• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 5
  • 4
  • 1
  • 1
  • Tagged with
  • 17
  • 17
  • 9
  • 7
  • 5
  • 5
  • 5
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 4
  • 3
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Taliban information strategy how are the Taliban directing their information strategy towards the population of Afghanistan?/

Schmeck, Derek I. January 2009 (has links) (PDF)
Thesis (M.S. in Information Operations)--Naval Postgraduate School, December 2009. / Thesis Advisor: Robinson, Glenn E. Second Reader: Gregg, Heather S. "December 2009." Description based on title screen as viewed on February 1, 2010. Author(s) subject terms: Information strategy, Taliban, cultural framing, night letters. Includes bibliographical references (p. 57-59). Also available in print.
2

A discretionary-mandatory model as applied to network centric warfare and information operations

Hestad, Daniel R. 03 1900 (has links)
Approved for public release, distribution is unlimited / The concepts of DoD information operations and network centric warfare are still in their infancy. In order to develop concepts, the right conceptual models need to be developed from which to design and implement these concepts. Information operations and network centric warfare are fundamentally based on trust decisions. However, the key to developing these concepts is for DoD to develop the organizational framework from which trust, inside and outside, of an organization may be achieved and used to its advantage. In this thesis, an organizational model is submitted for review to be applied to DoD information systems and operational organizations. / Outstanding Thesis / Lieutenant, United States Navy
3

Evaluating the Effectiveness of Counter-Narrative Tactics in Preventing Radicalization

Berman, Ellen 01 January 2019 (has links)
The U.S. Department of State disseminates counter-radicalization information through social media but has been unable to reach users due to an inability to create engaging posts due to a lack of understanding of the interests of the general population. The purpose of this quantitative study was to assess the utility of data analytics when administering counter-radicalization social media campaigns. The population for this study were social media posts published on the Quilliam Facebook page between 1 January 2018 and 31 December 2018. The nonexperimental quantitative descriptive research design sought to examine the correlation between the independent variables (topic of a post, use of visual aids in the post, and the geopolitical region the post addresses) and the dependent variables (resulting likes and shares). This study relied on the strategic choice theory which argues that individuals perform a cost and benefit analysis when deciding to join a terrorist organization and commit acts of terrorism. Specifically, individuals are often interested in participating in terror-ism in an effort to gain resources and feel a sense of belonging but can be dissuaded upon realization that terrorism can actually degrade their quality of life. The research found that social media can be used as a tool to increase the perceived costs of terrorism and decrease the perceived benefits of terrorism. The study concluded that posts which involved a personal story emphasizing the ramifications of terrorism and included a video resulted in the highest number of likes and shares, respectively. The findings provide a strong argument for utilizing data analytics to improve the dissemination of counter-radicalization information which could prevent individuals from joining terrorist organizations and committing acts of terrorism.
4

none

Tang, Tien-fu 30 August 2009 (has links)
none
5

Information operations (IO) organizational design and procedures

Caldwell, Russell J. 03 1900 (has links)
Approved for public release, distribution is unlimited / Multi National Force (MNF) operations recognize the existence of shared national interests in a specific geographic region. Furthermore, MNF operations seek to standardize some basic concepts and processes that will promote habits of cooperation, increased dialogue, and provide for baseline Coalition/Combined Task Force (CCTF) operational concepts. This thesis and its' recommendation for a Standard Operating Procedure (SOP) are aimed at improving interoperability and CCTF operational readiness. The SOP will focus on the spectrum of Information Operations (IO) with regards to Military Operations Other Than War (MOOTW) and Small Scale Contingencies (SSC) during MNF operations. First, existing doctrine and cases will be analyzed to develop a foundation for this study. This thesis will seek to identify the existing IO procedures to be utilized during MNF operations. Next, exercise observations and lessons learned reviews serve as the basis for IO SOP Annex development to support the MNF SOP. / Lieutenant, United States Navy
6

Cyberwar and International Law: An English School Perspective

Sinopoli, Anthony F. 01 January 2012 (has links)
Cyberwar challenges future endeavors of state security. As technological capability has improved, and access to information has become more widespread the importance of the issue in today's ever-globalizing world grows each day. A primary objective is to evaluate the place of cyber-warfare against nation-states and any repercussions under an international law paradigm. Utilizing an English School perspective, emphasis will be applied to the argument that disruptive circumstances could come to fruition if international conventions are not created to bring consensus and order among nation-states on this subject. This study hypothesizes that a future application could be an agreement under international law, beyond current regional cooperative initiatives. Since cyber-related attack is a relatively new development, the issue lacks adequate historical context. In addition, since state behavior is a major contributor to the interpretation of international law, the matter is in need of a clear delineation of the norms that define the phenomena and what acceptable responses might entail. Case study analysis will highlight recent examples of state behavior and cyber-related attacks and sabotages.
7

'Minds then hearts:' U.S. political and psychological warfare during the Korean War

Jacobson, Mark R. 02 March 2005 (has links)
No description available.
8

Who networks? The social psychology of virtual communities

Kinniburgh, James B. 06 1900 (has links)
Approved for public release, distribution is unlimited / SOF members must be fully capable (fluent and adept) at operating in, through and upon networks to maximize the leverage of information technologies. Military information operators must possess the components of network capital (access to technology, computer literacy, and social networking ability), a strong tendency to engage in trusting behavior, high cognitive ability and a formal education. Virtual communities offer a mosaic of social behaviors and practices that provide models for virtual organization(s) within the military. Computermediated communications technologies (CMCTs) provide an inherently neutral but polymorphic forum for human social interaction (cyberspace). Specific emergent social topology (real or virtual) depends on the local social needs of individuals and/or bounded groups (communities). Because differences in topology are emergent, topological models have little predictive value. Virtual communities are better understood and predicted through analysis of their metadata. Virtual communities can be characterized as open or clandestine, according to their purpose, accessibility, level of trust, and primary mode of connectedness (bonding or bridging ties). Both open and clandestine communities offer methods of ensuring high levels of efficiency, trust, and security within military computer-mediated communications networks, as well as providing models of organizational flexibility that can be adapted to SOF missions and roles. / Captain, United States Air Force
9

Evaluation of the Littoral Combat Ship (LCS) and SPARTAN SCOUT as Information Operations (IO) assets

Bromley, Joseph M. 03 1900 (has links)
Approved for public release, distribution is unlimited / This thesis will address the planned configuration of Lockheed Martin's Flight Zero, Module Spiral Alpha Littoral Combat Ship (LCS) and the ongoing development of the SPARTAN SCOUT, one of the Navy's Unmanned Surface Vessels (USV). Technology currently available as well as developmental technologies will be recommended for implementation in order to make the LCS and SCOUT assets to Information Operations (IO) objectives. Specific technology will include Outboard, TARBS, HPM, Loudspeakers, LRAD and Air Magnet. This thesis will include an evaluation of the current policy for authorizing Information Operations missions, specifically in the areas of Psychological Operations (PSYOP) and Electronic Warfare (EW). / Lieutenant, United States Navy
10

Military-media relationships : identifying and mitigating military-media biases to improve future military operations

Bohrer, Shawn A. 03 1900 (has links)
Approved for public release; distribution in unlimited. / A noticeable civil-military gap has emerged in American society where the public does not fully understand the mission of the military, and the military does not understand the expectations and demands by the public in a liberal democracy. Maintaining a good rapport with the media and not fostering a civil-military gap will allow the public to embrace 'good news' stories that are introduced by the military as well as accept the times when a negative story breaks the news. Cooperating with the media by allowing appropriate access to the military is vital to effective information operations. This research identifies instances of failure in military-media relationships by reviewing the historical relationship between the media and military in wartime as well as two examples in the last 15 years in which the Navy has mishandled newsworthy events-the 1989 explosion aboard the USS IOWA and the 2001 collision between the submarine, USS GREENEVILLE and the Japanese fishing trawler, Ehime Maru. The purpose of this project is to determine and ultimately to mitigate military bias against the media. / Lieutenant, United States Navy

Page generated in 0.1741 seconds