• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 25
  • 7
  • 7
  • 6
  • 5
  • 4
  • 3
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 66
  • 66
  • 27
  • 20
  • 15
  • 14
  • 13
  • 11
  • 10
  • 10
  • 9
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

An Assessment of the 2002 National Security Strategy of the United States: Continuity and Change.

Prince, Troy Jason January 2009 (has links)
The 2002 National Security Strategy of the US (NSS 2002) appeared to have presented a momentous approach to self-defense. To many, the doctrine of preemptive selfdefense seemed to challenge the legal and political foundations of the post-World War II international order. Some saw in the US stated reliance on preemption a direct threat to the international system embodied in the UN Charter. The prima facie case that the US position was novel and even dangerous appeared persuasive. This thesis attempts to assess the exceptionality of NSS 2002 in its formulation and implications. This question of exceptionality is broadly divided into two sections. The first section deals with internal exceptionality, in terms of means (the deliberation and drafting processes) and ends (the US defense posture). The second section deals with external exceptionality in the broader terms of possible consequences outside the US. Section One begins by establishing the grounds for looking into the formulation of NSS 2002, and provides the background for that Strategy's mandated precursors. After exploring how National Security Strategy documents are conceived and framed, Section One discusses the Strategy as it was published, and examines a sampling of contemporaneous reactions to its publication. Section Two concentrates on the second part of the research question, and utilizes a thematic approach ¿ in terms of the use of force, the international security environment, and international law. Possible consequences of the proposed US response to contemporary security challenges are considered in these three key areas.
12

The similarities and differences in the national security strategies of Sweden, Russia and the Czech Republic

Gabert, Antoine January 2014 (has links)
This thesis is a comparative study of the national security strategies of Sweden, Russia and the Czech Republic. The analysis investigates the contextual analysis made by each country and the identified security threats. To compare and find out the similarities and differences two theoretical approaches are used: realism and liberalism. To compare and identify the threats a five factor model is used, originating of general military threat assessment. / <p>Erasmus</p>
13

Information security strategy in telemedicine and e-health systems : a case study of England’s shared electronic health record system

Mohammad, Yara Mahmoud January 2010 (has links)
Shared electronic health record (EHR) systems constitute an important Telemedicine and e-Health application. Successful implementation of shared health records calls for a satisfactory level of security. This is invariably achieved through applying and enforcing strict, and often quite complicated, rules and procedures in the access process. For this reason, information security strategy for EHR systems is needed to be in place. This research reviewed the definition of different terms that related to electronically stored and shared health records and delineated related information security terms leading to a definition of an information security strategy. This research also made a contribution to understanding information security strategy as a significant need in EHR systems. A major case study of the National Programme for IT (NPfIT) in England is used to be the container of other two sub-case studies in two different Acute Trusts. Different research methods used: participant observation and networking, semi-structured interviews, and documentary analysis. This research aimed to provide a comprehensive understanding to the information security strategy of England’s EHR system by presenting its different information security issues such as consent mechanisms, access control, sharing level, and related legal and regulatory documents. Six factors that influence the building of an information security strategy in EHR systems, were identified in this research, political, social, financial, technical, clinical and legal. Those factors are considered to be driving the strategy directly or indirectly. EHR systems are technical-clinical systems, but having other factors (than technical and clinical) that drive this technical-clinical system is a big concern. This research makes a significant contribution by identifying these factors, and in addition, this research shows not only how these factors can influence building the information security strategy, but also how they can influence each other. The study of the mutual influence among the six factors led to the argument that the most powerful factor is the political factor, as it directly or indirectly influences the remaining five factors. Finally, this research proposes guidelines for building an information security strategy in EHR systems. These guidelines are presented and discussed in the form of a framework. This framework was designed after literature analysis and after completing the whole research journey. It provides a tool to help putting the strategy in line by minimising the influence of various factors that may steer the strategy to undesirable directions.
14

Reducing Incongruity of Perceptions Related to Information Risk: Dialogical Action Research in Organizations

Sedlack, Derek J. 01 January 2012 (has links)
A critical overreliance on the technical dimension of information security has recently shifted toward more robust, organizationally focused information security methods to countermand $54 billion lost from computer security incidents. Developing a more balanced approach is required since protecting information is not an all or nothing proposition. Inaccurate tradeoffs resulting from misidentified risk severity based on organizational group perceptions related to information risk form information security gaps. This dissertation applies dialogical action research to study the information security gap created by incongruent perceptions of organizational members related to information risk among different stakeholder communities. A new model, the Information Security Improvement model, based on Technological Frames of Reference (TFR), is proposed and tested to improve information security through reduced member incongruity. The model proved useful in realigning incongruent perceptions related to information risk within the studied organization. A process for identifying disparate information characteristics and potential influencing factors is also presented. The research suggested that the model is flexible and extensible, within the organizational context, and may be used to study incongruent individual perceptions (micro) or larger groups such as departments or divisions.
15

Precise Warriors: The Evolution of Special Operations Forces in U.S. Security Strategy

Mangone, Jason Albino January 2006 (has links)
Thesis advisor: Timothy W. Crawford / Images of burly men painted in green, outfitted in camouflage and a Rambo-esque bandana, donning night-vision goggles, and armed with the newest weaponry are drawn forth when thinking of the phrase "Special Operations." There is a certain myth surrounding the community: Special Operators are the greatest warriors in the world. The use of these warriors is usually only thought of in a tactical context. This thesis, in looking beyond the battlefield adventures of Special Operators, asks the question: "How do these warriors do this job, and what ends do they serve in greater US security strategy?" The thesis discusses the development of the special operations capability since World War II and shows that special operations forces can be precisely tailored by U.S. policy-makers to meet specific high-level strategic objectives. / Thesis (BA) — Boston College, 2006. / Submitted to: Boston College. College of Arts and Sciences. / Discipline: Political Science. / Discipline: College Honors Program.
16

The Research of the Relationship between the U.S., China and Taiwan After the 911 Incident

Wang, Jih-ching 26 January 2005 (has links)
The Research of the Relationship between the U.S., China and Taiwan After the 911 Incident Abstract The traditional diplomacy of America puts its main focus on Europe with little attention on Asia, however after having the 911 Attack in the U.S.2001, Bush junior administration has immediately adjusted the pace of global strategies. The main strategy has shifted its focus towards Asia, it shows that the US makes National Defences the first priority and seeks for the support of counter- terrorism from China in Asia. Before the 911 incident, China was not at the very heart of American policy in Asia policy, as a result of 1999 Chinese Embassy bombing in Belgrade in the former Yugoslavia Republic of Serbia and the April 2001 Hainan reconnaissance plane incident, there had been an awkward tension between U.S. and China. After seeking the cooperation of counter terrorism with China, it presented an opportunity that the U.S. and China can use to improve their relationship. Since the normalisation between U.S. and China, it has been through from the ¡§strategy cooperation relations¡¨ which was established to against Russia to the neorealism of ¡§constructive relations,¡¨ Clinton era formed a ¡§comprehensive association¡¨ with mainland China and advanced it into ¡§ constructive strategy partnership,¡¨ yet, before 911 Attack, the relationship of Bush junior Administration and China were ¡§strategic competitors¡¨, then after 911 incident, due to the strategy transformation of U.S., both parties developed ¡§ Constructive cooperation relations, ¡¨ even though there are still conflicts on the benefits, U.S.-China relation has ameliorated to some extent. As far as U.S. concerns, China is regarded a partner of counter terrorism and benefit exchanger by the world, yet U.S. recognises China as a potential strategic adversary, in some ways, U.S. still exposes the threatening gesture to China. Bush junior has indicated to China that U.S. does not support the independence of Taiwan, but if China force invades Taiwan on the premise that Taiwan does not declare independence, U.S. does not rule out the possibility of assisting Taiwan by the means of miliary. It has shown the U.S. strategy has changed from ¡§strategic ambiguity¡¨ to ¡§strategic clear¡¨ since Clinton to Bush junior. After the 911 incident, the relationship of U.S. and China has definitely improved in a short period, in terms of the long run, both parties still have serious differences regarding to the problem of Taiwan, human rights, economics impacts and anti nuclear proliferation. These conflicts still restrain the development of U.S and China relationship, in addition, U.S. has troops in middle Asia, in terms of the military strategy, the benefit of Mainland China is deprived. In terms of long term U.S-China relationship, it represents a cooperative yet defensive relationship, on the basis of that Taiwan does not declare independence, according to U.S.-Taiwan relationship, U.S. will secure the safety of Taiwan, and maintain the peace cross-straits.
17

USA:s officiella säkerhetsstrategi : Vad ligger bakom?

Backlund, Agneta January 2006 (has links)
<p>The purpose of this study is twofold: First, to inquire how the George W. Bush administration plans to keep America safe from external threats and second – based on the assumption that neoconservatives have influenced the Bush administration – examine how neoconservative ideas have influenced this strategy to protect America. The research questions are as follows:</p><p>What is the content of the Bush administration’s security strategy?</p><p>How are neoconservative ideas reflected in this security strategy?</p><p>To answer the first question, the main points of two studied documents were summarized. The summarized documents were the two versions of the National Security Strategy of the United States of America that the George W Bush administration has released during its tenure. These documents state the official security strategy of the United States and give a general view over the threats against America and how the administration plans to deal with these threats. To answer the second question the author studied literature about neoconservatism and gained valuable knowledge about the neoconservatives, which resulted in the creation of an analyzing instrument. This analyzing instrument was later applied on the empirical material that was gathered by answering the first question and in turn answered the second question.</p><p>The result of the study is that the Bush administration believes that by spreading freedom and fighting tyranny around the world, America will become safer. To accomplish this, the administration will employ the full array of political, economic, diplomatic and other tools at their disposal. Neoconservative influences on the strategy were found repeatedly – one of the most obvious influences being the administration’s adoption of the principle of preemptive strikes against enemies.</p>
18

US security engagement with Southeast Asia during the Clinton and Bush administrations

Cuong, Pham Cao, Social Sciences & International Studies, Faculty of Arts & Social Sciences, UNSW January 2009 (has links)
This study seeks to analyze the change of US security policy in Southeast Asia from the Clinton to Bush administrations. The main aim of the study is to examine the position of Southeast Asia in US security policy and changes in US security policy toward Southeast Asia between the two administrations at both regional and bilateral levels. Besides examining the US security approach to regional institutions like ASEAN and ARF, the study especially concentrates on the US security approach to some ASEAN members - The Philippines, Thailand, Singapore, Indonesia and Malaysia - as well as interactions between the United States and these countries in terms of security. The main argument of this study is that since the end of the Cold War, Southeast Asia has occupied an important position in US security strategy though it was far from being the highest priority in US foreign policy. During the Clinton administration and in the context of the post-Cold War environment which saw the decline of American economic power, the dynamic economic and political development of East Asia, and the existence of hot spots like North Korean and Taiwan, the United States supported the establishment of the ARF and strengthened its alliance with several ASEAN members, including the Philippines, Thailand, Singapore and Indonesia. With the goal to form a ???New Pacific Community???, the US had strategic interests in keeping Southeast Asia stable and preventing the emergence of a potential adversary in the future. To implement the security pillar in the Clinton Doctrine, the US provided military assistance to, and increased military exercises with the ASEAN states. During this period, the China factor was also a key element contributing to the change of the US relationship with the region. In the post-Cold War, the US has seen many challenges posed by China, especially from China???s military modernization program. Moreover, China???s activities in the South China Sea during the 1990s also contributed to the strengthening of bilateral relations between the US and ASEAN states. Under the Bush administration, Southeast Asia became more important to the US interests. Economically, Southeast Asia was the USA???s fifth-largest trading partner. At the same time, the US ranked as either the largest or second-largest trade partner of nine of the ten ASEAN states. Strategically, after September 11, 2001, Southeast Asia played a significant role in US security strategy since it served as the ???second front of terror???. Besides strengthening its relations with ASEAN and the ARF, the United States revitalized its bilateral relationships with ASEAN states, such as: The Philippines, Thailand, Singapore, Indonesia, and Malaysia. Through anti-terrorism initiatives, military assistance programs, intelligence sharing and joint military exercises, the US deepened and expanded its relations with ASEAN states. From this perspective, both the Philippines and Thailand were designated as ???major non-NATO allies??? of the US. In the long term, the USA???s objective in the region was to prevent the emergence of any potential adversary that would be capable of competing with the US in the future. Importantly, the US re-engagement in Southeast Asia under the Bush administration was not only to counter terrorism, but also to contain China. The rapid increase in China???s defense spending and the expansion of its influence in Southeast Asia concerned the United States. During the Bush era, China also played a key role in the US relationships with ASEAN states.
19

A case study of InterAdria; regarding security strategy of a SME

Kajtazi, Ariana January 2008 (has links)
Today, security strategy has a crucial role in society, which does not imply only to large companies, but also and especially to Small Medium Enterprises (SME’s). The intention of this thesis is to provide instructions and help enterprises that need assistance in applying proper security strategy. This thesis comprises the most crucial areas of security within an enterprise. Its aim is to study more deeply the situation of the current security strategy, of a telecom and a software development enterprise, by which the enterprise can extract enough information to provide a proper system. The purpose is to study, analyze, explore and bring some conclusions with new ideas on how to improve and propose a new security strategy that can fit and that can be appropriate for this enterprise. Regarding the exploration and research for the enterprise, “fragile assets” are the target to be taken in consideration such as “software”, “databases” and “important data”. The method which is used in this thesis, is the case study method, which has best suited the purpose of this thesis by covering the logic of design, data collection techniques and data analysis. As a theory the OCTAVE-sm approach was applied. This approach has three phases which each contains its own processes. These processes were followed and used for the evaluation of the current state in one Small Medium Enterprise (SME) called InterAdria. The use of OCTAVE-sm approach in this thesis can be a guide to all other Small Medium Enterprises (SME’s) that struggle with their security strategy same as the enterprise mentioned above. The conclusion was based on the entire data gathering that was done by following the steps of the Octave-sm approach.
20

The United States of America's foreign policy towards Africa: the case studies of Kenya and Nigeria, 1990-2008

Shai, Kgothatso 06 1900 (has links)
MA (Political Science) / Department of Development Studies / See the attached abstract below

Page generated in 0.1022 seconds