• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 1
  • 1
  • Tagged with
  • 17
  • 17
  • 14
  • 5
  • 4
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Do político à segurança e de volta outra vez: Carl Schmitt nos estudos críticos de segurança

Campos, Rodrigo Duque Estrada 19 April 2017 (has links)
Submitted by Filipe dos Santos (fsantos@pucsp.br) on 2017-04-29T19:33:28Z No. of bitstreams: 1 Rodrigo Duque Estrada Campos.pdf: 1420665 bytes, checksum: 326b11838022c4c903158ca076b460d6 (MD5) / Made available in DSpace on 2017-04-29T19:33:28Z (GMT). No. of bitstreams: 1 Rodrigo Duque Estrada Campos.pdf: 1420665 bytes, checksum: 326b11838022c4c903158ca076b460d6 (MD5) Previous issue date: 2017-04-19 / Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES / This dissertation thesis analyses the process of intellectual reception of Carl Schmitt in Critical Security Studies. Drawing upon the methodological discussion on the history of ideas, we question the typical bifurcation between textualism and contextualism as univocal principles of interpretation of the meaning of texts. Relevant to our analysis is not only to identify what the controversial German jurist really meant to say in his texts, but that its meaning is also conditioned by the use that is made out of it, of what one can make Schmitt “say” concerning the reception of his thought. What have been the uses of Carl Schmitt in Critical Security Studies and what structure of presuppositions and interests condition the social reading of the thinker in the area? To answer such questions, the first chapter offers a brief introduction to Schmitt’s thought, with a special attention to his “international” thinking. The second chapter analyses the first reception venue of Schmitt in Critical Security Studies, where it developed a negative hermeneutics in the debates about securitization theory and the normative need to depart from the ‘Schmittean logic’ of security; the second chapter analyses the second reception venue, which involves the critique to a universal and intrinsic concept of security. To the authors of this line of interpretation, the critique of Schmitt’s theoretical framework on sovereign decisionism and the concept of the political would allow to shift the fixed grammar of security towards a more progressive and emancipative terms; the last chapter analyses the individual appropriation of Schmitt by Andreas Behnke, who developed the last reception venue until the present moment. Escaping the negative hermeneutics, Behnke builds a new Schmittean analytical framework for security, which expands on Schmitt’s bibliographical horizon and criticizes the predominantly liberal premises of Critical Security Studies / A dissertação analisa o processo de recepção de Carl Schmitt nos Estudos Críticos de Segurança. Com base na discussão metodológica da história das ideias, problematizamos a bifurcação típica entre textualismo e contextualismo como princípiosunívocosde interpretação do significado dos textos. Relevante para nossa análise não é identificar apenas o que o controverso jurista alemão realmente quis dizer em seus textos, mas ofato de que o significado de suaobra está também condicionado ao uso que se faz dela, e do que se pode fazê-la“falar” com base na recepção do pensamentode Schmitt. Quais os usos de Carl Schmitt nos Estudos Críticos de Segurança e que estruturas de pressuposições e interesses condicionam a leitura do pensador na área? Para responder tal pergunta, o primeiro capítulo oferece uma breve introdução ao pensamento de Schmitt, com especial atenção ao seu ‘pensamento internacional’. O segundo capítulo analisa a primeira via de recepção de Schmitt nos Estudos Críticos de Segurança, onde se construiu uma hermenêutica negativa no âmbito dos debates sobre a teoria da securitização e a necessidade normativa de se afastar da “lógica schmitteana” da segurança; o terceiro capítulo analisa a segunda via de recepção de Schmitt, que envolve críticas a uma concepção universal e intrínseca da segurança. Para os autores desta linha interpretativa, a crítica ao arcabouço teórico de Schmitt sobre o decisionismo soberano e o conceito do político permitiria deslocar a gramática fixa da segurança em termos mais progressistas e emancipadores; o último capítulo analisa a apropriação individual de Andreas Behnke da obra de Schmitt, que constitui a última via derecepção (até o presente momento) do autor nos ECS. Fugindo da hermenêutica negativa, Behnke critica o que considera a leitura reducionistade Schmitt nos ECS e constrói um novo marco analítico schmitteano da segurança, que expande o lequebibliográfico de Schmitt e critica as premissas liberais da maior parte dos ECS
12

Understanding Iranian Proxy Warfare: A Historical Analysis of the Relational Development of the Islamic Republic of Iran and Iraqi Insurgencies

Handberg, Hjalte H. January 2019 (has links)
In recent years, the IRI has managed to increase its influence in the Middle East. The strategic use of proxy warfare has played a central role as surrounding countries have become destabilised. However, following the positivist logic of structural IR theories, the materially inferior IRI should not be a stronger player in the region’s conflicts than the US and its Arab allies. The Iranian success in proxy warfare, therefore, provides a paradox for the explanatory framework of reductionist IR theories which rely on rational and positivist epistemologies. I argue that this is because these perspectives do not endorse an adequate comprehension of the mutual embedded relations which have served the IRI a strategic advantage in proxy warfare. In a challenge to the parsimonious reductionism of structural IR and security studies, I adopt Feklyunina’s constructivist framework for analysing soft power as a relational identity. Thereby, I switch the focus from a top-down analysis of the IRI to a focus including Iraqi insurgencies’ acceptance or rejection of the IRI’s national identity and foreign policy goals. I argue that identity matter in proxy relations. Hence, I estimate the IRI’s strength in proxy warfare based on potential Iraqi insurgencies’ compatible identities. I employ a longitudinal historical research design tracing the development of collective identities within Iraq. The study finds that the Iraqi Shi’ites share important common facets of their identity with the IRI and have subsequently been willing to fight as proxies against American and Sunni forces in Iraq. However, identity and legitimacy structures in the Middle East are complex, multifaceted, constantly changing, and dependent on context. Iraqi Shi’ites still preserve some reservations and antipathy towards the Iranian regime due to a nationalist sense of community.
13

Sekuritizace migrace v České republice - role uprchlic v diskurzu o migraci / Securitization of Migration in the Czech Republic - Role of Refugee Women in the Discourse on Migration

Čermáková, Kristýna January 2018 (has links)
Master's Thesis Kristýna Čermáková Abstract This master's thesis explores the topic of the securitization of migration in the Czech Republic and the gender dimension of the discourse on migration. After a theoretical exploration of the migratory process and the specificities of its female face, a discourse analysis of the Czech media will present the main epistemological core of the work. The primary research question attempts to identify the ways in which the Czech media contributes to the shifting perception of migration as belonging to the sphere of politics, even presenting migration as a threat to security. The thesis is divided into four chapters. The first chapter provides a theoretical insight into migration studies, the motives to migrate and the phenomenon of forced migration. Despite the general assumption of mainstream academics that migrants are mainly men, the second chapter shows that women's experiences with migration differ greatly from those of men. Based on the Copenhagen stream of thought, the discourse analysis of the Czech media carried out in the third chapter points to the construction of perceptions about migration within Czech society. The absence of gender in the public discourse on migration is further analyzed in the last chapter. The missing gender dimension proved to be...
14

[pt] CONTESTAÇÃO RACIAL COMO EXTREMISMO: A PRODUÇÃO DE RADICAIS NEGROS COMO AMEAÇA À ORDEM POLÍTICA GLOBAL/LOCAL / [en] RACIAL CONTESTATION AS EXTREMISM: THE MAKING OF BLACK RADICALS AS A THREAT TO THE GLOBAL/LOCAL POLITICAL ORDER

PEDRO PAULO DOS SANTOS DA SILVA 20 October 2022 (has links)
[pt] Esta dissertação investiga a construção de negros radicais como ameaça à ordem política global/local, focando-se em dois períodos históricos em que um discurso sobre extremismo negro emergiu nos Estados Unidos. O primeiro corresponde ao final dos anos 1960 e início dos anos 1970, quando o Partido Panteras Negras foi construído como a maior ameaça doméstica à segurança estadunidense; e o segundo, ao final dos anos 2000 e ao decorrer dos anos 2010, quando ativistas e movimentos sociais engajados no combate à violência policial reentraram na lista de ameaças domésticas aos Estados Unidos. Em ambos os contextos históricos, tal processo de construção de ameaça foi, também, informado por discursos sobre outras ameaças racializadas e globais aos Estados Unidos. A segunda metade do século XX foi marcada pela construção do radicalismo negro como ameaça intrinsicamente conectada ao anticomunismo voltado, particularmente, para movimentos de libertação nacional em ex-colônias. No século XXI, a ameaça de radicais negros foi rearticulada de modo a conectá-la com o Terrorismo islâmico. Tais pontuações baseiam-se em uma análise discursivogenealógica que explora registros históricos sobre o extremismo negro feitos por agências policiai. A dissertação aponta para a persistência do enquadramento do radicalismo negro como problema de segurança nos Estados Unidos, ainda que os termos que constroem essa ameaça são transformados globalmente. Assim, o discurso de extremismo negro refere-se à uma ameaça racializadas ao ordenamento político global e local na parte da arquitetura de policiamento estadunidense. / [en] This dissertation investigates the making of black radicals as a threat to the global/local political order, focusing on two historical periods in which a discourse on black extremism emerged in the United States. The first corresponds to the late 1960s and early 1970s, when the Black Panther Party was constructed as the leading domestic threat to the U.S. security; the second, to the late 2000s and 2010s, when activists and social movements engaged in anti-police brutality re-entered the realm of concrete domestic threats to the U.S. In both historical contexts such threat-making processes were also infused with discourses concerning other racialized global threats to the U.S. The second half of the 20th century was marked by the construction of black radicals as a threat intrinsically connected with anticommunism and invested toward national liberation movements in former colonies. In the 21st century, the threat of black radicals is re-articulated into one intimately linked to Islamic terrorism. These claims are based on a discursive genealogical analysis that explores historical records made by policing agencies regarding black extremism. The dissertation points to the persistence of the framing of black radicals as a security problem; within the United States, while the terms for these threat-making processes have been globally re-articulated. Hence, the black extremism discourse simultaneously refers to a racialized threat to the global and local political orders in the perception of the United States policing architecture.
15

Changing Narratives : Ukrainian Memory Politics and Ontological Security

Braun, Billy Norman January 2023 (has links)
This thesis explores how ontological security shapes Ukrainian memory politics in the Russia-Ukraine conflict and the Russian invasion's effect on ontological security. Despite their interdependence, ontological security and memory politics are seldomly studied together. Ukrainian memory politics, particularly in the post-Soviet era and after the implementation of the 2015 decommunization laws, have attracted European scholarly attention, as the Russo-Ukrainian (Memory) war has impacted Self and Identity on multiple levels. Furthermore, the thesis highlights the role of memory political measures in creating securitized unitary narratives, emphasizing the significance of memory for stability of Self. While unpopular at first, the decommunization laws emerged from the conflict and enhanced ontological security by solidifying a common Identity.
16

A Solution to Selecting Cyber-Security Software Tools for an Organization Using Security Controls

Marcos Conca, Alexandre January 2017 (has links)
In the last decade, cyber-threats have evolved dramatically, forcing organizations yearafter year to use increasingly sophisticated security measures, security software amongothers. This has led to a huge increase in the number of security tools available in theindustry. The result of the increase is that that companies often do not know in whichsoftware to invest in order to meet their security needs. The purpose of this thesis isto address this problem by developing a solution that helps companies to choose theright security software based on their security needs and that allows to do the selectionprocess in a systematic and reliable way.The solution proposed in the thesis builds on interviews with experts in information security,data collection from the literature and Internet and on a case study. The solutionconsists of rstly an investigate method with which it is possible to categorize any securitytool according to the list of cyber-security controls proposed by CIS Critical SecurityControls (CSC), which were chosen after a comparative study with other publicly availablecontrols because they are actionable, relevant and updated frequently. Secondly,the solution proposes a user-friendly web tool that has been developed to allow the usersto visualize the collected information for comparison. The visualization tool will helpthe users to select the security tools in which the company could be interested to investin. The visualization is done in a simple way and the CSCs that would be covered areshown together with the gaps and the overlaps of the selected tools. In order to verifythe viability of the solution that was developed with real data, the project includes acase study with a representative set of security tools. The case study facilitates thecomprehension of the process undertaken and shows how this method could be appliedin a real case scenario. / Under det senaste decenniet har cyberhot utvecklats dramatiskt. Hotet tvingar organisationeratt år efter år använda allt mer sofistikerade säkerhetsåtgärder, bland annatsäkerhetsmjukvara. Detta har lett till en enorm ökning av antalet av säkerhetsverktygsom finns i branschen. Resultatet av ökningen är att företag ofta inte vet i vilken programvarade borde investera i för att möta sina säkerhetsbehov. Syftet med dennarapporten är att ta itu med detta problem genom att utveckla en lösning som hjälperföretag att välja rätt säkerhetsprogramvara baserat på deras säkerhetsbehov och somgör urvalsprocessen på ett systematiskt och tillförlitligt sätt.Den lösning som föreslås i rapporten bygger på intervjuer med experter inom informationssäkerhet, datainsamling från litteraturen och Internet och på en fallstudie. Lösningenbestår först av en utredningsmetod med vilken det är möjligt att kategorisera vilketsäkerhetsverktyg som helst enligt listan över cybersäkerhetskontroller som publiceras avCIS Critical Security Controls (CSC). CSC valdes efter en jämförande studie som inkluderadeandra allmänt tillgängliga förteckningar över kontrollerna, eftersom CSC kontrollerär genomförbara, relevanta och uppdateras ofta. För det andra föreslår lösningen ettanvändarvänligt webbverktyg som har utvecklats för att göra det möjligt för användareatt visualisera den insamlade informationen för jämförelse. Visualiseringsverktyget kommeratt hjälpa användarna välja säkerhetsverktyg som företaget kan vara intresseradeav att investera i. Visualiseringen sker på ett enkelt sätt och CSCs som omfattas visastillsammans med de luckor och överlappningar som finns i den valda programvaran.För att bekräfta genomförbarhet för den lösning som utvecklats med verkliga data,omfattar projektet en fallstudie med ett representativt urval av säkerhetsverktyg. Fallstudienunderlättar förståelsen för klassificeringen och urvalsprocessen genom att visahur denna metod skulle kunna tillämpas i ett verkligt fall.
17

Writing Southeast Asian Security. The “War On Terror” As A Hegemonic Security Narrative And Its Effects In Southeast Asia: A (Critical) Security Analysis

Mustapha, Jennifer 10 1900 (has links)
<p>This dissertation examines the (critical) security effects that US Foreign Policy, and in particular the War on Terror (WOT), has had on East and Southeast Asia. This dissertation also articulates an innovative critical security approach that requires a post-structuralism based in Stephen K. White’s notion of “weak ontology,” and further demands a historically and geographically contingent method of immanent critique that allows us to grapple with the politics and ethics of actually occurring security logics. <em>As</em> a form of immanent critique rooted in a weak ontological understanding of critical security, this dissertation asks- and answers- the following question(s): What can a critical security analysis tell us about security/insecurity that a more conventional realist-based security analysis cannot? And more specifically, what can a critical security analysis tell us about the impact that the WOT has had on both state and non-state actors in East and Southeast Asia? In other words, <em>operating as an immanent critique</em> in the context of empirical examples in East and Southeast Asia, this dissertation demonstrates that forms of insecurity were constructed and/or abetted by the WOT itself, understood as a hegemonic security narrative, and that these forms of insecurity occurred in concert with the practice of traditional forms of state-centric security.</p> <p>This dissertation contributes to scholarship in two significant ways. First, it seeks to remedy the relative paucity of <em>critical</em> security analyses focused on East Asia and Southeast Asia. Second, this dissertation demonstrates- using the weak ontological immanent critique approach that it outlines- that a deconstructive critical security analysis based in post-structuralist commitments need not be anathema to engagements with pragmatic problems and security issues, nor should it have to preclude the possibility of enacting the politics and ethics that are required to theorize alternative security logics.</p> / Doctor of Philosophy (PhD)

Page generated in 0.0673 seconds