Spelling suggestions: "subject:"[een] SECURITY STUDIES"" "subject:"[enn] SECURITY STUDIES""
121 |
The securitization of climate change in the United States : A case-study of the Biden-Harris administration’s first hundred days in officeSäll, Anna January 2021 (has links)
The Biden-Harris administration’s discussion of climate change is analyzed during the transformative time of the administration’s first hundred days in office. The theoretical framework of the Copenhagen School of Security Studies (CS) is used to develop the coding frame to perform a qualitative content analysis of empirical material consisting of speeches and other documents of the administration. Several securitization moves have been identified and climate change has been presented as a security issue and an existential threat by the Biden- Harris administration. A wide range of referent objects are identified, which is the people and things presented to be threatened by climate change. The whole world, ecosystems, the American people and future generations are a few of the identified referent objects. International and national solutions are presented, though the solutions are not interpreted as extreme measures as discussed by the CS. Therefore, this study supports the critique of a too narrow definition of securitization by the CS.
|
122 |
Možnosti zlepšení strategií pro kybernetickou bezpečnost / The potential improvement of the cyber security strategiesJandura, Lukáš January 2016 (has links)
The thesis is focused on central nodes' dynamics in cyberspace, representing its key elements. This approach is derived from the theory of networks developed by Albert-László Barabási and applied on different aspects of cyberspace, which brings different views at known events and issues and discovers relationship between central and common nodes. Cyberspace is perceived in its broadest shape as a fluid result of social constructivism influenced by behaviour of its users. Final outcomes are summarised to recommendations for a new approach to a cybersecurity strategy. Powered by TCPDF (www.tcpdf.org)
|
123 |
Public Participation in Emergency ManagementRood, Jason Alexander 01 January 2012 (has links)
With disasters increasing in frequency and costs each year, this study seeks to explore ways greater public participation can assist emergency managers in their mission to keep communities safe. Specifically this study examines the policy process and administrative functions of emergency management to illuminated the benefits and hindrances involved in greater participation. This study conducted a qualitative analysis of governmental documents, disaster case studies, international research, as well as political science and administrative doctrines, to arrive at its conclusions. The results of this study reveal that the public is a largely untapped resource in the emergency management field. Engaging the public dialogically in early policy stages and emergency management phases is essential to successful inclusion for both administrators and communities. Specifically, public inclusion creates expanded knowledge, shared learning, personal responsibility, and increased social capital. Faced with the growing threat from disasters, emergency management can create communities that are both more resilient and sustainable by increasing public participation.
|
124 |
FN - stora ord, små handlingar : - En jämförande feministisk säkerhetsanalys av fredsoperationerna i Västsahara, Kongo och Sydsudan i förhållande till FN-resolution 1325 / UN - All Talk, Little Action : - A comparative female security analysis of the peacekeeping operations in Western Sahara, Congo and South Sudan in relations to UNSCR 1325Nordberg, Filippa, Sundberg, Alva January 2023 (has links)
Women’s rights and female security is a growing concern in several conflicts around the world. In Congo, conflict-related violence has long been used as weapon and Congo has today become known as the “rape capital” beacuse of these war rapes. Further more, reports from South Sudan states that UN troops has ignored pleas for help by women being raped. United Nation Security Council Resolution (UNSCR) 1325 was implemented by the UN Security Council to combat conflict-related violence and add a gender perspective in UN Peacekeeping operations. The aim of this thesis is to analyze the impact of UNSCR 1325 by comparing UN Peacekeeping operations’ mandates and actions before and after the resolution was implemented. The thesis will also analyse the UN’s action to eliminate conflict-based sexual violence and war rape. The peacekeeping operations that will be discussed are MINURSO (West Sahara) MONUSCO (Congo) and UNMISS (South Sudan). In order to do so, the theory of Female Security Studies [FSS] and Militarized Masculinity will be applied. In our thesis, the UN’s actions were found to be insufficient. The main factors resulting in this insufficiency was found to be the systematic failure to take the actions needed to implement UNSCR 1325, such as the increasing the number of female involvement in peacekeeping and peacebuilding processes. In large, the impact of UNSCR 1325 could have been bigger if the resolution had been implemented more efficiently. While the written changes were significant with the implementation of the resolution, these changes were not as visible among the actual actions taken in the peacekeeping operations in West Sahara, Congo and South Sudan.
|
125 |
A Content Analysis of Jihadist Magazines: Theoretical PerspectivesUdani, Catalina M 01 January 2018 (has links)
During its violent spread across the Middle East, the Islamic State of Iraq and Sham (ISIS) amassed both a local and international following in large part due to its usage of emergent media distribution. Beginning in 2014, ISIS’s Ministry of Media published an English-language magazine, Dabiq, disseminating its issues through online platforms. Dabiq and its successor Rumiyah both serve as propagandistic recruitment material for ISIS’s international community as well as broadcasting the message of the jihadist movement to ISIS’s enemies. This study analyzed ISIS’s publications using a qualitative content analysis in order to identify jihadist recruitment strategies through the perspectives of agenda-setting theory, the diffusion of innovations, symbolic convergence theory, and speech codes theory. These communication theories characterize the roles that civilizational conflict, population demographics, narrative themes, and emergent media play in the diffusion of the jihadist movement. This study samples the textual content and imagery of issues of Dabiq and Rumiyah, using thematic analysis to procedurally code the data by recognizing shared characteristics and concepts. The fundamental goal of this study is to gain a greater understanding of the way ISIS, its members, and the jihadist movement communicate their intentions, with the hope of preventing further recruitment and radicalization. The two following research questions drive this study: (1) What themes are present in the ISIS publications of Dabiq and Rumiyah? (2) How do the themes of these publications vary over time?
|
126 |
Developing a Cyberterrorism Policy: Incorporating Individual ValuesRabie, Osama Bassam J. 01 January 2018 (has links)
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.
|
127 |
GIS-integrated mathematical modeling of social phenomena at macro- and micro- levels—a multivariate geographically-weighted regression model for identifying locations vulnerable to hosting terrorist safe-houses: France as case studyEisman, Elyktra 13 November 2015 (has links)
Adaptability and invisibility are hallmarks of modern terrorism, and keeping pace with its dynamic nature presents a serious challenge for societies throughout the world. Innovations in computer science have incorporated applied mathematics to develop a wide array of predictive models to support the variety of approaches to counterterrorism. Predictive models are usually designed to forecast the location of attacks. Although this may protect individual structures or locations, it does not reduce the threat—it merely changes the target. While predictive models dedicated to events or social relationships receive much attention where the mathematical and social science communities intersect, models dedicated to terrorist locations such as safe-houses (rather than their targets or training sites) are rare and possibly nonexistent. At the time of this research, there were no publically available models designed to predict locations where violent extremists are likely to reside. This research uses France as a case study to present a complex systems model that incorporates multiple quantitative, qualitative and geospatial variables that differ in terms of scale, weight, and type. Though many of these variables are recognized by specialists in security studies, there remains controversy with respect to their relative importance, degree of interaction, and interdependence. Additionally, some of the variables proposed in this research are not generally recognized as drivers, yet they warrant examination based on their potential role within a complex system. This research tested multiple regression models and determined that geographically-weighted regression analysis produced the most accurate result to accommodate non-stationary coefficient behavior, demonstrating that geographic variables are critical to understanding and predicting the phenomenon of terrorism. This dissertation presents a flexible prototypical model that can be refined and applied to other regions to inform stakeholders such as policy-makers and law enforcement in their efforts to improve national security and enhance quality-of-life.
|
128 |
Between Warrior and Helplessness in the Valley of Azawa - The struggle of the Kel Tamashek in the war of the SahelChristian, Patrick James 01 January 2015 (has links)
This dissertation is an Investigation into the Tuareg involvement in violent conflict in the Sahara and the Sahel of North Africa from a sociological psychological perspective of unmet human needs. The research begins by establishing the structure and texture of the sociological, psychological, and emotional life patterns of their existence when not involved in violent conflict. This is followed by an examination of the pathology of Tuareg social structures that are engaged in intra and inter communal violence as perpetrators, victims, and bystanders. The first part of the research establishes normal conditions of the sociological life cycle and highlights natural areas of conflict that arise from exposure to rapid and/or external changes to their physical and social environment. The second part establishes parameters of expected damage from trauma, extended conflict, and failure to adapt to rapid environmental, social and political changes. The research methodology relies on a case study format that uses collaborative ethnography and phenomenological inquiry to answer the research questions and validate propositions made from existing literature and pre]existing research. The research questions focus on aspects of the sociological structure and failing psychological and emotional needs that are relevant to the subjectfs involvement in violent conflict. The research propositions are in part shaped from existing knowledge of tribal sociological structures that are related to the Tuareg by ethnicity, environment, and shared psycho]cultural attributes. The expected contribution of this research is the development of an alternative praxis for tribal engagement and village stability operations conducted by the United States Special Operations Command.
|
129 |
Twelve Years Later: Afghan Humanitarian Aid Workers on War on TerrorOgwude, Emmanuel C. 01 January 2015 (has links)
Using narrative research study founded in social constructionism, I explored the lived experiences of thirty Afghan humanitarian aid workers in Kabul, Afghanistan, to discover how they experienced the war on terror. Ten participants were individually interviewed and their stories, personal experiences, perceptions, and voices have been presented in this study. I also facilitated a focus group of twenty Afghan NGO directors, and their views are echoed in the study. The participants represented a diversity of different humanitarian service specialties that cater to Afghan individuals, communities, and government agencies in areas such as education, human rights and good governance, food and shelter, to building bridges and infrastructural development. Based on a critical review of existing literature, the interviews addressed significant issues that affect humanitarian aid workers in complex political emergencies. I investigated the sociocultural contexts and structural conditions that enable and inform the personal narratives. There were six main themes that emerged from the participants’ narratives and each main theme had an average of three sub-themes. The resulting themes were: Security/Insecurity; Funding; Trust; Abandonment; Achievement; and Interventionism.
From the analysis of the storied narratives of thirty Afghan humanitarian aid workers in Kabul, Afghanistan, this study was able to create better understanding of how conditions from the war on terror create high-risk environments that expose humanitarian aid workers to kidnappings and violent attacks.
|
130 |
The threat of cyberterrorism: Contemporary consequences and prescriptionsStocking, Galen Asher Thomas 01 January 2004 (has links)
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat, including virtual to virtual attacks and threats to critical infrastructure that can be traced to online sources. It then reports on the methods that terrorists employ in using information technology such as the internet for propaganda and other communication purposes. It discusses how the United States government has responded to these problems, and concludes with recommendations for best practices.
|
Page generated in 0.4018 seconds