• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 115
  • 46
  • 44
  • 22
  • 21
  • 12
  • 10
  • 10
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 324
  • 324
  • 102
  • 68
  • 67
  • 64
  • 61
  • 60
  • 60
  • 57
  • 56
  • 40
  • 40
  • 40
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
151

Vliv referenda Brexit na společnou bezpečnostní a obrannou politiku Evropské unie / Effects of the Brexit referendum on the Common Security and Defence policy

Schlecht, Niclas January 2019 (has links)
in English The Common Security and Defence Policy (CSDP) epitomizes the EU's aspirations to be a key actor in global security. With the Brexit the CSDP looses its biggest military power and one of its major payers. This thesis assesses how the EU dealed with the Brexit referendum and how the CSDP developed. It provides evaluation of the CSDP- related policies and asses the degree to which new developments can be traced back to the Brexit referendum and how they are infected by domestic constituencies in the EU Member States. The thesis shows that the exit of the UK gave the CSDP new possibilities to develop, that were not fully used due to domestic constraints of EU Member States.
152

Angažovanost Německa v operacích SBOP: srovnání misí v Demokratické republice Kongo a Libyi / Germany's commitment to CSDP operations: comparing the cases of the DRC and Libya

Westenberger, Kay Louise January 2019 (has links)
This thesis analyses Germany's commitment to multilateral military operations. Following the research question why Germany participates in some multilateral military operations but not in others, Germany's respective decision-making process regarding troop deployment in the DR Congo in 2006 on one hand and military non-engagement in Libya 2011 on the other hand is traced. By contrasting the concept of strategic culture with a purely rational assessment of the factors of alliance politics, risk-analysis and military feasibility of the operations, the decisiveness of taking into account Germany's strategic culture to explain deployment decisions is stressed. Neither is there a lack of external pressure for German military participation in the case of Libya, nor is the military operation in the DR Congo decisively less risky or militarily more feasible. Rather, Germany's multilateral and anti- militaristic strategic cultural strands affect its decision-making. Next to demanding a thorough justification and legitimization of any military engagement, two red lines for military deployment can be identified. First, Germany refuses to act unilaterally and displays a high reluctance towards military engagement outside the multilateral framework of the UN, NATO or EU. Secondly, Germany rejects to engage in...
153

Strategická kultura České republiky / Strategic Culture of the Czech Republic

Beneš, Jan January 2019 (has links)
Jan Beneš Strategic Culture of the Czech Republic Abstract The aim of the dissertation is to define in a complex manner the strategic culture of the Czech Republic. Strategic culture is at first analysed as a conceptual phenomenon both in relation to strategy itself and to the theories of international relations. The dissertation introduces the different streams of thought about strategic culture and then studies the approaches of the key involved authors with a special focus on the discussion between the first and the third generation of strategic culture scholars. Concerning the fact that the strategic culture has been originally created for the study of the behaviour and strategic thought of major powers, the author analyses the historical and geostrategic peculiarities of a small state in the Central Europe and then defines own conceptual and methodological framework. Using the method of grounded theory, the important symbols and narratives from the Czech history as well as the most important moments in the Czech political and strategic thought and decision-making are being examined. The historical narratives re-appear and influence the decision-making, thinking and argumentation of the key actors in the Czech security community. The research of the key decisions and historical moments after the 1989 is...
154

Postoje České republiky k bezpečnostní a obranné dimenzi EU: hodnocení a perspektivy / Czech Positions on EU's Security and Defence Dimension: Assesment and Perspectives

Málek, Jan January 2012 (has links)
The work is a case study that focuses on the attitude of the Czech Republic towards security and defence dimension of the European Union. It focuses on the context of European security and defence policy. It gives a detailed insight into the system formed by the European institutions, their powers and decisions on the one hand and Member States on the other. Within this context, formulates four major issues that the European security and defence policy reflected in the security policy of the Member States. The study focuses and examines the most significant of these problems, and probes whether and how these problems appear in the attitudes of the actors of the Czech security policy. Key words: European Union, Common Security and Defence Policy, Czech Republic, security policy
155

Bezpečnostní politika Německé spolkové republiky od roku 1990 po současnost / German Security Policy From 1990 Until Now

Balcová, Katarína January 2015 (has links)
This diploma thesis deals with German security and foreign policy in the period from its reunification in 1990 until now and focuses on deployment of German soldiers abroad. The aim of this thesis is to analyse eleven most important cases, in which Germany decided to support military missions abroad and to find out if in the decision making process were prevailing normatively guided factors corresponding with concepts of multilateralism, civilian power and antimilitarism or pragmatic guided factors regarding rather economical, geopolitical or other interests. The chosen cases are analysed using single-case studies and sorted into three subchapters following the terms of office of German chancellors. The results of these analyses are presented in the form of a table.
156

Vojenská strategie Ruské federace na počátku 21. století / Military Strategy of the Russian Federation in Early 21st Century

Konopásek, Štěpán January 2016 (has links)
Diploma thesis tracks a process of transformation of the military strategy of the Russian Federation since its establishment (end of 1991) up to now (May 2016). The author observes, using longitudinal method of Process Tracing and with help of strategic theory and concept of strategic culture, the author observes in which areas of the Russian strategic culture and military strategy occurred changes throughout the surveyed period of time and how the changes influenced strategy implemented in armed conflicts in which Russian Federation was involved. Another observed phenomenon is a formalisation of ideological anchoring of revisionist foreign and security policy in the key strategic documents. Following factors are identified as critical in formation and implementation of final strategy: Presidential administration, strategic culture, strategic documents, armed forces, and military operations. Powered by TCPDF (www.tcpdf.org)
157

Sociální konstrukce jaderné hrozby : nukleární odzbrojovací diskurz USA mezi lety 1945 a 2014 / The social construction of nuclear threat : US nuclear disarmament discourse, 1945-2014

Pyrihová, Marie January 2015 (has links)
Nuclear weapons are the key element of the security policy of the United States of America since 1945. Since then, nuclear weapons and related nuclear threats were part of a social discourse of the United States. This thesis examined how these threats were socially constructed within the discourse by individual actors. Then, by discoursive analysis, the thesis investigated how the nuclear disarmament discourse responded to these identified threats. The study focused on how these identified threats and the nuclear disarmament discourse influenced each other in each period and how they impacted following periods. This diploma thesis examined the U.S. nuclear discourse while using a methodological framework of discoursive analysis. The diploma thesis operated with the theory of securitization and determined key moments, when particular threat was designated as existential to the security of the United States and when, eventually, this threat subsided.
158

RECONSTRUCTING NATO IN TIMES OF CHANGE : A study of the Swedish government’s discourse on NATO in 2004 and 2015

Melander, Daniel January 2020 (has links)
This study sets out to examine the Swedish government´s altered discourse on NATO in the years 2004 and 2015. Given the drastic change in security situation in Europe over the last 20 years, it is logical to assume it has influenced the relation between Sweden and NATO. The study aims to highlight how the Swedish government governs through discourse and its understanding of NATO in different circumstances. When compared, the analyzed defense propositions both describe NATO as important, even crucial, but in vastly different ways. In 2004, NATO acts as an entry point for diplomatic and political influence in international politics as well as a way for Sweden to express its identity as an altruistic country. In contrast, NATO in 2015 is vital to the development of Sweden´s military capability and the ability to provide and receive the help necessary for its solidarity policy.
159

Standardizing Instructional Definition and Content Supporting Information Security Compliance Requirements

Curran, Theresa 01 January 2018 (has links)
Information security (IS)-related risks affect global public and private organizations on a daily basis. These risks may be introduced through technical or human-based activities, and can include fraud, hacking, malware, insider abuse, physical loss, mobile device misconfiguration or unintended disclosure. Numerous and diverse regulatory and contractual compliance requirements have been mandated to assist organizations proactively prevent these types of risks. Two constants are noted in these requirements. The first constant is requiring organizations to disseminate security policies addressing risk management through secure behavior. The second constant is communicating policies through IS awareness, training and education (ISATE) programs. Compliance requirements direct that these policies provide instruction about making compliant and positive security decisions to reduce risk. Policy-driven and organizationally-relevant ISATE content is understood to be foundational and critical to prevent security risk. The problem identified for investigation is inconsistency of the terms awareness, training and education as found in security-related regulatory, contractual and policy compliance requirements. Organizations are mandated to manage a rapidly increasing portfolio of inconsistent ISATE compliance requirements generated from many sources. Since there is no one set of common guidance for compliance, organizations struggle to meet global, diverse and inconsistent compliance requirements. Inconsistent policy-related content and instructions, generated from differing sources, may cause incorrect security behavior that can present increased security risk. Traditionally, organizations were required to provide only internally-developed programs, with content left to business, regulatory/contractual, and cultural discretion. Updated compliance requirements now require organizations to disseminate externally-developed content in addition to internally-provided content. This real-world business requirement may cause compliance risks due to inconsistent instruction, guidance gaps and lack of organizational relevance. The problem has been experienced by industry practitioners within the last five years due to increased regulatory and contractual compliance requirements. Prior studies have not yet identified specific impacts of multiple and differing compliance requirements on organizations. The need for organizational relevance in ISATE content has been explored in literature, but the amount of organizationally-relevant content has not been examined in balance of newer compliance mandates.The goal of the research project was to develop a standard content definition and framework. Experienced practitioners responsible for ISATE content within their organizations participated in a survey to validate definitions, content, compliance and organizational relevance requirements imposed on their organizations. Fifty-five of 80 practitioners surveyed (68.75% participation rate) provided responses to one or more sections of the survey. This research is believed to be the first to suggest a standardized content definition for ISATE program activities based on literature review, assessment of existing regulatory, contractual, standard and framework definitions and information obtained from specialized practitioner survey data. It is understood to be the first effort to align and synthesize cross-industry compliance requirements, security awareness topics and organizational relevance within information security awareness program content. Findings validated that multiple and varied regulatory and contractual compliance requirements are imposed on organizations. A lower number of organizations were impacted by third party program requirements than was originally expected. Negative and positive impacts of third party compliance requirements were identified. Program titles and content definitions vary in respondent organizations and are documented in a variety of organizational methods. Respondents indicated high acceptance of a standard definition of awareness, less so for training and education. Organizationally-relevant program content is highly important and must contain traditional and contemporary topics. Results are believed to be an original contribution to information/cyber security practitioners, with findings of interest to academic researchers, standards/framework bodies, auditing/risk management practitioners and learning/development specialists.
160

To BRI or Not to BRI? : A framing analysis on the European Union’s member states’ views on China’s Belt and Road Initiative

Sundberg, Ellen January 2022 (has links)
The European Union’s foreign and security policy has become an important asset for the union and its members to act upon the security challenges within and outside Europe. Even though the union’s foreign and security policy is well established, research shows that it still has difficulties uniting all its member states to its foreign and security policy on different security challenges. An example of this is China’s Belt and Road Initiative. By comparative framing analysis on five selected member states’ governments, Estonia, Italy, Germany, France and Hungary, the thesis map and compare the different views the member states have on the BRI and identify in what ways the member states differ. The analysis concludes that there are differences and similarities in the five member states framing BRI. The thesis’ findings contribute to the broader academic research that tries to understand why the member states has difficulties uniting behind a common foreign and security policy, especially where security challenges are involved.

Page generated in 0.0661 seconds