• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 65
  • 6
  • 5
  • 4
  • 3
  • 2
  • Tagged with
  • 138
  • 138
  • 75
  • 46
  • 36
  • 35
  • 28
  • 27
  • 22
  • 20
  • 19
  • 19
  • 18
  • 16
  • 16
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
121

The Axe Without the Handle: An Exploratory Analysis of Eco-Terrorism and its Relationships to U.S. Public Policy towards Terrorism:1990-2010

Smith, Phillip Andrew 01 January 2014 (has links)
From 1990-2010 ecoterrorist attacks by the Animal Liberation Front (ALF) and Earth Liberation Front (ELF) created an anomaly in the U.S. with millions of dollars in property destruction. Interestingly, in a post 9/11 era, the FBI warns that the number one threat to U.S. national security is not religious terrorism, but rather environmental-group terrorism. When examining this topic further, there is a void in analysis between examining ecoterrorist attacks and U.S. public policy. Is there a statistical significant relationship between terrorist attacks by ALF/ELF and U.S. public policy towards terrorism? Is per capita income an influence on the attacks occurring in specific states? This study seeks to analyze such relationships through an exploratory analysis and case study approach. I conducted a trend analysis on attacks by ELF/ALF from 1990-2010 and the subsequent adoption of U.S. public policy towards terrorism. I analyzed per-capita income by region and its relationships to attacks occurring. I performed chi^2 hypothesis testing in order to determine the statistical significant relationships between ELF/ALF attacks/U.S. public policy and per capita income by State. The findings of this study suggest that the definition of terrorism is ambiguous and can lead to alternative interpretations, which can affect U.S. public policy towards terrorism. Attacks by ALF/ELF are not deterred by U.S. public policy. Also, a majority of attacks by ALF/ELF are most likely to occur in states that rank in the top 20th percentile regarding per capita income and occur mainly on the west coast. The statistical significance of the relationships between ELF/ALF attacks and U.S. public policy demonstrate that these two entities are mutually exclusive. Per capita income levels by states and ELF/ALF attacks are also mutually exclusive. This study creates an improved understanding of what constitutes terrorism and an understanding of the radical elements in the environmental movement and its place in a post 9/11 America. The significance of this study is to provide a model for analysis of terrorist attacks and government responses and provide a framework of inquiry for the fields of terrorism,public policy and conflict studies.
122

Conflict between Saudi Arabia and Iran: An Examination of Critical Factors Inhibiting their Positive Roles in the Middle East

Alghunaim, Ghadah 01 January 2014 (has links)
Since 1979, Saudi-Iranian relations have been tense due to their position as superior powers in the Middle East. Both countries have different values and perspectives in regards to diplomatic relations with the West. As a consequence of the new developments in Iran's foreign policy and the newfound openness to the West adopted by President Rouhani, the topic has proven to be of research interest. The primary concern of this research was to explore the effect of the conflict between Saudi Arabia and Iran in the Middle East, and whether or not there is a possibility to overcome this conflict using the new political developments. For this purpose, a content analysis methodology was employed. Through an analysis of data presented in the literature review, which consisted of scholarly articles, policy briefs, and books, this dissertation examines the complex political relations through which the pattern of the bilateral relations explain the conflicting narratives. This complexity is present in the political actions taken by Iran and Saudi Arabia, as well as the domestic and foreign policies they are embracing. The findings of this study demonstrate the effect of this conflict in the Middle East. The research also proposes a number of possible recommendations on how to resolve this conflict through political openness and reciprocal agreements that target the citizens of Iran and Saudi Arabia.
123

Možnosti zlepšení strategií pro kybernetickou bezpečnost / The potential improvement of the cyber security strategies

Jandura, Lukáš January 2016 (has links)
The thesis focusses on central nodes' dynamics in cyberspace, representing its key elements. Such approach derives from the theory of networks developed by Albert-László Barabási and it is conceptualised along with cyberspace in security studies and the role of a state in cyberspace. Main question, which is how to improve cybersecurity strategies, is answered by well-structured package of possible positions of a state towards central nodes. It asses the level of involvement in cyberspace, boundaries of intrusion into central nodes and acceptable tools usable against those which are not directly accessible. Powered by TCPDF (www.tcpdf.org)
124

Säkerhet kontra desinformation : En idéanalys av Europeiska unionens säkerhetspolitik mot desinformation. / Security versus disinformation : An idea analysis of the European Union's security policy against disinformation.

Vaitkuté, Laura January 2021 (has links)
Disinformation is a growing problem in a fast changing world, where technology today contributes to the spread of false and sometimes directly harmful information. Within the field of international security studies there is an ongoing theoretical conflict over whether or not security ought to be expanded to include issues that otherwise do not concern the traditional state and military-centric approach. One such issue is the multifaceted phenomenon disinformation, which some claim has little or no meaning and relevancy within the international arena. This is because it mainly influences individuals. Nevertheless, the EU has still initiated security work to combat disinformation. The main purpose of this study is to describe and illustrate how disinformation is defined within the EU’s security framework. Applying David. A Baldwins conceptual dimensions and ideal types and anchoring them in the prominent theories realism, liberalism and constructivism, the study aims to describe and illustrate how EU views disinformation in its pursuit for security. The study later shows that disinformation needs to be affirmed and taken more seriously by the international community.
125

The securitization of climate change in the United States : A case-study of the Biden-Harris administration’s first hundred days in office

Säll, Anna January 2021 (has links)
The Biden-Harris administration’s discussion of climate change is analyzed during the transformative time of the administration’s first hundred days in office. The theoretical framework of the Copenhagen School of Security Studies (CS) is used to develop the coding frame to perform a qualitative content analysis of empirical material consisting of speeches and other documents of the administration. Several securitization moves have been identified and climate change has been presented as a security issue and an existential threat by the Biden- Harris administration. A wide range of referent objects are identified, which is the people and things presented to be threatened by climate change. The whole world, ecosystems, the American people and future generations are a few of the identified referent objects. International and national solutions are presented, though the solutions are not interpreted as extreme measures as discussed by the CS. Therefore, this study supports the critique of a too narrow definition of securitization by the CS.
126

Možnosti zlepšení strategií pro kybernetickou bezpečnost / The potential improvement of the cyber security strategies

Jandura, Lukáš January 2016 (has links)
The thesis is focused on central nodes' dynamics in cyberspace, representing its key elements. This approach is derived from the theory of networks developed by Albert-László Barabási and applied on different aspects of cyberspace, which brings different views at known events and issues and discovers relationship between central and common nodes. Cyberspace is perceived in its broadest shape as a fluid result of social constructivism influenced by behaviour of its users. Final outcomes are summarised to recommendations for a new approach to a cybersecurity strategy. Powered by TCPDF (www.tcpdf.org)
127

Public Participation in Emergency Management

Rood, Jason Alexander 01 January 2012 (has links)
With disasters increasing in frequency and costs each year, this study seeks to explore ways greater public participation can assist emergency managers in their mission to keep communities safe. Specifically this study examines the policy process and administrative functions of emergency management to illuminated the benefits and hindrances involved in greater participation. This study conducted a qualitative analysis of governmental documents, disaster case studies, international research, as well as political science and administrative doctrines, to arrive at its conclusions. The results of this study reveal that the public is a largely untapped resource in the emergency management field. Engaging the public dialogically in early policy stages and emergency management phases is essential to successful inclusion for both administrators and communities. Specifically, public inclusion creates expanded knowledge, shared learning, personal responsibility, and increased social capital. Faced with the growing threat from disasters, emergency management can create communities that are both more resilient and sustainable by increasing public participation.
128

FN - stora ord, små handlingar : - En jämförande feministisk säkerhetsanalys av fredsoperationerna i Västsahara, Kongo och Sydsudan i förhållande till FN-resolution 1325 / UN - All Talk, Little Action : - A comparative female security analysis of the peacekeeping operations in Western Sahara, Congo and South Sudan in relations to UNSCR 1325

Nordberg, Filippa, Sundberg, Alva January 2023 (has links)
Women’s rights and female security is a growing concern in several conflicts around the world. In Congo, conflict-related violence has long been used as weapon and Congo has today become known as the “rape capital” beacuse of these war rapes. Further more, reports from South Sudan states that UN troops has ignored pleas for help by women being raped. United Nation Security Council Resolution (UNSCR) 1325 was implemented by the UN Security Council to combat conflict-related violence and add a gender perspective in UN Peacekeeping operations.  The aim of this thesis is to analyze the impact of UNSCR 1325 by comparing UN Peacekeeping operations’ mandates and actions before and after the resolution was implemented. The thesis will also analyse the UN’s action to eliminate conflict-based sexual violence and war rape. The peacekeeping operations that will be discussed are MINURSO (West Sahara) MONUSCO (Congo) and UNMISS (South Sudan). In order to do so, the theory of Female Security Studies [FSS] and Militarized Masculinity will be applied. In our thesis, the UN’s actions were found to be insufficient. The main factors resulting in this insufficiency was found to be the systematic failure to take the actions needed to implement UNSCR 1325, such as the increasing the number of female involvement in peacekeeping and peacebuilding processes. In large, the impact of UNSCR 1325 could have been bigger if the resolution had been implemented more efficiently. While the written changes were significant with the implementation of the resolution, these changes were not as visible among the actual actions taken in the peacekeeping operations in West Sahara, Congo and South Sudan.
129

A Content Analysis of Jihadist Magazines: Theoretical Perspectives

Udani, Catalina M 01 January 2018 (has links)
During its violent spread across the Middle East, the Islamic State of Iraq and Sham (ISIS) amassed both a local and international following in large part due to its usage of emergent media distribution. Beginning in 2014, ISIS’s Ministry of Media published an English-language magazine, Dabiq, disseminating its issues through online platforms. Dabiq and its successor Rumiyah both serve as propagandistic recruitment material for ISIS’s international community as well as broadcasting the message of the jihadist movement to ISIS’s enemies. This study analyzed ISIS’s publications using a qualitative content analysis in order to identify jihadist recruitment strategies through the perspectives of agenda-setting theory, the diffusion of innovations, symbolic convergence theory, and speech codes theory. These communication theories characterize the roles that civilizational conflict, population demographics, narrative themes, and emergent media play in the diffusion of the jihadist movement. This study samples the textual content and imagery of issues of Dabiq and Rumiyah, using thematic analysis to procedurally code the data by recognizing shared characteristics and concepts. The fundamental goal of this study is to gain a greater understanding of the way ISIS, its members, and the jihadist movement communicate their intentions, with the hope of preventing further recruitment and radicalization. The two following research questions drive this study: (1) What themes are present in the ISIS publications of Dabiq and Rumiyah? (2) How do the themes of these publications vary over time?
130

Developing a Cyberterrorism Policy: Incorporating Individual Values

Rabie, Osama Bassam J. 01 January 2018 (has links)
Preventing cyberterrorism is becoming a necessity for individuals, organizations, and governments. However, current policies focus on technical and managerial aspects without asking for experts and non-experts values and preferences for preventing cyberterrorism. This study employs value focused thinking and public value forum to bare strategic measures and alternatives for complex policy decisions for preventing cyberterrorism. The strategic measures and alternatives are per socio-technical process.

Page generated in 0.1218 seconds