• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 55
  • 12
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 96
  • 96
  • 25
  • 19
  • 15
  • 15
  • 14
  • 14
  • 13
  • 12
  • 11
  • 10
  • 10
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Traditional Escalation & Hybrid Escalation: Comparing Two Crisis Escalation Models

Wolterman, Justin 02 June 2023 (has links)
No description available.
72

The Strength of Weakness: Weaponized Information

Thomas, Raymond Christopher 19 May 2017 (has links)
The Russian Federation has recently implemented a foreign policy strategy aimed at subverting the West’s ability to deter Russia from destabilizing its neighbors. This strategy combines elements of conventional military strategy with “weaponized information” in order to achieve success in the political and military arenas of conflict. “Weaponized Information” goes beyond the “network-centric” warfare envisioned by cyber security experts, focused instead upon the development of “fake news,” disinformation, and encouraging conflicting media narratives. This thesis explores this strategy through Thomas Schelling’s framework of deterrence elucidated in Arms and Influence and uses recent events in Ukraine, Syria, the United States, and Europe to describe the development and implementation of “weaponized information” in 21st Century international conflicts. / Master of Arts
73

Evaluating Cyber war

Lee, Jonathan Iming 21 February 2011 (has links)
Richard A. Clarke and Robert K. Knake’s book, Cyber war, claims to identify a new threat and vulnerability in the United States. By examining the points they make and evaluating them in the context of the first cyber attack, STUXNET, we shall conclude that the technical argument is correct; however the overall argument is incomplete. What they fail to emphasize is the amount of human intelligence involved in committing a successful cyber attack, and the extent to which having intelligence operations greatly enhances a state's cyber capabilities. / text
74

An Ontological Approach to Developing Information Operations Applications for Use on the Semantic Web.

Clarke, Timothy L. 2008 September 1900 (has links)
Thesis (Master').
75

How Russia Today supported the annexation of Crimea : A Study of the Media’s role in Hybrid Warfare

Partanen-Dufour, Rebecca January 2016 (has links)
No description available.
76

Interakce narativů: Jak čeští novináři vnímají sekuritizované dezinformace? / An Interplay of Narratives: How Do the Czech Journalists Perceive Securitized Disinformation?

Hroch, Jaroslav January 2020 (has links)
The aim of this thesis is to contribute to theoretically sound concept of Peace Journalism, which combines theoretical foundations from two spheres: conflict and peace studies and media studies. Influence of journalists as intervening force and explaining factor with regard to (violent) conflict is neglected. However, Peace Journalism is not theoretically strong and builds upon dualistic definition vis-á-vis so-called War Journalism. The concept of Peace Journalism has to overcome this delamination in order to reflect theoretical underpinnings of conflict transformation theory and conflict analysis. Moreover, Peace Journalism has to differentiate media according to an involvement of given societies in a conflict. This offers an opportunity to specifically and accurately analyse news coverage of conflicts. Case studies analysing Czech coverage of Cyprus and Nagorno-Karabakh conflicts illustrates this approach. The coverage is essentially flat, distorts a reality of the conflict, pays attention to visual and physical aspects of the conflict and closes the conflicts in arbitrary time boundaries.
77

Information operations (IO) organizational design and procedures

Caldwell, Russell J. 03 1900 (has links)
Approved for public release, distribution is unlimited / Multi National Force (MNF) operations recognize the existence of shared national interests in a specific geographic region. Furthermore, MNF operations seek to standardize some basic concepts and processes that will promote habits of cooperation, increased dialogue, and provide for baseline Coalition/Combined Task Force (CCTF) operational concepts. This thesis and its' recommendation for a Standard Operating Procedure (SOP) are aimed at improving interoperability and CCTF operational readiness. The SOP will focus on the spectrum of Information Operations (IO) with regards to Military Operations Other Than War (MOOTW) and Small Scale Contingencies (SSC) during MNF operations. First, existing doctrine and cases will be analyzed to develop a foundation for this study. This thesis will seek to identify the existing IO procedures to be utilized during MNF operations. Next, exercise observations and lessons learned reviews serve as the basis for IO SOP Annex development to support the MNF SOP. / Lieutenant, United States Navy
78

Evaluation of the Littoral Combat Ship (LCS) and SPARTAN SCOUT as Information Operations (IO) assets

Bromley, Joseph M. 03 1900 (has links)
Approved for public release, distribution is unlimited / This thesis will address the planned configuration of Lockheed Martin's Flight Zero, Module Spiral Alpha Littoral Combat Ship (LCS) and the ongoing development of the SPARTAN SCOUT, one of the Navy's Unmanned Surface Vessels (USV). Technology currently available as well as developmental technologies will be recommended for implementation in order to make the LCS and SCOUT assets to Information Operations (IO) objectives. Specific technology will include Outboard, TARBS, HPM, Loudspeakers, LRAD and Air Magnet. This thesis will include an evaluation of the current policy for authorizing Information Operations missions, specifically in the areas of Psychological Operations (PSYOP) and Electronic Warfare (EW). / Lieutenant, United States Navy
79

Extremist religious ideologies and military strategy /

Phillips, William. January 2006 (has links)
Thesis (MMAS) -- U.S. Army Command and General Staff College, 2006. / AD-A463 803. Also available via the World Wide Web.
80

"Kill with a borrowed sword" : kinesisk förmåga till informationsoperationer och CNO

Berner, Stefan January 2006 (has links)
Efter Kuwaitkriget 1991 har Kina påbörjat att modernisera sin försvarsmakt därinformationsteknologin fått en ökad betydelse. Informationsteknologin har medfört ett ökatkinesiskt intresse för informationsoperationer som ett sätt att angripa en motståndares system.Syftet med denna uppsats är att lägga en grund för fördjupad kunskap kring Kinas syn på ochförmåga till informationsoperationer och informationskrigföring, samt att inom dessaområden speciellt belysa CNO. Detta för att få en insikt i Kinas militära upprustning.Metoden som används för att analysera detta är att genom textanalys jämföra kinesisk ochamerikansk krigföringsförmåga inom informationsoperationer i allmänhet och CNO isynnerhet. Teoriansatsen för jämförelsen bygger på den svenska ”Pelarmodellen” somanalysverktyg för krigföringsförmågan.Resultatet visar på att det finns likheter mellan USA och Kina, men att det också finnsavgörande skillnader. Dessa består främst i Kinas integrering av civila och militära resurserdär milisförband utgör ett viktigt bidrag till armén, samt användandet av strategier som ettsätt att kompensera tekniska tillkortakommanden och jag har där funnit en avsaknad avdiskussion kring legala frågor kring nyttjandet av CNO på den kinesiska sidan. / After the Kuwait war in 1991 has China begun to modernize is defence force and where theinformation technology have got a more important role. The information technology hasbrought to consequence an increased Chinese interest for information operations as a methodto attack adversary systems.The purpose with this essay is to lay a foundation for a increased knowledge in Chinese viewsand capacity to information operations and information warfare, and within these areasespecially highlight CNO. The reason for that is to get an insight in the Chinese rearmament.The method used to analyse this is by text analyses compare Chinese and American fightingcapability in information operations in general and in CNO in particular. The theory base forthe comparison is build upon the Swedish ”Pelarmodellen” as the tool for the analyse of thefighting capacity.The result shows that there is similarities between USA and China, but there is also crucialdifferences. They consists mainly of Chinese integration between civil and military resourceswhere militia units constitute a important contribution to the army, and the use of strategies asa way to compensate technological inferiority in witch I discovered a lack of discussion onlegal aspects revolving the use of CNO on the Chinese part. / Avdelning: ALB - Slutet Mag 3 C-upps.Hylla: Upps. ChP T 04-06

Page generated in 0.1691 seconds