• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 394
  • 76
  • 30
  • 30
  • 22
  • 16
  • 13
  • 13
  • 12
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • Tagged with
  • 772
  • 772
  • 178
  • 178
  • 144
  • 130
  • 115
  • 99
  • 98
  • 96
  • 88
  • 80
  • 78
  • 76
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

The Discursive Construction of National Security Threats from 2001-2018

Stieper, Erica Marie 29 June 2018 (has links)
This thesis seeks to explain the discursive construction of national security threats facing the United States from 2001-2018. The driving argument is that the nation's perception of threats and conceptualization of itself are vulnerable to Presidential rhetoric. Presidents convey threats through rhetorical frameworks, a simplified means to present a manipulated perception of reality to a wider audience, which intentionally provoke reactions from the nation to garner consensus towards executive decision-making. Presidents apply frames from prior administrations as well as new frames to define adverse states, organizations, groups of people, etc., and to justify disciplinary practices, military action, or policy implementation against threats. Primarily, they portray threats as the binary opposite of the American national identity to reinforce the country's legitimacy in national security decision-making. This discourse influences how the public internalizes major issues facing the nation and triggers emotions that can either unite or divide the national identity. This research maps variation among the rhetorical frameworks and strategies of President George W. Bush, President Barack Obama, and President Donald J. Trump to evaluate: how national security threats are constructed, how the nation interprets threats, and the resulting social and political effects. / Master of Arts / This thesis seeks to explain how presidential language contributes to the construction of national security threats facing the United States from 2001-2018. The driving argument is that the nation’s perception of threats and conceptualization of itself are vulnerable to Presidential rhetoric. Presidents intentionally portray threats as the binary opposite of the American national identity to justify the country’s retaliation. This language impacts how Americans conceptualize themselves and triggers emotions that can either unite or divide the national identity. This research maps how President George W. Bush, President Barack Obama, and President Donald J. Trump have used language to construct national security threats and the American national identity. Further, it evaluates the resulting social and political effects and the implications moving forward.
62

Parliamentary discourses on the European security and defence policy in Britain, Ireland and Poland, 1998-2008

Huff, Ariella Rachel January 2012 (has links)
No description available.
63

The cultural formulation of national security policy in the United States and Japan

Willey, Kristin Raphaële. January 2005 (has links)
Thesis (Ph. D.)--University of Minnesota, 2005. / Includes bibliographical references (leaves 218-241).
64

Pakistan's accommodative moves vis-à-vis India : a case study of the dynamics of accommodation in the developing world

Bhatti, Haroon Haider. January 1999 (has links)
No description available.
65

Baltic-Russian security in practice and theory : before and after enlargement

Lamoreaux, Jeremy W. January 2009 (has links)
In 1991, the Baltic states re-gained independence from the Soviet Union after roughly 50 years of Soviet domination.  The primary benefit of this change was renewed sovereignty.  The primary challenge was how to retain that sovereignty. This thesis offers a comparative analysis of the Baltic-Russian security relationship focusing on three aspects: the extent of the Russian threat, the extent of security from the West, and whether small state theory can account for the actions of the Baltic states vis-à-vis both Russia and the West.  The thesis compares security issues in the Baltic-Russian relationship with the similar issues in other former-Soviet states.  It also compares security provided by the West with security from the Nordic states.  Finally, the thesis tests the main expectations of small state theory through Baltic-Russian and Baltic-West relations.  The conclusion argues that though Russia did (and does) pose a threat to Baltic sovereignty, it is significantly less than the threat to other former Soviet states.  Furthermore, the security provided by the West is less than expected when compared to security from the Nordic states.  Finally, while small state theory is capable of accounting for most Baltic actions vis-à-vis Russia and the West, there are some shortcomings in the theory as regards this case study.
66

What lies beneath Saddam's legacy and the roots of resistance in Iraq

Munson, Peter J. 12 1900 (has links)
Saddam Hussein's patrimonial coercive rule reshaped major aspects of the Iraqi state and society, providing structures and motivations that have fueled resistance in the wake of regime change. By linking literature describing the effects of Ba'ath rule on the Iraqi state, society, and individual to the characteristics and motivations of the resistance, a more nuanced understanding of the complex landscape of Iraqi transition is possible. Repressive regimes produce a lasting and complex legacy in the structures of state and society that they leave behind. This legacy is often contentious and unpredictable, complicating efforts toward a democratic transition. This thesis concludes that, in the case of Iraq, patrimonial coercive rule produced a set of Sunni sub-state power structures that coveted the state and personal powers enjoyed under the old system. This sub-state landscape has proven to be difficult terrain for a successful transition, producing a network of actors that resist for varied motives. Exploration of the case of Iraqi transition reveals a demand for balanced political and military policies that address the sociopolitical roots of the resistance as well as the violent symptoms. Military initiatives alone cannot produce a solution to the problems in Iraq.
67

Patterns of error perceptual and cognitive bias in intelligence analysis and decision-making

Jones, Lloyd (Chad). 12 1900 (has links)
The history of man is written in choice. Whether simple or complex, on a whim or after labored consideration, inflamed by passion or calculated coolly, the judgments that we form and the choices that we make define who we are and what we want for the future. Yet most of us have little or no conscious awareness of the inner workings of our own minds. We often choose without understanding or accounting for the perceptions, intuitions, and inferences that underlie our decisions. So how do people make decisions? How do we cope with the volume and complexity of information in our environment without being overwhelmed? How do we use our senses to select and process this information, and how do we organize, contextualize, and conceptualize it once it reaches our brains? How do we form judgments about the value of a specific piece of information or about the likelihood of a particular event or outcome? And what are the factors that lead us astray? The search for answers to these questions is more than academic; understanding the fundamentals of perception and cognition is critical to effective analysis and decision-making. For those involved in national security, and particularly for those involved in the collection and analysis of national intelligence, an appreciation of the intricacies of these processes has real-world implications. As evidenced by the dramatic intelligence failures of the last few years, and in particular by the mistaken assessment concerning Iraqi weapons of mass destruction, understanding how we arrive at judgments and decisions can be quite literally a matter of life and death.
68

Enhancing national security in Jamaica through the development and employment of special forces

Ogilvie, Jaimie S. A. 06 1900 (has links)
While Special Operations Forces are commonly identified with the pursuit of foreign policy, they may also be used within the domestic security infrastructure. Given the long-practiced use of the military in developing countries in internal security roles (inclusive of Jamaica), and given the rise to prominence of transnational threats over traditional threats in Jamaica, a need has arisen for an evolution in the military to adequately meet these new unconventional threats. Such a capability may be embodied in a SOF properly selected, trained, equipped and organized to mitigate these irregular threats such as terrorism, illicit arms and narcotics trafficking, and organized crime which currently face Jamaica. This study examines the value, utility, and possible roles of such a unit in the Jamaican security landscape, and makes recommendations for the establishment and employment of such a unit in Jamaica.
69

Manhunting : a methodology for finding persons of national interest / A methodology for finding persons of national interest

Nilson, Matthew T., Marks, Steven, Meer, Thomas 06 1900 (has links)
The asymmetrical threats that challenge U.S. national policies are not large standing armies, but rather individuals who seek to usurp and coerce U.S. national interests. The nature of today's threats call for the U.S. military to change from finding, fixing, and destroying the enemy's forces to identifying, locating and capturing rogue individuals in order to destroy networks. To counter such threats, the USG will have to quickly and efficiently identify and find these targets globally. Unfortunately, no military doctrine, framework or process currently exists for finding and apprehending these Persons of National Interest (PONIs). Since military planners and intelligence analysts are neither educated nor trained in the methods or procedures necessary to find and capture PONIs, this thesis will propose a methodology to do so. This involves the development of an analytical process, and an organizational structure and procedure to identify and locate PONIs. Consequently, the United States government's ability to prosecute the war on terrorism today, and to find and apprehend PONIs in the future, depends on its ability to develop and institutionalize a comprehensive manhunting strategy now. / US Air Force (USAF) author.
70

Why culture matters an empirically-based pre-deployment training program

Chandler, Jennifer V. 09 1900 (has links)
As part of analyzing any dynamic situation or area in military operations, it is crucial to addresses how and why culture matters to the military. This thesis utilizes a systems approach for analyzing both the operational environment and culture, recommending an empirically-based pre-deployment training program that trains military members to operate at a higher level of effectiveness required for stability operations and today's "strategic sergeant" informational environment. A systems approach to analyzing the operational environment considers the current situation and the military mission in the context of geographic, societal, political, economic, military, paramilitary, security, and historical dynamics. This approach also analyzes culture through cross-cultural communications training. In order to align empirical and doctrinal analysis with operational realities, the thesis presents a pre-deployment framework and a tailored template for training at the basic, intermediate, and advanced levels. A systems approach towards culture and the operational environment, applied to pre-deployment training, and linked with long-term regional educational studies, and language proficiency, will improve the military's ability to operate successfully across the range of military missions.

Page generated in 0.0366 seconds