• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 12
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 96
  • 96
  • 25
  • 19
  • 15
  • 15
  • 14
  • 14
  • 13
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

China's development of asymmetric warfare and the security of Taiwan, Republic of China

Jinn, Guo-Woei 12 1900 (has links)
Approved for public release; distribution in unlimited. / The military changes that have transformed global politics in recent years - especially since the end of the Cold War - have brought about a new revolution in military affairs (RMA) by the United States. The PLA has begun to study the RMA by focusing on asymmetric warfare capabilities under high technological conditions. China believes that asymmetric operations have the advantages of enabling a swift and precise attack and avoiding mass destruction on Taiwan's infrastructure and hightech industry. They also have the benefits of low intensity, low collateral damage, high efficiency, fast attack, and fast victory. In summary, asymmetric operations are regarded by the PLA as a kind of warfare that conforms both with the dictum of China's ancient war theorist Sun Tzu to "defeat the enemy without bloodshed and fighting" and the demands of a modern economy. In the face of China's development of asymmetric capabilities, Taiwan should think about how best to confront and counter China's threats and to gain a military edge over China.
52

The strategic framing of foreign policy : A comparative case study between the United State’s invasion of Iraq and the Russian annexation of Crimea

Männistö, Ida January 2016 (has links)
This research presents a comparative case study between the Russian annexation of Crimea in 2014 and the United State’s invasion of Iraq in 2003. It specifically examines how the two interventions were framed by the political executives. Frame theory and a qualitative content analysis served as theoretical­ and methodological benchmarks to assess selected speeches and public statements delivered by president George W. Bush and Vladimir Putin, in order to detect similar motives and justification patterns for the armed occupations. Four distinct war frames emerged from the text material: prevention, common good, state liability and imposed war. The results demonstrate that state leaders are prone to strategically communicate their military ambitions and legitimize their policy agendas through corresponding framing processes.
53

中共「信息戰」之研究

張文廣 Unknown Date (has links)
冷戰結束,世界各強均著手從事各項軍事變革,中共也不例外效尤美國,引進新知,進行所謂「新軍事革命」,更以「信息戰」為其核心。本論文以「科際整合途徑」為起點,在研究方法上採取「歷史研究法」、「比較法」、「文獻分析法」進行研究。 首先,籍資料蒐集,對資訊戰認識其基本內涵、定義、理論核心、特徵等,對資訊戰的基本概念做簡要的敘述。 其次,針對中共信息戰的作戰樣(方)式,包括指揮控制戰、信息情報戰、信息電子戰、信息網路戰、信息精確(準)戰、信息心理戰等六種作戰方式與信息戰的關係,做深入的闡釋,以瞭解中共信息戰的整體架構。 再就西方對中共「信息戰」評估觀點,以「MCTL」模式,針對中共軍事理論、軍事工業、信息戰關鍵系統等方面能力,做有系統的比較分析,以探索中共信息戰實際能力與成效,進而預測其攻擊潛力。 最後,探討中共發動信息戰攻擊,對台海安全的威脅與影響,以及早預防與妥覓因應之道,並報告個人心得、見解與發現,提出建議。 關鍵詞:信息戰、信息作戰 / The military affairs change that have transformed global politics in recent years, especially at end of the Cold War have brought about a new military revolution, the Revolution in Military Affairs (RMA) lead by the U.S.A. The Peoples Republic of China (PRC) has begun to study RMA through its focus on Information Warfare under high technological' conditions. The issue of Information Warfare (IW) has been discussed for years. This thesis is undertaken with interdisciplinary approach, historical method and documentary analysis method to explore the development and capability of the PLA in information warfare. At first, the thesis explained the definition, connotation, Theory of nucleus and characteristic of information warfare that includes Taiwan, U. S. Army, and Chinese PLA. Next, the thesis explored six information warfare styles of the PLA, applications in Persian Gulf and Kosovo war. Additionally, using Military Critical Technology List (MCTL) Model to evaluate the PLA information warfare level, preparations, and capabilities, military doctrines, military key-technology and industries in the twenty-first century. The operative issue is not whether the PLA is seeking to master high-tech warfare but how much progress it is making. Finally, author analyzed China s information warfare attack-capability, influence and threaten to Taiwan national-security aswell as it is the deduction of areasonable and practicable strategy. The author has been making some suggestion of information warfare and strategies development. Keywords: Information Warfare Information Operation
54

Natural language processing of online propaganda as a means of passively monitoring an adversarial ideology

Holm, Raven R. 03 1900 (has links)
Approved for public release; distribution is unlimited / Reissued 30 May 2017 with Second Reader’s non-NPS affiliation added to title page. / Online propaganda embodies a potent new form of warfare; one that extends the strategic reach of our adversaries and overwhelms analysts. Foreign organizations have effectively leveraged an online presence to influence elections and distance-recruit. The Islamic State has also shown proficiency in outsourcing violence, proving that propaganda can enable an organization to wage physical war at very little cost and without the resources traditionally required. To augment new counter foreign propaganda initiatives, this thesis presents a pipeline for defining, detecting and monitoring ideology in text. A corpus of 3,049 modern online texts was assembled and two classifiers were created: one for detecting authorship and another for detecting ideology. The classifiers demonstrated 92.70% recall and 95.84% precision in detecting authorship, and detected ideological content with 76.53% recall and 95.61% precision. Both classifiers were combined to simulate how an ideology can be detected and how its composition could be passively monitored across time. Implementation of such a system could conserve manpower in the intelligence community and add a new dimension to analysis. Although this pipeline makes presumptions about the quality and integrity of input, it is a novel contribution to the fields of Natural Language Processing and Information Warfare. / Lieutenant, United States Coast Guard
55

Best practice strategy framework for developing countries to secure cyberspace

12 November 2015 (has links)
M.Com. (Informatics) / Cyber issues are global phenomena in a world of inter-related systems, and as such, the discussion on cybersecurity frameworks, policies and strategies inevitably requires reference to, and benchmarking with regional, continental and global trends and solutions. This, in the context of the effects of globalisation on developing countries, with specific reference to areas such as Africa as a developing continent with regard to the protection of its cyberspace. More drastic measures, such as the utilization of cyber warfare techniques and pre-emptive cyber strike-teams in addition to traditional cybersecurity mechanisms as an essential part of a national security effort to protect cyberspace has become more prevalent within the developed worlds. Likewise, developing nations need to gear themselves in a structured, coordinated and responsible way in order to do their part to secure their own environments. Cyberspace is a dynamic global environment with cyber related issues being a global concern. Although countries generally regulate their own cyber environment through policy; cross-border cyber issues are difficult to resolve and the lack of international cyber laws impede cybersecurity efforts. Cybercrime and the management of cross-border cyber incidents are becoming a growing national security concern as the lack of effective controls leave critical infrastructure and the cyber-connected environment vulnerable to attack. Some developing countries are on track with the maturity of their cybersecurity initiatives, but appropriate cybersecurity frameworks for many developing countries require careful consideration, especially due to the lack of resources, infrastructure and local technology development capabilities.
56

Rysk-georgiska kriget : Rysk <em>maskirovka</em> eller georgisk rundgång? / Russian-Georgian War : Russian maskirovka or Georgian acoustic feedback?

Svensson, Martin January 2009 (has links)
<p>This essay aims to analyse if the Russian military operation carried out against Georgia between the 7<sup>th</sup> and 12<sup>th</sup> of august 2008 were executed with adherence to the Russian principles for military deception, <em>maskirovka</em>.</p><p>   A superior purpose is to assess the situation according to the Swedish Armed Forces task of identifying possible needs for new or changed needs for abilities and competence.</p><p>   The method used is two-alternative hypotheses which are tried by comparing actual events before and during the Russian-Georgian war with the ten methods of <em>maskirovka</em>, compiled from military analytical literature. Such traces of resemblance are further examined, both individually and as a part of a larger indication.</p><p>   Further the essay describes the Russian art of war, the prerequisites for military surprise, information warfare in Russian doctrine, the disputed territories of South Ossetia and Abkhazia and the principles for <em>maskirovka</em>.</p><p>   The conclusion is that the Russian operation was executed with some adherence to maskirovka, though unspecified of to what degree.</p><p>   Author of this essay is Cadet Martin Svensson of the Swedish Army, currently a student at the Armed Forces Technical School in Halmstad.</p>
57

Rysk-georgiska kriget : Rysk maskirovka eller georgisk rundgång? / Russian-Georgian War : Russian maskirovka or Georgian acoustic feedback?

Svensson, Martin January 2009 (has links)
This essay aims to analyse if the Russian military operation carried out against Georgia between the 7th and 12th of august 2008 were executed with adherence to the Russian principles for military deception, maskirovka.    A superior purpose is to assess the situation according to the Swedish Armed Forces task of identifying possible needs for new or changed needs for abilities and competence.    The method used is two-alternative hypotheses which are tried by comparing actual events before and during the Russian-Georgian war with the ten methods of maskirovka, compiled from military analytical literature. Such traces of resemblance are further examined, both individually and as a part of a larger indication.    Further the essay describes the Russian art of war, the prerequisites for military surprise, information warfare in Russian doctrine, the disputed territories of South Ossetia and Abkhazia and the principles for maskirovka.    The conclusion is that the Russian operation was executed with some adherence to maskirovka, though unspecified of to what degree.    Author of this essay is Cadet Martin Svensson of the Swedish Army, currently a student at the Armed Forces Technical School in Halmstad.
58

Kan iranska aktörer påverkas? : USA:s förmåga till strategiskt inflytande ur ett fältperspektiv

Andersson, Björn January 2006 (has links)
Sedan 1979 när den amerikanska ambassaden i Teheran ockuperades av studenter och personalentogs som gisslan under 444 dagar har kontakterna mellan Iran och USA varit ansträngda. Iran harbland annat pekats ut av president George W Bush som ”en av ondskans axelmakter”. Syftet meddenna uppsats är att undersöka vilka metoder för amerikanskt strategiskt inflytande som haranvänts av USA mot Iran och haft framgång. Den valda metoden är kvalitativ textanalys. Utifrånfrågeställningen:Vilken/vilka typer av strategiskt inflytande har varit effektiva för att påverka styret av Iran?granskas tre fall av informationsoperationer (militär-, politisk- och mediaoperation) genomfördamot Iran mellan 1979 och 2006. Aktörerna ayatolla, parlament, president, prästerskap ochmedelklass beskrivs utifrån Pierre Bourdieus fältteori för att belysa vilka metoder som varitändamålsenliga och framgångsrika från USA:s sida. Granskningen visar att USA:s främsta väg tillframgång har varit psyops och mjuka metoder mot utvalda grupper medan direkt konfrontation iform av hårda politiska påtryckningar och hot om, eller bruket av militära medel inte i sammautsträckning varit framgångsrika. / Since 1979 when students occupied the American embassy in Tehran and the entire U.S.legation was taken hostage for 444 days, diplomatic relations between Iran and the U.S. hasbeen strained. Iran has also been pointed out as one of the countries “in the axis of evil” bypresident George W Bush. The purpose of this thesis is to examine what means and methodsof Strategic Influence that has been successfully used by the U.S. against Iran. Qualitative textanalysis has been the chosen method. To answer the question:What means of Strategic Influence has been effective in the attempt to influence thegovernment of Iran?Three cases of accomplished or ongoing information operations (one military-, one political-,and one media-operation) performed 1979-2006 is presented. Using the Field theory of PierreBourdieu the following actors on the Iranian field is introduced; Ayatollah, President,Parliament, Priests and the Middleclass in order to examine what methods have been usefuland successful from a U.S. perspective. This examination claims that it is the use of psyopsand soft approaches towards specific targets that has been the American success-story whilethe use of hard political pressure and the threat to, or use of military means has not achievedthe desired effects. / Avdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP 04-06
59

The Development of China's Information Warfare and It Impact on Taiwan's National Defense

Chou, Fang-Yi 09 February 2009 (has links)
In 1991 Persian Gulf war US has used the innumerable high-tech weapons, not only wins Iraq, but also lets various countries broaden the outlook.Thus it urges various countries military national defense to present the revolutionary change.The massive information technology skill is utilized at the military war, by the information military national defense concept primarily, launched rapidly. Receiveing this military revolution as well as the economic growth and the high-tech industry's rapidly expanding. The PLA starts to impel that it constructs the information troops and develops high-tech weapons systm including space technology. The PLA uses the information warfare to enter each kind of information attack, affect government's effective operation and the society stable without the world consensus pressure. It could relieve Taiwan rapidly and achieves it¡¦s political and the military purpose before other country military interference. This research's discovery is that compareing with mainland China, Taiwan is a highly information society. Facing the PLA¡¦s information menace, we should grasp the information superiority , strengthen the protection work, promot modernization armament, maintain the defense capability effectively and national information security by the outstanding information ability. In oder to achieve the prevention of war and the defense goal, now providing the following suggestion¡G 1¡BSelecting the outstanding talent and promoting the national troops quality. 2¡BExpaning crosswise Military organization and storing up the information defense ability. 3¡BEstablishing information strategy instruction and strengthening all the people defense education. 4¡BConstructing the information security system and establishing the information infrastructure. 5¡BStrengthening the information psychological warfare, the law warfare, sedan chair controversy. 6¡BUsing the folk technical force strengthens national defense whole.
60

Analyzing the effects of Network Centric Warfare on warfighter empowerment /

Williamson, Ahmed T. January 2002 (has links) (PDF)
Thesis (M.S. in Leadership and Human Resource Development)--Naval Postgraduate School, June 2002. / AD-A405 963. Thesis advisor(s): Susan Hocevar, William Kemple. Includes bibliographical references (p. 157-160). Also available online.

Page generated in 0.7296 seconds