urbanisation, migration, environmental degradation and biodiversity loss, water scarcity, spread of diseases, slow onset climate change, economic decline and poverty, criminality and conflict. The most profound issues that will have an impact on South African border integrity and safeguarding include urbanisation, migration, environmental degradation and biodiversity loss, water scarcity, spread of diseases, economic decline and poverty, criminality and conflict. Migration can be singularly highlighted as it has the potential to amplify and exacerbate all of the abovementioned issues. States have national security strategies and policies in order to guide policy and legislation to adequately protect the state from threats and to determine national security priorities. Border safeguarding is an important aspect of state security and strategy, policy and legislation, informed by the national security strategy and policy, constantly have to evolve and adapt to changes in the threat pattern affecting states. The border safeguarding environment of any state is very complex and faced with multiple external and international threats. Climate change-related human security threats will further amplify and complicate these threats as the impact of climate change becomes more pronounced in the southern African region. In order for South Africa to successfully address these threats in the border safeguarding environment it is important that a sound National Security Strategy and Policy provide focus and priorities for all government departments involved. This is a very complex field with multiple factors and only the key issues are highlighted and discussed in this paper.
339

The War on Terror and the Separation of Powers Tug-of-War

Burnep, Gregory January 2016 (has links)
Thesis advisor: Shep Melnick / Most of the literature on the separation of powers in the war on terror vastly overstates the power of the presidency and pays little attention to the respective roles of Congress, the courts, and the bureaucracy in prosecuting that conflict. Scholars – especially those in the legal academy – have consistently failed to appreciate the ways in which the president has been, and continues to be, checked and constrained by a variety of forces. In my dissertation, I engage in highly detailed case studies of U.S. law and policy with respect to detention and military commissions in the war on terror. I pay special attention to the complex interactions that occurred within and between our governing institutions in these policy areas. There are two central arguments that come out of my research and run through my case studies. First, the political scientist Robert Kagan’s work on “adversarial legalism” is no longer simply applicable to the domestic policy realm. The proliferation of legal rules and extensive litigation has increasingly come to characterize foreign affairs as well, with important consequences for how the U.S. implements its national security policies and fights its armed conflicts. In short, adversarial legalism has gone to war. Second, loose talk about the “unitary” nature of the executive branch is misleading. The executive branch is a sprawling bureaucracy made up of diverse actors with different perspectives, preferences, and norms, and that bureaucracy has interacted with Congress and the courts in surprising ways to constrain the presidency in the war on terror. / Thesis (PhD) — Boston College, 2016. / Submitted to: Boston College. Graduate School of Arts and Sciences. / Discipline: Political Science.
340

Operation Condor : The U.S. involvement - A rational strategy or a political powerplay?

Hedman, Amanda January 2019 (has links)
During 1975-1989 a transnational state-terror operation was carried out by several South American states called Operation Condor. Declassified documents show that the U.S. government assisted the operation with communication and intelligence techniques. This case-study is with a theory consuming method aiming to analyze the internal decision process within the U.S. government to assist Condor. The analysis is based on two theoretical frameworks by Allison Graham, the “Rational Actor” and “Governmental Politics”. By studying the cold war doctrine, the objectives of the U.S. and the political actors behind the assessment the aim is to understand the structures that shaped the final decision. The conclusion shows that the Cold War, political crises and power relations between politicians played a major role in the internal decision process.

Page generated in 0.0283 seconds