• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 394
  • 76
  • 30
  • 30
  • 22
  • 16
  • 13
  • 13
  • 12
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • Tagged with
  • 772
  • 772
  • 178
  • 178
  • 144
  • 130
  • 115
  • 99
  • 98
  • 96
  • 88
  • 80
  • 78
  • 76
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
541

The United States in El Salvador: 1979-1992 Success Through the Eyes of the Diplomats

Mouritsen, David Jeffrey 12 July 2003 (has links) (PDF)
The United States made El Salvador one of its top priorities in the 1980s as the communist threat from the Soviet Union made its way to El Salvador. The Marxist-Leninist guerrilla group, the Farabundo Martí­ National Liberation Front (FMLN), was supported by the Soviet Union via Cuba and became the target of the hard line politicians that ruled in El Salvador. In order to combat the guerrilla movement, the United States structured its policy around national security to justify intervention in El Salvador. The three main points of the policy were to prevent a left-wing takeover by the communist-backed FMLN, to promote democracy by establishing free elections, and to reduce the number of human rights abuses that were rampant at the beginning of the 1980s. The question of whether or not the United States was successful in its efforts in El Salvador was a very controversial one. Through the analysis of the perceptions and statements of the United States Ambassadors that were assigned to El Salvador between 1979 and 1992, this thesis will show that the three-pronged policy was successful. It is important to note that El Salvador still has many issues to address before it fully recovers from the civil war, but the policy of United States during its civil war was achieved.
542

Разработка методов информационно-аналитической работы с политической оппозицией по обеспечению национальной безопасности Российской Федерации : магистерская диссертация / Development of information-analytical methods of work with the political opposition to ensure the national security of the Russian Federation

Монина, Э. А., Monina, E. A. January 2016 (has links)
Master's thesis "Development of information-analytical methods of work with the political opposition to ensure the national security of the Russian Federation has 117 pp., 111 sources, including electronic resources, application 2. The purpose of this work is to identify specific methods and analytical work with the political opposition in Russia and the development of a new method. Thesis structure includes: introduction, main part, consisting of three chapters (1.1-1.2, 2.1-2.3), conclusion, bibliography, annexes a and b. The first chapter is devoted to theoretical characteristics of political opposition. Chapter carried out structural-functional analysis of the political opposition. The second chapter is devoted to the analytical work to identify features of use of information and analytical work with the political opposition to ensure the national security of the Russian Federation. The third chapter is dedicated to the research, which has developed a method of information-analytical work with the political opposition, consisting of analytical work with the tools of political language as a method. In conclusion, the work submitted to the opinion, which contains conclusions, bibliography and sources, applications. / Магистерская диссертация на тему: «Разработка методов информационно-аналитической работы с политической оппозицией по обеспечению национальной безопасности РФ» имеет 117 стр., 111 источников, включая электронные ресурсы, 2 приложения. Целью настоящей работы является выявление специфических методов информационно-аналитической работы с политической оппозицией в современной России и разработка нового метода. Структура магистерской диссертации включает: введение, основную часть, состоящую из трех глав (1.1-1.2, 2.1-2.3), заключение, библиографический список, приложения А и Б. Первая глава посвящена теоретическим характеристикам политической оппозиции. В главе проведен структурно-функциональный анализ особенностей политической оппозиции. Вторая глава посвящена аналитической работе по выявлению особенностей применения методов информационно-аналитической работы с политической оппозицией по обеспечению национальной безопасности РФ. Третья глава посвящена исследованию, в котором был разработан метод информационно-аналитической работы с политической оппозицией, заключающийся в аналитической работе со средствами политического языка, как метод. В завершении работы представлено заключение, которое содержит выводы по работе, список использованной литературы и источников, приложения.
543

Spatial competition, conflict and cooperation

Dietz, Robert D. 14 October 2003 (has links)
No description available.
544

“Inter Arma Silent Leges: In Time of War the Laws are Silent”

Peterson, Allison A. 29 June 2010 (has links)
No description available.
545

American Exception: Hegemony and the Tripartite State

Good, Aaron January 2020 (has links)
This dissertation seeks to explain the uncanny continuity of hegemonic US foreign policy across presidential administrations and the breakdown of the rule of law as evidenced by unadjudicated state and elite criminality. It finds that a nebulous deep state predominates over politics and society. This deep state is comprised of institutions that advance the interests of the politico-economic elite through nexuses connecting the overworld of the corporate rich, the underworld of organized crime, and mediating national security organizations. To investigate the evolution of the state, the tripartite state construct is elucidated. It is a synthesis and expansion of three extant approaches—dual state theory, theories of the power elite, and the deep politics framework which explores the impactful forces and institutions whose influence is typically repressed rather than acknowledged in mainstream discourse. The tripartite state is comprised of the democratic or public state, the security state, and the deep state. A key contention herein is that the deep state developed alongside postwar US exceptionism—the institutionalized abrogation of the rule of law, ostensibly on the basis of “national security.” Theories of hegemony and empire are analyzed and critiqued and refined. To wit: the post-World War II US empire has been sustained by hegemonic institutions which rely on various degrees of consent and coercion—both in a dyadic sense but increasingly through structural dominance following the collapse of Bretton Woods. Rival hypotheses related to the state and US foreign policy are analyzed and critiqued. To explore the concept of a deep state within a nominal democracy, open democratic modes of power are contrasted with top-down or dark power. Through process tracing, the historical evolution of the US state is delineated, charting the means by which US imperial hegemony was reproduced. Presidential administrations and the Watergate scandal serve as case studies of sorts, illustrating the deep state’s role in the general thrust of postwar US politics—imperial hegemony over the international system. Finally, various deep state institutions are examined along with a discussion of generalizability, applications, and implications of the foregoing scholarship. / Political Science
546

Encapsulation of large scale policy assisting computer models

Sathisan, Shashi Kumar January 1985 (has links)
In the past two decades policy assisting computer models have made a tremendous impact in the analysis of national security issues and the analysis of problems in various government affairs. SURMAN (Survivability Management) is a policy assisting model that has been developed for use in national security planning. It is a large scale model formulated using the system dynamics approach of treating a problem in its entirety rather than in parts. In this thesis, an encapsulation of SURMAN is attempted so as to sharpen and focus its ability to perform policy/design evaluation. It is also aimed to make SURMAN more accessible to potential users and to provide a simple tool to the decision makers without having to resort to the mainframe computers. To achieve these objectives a personal/microcomputer version of SURMAN (PC SURMAN) and a series of curves relating inputs to outputs are developed. PC SURMAN reduces the complexity of SURMAN by dealing with generic aircraft. It details the essential survivability management parameters and their causal relationships through the life-cycle of aircraft systems. The model strives to link the decision parameters (inputs) to the measures of effectiveness (outputs). The principal decision variables identified are survivability, availability, and inventory of the aircraft system. The measures of effectiveness identified are the Increase Payload Delivered to Target Per Loss (ITDPL), Cost Elasticity of Targets Destroyed Per Loss (CETDPL), Combat Value Ratio (COMVR), Kill to Loss Ratio (KLR), and Decreased Program Life-Cycle Cost (DPLCC). The model provides an opportunity for trading off decision parameters. The trading off of survivability enhancement techniques and the defense budget allocation parameters for selecting those techniques/parameters with higher benefits and lower penalties are discussed. The information relating inputs to outputs for the tradeoff analysis is presented graphically using curves derived from experimentally designed computer runs. / M.S.
547

The National Security Defence in International Investment Arbitration from the Perspective of Customary International Law : Predicting the Huawei Arbitration

Ren, Shuailong January 2024 (has links)
National security has emerged as a pivotal issue in the domains of international politics and law. Its scope has expanded significantly in contemporary contexts. Host States can leverage national security as a defence within International Investment Law (IIL). From the perspective of Customary International Law (CIL), host States may invoke Article 25 of the Draft Articles on Responsibility of States for Internationally Wrongful Acts (ARSIWA), namely the plea of necessity, as a national security defence to preclude wrongfulness. Certain bilateral investment treaties incorporate an essential security exception clause, known as the 'non-precluded measures provision,' which further complicates the application of Article 25 of ARSIWA. Consequently, the investor-State-dispute-settlement tribunals have rendered divergent conclusions, revolving around the applicability of the CIL-based national security defence, its relationship with treaty-based defences, and the interpretation of Article 25 of ARSIWA. The employed methodologies are doctrinal research and critical legal studies (CLS). CLS examines the interaction between international politics and law, uncovering the structural biases inherent in international legal institutions that reflect the preferences and interests of dominant decision-makers. By structuralism, CLS posits that the indeterminacy of international law enables decision-makers to interpret laws according to their preferences. Thus, it is imperative to analyse the reasons behind the tribunals' conclusions. Additionally, legal positivism underpins CLS, making doctrinal research a prerequisite for CLS analysis. The materials used include CIL, treaties, precedent cases, and general principles of law. Neoliberalism plays a significant role in the CLS analysis of IIL. The CMS v Argentina Tribunal dismissed the plea of necessity, establishing a high threshold for invoking ARSIWA, indicative of a neoliberal bias aimed at preserving the neoliberal economic order. Conversely, the LG&E v Argentina Tribunal, while still imposing relatively stringent requirements for invoking ARSIWA, approved the national security defence based on the same facts. This Tribunal displayed hypocrisy by upholding a neoliberal bias while pursuing international capital's sustainable exploitation. The Unión v Egypt Tribunal dismissed the plea of necessity, adopting an ostrich policy by avoiding the issue of public safety, which resulted in a straw-man fallacy. This Tribunal appeared confused about neoliberalism after the 2008 Global Financial Crisis and opted to hedge its bets. Issues such as the differences between ordoliberalism and neoliberalism, the European Union's Strategic Autonomy, and the hegemonic rivalry between the United States and China, may potentially shape a new structural bias in the Huawei v Sweden Tribunal.
548

A security community in Africa : a critical assessment of the African Union’s contribution towards the construction of a potential security community since 2002

De Vos, Johannes Nicolaas 03 1900 (has links)
Thesis (MA)--Stellenbosch University, 2012. / ENGLISH ABSTRACT: This thesis seeks to provide a critical discussion of the contributions of the African Union towards the potential development of an African security community since its inception in 2002. Utilising Security Community Theory, and the framework for the study of security communities developed by Adler & Barnett (1998) it commences with an interrogation of the AU. This interrogation is arranged along the three tiers of the framework. The first tier is the precipitating conditions, which cause states to orient themselves in each other’s direction and desire to coordinate their relations. The second tier investigates the factors conducive to the development of mutual trust and collective identity. The third, and final, tier identifies the necessary conditions of dependable expectations of peaceful change. The study goes on and introduces three African case studies, which illustrate the contributions of the African Union towards the potential development of an African security community. The case studies are the African Union mission in Burundi, the African Union mission in Sudan, and the recent intervention of the African Union in the post-election crisis in Côte d'Ivoire. All three case studies were able to provide ample evidence to illustrate the AU’s contributions. The study concludes with two major findings. Firstly, this study is able to illustrate that the AU has made significant contributions towards the development of peace and security in Africa. Secondly, that the AU has made significant contributions at all three tiers of the framework, and therefore major contributions to the potential development of an African security community. However, the AU is still in its embryonic phase, and any prediction concerning the existence, or potential existence of an African security community would be premature. Even though there are ostensibly, positive developments in the area of continental peace and security this study is able to illustrate several remaining challenges to further contributions by the AU. The first is a lack of resources. The AU is heavily dependent on the contributions of its member states, and a number of members persistently fail to meet their contributions to the organization. A second challenge is the loosely defined relationship with the UN (and other external partners). It is crucial that a constructive relationship be established, if not, differences might antagonise the two organisations and negatively affect any future contributions of the AU towards the development of an African security community. Finally, the role of core states, most notably regional hegemons such as South Africa and Nigeria will remain important for stabilizing and encouraging the further development of an African security community. / AFRIKAANSE OPSOMMING: Hierdie tesis poog om n kritiese bespreking te bied van die bydra wat die Afrika Unie na die potensiele ontwikkeling van n Afrika sekuriteits gemeenskap gemaak het sedert sy intrede in 2002. Deur gebruik te maak van Sekuriteits Gemeeenskap Teorie, en die raamwerk vir die studie van sekuriteits gemeenskappe deur Adler & Barnett (1998) begin die studie met n direkte ondersoek van die AU. Hierdie ondersoek vind plaas volgens die drie vlakke van die raamwerk. Die eerste vlak is die kondisies wat veroorsaak dat state hulself na mekaar orienteer, en n wil ontwikkel om hulle sake te koordineer. Die tweede vlak ondersoek die faktore vir die ontwikkeling van wedersydse vertroue en gesamentlike identiteit. Die derde, en finale, vlak identifiseer die nodige kondisies van afhanklike verwagtinge vir vreedsame verandering. Die studie gaan voort met drie Afrika geval studies, wat die bydra van die AU na die potensiele ontwikkeling van n Afrika sekuriteits gemeenskap illustreer. Die geval studies sluit in die Afrika missie in Burundi, die Afrika missie in Sudan, en die onlangse intervensie deur die AU in die na-eleksie krisis in Côte d'Ivoire. Al drie geval studies verskaf wye getuienis wat die bydra van die AU illustreer. Die studie sluit af met twee hoof bevindings. Eerstens, kon hierdie studie illustreer dat die AU betekenisvolle bydraes na die ontwikkeling van vrede en sekuriteit in Afrika gemaak het. Tweedens, dat die AU betekenisvolle bydraes op al drie vlakke van die raamwerk gemaak het, en daarom ook mondige bydraes tot die potensiele ontwikkeling van n Afrika sekuriteits gemeenskap gemaak het. Nogtans, is die AU self nog in n onvolwasse stadium, en enige voorspelling in verband met die bestaan, of oor die potensiele bestaan van n Afrika sekuriteits gemeenskap is voortydig. Al is daar opmerkilike positiewe ontwikkelinge in die area van kontinentale vrede en sekuriteit, kan hierdie studie steeds verskeie uitdagings identifiseer wat verdere bydraes deur die AU kan hinder. Die eerste uitdaging is n tekort aan bevondsing. Die AU is hoogs afhanklik op die bydrae van sy lidmaat state, maar n paar lede mis aanhoudend hulle bydraes tot die orginasasie. n Tweede uitdaging is die ongedefineerde verhouding tussen die AU en die VN (en ander eksterne vennote). Dit is belangrik dat n konstruktiewe verhouding in werk gestel word, indien nie, kan verskille die twee organisasies van mekaar dryf en enige toekomstige bydraes van die AU na die potensiele ontwikkeling van n Afrika sekuriteits kompleks negatief beinvloed. Laastens, sal die rol van kern state, mees aanmerklik streek leiers soos Suid Afrika en Nigerie, belangrik bly om die sekuriteits kompleks te stabiliseer en verdere ontwikkeling in die toekoms te bevorder.
549

From National Defence to International Operations? : A study on the transformation of Sweden's armed forces between 1989-2009

Kettil, Daniel January 2011 (has links)
Since the cold war, most countries have moved on from the classical security perception that all threats are external and aiming to invade the sovereignty of the state, thus leading to military armies fighting each other. Instead as Globalization have become more predominant since the beginning of the 1990’s new threats have also emerged that militaries can’t fight as they used to, thus it has become necessary for a wider view on security which also involves human suffering, and the general trend among armies have been to combat these through international peacekeeping and humanitarian operations. This study aims at showing the change in which the Swedish army have undergone since the end of the cold war and into modern days, both in terms of political decisions and also show how the use of language have been changed throughout the course. The thesis covers a time period between 1989 to 2009 and following the process of change from the Swedish political institution that works with military issues, called the Försvarsutskottet or the FöU and the method applied is process tracing with a detailed narrative. Several important conceptions are also explained such as Globalization, Collective security and Human security, which will make the result chapter more understandable. The results showed that the biggest changes in Sweden’s military policy came in three steps, the beginning of the 1990’s was influenced with economic problems for Sweden which also lead to budget downsizings in the military. The mid-1990’s was the time where there existed no real external threat to Sweden, and hence it came to be dominated by several large reforms which also aimed at lowering the costs of the military and adapt it into becoming rapid response forces. After the 9/11 attacks in 2001 the new threats emerged and the Swedish military focused even more on improving their international and humanitarian operations. The thesis ends by discussing these finding and present some changes in the use of languages in-between the 20 years.
550

Defining the role of the African Union Peace and Architecture (APSA) : a reconceptualisation of the roles of institutions

Wood, J. C. January 2012 (has links)
At its core, this research project is a revision of how we conceptualise the role of international organisations. The concept of role is often invoked International Relations when discussing the function of institutions like the African Peace and Security Architecture (APSA), but its full meaning in this context has never been problematised, leading to varying perceptions of its meaning and a lack of common understanding in the discourse. In the case of the APSA, this lack of common understanding has led to a wide variance in how the role of the APSA is categorised, and a corresponding discrepancy in assessments of the institution’s success and utility, which has had a knock-on effect on policy recommendations, which also differ wildly from author to author. This thesis devises technical definitions for the various ways in which the word role is utilised in International Relations and related fields, and in so doing, aims to standardise our understanding of the role of institutions, using the APSA as a case study. After developing a new technical definition of role based on Role Theory, the thesis develops a research programme which sets out to investigate the true role of the APSA, based on an examination of how the APSA’s role has been shaped by key limiting and enabling factors, and how this role is shaped and influenced, and directed; all the while highlighting how it differs from the organisation’s stated role, and scholarly perceptions of that role.

Page generated in 0.1153 seconds