• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 394
  • 76
  • 30
  • 30
  • 22
  • 16
  • 13
  • 13
  • 12
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • Tagged with
  • 772
  • 772
  • 178
  • 178
  • 144
  • 130
  • 115
  • 99
  • 98
  • 96
  • 88
  • 80
  • 78
  • 76
  • 74
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
701

Signalspaning i Sverige och USA : En komparativ studie av skyddet för den personliga integriteten vid signalspaning i försvarsunderrättelseverksamhet / Signals intelligence in Sweden and the United States : A comparative analysis of the protection of personal integrity in the collection of electronic communications for foreign intelligence purposes

Wiklund, Marlene January 2020 (has links)
The need to collect electronic communications for foreign intelligence purposes has increased in the past two decades, primarily due to the increase of international threats such as terrorism and proliferation of weapons of mass destruction. Meanwhile, digitalization and technical innovation have given rise to new possibilities for government surveillance and expanded the scope of the types of communications that may be collected. This gives rise to issues concerning the balance between effective foreign intelligence activities and the protection of personal integrity. This thesis performs a comparative analysis of the protection of personal integrity in signals intelligence in Sweden and the United States, by examining the protection of personal integrity under the Swedish Instrument of Government and Article 8 of the European Convention of Human Rights (European Convention) compared to the Fourth Amendment to the United States Constitution, and the requirements for signals intelligence under the Swedish Act (2008:717) on Signals Intelligence in Defense Intelligence Operations (the Surveillance Act) and § 702 of the Foreign Intelligence Surveillance Act (FISA, as amended). The analysis further includes a review of the safeguards adopted in each legal system to limit the collection of communications and to ensure that personal integrity is considered in signals intelligence operations. In regard to the protection of personal integrity, the analysis concludes that Swedish law, combined with the European Convention, offers a wider and more extensive protection for individuals when compared to the United States’ framework. However, all provisions include a requirement of proportionality or reasonableness intended to balance the need for effective law enforcement with the protection of personal integrity. The analysis further concludes that the Fourth Amendment has limited impact on signals intelligence carried out under § 702 FISA due to its limitations to the people of the United States, and that individuals' ability to exercise their rights is greater under the European Convention. The European Convention further offers protection beyond Sweden's borders, resulting in some protection for non-Swedish persons. As for the signals intelligence conducted under the Surveillance Act and § 702 FISA, several similarities and differences are identified. Both regulations limit the signals intelligence to be carried out for certain purposes. However, a notable difference is that, while signals intelligence under both the Surveillance Act and § 702 FISA are limited to foreign conditions, Swedish signals intelligence may be conducted on communications that cross Sweden’s borders. Meanwhile, collection under § 702 FISA may only target non-US persons outside of the United States. Despite this difference, signals intelligence under both regulations result in the collection of communications of the country’s own citizens. To limit the collection, both the Swedish National Defense Radio Establishment (Sw. Försvarets Radioanstalt, FRA) and the United States National Security Agency (NSA) apply certain safeguards. These include the use of search terms in Swedish signals intelligence and selectors in American signals intelligence. While they are both used to make relevant selections in the collection of communications, there are some notable difference between the two. For example, selectors consist of, inter alia, an email address or phone number, while search terms should not, as a general rule, target a specific individual. Further, there is no warrant requirement for collections under § 702 FISA compared to the Surveillance Act, which requires court approval. Lastly, in regard to the control and review of Swedish and American signals intelligence, the analysis concludes that such activities are conducted in different manners in both legal systems. This includes both internal and external controls. However, the Swedish control units appear to have greater opportunities to intervene by, for example, controlling the FRA's access to signal carriers and interrupting an ongoing collection if needed.
702

National and Human Security Challenges Posed by Ethnic-influenced conflict in the Great Lakes Region (GLR) of Africa :A case of the Democratic Republic of Congo (DRC), 1980-2013

Modiba, Mmatlou Millicent-Anne Hannah 18 September 2017 (has links)
MAAS / Department of Development Studies / See the attached abstract below
703

Hybridhotbilden mot Sverige : En kvalitativ försvars- och säkerhetspolitisk innehållsanalys om hybridhot / The Hybrid Threat Scenario in Sweden : A qualitative defense and security policy content analysis on hybrid threats

Nilsson, Pierre January 2021 (has links)
With a changing state of security in Europe, defined by instability and unpredictability, the use of hybrid threats presents itself as an international security challenge. Characterized by the antagonistic use of both conventional and unconventional means, the hybrid threat actor coordinates these means in an attempt achieve specific goals, often under a guise of ambiguity. The complexity of hybrid threats deepens as advancing technology and globalisation enables the hybrid threat actor to use tools not only bound by geographical constraints, but tools that makes use the cyber domain and the constant flow of information. Tools ranging from military, political, economic, civil, and informational tools can, in various combinations, take advantage of specific vulnerabilities in the target state. Identifying and countering such a wide range of multifaceted tools provides a difficult task for most states.                                            This study aims to investigate the Swedish hybrid threat scenario by focusing on the authorities concerned with national defence and security and their identification of potential hybrid threats that faces Sweden. For countering such hybrid threats the study investigates the highly topical Swedish defence act 2021-2025. Its focus being on investigating potential goals, strategies and abilities for building resilience and countermeasures regarding hybrid threats. The study finds that Sweden is subject to the use of hybrid threats by antagonistic state actors, mainly Russia and China. Tools being used against Sweden include for example espionage, strategic acquisition of businesses and real estate, disinformation, and cyberattacks. For countering these threats, the study fails to find a specific set of goals for hybrid threat defence. Instead, the study finds a broad effort to strengthen national defence and security including among others the rebuilding of the Total Defence, founding of a national cybersecurity centrum, instituting an agency for psychological defence as well as lifting the perspective of hybrid threat among relevant national agencies.
704

Renseignement public et sécurité nationale / Public intelligence and national security

Deprau, Alexis 29 November 2017 (has links)
Si les activités de renseignement public n’étaient pas encadrées, la loi du 24 juillet 2015 relative au renseignement a permis de créer un cadre juridique du renseignement, tout en mettant en avant la communauté du renseignement. Cet encadrement juridique des activités de renseignement s’exerce dans le but de faire face aux menaces à la sécurité nationale. Cet encadrement juridique est aussi une avancée qui a permis d’ériger le renseignement public comme une politique publique, nécessaire pour protéger les intérêts fondamentaux de la Nation, et a été complété par un contrôle concret de ces activités de renseignement. / As the activities of public intelligence services were not regulated before, the law on intelligence dated July 24th, 2015 allowed to create a legal framework of intelligence, while showcasing the intelligence community. This legal framework of intelligence activities is meant to deal with the threats to national security. This legal framework is also a breakthrough allowing to turn public intelligence into public policy, which is required to protect the fundamental interests of the Nation, and it has been completed by an effective control of these intelligence activities.
705

Válka proti terorismu na pozadí teorie spravedlivé války / War againts terrorism on the background of Just War Theory

Slavíková, Petra January 2012 (has links)
The day of September 11, 2001 which was primarily seen like an ordinary day was significantly written into the world's history. The worst terrorist attack of all ages were commited in the United States, nearly 3.000 people were killed during the attacks. American administration in response to the attacks declared the "war on terorr", which was mainly represented by military interventions to Afghanistan 2001 and Iraq 2003. Inseparable part of Bush's foreign policy was National Security Strategy, which is the strategic basis for invasion to Iraq, approved on September 2002. This concept of this analysis is dealing with these three concrete events of american foreign policy which are specified on the background of Just War Theory JWT. Concretely on the basis of category jus ad bellum - right to war. The main aim of this work is to explore compatibility of these missions with the principles of just war and find out whether operations were launched justly according to JWT. National Security Strategy NSS - which is discussable in the current international system with the regard of the controversial concept of preemption - is important part of the research too. Pre-emptive strategy is confronted with the just war theory, primarily in the sence whether it is possible to consider preemption like just cause...
706

The national security implications of illegal immigration to South Africa

Vermaak, Corneluis Grugorius Buitendag 21 September 2010 (has links)
The aim of this study is to confirm whether illegal immigration to South Africa is being regarded as a threat to national security and to analyse the implications thereof. The dissertation presents three assumptions to be explored and tested, namely: <ul> <li>Illegal immigration poses a growing threat to South Africa’s national security. The latter is due to an increase in the number of illegal immigrants entering the country as well as their seemingly increasing involvement in especially violent crime.</li> <li>The South African government does not adequately acknowledge the threat potential of illegal immigration with regard to the country’s national security status and as such adequate measures are not being taken to curb the influx of illegal immigrants.</li> <li>Violent attacks on foreigners in South Africa have been seen as xenophobia, however, specific factors exist that contributed to these attacks.</li> </ul> The study is conducted and contextualised in terms of the theory of national security, more specifically as it applies to developing countries. It aims to analyse the security implications of illegal immigration for South Africa, with specific reference to the involvement of foreigners in crime in South Africa and also focus on the political implications, more especially the role of foreigners in fomenting political violence. The study accepts the notion that the phenomenon is multi-dimensional and that it cannot be divorced from its socio-economic implications. Reference is therefore made to the political, social, economic and crime dimensions. The dissertation also focuses on the official and public views on illegal immigration and analyse measures adopted by the South African government to address the issue. The study predominantly focuses on the period 1994 to 2008 in an effort to demonstrate the extent of the increase in the number of illegal immigrants to South Africa following the advent of the new dispensation. It further attempts to ascertain whether this increase could be linked to the rise in incidences of violent crime in South Africa during the period in question. AFRIKAANS : Die doel van die studie is om te bepaal of onwettige immigrasie na Suid Afrika toenemend beskou word as ‘n bedreiging vir nasionale veiligheid en, tweedens, om die implikasies daarvan te analiseer. Die studie stel drie aannames voor vir toetsing en verdere bespreking, naamlik: <ul> <li>Onwettige immigrasie bedreig Suid Afrika se nasionale veiligheid toenemend. Laasgenoemde stelling is gebaseer op die toename in die getal onwettige immigrante wat Suid Afrika binnekom, sowel as aan die betrokkenheid van onwettige immigrante in misdaad (veral geweldadige misdade) in Suid Afrika.</li> <li>Die Suid Afrikaanse regering beskou die potensiële bedreiging van onwettige immigrasie vir nasionale veiligheid nie met die nodige erns nie en gevolglik word die nodige maatrëels nie ingestel om die toenemende instroming van omwettige immigrante na Suid Afrika te bekamp nie.</li> <li>Geweld teenoor vreemdelinge in Suid Afrika word alom gesien as xenofobies van aard, alhoewel spesifieke faktore teenwoordig is wat bydra tot sulke aanvalle.</li></ul> Die studie is gebaseer op die teoretiese beginsels van nasionale veiligheid en meer spesifiek soos dit van toepassing is op ontwikkelende lande. Die studie poog om die veiligheidsimplikasies van onwettige immigrasie na Suid Afrika te analiseer, met spesifieke verwysing na die betrokkenheid van onwettige immigrante by misdaad in Suid Afrika. Daar word ook gefokus op die politieke gevolge, insluitend die opvatting dat vreemdelinge betrokke is by, of bydra tot politieke spanning in sekere gemeenskappe. Die studie aanvaar die beginsel dat onwettige immigrasie multi-dimensioneel is en dat dit onlosmaaklik verbonde is aan die sosio-ekonomiese impak daarvan. Gevolglik word verwys na die politieke, sosiale, ekonomiese en misdaad impak van onwettige immigrasie. Die studie fokus verder ook op die amptelike en nie-amptelike standpunte oor onwettige immigrasie en analiseer die maatrëels deur die Suid Afrikaanse regering ingestel ten einde die vraagstuk aan te spreek. Die studie fokus oorwegend op die periode 1994 tot 2008 ten einde die toename in die getal omwettige immigrante wat die land sedert 1994 binnegekom het, aan te dui. Verder poog die studie om vas te stel of daar ‘n verband bestaan tussen die toename in onwettige immigrante en ‘n toename in geweldadige misdaad in Suid Afrika in die periode onder bespreking. Copyright / Dissertation (MSS)--University of Pretoria, 2009. / Political Sciences / unrestricted
707

Cyber Supply Chain Security and the Swedish Security Protected Procurement with Security Protective Agreement

Dios Falk, Carina January 2023 (has links)
Digitalisation and globalisation are increasing the number of integrated and interconnected information technology (IT) systems worldwide. Consequently, these relationships and dependencies develop technological relationships through their services. Identifying all these relations is for organisations a challenge and complex since it involves millions of source code lines and global connections. For this reason, cyber supply chain risk management (C-SCRM) is becoming ever more critical for organisations to manage risks associated with information technology and operational technology (OT). At the same time, during a press conference, the Swedish Minister for Defense Peter Hultquist estimated that there are approx. 100.000 cyber activities against Swedish targets every year that targets both the Private and Public sector. In response to the evolving threat landscape, Sweden is experiencing a paradigm shift in protective security processes with new legislation entering into force that aims to protect Sweden's security against espionage, sabotage, terrorist offences and other crimes against national security. These rules on protective security, the Protective Security Act (2018:585) and Protective Security Ordinance (2021:955) apply to operators that are important for Sweden's national security and affect how public procurement processes are regulated. This thesis aims to study how the Swedish Security Protected Procurement with Security Protective Agreements (SUA) process and Cyber Supply Chain Risk Management (C-SCRM) relate and to understand what practices increase and decrease the level of C-SCRM in the current SUA process. The research questions are Q1) How does the SUA process relate to C-SCRM? and Q2) How does the SUA process affect the level of C-SCRM? This research paper contributes to understanding C-SCRM in the context of the Swedish Security Protected Procurement with Security Protective Agreements (SUA). To answer the research questions a Case study strategy was used, and interviews were conducted with eight key experts as well as a document analysis. The results showed that audit, regulation and people and processes are essential to managing C-SCRM and that processes within other international models, including the CMMC and Cyber Essential Plus, should be adopted to the SUA process to better manage cyber supply chain risks.
708

U.S. Intelligence Reform A Bureaucratic Politics Approach

Schickler, Bonnie M. 01 January 2010 (has links)
This study investigates the current bureaucratic struggles that exist within the U.S. intelligence community as a result of the Intelligence Reform and Terrorism Prevention Act (IRTPA) of 2004. The first part of this research examines the history of intelligence reform in the United States beginning with the National Security Act of 1947. The second part provides an indepth discussion of the 2004 legislation as well as an examination of the main bureaucratic conflicts that have arisen between the Director of National Intelligence (DNI) and the rest of the U.S. intelligence community. This study used the bureaucratic politics model to explain the development of the current disagreements, the reasons behind the DNI‘s struggle for power, and the intelligence community‘s inability to adapt to the reform. This research determined that the current conflicts have occurred as a result of the unclear authorities issued to the DNI by IRTPA and have been further exacerbated by interest-driven intelligence agencies and a well-developed culture that has proven difficult to abandon. This research also provides insight into several alternative approaches that can be used to explain the current U.S. intelligence reform process. Additionally, recommendations were made for reducing the bureaucratic friction that currently exists within the intelligence community and to strengthen the overall authority of the Director of National Intelligence.
709

Управление социально-демографической безопасностью региона в условиях общества риска : магистерская диссертация / Management of social and demographic security of a region in a risk society

Казанцева, А. Е., Kazantseva, A. E. January 2021 (has links)
Объектом исследования является общественная безопасность региона в условиях общества риска. Предмет исследования – управление социально-демографической безопасностью региона в условиях общества риска. Цель работы заключается в изучении социально-демографической безопасности региона в контексте общественной безопасности в условиях общества риска, оценке состояния социально-демографический безопасности и разработке рекомендаций, направленных на совершенствование системы управления социально-демографической безопасностью в Свердловской области. В работе раскрыта сущность риск-ориентированного подхода в управлении общественной безопасностью через призму теории общества риска, проведен анализ нормативно-правового регулирования социально-демографической и общественной безопасности; с помощью метода анализа статистических данных и экспертного интервью был составлен перечень угроз социально-демографической безопасности региона; проведена оценка социально-демографического положения Свердловской области; проанализирована система управления региональной общественной безопасностью; идентифицированы основные угрозы социально-демографический безопасности региона; составлен перечень критериев социально-демографической безопасности в системе общественной безопасности; предложен проект по созданию Межведомственного совета по обеспечению социально-демографической безопасности Свердловской области. / The object of the research is the public safety of the region under the conditions of a risk society. The subject of the research is the management of the socio-demographic security of the region in a risk society. The purpose of the work is to study the socio-demographic security of the region in the context of public security in a society at risk, assess the state of socio-demographic security and develop recommendations aimed at improving the management system of socio-demographic security in the Sverdlovsk region. The paper reveals the essence of the risk-oriented approach in public security management through the prism of the theory of risk society, analyzes the legal regulation of socio-demographic and public security; using the method of analysis of statistical data and expert interviews, a list of threats to the socio-demographic security of the region was compiled; an assessment of the socio-demographic situation of the Sverdlovsk region was carried out; analyzed the management system of regional public security; identified the main threats to the socio-demographic security of the region; compiled a list of criteria for social and demographic security in the public security system; a project was proposed for the creation of an Interdepartmental Council for ensuring the social and demographic security of the Sverdlovsk region.
710

The Limits of Control: A History of the SALT Process, 1969-1983

Ambrose, Matthew John January 2014 (has links)
No description available.

Page generated in 0.0296 seconds