• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 113
  • 46
  • 42
  • 22
  • 21
  • 12
  • 10
  • 10
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 1
  • Tagged with
  • 320
  • 320
  • 101
  • 68
  • 67
  • 63
  • 61
  • 59
  • 57
  • 57
  • 56
  • 40
  • 40
  • 39
  • 34
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

Develop a Secure Network – A Case Study

Rayapati, Habeeb January 2010 (has links)
In recent years, so many networks are being built and some of the organizations are able to provide security to their networks. The performance of a network depends on the amount of security implemented on the network without compromising the network capabilities. For building a secure network, administrators should know all the possible attacks and their mitigation techniques and should perform risk analysis to find the risks involved in designing the network. And they must also know how to design security policies for implement the network and to educate the employees, to protect the organization’s information. The goal behind this case-study is to build a campus network which can sustain from reconnaissance attacks. This thesis describes all the network attacks and explores their mitigation techniques. This will help an administrator to be prepared for the coming attacks. This thesis explains how to perform risk analysis and the two different ways to perform risk analysis. It also describes the importance of security policies and how security policies are designed in real world.
22

High representative of the Union : the constrained agent of Europe's foreign policy

Helwig, Niklas January 2014 (has links)
This study argues that the High Representative of the Union for Foreign Affairs and Security Policy is a constrained agent of Europe’s foreign policy. The 2009 Lisbon Treaty reform created the remodelled version of the High Representative of the Union as a potentially powerful agent to represent and coordinate Europe’s foreign policy. However, the analysis shows how and why the member states granted only limited discretion to the new foreign policy actor during the first years of the post’s existence. The aim of the study is to reveal the conditions of discretion of the High Representative. With the use of a principal-agent (PA) approach, the study shows that conflicting preferences of the member states, tight control mechanisms, as well as inadequate cooperation with the European Commission limited the High Representative’s room for manoeuvre. The findings suggest that the PA approach can be developed further in the future in order to better explain limited discretion of agents in matters of foreign policy. Based on the findings, the study also puts forward a number of characteristics of a ‘constrained agent’. It is suggested that the post of High Representative has the potential to emancipate from its status of a constrained agent over time, and to gain credibility as a foreign policy actor.
23

Proměny strategické kultury Japonska po studené válce / Development of Japanese Strategic Culture after the Cold War

Šelepová, Adéla January 2020 (has links)
Recently, the volatile developments in Northeast Asia have put Japanese assertive policies on the spotlight and revived the necessity to understand the state's pacifist conduct that had been studied by scholars aiming to grasp its projection into foreign and security policies ever since the end of the Second World War. The academic debate between neorealism and constructivism gained momentum with the dissolution of the bipolar world order following the end of the Cold War. Yet, the examination of their respective approaches proved the inappropriateness of the rigid adherence to either of the IR stream when scrutinizing the Japanese case. Hence, the thesis expands in the field of analytical eclecticism by reconciling the outputs of the academic debate and consequently maps Japanese post-Cold War evolution through synthesis of concepts emanating from neoclassical realism and strategic culture. The thesis thereby acknowledges the crucial role of the system and its structure and, at the same time, understands the peaceful and antimilitarist principles as a driving force behind Japanese decision-making embedded in the state's strategic culture. Against the backdrop of the complex theoretical and methodological research design, the thesis examines the relevant empirical data within the timespan of almost...
24

India's National Security under the BJP: ¿Strong at Home, Engaged Abroad¿

Kundu, Apurba January 2004 (has links)
No / In a marked departure from previous national governments, those led by the Bharatiya Janata Party (BJP) sought to address national security issues both proactively and strategically in line with the party¿s philosophy of achieving a strong India. This paper begins by examining the strategic vision of the BJP. It then analyses how this vision led the BJP to make India an overt nuclear weapons state in 1998, and how this status affected the government¿s actions in the Kargil Conflict of 1999. This is followed by an closer examination of national security strategy under the BJP-led National Democratic Alliance (NDA), particularly as outlined in the seminal Reforming the National Security System: Recommendations of the Group of Ministers of 2001, and how this administration responded to the near-war situation which developed between India and Pakistan in the spring-summer of 2002. The paper then will conceptualise NDA national security policy as ¿strong at home, engaged abroad¿ as evidenced by defence spending on external and internal security, the military¿s deployment on peacekeeping duties, and defence cooperation with other countries. It will conclude with an examination as to whether this national security policy as conceptualised here will remain effective and/or viable in the future.
25

The COVID-19 pandemic impact on Information Security Policy compliance in regional healthcare. : An empirical study

Fält, Melker, Minierski, Bartlomiej January 2022 (has links)
Information Security (InfoSec) is a broad term used to describe the study of how to protect sensitive data from unauthorized access, modification, or deletion. InfoSec is commonly used within companies and organisations to facilitate the secure use of digital systems, taking its shape in the form of technical solutions as well as rules and guidelines defined in a so-called Information Security Policy (ISP). Subsequently, ISPs, which aim to mitigate the risks posed by the generally agreed upon weakest link, the human factor, is considered a crucial asset to maintaining security. The outbreak of the COVID-19 pandemic further solidifying its worth as an increase in attacks targeting humans, especially within the healthcare sector, can be seen. Research directed at ISPs is a much debated area which scientists from many different fields of study continuously lend their efforts. However, to the best of the authors' knowledge no recent studies can been seen that examines ISP Compliance (ISPC), with a focus on InfoSec awareness, from a Swedish regional healthcare employees’ perspective. Hence, this study seeks to provide an insight into this area, with the outbreak of the COVID-19 pandemic in mind. The research is based on a web-questionnaire survey created using information gained throughout several interviews with people working in the field of InfoSec. It seeks to examine healthcare employees' InfoSec awareness following the COVID-19 pandemic outbreak with regard  teleworking. It can be seen from the results that healthcare sector employees' were well aware of the InfoSec risks related to the changing work conditions following the outbreak of the COVID-19 pandemic.
26

Política de segurança pública no Brasil na pós-transição democrática: deslocamente em um modelo resistente / Public secutity policy in Brazil in the post-democratic transition: shifts in a weatherproof model

Gonçalves, Ligia Maria Daher 09 March 2010 (has links)
A presente dissertação analisa as mudanças implementadas na agenda da segurança pública na pós-transição democrática e os motivos pelos quais o modelo de segurança pública no Brasil é tão resistente a reformas. O cenário democrático testemunhou a entrada de novos atores na comunidade da política, e, a partir de então, novas e velhas visões acerca do tema passaram a coexistir. Apesar da crise da segurança pública, explicitada nas décadas de 1980-1990, nenhuma das propostas de reforma estrutural do modelo da política obteve êxito até o momento, o que pode ser explicado pela ausência de uma ampla coalizão em torno de uma agenda mínima de reformas e pelo padrão de dependência da trajetória da política. As mudanças possíveis nesse contexto, embora sejam insuficientes para conformar um novo modelo de política, têm provocado deslocamentos em algumas das características históricas do sistema de segurança pública, promovendo pequenas alterações na sua dinâmica federativa. / This dissertation analyzes the changes to the agenda of public security in Brazil after its democratic transition. It also addresses the reasons why the Brazilian policy model of public security might be so resistant to reforms. The new democratic scenario witnessed new actors entering the policy community and brought together old and new views on the subject. In spite of the crisis in the public security, which was brought to light in the 1980´s and 1990´s, none of the proposals for structural reform of the policy model have hitherto been successful. Such a failure might be explained by the absence of a broad coalition around a minimum agenda of reforms and also by the path dependence of the public security policy. The possible changes in this context, despite being insufficient to forge a new policy model, have led to shifts in some of the historical features of the system of public security, promoting small changes in its federative dynamics.
27

The Common Foreign And Security Policy: The European Union

Kaya, Taylan Ozgur 01 July 2004 (has links) (PDF)
The objective of this thesis is to evaluate European States&rsquo / efforts to develop a coherent and effective foreign and security policy in the context of historical evolution of the CFSP. In this thesis, European States&rsquo / efforts to develop a coherent and effective foreign and security policy will be evaluated in three international political contexts. First period is Post World War II Period, second one is Post-Cold War Period and third one is Post September 11 Period. In the context of Post World War II period, European States&rsquo / efforts to develop a coherent and effective foreign and security policy is shaped by the conditions of Cold War, Bipolar World and threat of Soviet expansionism towards Western Europe and characterized by the attempts such as European Defence Community, Fouchet Plan and European Political Cooperation. In the context of Post-Cold War period, European States&rsquo / efforts to develop a coherent and effective foreign and security policy were shaped by ex-Yugoslavian Conflict in early 90s which brought new security challenges such as ethnic conflicts and instability in the ex-Communist States in Central and Eastern Europe. EU&rsquo / s attempts were characterized by the CFSP which was launched by the Maastricht Treaty and the CESDP which emerged after Kosovo War with Saint Malo Declaration as defence dimension of the CFSP. In the context of Post September 11 period, European States&rsquo / efforts to develop a coherent and effective foreign and security policy were shaped by global fight against international terrorism. EU&rsquo / s attempts were characterized by adoption of European Security Strategy which accepted international terrorism, organized crime and proliferation of weapons of mass destruction as key threats towards Europe and aimed at developing a coherent vision of strategic objectives, shared threat assessment for European States in order to prevent divisions among EU States in future international events. The main argument of this thesis is that in order to be an important and effective actor in global politics, EU Member States should act coherently and speak with one voice. Their influence on important international issues is greater if they act as a coherent actor rather than acting individually.
28

Política de segurança pública no Brasil na pós-transição democrática: deslocamente em um modelo resistente / Public secutity policy in Brazil in the post-democratic transition: shifts in a weatherproof model

Ligia Maria Daher Gonçalves 09 March 2010 (has links)
A presente dissertação analisa as mudanças implementadas na agenda da segurança pública na pós-transição democrática e os motivos pelos quais o modelo de segurança pública no Brasil é tão resistente a reformas. O cenário democrático testemunhou a entrada de novos atores na comunidade da política, e, a partir de então, novas e velhas visões acerca do tema passaram a coexistir. Apesar da crise da segurança pública, explicitada nas décadas de 1980-1990, nenhuma das propostas de reforma estrutural do modelo da política obteve êxito até o momento, o que pode ser explicado pela ausência de uma ampla coalizão em torno de uma agenda mínima de reformas e pelo padrão de dependência da trajetória da política. As mudanças possíveis nesse contexto, embora sejam insuficientes para conformar um novo modelo de política, têm provocado deslocamentos em algumas das características históricas do sistema de segurança pública, promovendo pequenas alterações na sua dinâmica federativa. / This dissertation analyzes the changes to the agenda of public security in Brazil after its democratic transition. It also addresses the reasons why the Brazilian policy model of public security might be so resistant to reforms. The new democratic scenario witnessed new actors entering the policy community and brought together old and new views on the subject. In spite of the crisis in the public security, which was brought to light in the 1980´s and 1990´s, none of the proposals for structural reform of the policy model have hitherto been successful. Such a failure might be explained by the absence of a broad coalition around a minimum agenda of reforms and also by the path dependence of the public security policy. The possible changes in this context, despite being insufficient to forge a new policy model, have led to shifts in some of the historical features of the system of public security, promoting small changes in its federative dynamics.
29

Employee and Organization Security Value Alignment Through Value Sensitive Security Policy Design

Solomon, Dianne Blitstein 05 September 2014 (has links)
Every member of the organization must be involved in proactively and consistently preventing data loss. Implementing a culture of security has proven to be a reliable method of enfranchising employees to embrace security behavior. However, it takes more than education and awareness of policies and directives to effect a culture of security. Research into organizational culture has shown that programs to promote organizational culture - and thus security behavior - are most successful when the organization's values are congruent with employee values. What has not been clear is how to integrate the security values of the organization and its employees in a manner that promotes security culture. This study extended current research related to values and security culture by applying Value Sensitive Design (VSD) methodology to the design of an end user security policy. Through VSD, employee and organizational security values were defined and integrated into the policy. In so doing, the study introduced the concept of value sensitive security policy (VSP) and identified a method for using VSPs to promote a culture of security. At a time when corporate values are playing such a public role in defining the organization, improving security by increasing employee-organization value congruence is both appealing and practical.
30

Accountable Security Architectures for Protecting Telemetry Data

Kalibjian, Jeffrey R. 10 1900 (has links)
International Telemetering Conference Proceedings / October 22-25, 2001 / Riviera Hotel and Convention Center, Las Vegas, Nevada / Today there are many security solutions available which can facilitate both protection and sharing of telemetry data. While the technologies behind these solutions are maturing [1] [2] [3], most products lack a consistent and coherent paradigm for enforcing who is able to access the secured data, what is done with it, and insuring it can be recovered if the person who secured it is disabled.

Page generated in 0.0644 seconds