Spelling suggestions: "subject:"sabotage"" "subject:"cabotage""
1 |
Die Sabotage im Strafrecht /Hauer, Rolf. January 1938 (has links)
Thesis (doctoral)--Universität Freiburg i. Br.
|
2 |
Security considerations for network-centric weapon systemsNesteruk, Erik A. January 2009 (has links) (PDF)
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): Goshorn, Rachel ; Huffmire, Ted. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Network-Centric, Weapons Systems, Systems Engineering, Security, Cryptography, Authentication, Espionage, Sabotage, Confidentiality, Integrity, Availability Includes bibliographical references (p. 75-78). Also available in print.
|
3 |
Rättsstat i kris : spioneri och sabotage i Sverige under andra världskriget /Flyghed, Janne, January 1992 (has links)
Akademisk avhandling--Stockholm, 1992. / Bibliogr. p. 524-537. Index.
|
4 |
When Resistance is Not Enough: The Role of Ecotage in Radical EnvironmentalismBrown, Kris R 01 January 2010 (has links)
As a starting point, I've created a simple, five step argument for my view on humanity's environmental responsibility. The first four steps are premises upon which I will elaborate to some degree over the course of this paper, and the fifth step is a conclusion that should necessarily follow from the premises if they are true.
1) Humans are currently threatening the earth's viability as a habitat for living thing.
2) Humans have a duty not to threaten the earth's viability as a habitat for living things.
3) Our duty not to threaten the viability of the earth as a habitat for living things is stronger than our duty to obey the law.
4) The exclusive use of traditional, legal attempts to change patterns of human behavior to eliminate their threat to the earth's viability as a habitat for living things is and will always be ineffective.
5) Therefore, when our duty not to threaten the earth's viability as a habitat for living things conflicts with our duty to obey the law, we ought first to satisfy the former.
|
5 |
An Examination Of Effort: An Experimental ApproachBrumlik, Alexander P 18 December 2013 (has links)
This dissertation studies issues associated with various topics related to a worker’s effort. For example, I explore how different wage incentives affect a worker’s productivity. I explore how exogenous shocks, what we often refer to as “luck,” can affect a worker’s motivation. In addition, I explore how different wage contracts destroy cooperation and can lead to destructive activities such as cheating and sabotage, as well as how these activates, in turn, affect productivity. Finally, in the last chapter, I analyze behavioral issues related to fairness and altruism in tournaments, and how these behaviors affect worker’s effort.
|
6 |
Vertical integration and sabotage evidence and regulation /Chikhladze, George, Mandy, David. January 2009 (has links)
Title from PDF of title page (University of Missouri--Columbia, viewed on Feb. 23, 2010). The entire thesis text is included in the research.pdf file; the official abstract appears in the short.pdf file; a non-technical public abstract appears in the public.pdf file. Dissertation advisor: Dr. David Mandy. Vita. Includes bibliographical references.
|
7 |
Principer i sabotaget mot Vemork : Krigföringens grundprinciper provade mot historien / Principles in the sabotage of Vemork : Basic principles of warfare tested against historyAndersson, Rasmus January 2010 (has links)
<p>Denna uppsats är skriven som en studie i fyra delar. Första delen består utav redogörelser för syfte, metod och källmaterial samt hur jag skapat det analysverktyg som används i arbetet. I andra delen belyses krigföringens grundprinciper såsom de är definierade i litteraturen. Här redogörs även för de faktorer som kommer att användas vid identifikationen. Tredje delen av min studie inleds utav en historisk återblick, där jag återberättar händelserna som utspelar sig i Norge under 1942-1943. Detta case som ligger till grund för min studie är en av andra världskrigets mest kända specialoperationer, som trots sin berömmelse väldigt få har djupare information om. Operationerna är kantade av motgångar och dödsfall, men framförallt av målmedvetenhet och stor vilja. Genom att använda mitt analysverktyg mot detta case vill jag se huruvida samtliga av krigföringens grundprinciper kan identifieras. Slutsatserna som är dragna är att samtliga av krigföringens grundprinciper kan identifieras med hjälpav de faktorer jag använt.</p> / <p>This paper is written as a study in four parts. The first part consists of statements of purpose, methodology and source materials, and how I created the analysis tools used at work. The second section highlights the basic principles of warfare as defined in the literature. This also presents the factors that will be used for identification. The third part of my study starts out a historical review, which I am recounting the events that take place in Norway during 1942-1943. This case, which is the basis for my study is one of WWII's most famous Special Operations, who, despite its fame, very few have deeper information. These operations are marked by misfortune and death, but above all the determination and eagerness. By using my analysis tool of this case I want to see whether all of the basic principles of warfare can be identified. The conclusions that are drawn are that all of the basic principles of warfare can be identified by the factors I used.</p>
|
8 |
Principer i sabotaget mot Vemork : Krigföringens grundprinciper provade mot historien / Principles in the sabotage of Vemork : Basic principles of warfare tested against historyAndersson, Rasmus January 2010 (has links)
Denna uppsats är skriven som en studie i fyra delar. Första delen består utav redogörelser för syfte, metod och källmaterial samt hur jag skapat det analysverktyg som används i arbetet. I andra delen belyses krigföringens grundprinciper såsom de är definierade i litteraturen. Här redogörs även för de faktorer som kommer att användas vid identifikationen. Tredje delen av min studie inleds utav en historisk återblick, där jag återberättar händelserna som utspelar sig i Norge under 1942-1943. Detta case som ligger till grund för min studie är en av andra världskrigets mest kända specialoperationer, som trots sin berömmelse väldigt få har djupare information om. Operationerna är kantade av motgångar och dödsfall, men framförallt av målmedvetenhet och stor vilja. Genom att använda mitt analysverktyg mot detta case vill jag se huruvida samtliga av krigföringens grundprinciper kan identifieras. Slutsatserna som är dragna är att samtliga av krigföringens grundprinciper kan identifieras med hjälpav de faktorer jag använt. / This paper is written as a study in four parts. The first part consists of statements of purpose, methodology and source materials, and how I created the analysis tools used at work. The second section highlights the basic principles of warfare as defined in the literature. This also presents the factors that will be used for identification. The third part of my study starts out a historical review, which I am recounting the events that take place in Norway during 1942-1943. This case, which is the basis for my study is one of WWII's most famous Special Operations, who, despite its fame, very few have deeper information. These operations are marked by misfortune and death, but above all the determination and eagerness. By using my analysis tool of this case I want to see whether all of the basic principles of warfare can be identified. The conclusions that are drawn are that all of the basic principles of warfare can be identified by the factors I used.
|
9 |
La lutte contre la cybercriminalité au regard de l’action des États / The fight against cyber crime under state actionBoos, Romain 09 December 2016 (has links)
Le XXIe siècle voit la consécration des technologies numériques comme la fin du Moyen Âge a vu celle de l’imprimerie. L’ère numérique ignore désormais toutes les frontières. Elle permet l’accès à la culture et à la connaissance, favorise les échanges entre les personnes. Elle rend possible la constitution d’une économie en ligne et rapproche le citoyen de son administration. Les technologies numériques sont porteuses d’innovation et de croissance, en même temps qu’elles peuvent aider ou accélérer le développement des pays émergents. Mais un certain pessimisme vient tempérer cette approche idéaliste. Tous les progrès génèrent aussi de nouvelles fragilités et vulnérabilités propices aux menaces ou aux risques, car ils aiguisent l’imagination des criminels. La cybercriminalité est désormais une réalité. Elle est d’autant plus dangereuse qu’elle pénètre au sein des familles, là où la délinquance ordinaire n’avait pas accès jusqu’à présent. Dès lors, cette nouvelle forme de criminalité laisse apparaître comme une évidence, l'adaptation du système judiciaire. En effet, face à ces atteintes, il existe bel et bien des lois qui sont d'ores et déjà appliquées à l’Internet. Mais sont-elles réellement efficaces ? Dans le même sens, la coopération interétatique est-elle également suffisante pour lutter efficacement contre la cybercriminalité ? Ainsi, il importe de se demander si dans notre société moderne, le cadre normatif et la coopération institutionnelle tant européenne qu'internationale, sont suffisants et efficaces pour sanctionner les infractions cybercriminelles ? / The twenty-first century sees the consecration of digital technologies just as the end of the Middle-Ages saw the creation of printing.Henceforth, the digital era has no limits. It gives access to culture and knowledge, encourages the exchanges between people.It allows the constitution of an economy online and brings citizens closer to their adminitration. Digital technologies generate innovation and growth, and can help or accelerate the development of the emergent countries as well. But a certain pessimism moderates this idealistic approach.All these advances also generate new fragilities and vulnerabilities propicious to threats or risks, as they stimulate the criminals' imagination.Now , cybercriminality has become reality.It is all the more dangerous as it penetrates within families , where ordinary delinquency didn't exist until now. From now on, this new kind of criminality made it obvious that the judicial system had to be adapted. Indeed , faced with these violations , there are of course laws that are applied here and now to the Internet.But , are they really efficient? In the same way, is the intersate cooperation also sufficient to fight against cybercriminality? So , it is important to wonder whether , in our modern society , the legislative framework and the institutional cooperation , both european and international , are sufficient and efficient to penalize the cybercriminal offences.
|
10 |
The National Committee for Liberation ("ARM"), 1960-1964 : sabotage and the question of the ideological subject / The National Committee for Liberation ("ARM"), 1960-1964 : sabotage and the question of the ideological subjectDu Toit, Andries, Du Toit, Andries 22 November 2016 (has links)
Subject Matter: The dissertation gives an account of the history of the National Committee for Liberation (NCL), an anti-apartheid sabotage organisation that existed between 1960 and 1964. The study is aimed both at narrating its growth and development in the context of South Africa in the 1950s and 1960s, and explaining its strategic and political choices. In particular, the reasons for its isolation from the broader muggle against Apartheid and its inability to transcend this isolation are investigated. Sources: Discussion of the context of the NCL's development depended on secondary historical works by scholars such as Tom Lodge, Paul Rich, C.J. Driver and Janet Robertson as well as archival sources. The analysis of liberal discourse in the 1950s and 1960s also drew heavily on primary sources such as the liberal journals Contact, Africa South and The New African. Secondary sources were also used for the discussion of the NCL's strategy in the context of the development of a theory of revolutionary guerrilla warfare after the Second World War: here the work of Robert Taber, John Bowyer Bell, Kenneth Grundy and Edward Feit was central. The history of the NCL itself was reconstructed from trial records, newspapers and personal interviews. Archival sources such as The Karis-Carter collection, the Hoover Institute microfilm collection of South African political documents, the Paton Papers, the Ernie Wentzel papers were also extensively used. Methodology: The discussion of the discourse of liberal NCL members depended on a post-structuralist theory of subjectivity. The conceptual underpinnings of the thesis were provided by on the work of Jacques Lacan, Louis Althusser, Michel Pecheux, Ernesto Laclau, Chantal Mouffe and Slavoj Zizek. Pechcux's elaboration of the Althusserian concept of interpellation formed the basis of a discourse analysis of NCL texts. In the interviews, some use was also made of techniques of ethnographic interviewing developed by qualitative sociologists such as James Spradley. Conclusions: The analysis focused on the way NCL discourse constructed NCL members as "ordinary persons", a subject-position which implied a radical opposition between political struggle and ideological commitment. The NCL's strategic difficulties were related to the contradictions this discourse, related to metropolitan political traditions that valorised civil society, manifested in the context of post-Sharpeville South Africa. These contradictions were explored in terms of the Lacanian notion of the "ideological fantasy". The dissertation thus closes with a consideration, both of the importance of the ideological traditions identified in the analysis of NCL discourse, and the methodological importance of non-reductive conceptualisations of political identity and ideology.
|
Page generated in 0.0255 seconds