• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 25
  • 7
  • 7
  • 6
  • 5
  • 4
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 66
  • 66
  • 27
  • 20
  • 15
  • 14
  • 13
  • 11
  • 10
  • 10
  • 9
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Strategy and logistics for the new world order

Gildersleeve, Cory W. January 1990 (has links) (PDF)
Thesis (M.S. in Management and M.A. in National Security Affairs)--Naval Postgraduate School, December 1990. / Thesis Advisor(s): Trietsch, Dan ; Brown, R. Mitchell. "December 1990." Description based on title screen as viewed on March 31, 2010. DTIC Identifier(s): National Security, Military Planning, Post Cold War Era, United States, National Interests, Political Philosophy, Military Strategy, New World Order, Logistics Support, Theses. Author(s) subject terms: Strategy, Logistics, National Interests, Uranium, Phosphates, FMS, Multinational Defense. Includes bibliographical references (p. 123-126). Also available in print.
2

National Resilience in Cyberspace: an analysis of the evolution of the United Kingdom's National Cyber Security Strategy and its response to dynamic cyber security challenges / National Resilience in CyberSpace: The UK's National Cyber Security Strategy Evolving Response to Dynamic Cyber Security Challenges

Johnson, Kailyn January 2018 (has links)
Criminals and other threat actors are adapting to the growing reliance individuals, organisations, and nations have upon technology and the internet and have augmented their capabilities to be oriented in that direction for malevolent purposes. Cyberspace has become an extremely large vulnerability for countries because it facilitates any person with access to a computer or other technology along with malicious intent, to cause harm. The increased risk people and organisations now face in cyberspace is not isolated to just them. Nations now are also at an increased risk because of the evolving ubiquity of cyberspace and technology. States are at risk of cyber threats because of vulnerabilities in individual citizens and organisations. Nations have now become intended targets by a larger spectrum of threat actors. This research examines how the United Kingdom has developed their specific national cyber security strategy to improve national resilience to threats, and how well the UK government adapts to an ever- changing threat landscape. The UK is still deficient in the appropriate and thorough execution of their proposed strategies and strategic policies to attain national resilience and security. There have been strides to achieve that goal, but the national strategy continues to fail to...
3

Understanding the existence and latent threat of Islamist terrorism through a multi-dimensional analysis : the case of Republic of Indonesia

Nugroho, Wibawanto January 2018 (has links)
Terrorism is a multi-dimensional phenomenon that encompasses elements of politics, economics, social, and ideology, driving people to commit violent acts and become involved in such activity. As of today, the existence and latent threat of Islamist terrorism still inflict global society with formidable challenges, and one way to overcome such challenges is by leveraging our knowledge on the multi-dimensional, determining factors/elements that lead people to commit terrorist attacks and other radical-related activities. In other words, as our struggle against terrorism is a global endeavour that may last a generation or more, leveraging our knowledge on such multi-dimensional, determining factors/elements will increase our understanding of the underlying causes and patterns that continue to inspire jihadist terrorism. However, it is wrong to equate the religion of Islam with terrorism. Perhaps most importantly, the Islamic tradition is all-encompassing, combining religious and secular life and law. This surely complicates attempts to understand the Islamist ideology and counter-measures to it solely through the lens of traditional Western political science. Therefore, a distinction must be made between the religion of Islam and a set of often-conflicting political ideologies known as Islamism, where many forms of them are non-radical, reformists or gradualists. That is why, Islamist extremists who advocate acts of terrorism may be properly termed Islamist terrorists, who seek to cloth their acts in the trappings of the Islamic religion. In this case, they use their own religious-based arguments to justify their violent acts. This Ph.D. thesis examines the multi-dimensional factors that lead to the existence and latent threat of Islamist terrorism in Indonesia by focusing on the individuals who committed series of deadly terrorist attacks from 2002 – 2009 and some other radical-related activities in Indonesia until 2017. Such factors encompass at least the economic grievances, social grievances, political grievances, radical ideology, social network, state repression (“stick”), and government incentive (“carrot”), all which are the key variables in determining the existence and latent threat of Islamist terrorism. Through a systematic, multi-dimensional analysis using qualitative and quantitative research methodologies (including the social network analysis), this Ph.D. thesis will specifically examine what factors drove people with the association to Jemaah Islamiya (JI) and radical-Islamist movements to commit and become involved in terrorist attacks? and why and how might such factors/elements influence these people to commit terrorist attacks in the future? The combined qualitative, quantitative, and social network analysis in this Ph.D. thesis has proven and confirmed the main hypothesis, where the existence and latent threat of Islamist terrorism in Indonesia are indeed caused by the intertwining interaction of these multi-dimensional factors instead of being otherwise. The ideological-related variables followed by the social network-related ones are proven as the two most significant factors in the pattern of Islamist terrorism in Indonesia. In other words, the set of economic, social, and political grievances will not cause Islamist terrorism in Indonesia to occur if there are no intervening variables: the social network and radical ideology being involved in the equation. Subsequently, the other two moderating variables also play its own role, namely the state repression and the government incentive. According to various examinations of multivariate statistical analysis in this Ph.D. thesis, these two variables on their own will not cause the Islamist terrorism to occur in Indonesia, but when combined with the existence of social network and radical ideology, these two variables are proven as the moderating variables to exacerbate the occurrence of Islamist terrorism in Indonesia. In conclusion, by looking at this current pattern, it could be predicted that Indonesia herself is still likely to become both the producer and battlefield of global-Islamist terrorism in near future. Therefore, the Indonesian national counterterrorism policy and strategy need to be updated and well integrated with the Indonesian national policy and grand strategy to better address the existence and latent threat of Islamist terrorism in the archipelago.
4

The National Security Strategy and the Constitutionalism Order (1949-2007)

Chen, Tien-Wang 06 July 2008 (has links)
A constitution is a basic law to constitute a country and protect human right, it has a height attribute of politics, hence it regulates and interacts the real development of country. General national security strategy is based on national destinations and benefits, then it brings up a definite source of threat and priority, and arranges the strategies to react, besides it should be considered all the situations to come up with near, middle and far national security strategy. Furthermore, according to the guideline which decided by the strategy, the departments can make policy, then they have the direction to obey. Moreover, nation fulfill its policy includes ¡upolicy-making¡vand ¡ubills or budgets be approved¡vtwo parts, which to fulfill policy and obey the order of law. However, our country brings up national security strategy and act it are different from the above parts. This thesis discusses that our nation made national security strategy in different phase and use it to evaluate the change of our constitution. to focus on the questions and to analyze, to review and to predict.
5

A Study of Japan's Energy Security Strategy

Yeh, Chiu-lan 17 July 2008 (has links)
Japan is the third energy consumption country in the world (next to the United States, and China), and the lowest to its energy self-sufficiency among advanced countries. Japan is aware of its dependence on the unstable Middle East for the energy security. Therefore, to ensure the Japanese having reliable supply of energy, become a vital issue not only to its economic development but also its national security. Japanese government attempted to change the condition of their vulnerability in regard to energy security and dependence on foreign energy. Japanese energy diplomacy primarily hopes to guarantee their energy security. Japan¡¦s energy security relied on other countries since postwar was an indisputable fact. Japan is unable to control energy security which is not surprising. However, Japan is the second largest economy country in the world, therefore, Japan's energy security strategy and concrete achievement, immediately impacts on Japan's politics and economic performance. Consequently, it brings a significant influence on the international politics and economics development. After postwar, Japan's energy security relied on the protective umbrella that U.S. provided. Two main constructions are: the maintenance of U.S.-Japan security alliance and the U.S. Pacific fleet control the sea lines of communication (SLOCs). The world energy domain changed rapidly since the cold war was ended. The Soviet Union contains rich reserved energy and opens to the capitalism market. This is a breakthrough opportunity for Japan especially when it is in an energy security dilemma. In addition, Chinese economic has been rising in recent years, the initiation energy is in demanding, that also impacts greatly on the energy market among Asian regions. As for Japan, its deficiency in energy resources becomes a numerous threat. Therefore, Japan's energy security problem not only affects the Asian regions, but also breaks that existing international power balance.
6

A case study of InterAdria; regarding security strategy of a SME

Kajtazi, Ariana January 2008 (has links)
<p>Today, security strategy has a crucial role in society, which does not imply only to large companies, but also and especially to Small Medium Enterprises (SME’s).</p><p>The intention of this thesis is to provide instructions and help enterprises that need assistance in applying proper security strategy. This thesis comprises the most crucial areas of security within an enterprise. Its aim is to study more deeply the situation of the current security strategy, of a telecom and a software development enterprise, by which the enterprise can extract enough information to provide a proper system. The purpose is to study, analyze, explore and bring some conclusions with new ideas on how to improve and propose a new security strategy that can fit and that can be appropriate for this enterprise.</p><p>Regarding the exploration and research for the enterprise, “fragile assets” are the target to be taken in consideration such as “software”, “databases” and “important data”.</p><p>The method which is used in this thesis, is the case study method, which has best suited the purpose of this thesis by covering the logic of design, data collection techniques and data analysis. As a theory the OCTAVE-sm approach was applied. This approach has three phases which each contains its own processes. These processes were followed and used for the evaluation of the current state in one Small Medium Enterprise (SME) called InterAdria. The use of OCTAVE-sm approach in this thesis can be a guide to all other Small Medium Enterprises (SME’s) that struggle with their security strategy same as the enterprise mentioned above. The conclusion was based on the entire data gathering that was done by following the steps of the Octave-sm approach.</p>
7

Regional-Scale Food Security Governance in Inuit Settlement Areas: Opportunities and Challenges in Northern Canada

Girard, Nicholas January 2018 (has links)
Food insecurity among northern Inuit communities represents a significant public health challenge that requires immediate and integrated responses. In the Inuvialuit Settlement Region (ISR), in the Northwest Territories (NWT), almost half of households experience some degree of food insecurity (33% moderate, 13% severe), and rates are even higher in Nunavut (35% moderate, 34% severe). Currently, food security issues in the Arctic are being addressed by multiple initiatives at different scales; however, the role that governance and policy plays in fostering or hampering Inuit food security remains under-evaluated. We took a participatory-qualitative approach to investigate how food security governance structures and processes are functioning in Inuit settlement areas, using case studies of the Inuvialuit Settlement Region (ISR) and Nunavut, the latter of which has already developed a food security strategy through significant community consultation. Using 18 semi-structured interviews, we examined the development and implementation of the Nunavut Food Security Strategy (NFSS) and Action Plan to identify challenges and lessons learned, identified governance challenges and opportunities in the current way food policy decisions are made in the ISR, and determined ways to improve governance arrangements to address Inuit food security more effectively at a regional scale. Participants implicated in the NFSS process identified a number of challenges, including high rates of employee turnover, coordinating work with member organizations, and lack of a proper evaluation framework to measure the Strategy’s outcomes. In terms of lessons learned, participants expressed the need to establish clear lines of accountability to achieve desired outcomes, and the importance of sufficient and sustained financial resources and organizational capacity to address food security in a meaningful way. Similar themes were identified in the ISR; however, top-down government decision-making at the territorial level and an absence of meaningful community engagement from program administrators during the conceptualization of food security interventions were specific issues identified in this context. In terms of opportunities for regional-scale food security governance, the Government of Northwest Territories (GNWT) is in the process of developing a Country Food Strategy that will engage with a range of stakeholders to develop a broader selection of country food programing. These findings suggest that food security governance remains a key challenge for Inuit. First, sufficient resources are needed to address food security in a sustained manner. Second, existing and planned food security policies and programs should include an evaluation component to demonstrate greater accountability towards desired outcomes. Finally, findings point to the need to develop new collaborative, integrated, and inclusive food security governance arrangements that take into account local context, needs, and priorities. The NFSS is a useful model for collaborative food security governance from which other Inuit regions can learn and adapt.
8

The United State of America's foreign policy towards Africa: The case studies of Kenya and Nigeria, 1990-2008

Shai, Kgothatso 06 1900 (has links)
See the attached abstract below
9

Bezpečnostní strategie malých států v sousedství velmocí / Security Strategy of Small State in the Neighborhood of Great Powers

Bokeria, Levan January 2017 (has links)
The following master`s thesis focuses on small states security strategy choices, namely the case of Georgia. According to neorealist assumptions small states choose their security strategy to minimalize the potential threat to their existence. The case of Georgia is anomalous, as it has increased the security risk by choosing its alliance strategy. This work analyses the factors influencing the preferences in choosing a security strategy by neorealist and constructivist approach. The aim of this work is to research whether the selection of the security strategy is a rational choice and if so what other factors influence this choice
10

An assessment of the 2002 National Security Strategy of the United States : continuity and change

Prince, Troy Jason January 2009 (has links)
The 2002 National Security Strategy of the US (NSS 2002) appeared to have presented a momentous approach to self-defense. To many, the doctrine of preemptive selfdefense seemed to challenge the legal and political foundations of the post-World War II international order. Some saw in the US stated reliance on preemption a direct threat to the international system embodied in the UN Charter. The prima facie case that the US position was novel and even dangerous appeared persuasive. This thesis attempts to assess the exceptionality of NSS 2002 in its formulation and implications. This question of exceptionality is broadly divided into two sections. The first section deals with internal exceptionality, in terms of means (the deliberation and drafting processes) and ends (the US defense posture). The second section deals with external exceptionality in the broader terms of possible consequences outside the US. Section One begins by establishing the grounds for looking into the formulation of NSS 2002, and provides the background for that Strategy's mandated precursors. After exploring how National Security Strategy documents are conceived and framed, Section One discusses the Strategy as it was published, and examines a sampling of contemporaneous reactions to its publication. Section Two concentrates on the second part of the research question, and utilizes a thematic approach - in terms of the use of force, the international security environment, and international law. Possible consequences of the proposed US response to contemporary security challenges are considered in these three key areas.

Page generated in 0.0703 seconds