Spelling suggestions: "subject:"2security policy."" "subject:"bsecurity policy.""
11 |
From Pulling the Trigger to Pushing the Button: Historical Precedents for Targeted Killings and Signature StrikesMencini, Damian January 2014 (has links)
Thesis advisor: Charles Gallagher / Thesis advisor: Peter Krause / Drone strikes are sensational events. The United States Government uses remotely piloted aircraft (or drones) equipped with precisions weapons systems to unilaterally hunt and kill its enemies across the globe. The American public, and many around the world, are startled by the pervasiveness of American lethal force. In many ways, drone strikes are unprecedented. The technology, the frequency of use, and the geographic scope are all by-products of the twenty-first century. However, the United States government has a deep history of debating whether to kill individual enemies, and has a history of authorizing operations to do so. Beneath the rhetoric, the arguments, and the opinions that dominate drone policy today there is something missing: the history. This thesis argues that there are historical precedents for targeted killings and signature strikes in American history that predate the September 11 terrorist attacks and examining these past operations can inform modern policy. / Thesis (BA) — Boston College, 2014. / Submitted to: Boston College. College of Arts and Sciences. / Discipline: College Honors Program. / Discipline: History.
|
12 |
Fighting for reputation: China's deterrence policy and concerns about credibilityCheng, Sijin 22 January 2016 (has links)
States under threat may choose to initiate war not only because their interests are hurt, but also because they want to establish or defend their credibility, so that they do not have to fight later wars. This dissertation looks at deterrence situations where the defender of the status quo responds to challenges with force and links its concern with credibility to the decision. When states are expressly worried about the repercussions of backing down, they are more likely to fight. By shining a spotlight on the defender rather than the challenger, this study enriches the discussion on why and how deterrence fails. By linking the decision to fight to a concern about reputation, this study also provides a new framework for analyzing deterrence and foreign policy.
In addition, the dissertation joins the debate on Chinese use of force. All three case studies cast China as the defender that ultimately decided to fight the challenger decisively. In each case, aside from the real and perceived security interests at stake, China's concern with its reputation for resolve contributed to the decision. The reputation for resolve became a security interest in and of itself, serving to dispel future infringements and well worth fighting for. China was particularly worried about its reputation when it feared a collusion of foreign and domestic enemies and sought to internalize the lesson that fighting now means enjoying peace later.
This study uses in-depth, qualitative case studies with a heavy reliance on textural analysis of first and secondary sources. The three case studies are China's intervention in the Korean War in 1950, China's border war with India in 1962, and Sino-Soviet clashes in 1969. While only three case studies are selected, they are structured along the same questions on deterrence and credibility to focus the reader's attention on the hypothesis. The case studies are selected because they were robust tests; they were all drawn-out deterrence situations in which Chinese leaders pondered explicitly on the role of credibility.
|
13 |
Develop a Secure Network – A Case StudyRayapati, Habeeb January 2010 (has links)
<p>In recent years, so many networks are being built and some of the organizations are able to provide security to their networks. The performance of a network depends on the amount of security implemented on the network without compromising the network capabilities. For building a secure network, administrators should know all the possible attacks and their mitigation techniques and should perform risk analysis to find the risks involved in designing the network. And they must also know how to design security policies for implement the network and to educate the employees, to protect the organization’s information. The goal behind this case-study is to build a campus network which can sustain from reconnaissance attacks.</p><p>This thesis describes all the network attacks and explores their mitigation techniques. This will help an administrator to be prepared for the coming attacks. This thesis explains how to perform risk analysis and the two different ways to perform risk analysis. It also describes the importance of security policies and how security policies are designed in real world.</p>
|
14 |
Zwischen Konkurrenz und Kooperation : Europas Rüstung kostet Geld und Vernunft / Between rivalry and cooperation : Europe's armament costs money and sanityHeilig, René January 2009 (has links)
NATO-Streitkräfte sind weltweit im Einsatz. Dazu benötigen sie Material und die Industrie könnte sich eigentlich freuen. Doch der Markt für Rüstungsgüter aller Art ist kleiner geworden. Der Autor belegt an Beispielen deutlich, dass die Mitgliedstaaten der NATO sich bei ihren Verteidigungsagenden finanziell übernehmen und es ohne Kooperation keinen wirtschaftlichen Erfolg geben kann.
|
15 |
Die NATO als militärischer Akteur / NATO as military actorWittmann, Klaus January 2009 (has links)
Die NATO gilt als das erfolgreichste Militärbündnis der Geschichte. Dabei war sie immer zugleich auch ein politisches Bündnis. Notwendig ist die aktuelle Selbstvergewisserung zu Zweck und Hauptaufgaben. Verteidigung, Stabilisierung Europas und internationale Friedensmissionen werden dazu gehören. Wichtig bleibt ein gemeinsamer Wille zum praktischen Untersetzen durch verbesserte militärische Fähigkeiten. Die Allianz sollte das spezifische militärische Instrument in die breiteren internationalen sicherheitsrelevanten Bemühungen einbringen.
|
16 |
Realism and new threats : an analysis of Israel's security policyJaziri Stenberg, Jasmin January 2012 (has links)
This essay takes a look at Israel's security policy and the definition of threat as a major factor in building up the security policies. This essay brings up also the problems of having a realist way of acting towards a more constructivist problem, as it is in this case. To understand better the constructivist context an analysis of Israel's security policy and a research of its roots are made as well as how Palestine Liberation Organization (PLO), Hamas and Hezbollah are seen as threats to the Israeli state security. The aim is to look at the problem and at the basis of the foundation of both the organizations and Israel. From there, the conclusion takes its essence. In fact. what come forward are the social structures that created the infrastructures and this phenomenon is the root of the problem and not just the balance of power, which tends to come from a more bipolar problem thinking. This means that this problem might be easier to please with a more constructivist way of thinking and of looking at the problem to be able to think of solving it.
|
17 |
NATO 1989-2015 : NATO:s säkerhetpolitiska arbetsprocessfrån 1989 till 2015 sett utifrån Berlinmurensfall och konflikten i AfghanistanEdman, Martin January 2015 (has links)
The main purpose with the essay is to look into NATO and annalise how the organisation haschanged it´s security policy work process today 2015, seen from two different world eventsduring the period 1989-2015, the collapse of the Berlin wall and war in Afghanistan. Purposeand issuses also apply based on two theories Anarchymodel and World society model. In orderto highlight two different ways to see NATO:s security policy work process over time untilthe present day. Issues: • How did the fall of Berlin wall in 1989 change NATO:s security policy work process? • How did the war in Afghanistan in 2001 change NATO:s security policy work process? The essay is a qualitative method literature review describing NATO as an organisation andworld events that had impact on NATO over time. The result show that NATO has shifled it´s borders further fast because ”new” membercountries from the former Soviet Union are party members. NATO has moved closer toRussia, and increased in momentum. A possible armed conflict could be in the advantage ofnew markets that werwe previously isolated and intiate a co-operation with entrant´s. The result also shows that terroism and conflicts are carried out between operators and groupswithout fixed borders. It is largely down to the balance of power between NATO and Warsawpact dosesn´t exist anymore. Earlier controlled Superpowers of their allies. It has providedspace for new opponents to understand rights and responsibilities according to their way ofthinking and acting on that basis. These operators are weaker in impact strength and hencethey act according to their own circumstances and conditions, often through terroism. NATOhas transformed a large part of it´s security policy process to better respond to threats such asterroism.
|
18 |
The effects of the Kurdish question on Turkey's foreign and security policy with reference to the Western WorldBor, Yasin January 2013 (has links)
The main topic of this thesis is the influence of the Kurdish Question on Turkey’s relations with Europe and the USA. Aiming to develop a triplex framework of (1) the Kurdish Question in Turkey, (2) Turkey’s Foreign and Security Policy, and (3) Turkey’s Relations with Western Society, this thesis specifically studies the international dimension of the Kurdish Question. It has two basic arguments: first, the Kurdish issue is the major cause of the deterioration in the relationship between Turkey and the West, in spite of alliances that go back over half a century. Second, Turkey’s Foreign and Security Policy is the main catalyst of that long-lasting troublesome relationship. The Kurdish Question is evaluated using empirical data that examines its impact on the relationship between Turkey and the West in the period 1989-2007. Within this the problem is examined by applying a normative approach and analyses that are carried out within a theoretical framework provided by a constructivist approach. In order to present research questions by empirical evidence, discourse analysis is used that goes in hand with the theoretical approach. Three Foreign and Security Policy norms are examined, namely “Sèvres Syndrome”- the suspicion of influence of external powers and interests on Turkey, the principle of “Status Quo” applicable in FSP and internal security arrangements, and finally, the “Westernism” that foresees being pro-Western in foreign policies and internal socio-political field. Findings suggest that those three norms played significant roles in shaping Turkey’s Foreign and Security Policy for decades, while important changes occurred within the recent years.
|
19 |
A model for monitoring end-user security policy complianceAlotaibi, Mutlaq January 2017 (has links)
Organisations increasingly perceive their employees as a great asset that needs to be cared for; however, at the same time, they view employees as one of the biggest potential threats to their cyber security. Organizations repeatedly suffer harm from employees who are not obeying or complying with their information security policies. Non-compliance behaviour of an employee, either unintentionally or intentionally, pose a real threat to an organization’s information security. As such, more thought is needed on how to encourage employees to be security compliant and more in line with a security policy of their organizations. Based on the above, this study has proposed a model that is intended to provide a comprehensive framework for raising the level of compliance amongst end-users, with the aim of monitoring, measuring and responding to users’ behaviour with an information security policy. The proposed approach is based on two main concepts: a taxonomy of the response strategy to non-compliance behaviour, and a compliance points system. The response taxonomy is comprised of two categories: awareness raising and enforcement of the security policy. The compliance points system is used to reward compliant behaviour, and penalise noncompliant behaviour. A prototype system has been developed to simulates the proposed model in order to provide a clear image of its functionalities and how it is meant to work. Therefore, it was developed to work as a system that responds to the behaviour of users (whether violation or compliance behaviour) in relation to the information security policies of their organisations. After designing the proposed model and simulating it using the prototype system, it was significant to evaluate the model by interviewing different experts with different backgrounds from academic and industry sectors. Thus, the interviewed experts agreed that the identified research problem is a real problem that needs to be researched and solutions need to be devised. It also can be stated that the overall feedback of the interviewed experts about the proposed model was very encouraging and positive. The expert participants thought that the proposed model addresses the research gap, and offers a novel approach for managing the information security policies.
|
20 |
Security in wireless networks : Vulnerabilities and Countermeasures / Säkerhet i trådlösa nätverk : Sårbarheter och motåtgärderLarsson, Josephine, Waller, Ida January 2003 (has links)
The market for wireless networks has increased over the years, more and more organizations implement this technology. The need to work flexible, convenient and cost-effective are three reasons for the technology’s raised popularity. The use of wireless networks has exposed new aspects of network security. The information is no longer dependent on wires because it can be transmitted trough radio waves instead. The exposure of information increases, therefore also the vulnerabilities. This leads to more security problems related to the exposure of the transmitted information. It is difficult to understand the importance of network security and why to invest resources for it. Investing in security can lead to lower costs in the long run, because incidents can be perceived before it is too late. This thesis will describe why it is important to perform a risk assessment before developing a security policy. One of the reasons for having a security policy is to clarify the responsibilities for the network security to raise understanding for security within the organization. Other motive is to define how the information should be protected when transmitted in the wireless network. For example, by using the IEEE standard protocol (WEP), which may not be the best encryption solution. For organization that handles sensitive information it is important to be aware of the security problems that exist and to prevent the security risks. A case study was performed at several county councils in Sweden. The reason for this was that county councils handle sensitive information. The case study’s main purpose was to evaluate the level of knowledge about wireless security at county councils.
|
Page generated in 0.0358 seconds