• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 13
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 35
  • 35
  • 12
  • 11
  • 9
  • 8
  • 8
  • 8
  • 8
  • 7
  • 6
  • 6
  • 6
  • 5
  • 5
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A system for analyzing and characterizing environmental chemicals and explosives and a propoasal for its miniaturization

Sonnen, Steven J. 30 June 1993 (has links)
Electron capture negative ion mass spectroscopy (ECNIMS) has been performed on environmental chemicals and explosives. A trochoidal electron monochromator interfaced to a gas chromatograph and a quadrupole mass spectrometer allows compounds to be studied by this method. The method employed here differs from standard ECNIMS in that no reagent gas is used to moderate electron energies. Several explosives were analyzed using this system, as were chlorinated compounds obtained from the lipid fraction of Arctic trout muscle. A miniaturized version of the system would be advantageous as a portable apparatus for field use. Among the required modifications would be the installation of cylindrical permanent magnets to replace the Helmholtz coils used for generating the magnetic field for the monochromator. Tests suggest that the trochoidal electron monochromator component of the system can be reduced in volume by a factor of 200 without an appreciable loss of energy resolution. / Graduation date: 1994
2

Violation of human rights to combat terrorism.

Sabonga, Mpongosha 15 August 2012 (has links)
LL.B. / No one definition of terrorism has gained universal acceptance. The lack of agreement on a definition of terrorism has been a major obstacle to meaningful international countermeasures to combat terrorism. There are 12 International Conventions related to terrorism and an explicit definition is still missing. Many states have tried to define terrorism and none of these definitions has been implemented, either by the United Nations or these states. There are many International Conventions, Protocols and Treaties related to state responsibilities to combating terrorism. Many states are not yet part to these legal instruments or not yet implementing them. Following the attack in the United States of America, the United Nations Security Council had passed three Resolutions to combat terrorism. None of these resolutions were implemented successfully. Article 51 of the United Nations Charter gives a state a right to repel on attack that is ongoing or imminent as a temporary measure. This Article has been used by states to eliminate terrorism. International Convention for the Suppression of Terrorist Bombing, enable the State Parties to extradite and exercise jurisdiction over terrorist and to cooperate in the investigation, prosecution, and extradition of persons who engage in terrorist activities by establishing a regime of universal jurisdiction to punish the crime of terrorist bombings. The states must develop and adopt bilateral and multilateral agreements to increase cooperation between them.
3

Transnational counter-terrorism cooperation and world order

Hartmann, Jacques January 2012 (has links)
No description available.
4

Risk management initiatives for post 9/11 maritime security

Metaparti, Satya Prakash. January 2009 (has links)
published_or_final_version / Asian Studies / Doctoral / Doctor of Philosophy
5

Maritime security after 9/11: the shipping industry's response to the terrorist threat

Metaparti, Satya Prakash. January 2004 (has links)
published_or_final_version / abstract / toc / Asian Studies / Master / Master of Philosophy
6

Preventive terrorism offences : the extension of the ambit of inchoate liability in criminal law as a response to the threat of terrorism

Simon, Joanna January 2015 (has links)
The aim of this thesis is to assess the justifications for various extensions of the criminal law introduced to combat terrorism, in particular those extensions that go beyond the existing remit of inchoate offences and extend liability to earlier acts and intentions. Its method is to begin by exploring the principles of criminal law theory that ought to apply to such extensions; to interrogate the definition of terrorism; and then to examine four recent classes of offence in counter-terrorism legislation that extend the criminal law beyond its legitimate boundaries. These offences are collectively referred to in this thesis as 'preventive terrorism offences' to reflect the fact that the primary rationale for their enactment is to prevent terrorism. The thesis concludes by assessing the place of these offences within the government's overall counter-terrorism strategy, focusing in particular on the Prevent leg of the strategy, which aims to reduce extremism and tackle the root causes of terrorism. The preventive terrorism offences display several very troubling features, most notably that they have the potential to criminalise non-wrongful conduct. It is argued that by virtue of their ability to criminalise non-wrongful conduct the offences under examination diminish the legitimacy and moral force of the criminal law. Furthermore, by extending inchoate liability to very remote acts of preparation, possession, encouragement, and association, the criminal law occupies the same operational space as measures under the Prevent strategy that are intended to be reintegrative. This overlap has the potential to render the offences counterproductive to the larger counter-terrorism endeavour by creating the perception that the Prevent strategy is in fact a covert surveillance mechanism to gather intelligence for future prosecutions. This perception leads to further mistrust and alienation of individuals and communities who feel disproportionately targeted by these measures. Thus, the offences not only offend criminal law principles and values, but also have the potential to offend the very preventive justification that is given for their enactment.
7

Destruction and redemption : the conduct of revealed religious violence in the contemporary era

Muir, Angus January 2001 (has links)
The final quarter of the twentieth century saw the emergence of a variety of security threats, perhaps the most pernicious and least understood of which has been the rise of religiously motivated violence and terrorism. While a great deal has been written on this phenomenon, much has been in the form of individual case studies and those more inclusive examinations which have been offered deal more with the causes of religious violence and not the underlying processes of justification and operational activity. In cases where such an approach has been attempted these have been conducted in a cursory fashion, presenting generalisations which are not necessarily valid across the entire spectrum of religious violence. The purpose of this thesis is to offer a holistic examination of violence within the three revealed religions (Judaism, Christianity and Islam) in order to establish common features in the conduct of violence across the faiths and to provide a framework whereby the ideological and operational processes and mechanisms can be understood collectively rather than individually. In the process, a number of commonly accepted generalisations regarding religiously motivated violence will be modified or challenged. The method chosen consists of the identification of a number of key components common to all revealed violent groups, ranging from the formation of an ideology which justifies violence to the tactics that are employed, and these key components are then used to examine the behaviour of three distinct group types. The three group types are represented by ten case studies, chosen to reflect the variety of group types that have existed and continue to exist. The objective is to present a broad framework which will enable a greater understanding of how religiously motivated violence is justified both to internal and external audiences, the manner in which this violence is expressed operationally, and the degree to which the course and trajectory of group violence may be anticipated.
8

An analysis of the impact of grant involvement on perceptions of terrorism preparedness improvement in Texas /

Good, James B. January 2006 (has links)
Thesis (M. P. A.)--Texas State University-San Marcos, 2006. / "Spring 2006." Includes bibliographical references (leaves 77-84).
9

Terrorism as a social information entity: A model for early intervention.

Yayla, Ahmet 08 1900 (has links)
This dissertation studies different social aspects of terrorists and terrorist organizations in an effort to better deal with terrorism, especially in the long run. The researcher, who also worked as a Police Captain at Turkish National Police Anti-Terrorism Department, seeks solutions to today's global problem by studying both literature and a Delphi examination of a survey of 1070 imprisoned terrorists. The research questions include questions such as "What are the reasons behind terrorism?", "Why does terrorism occur?", "What ideologies provide the framework for terrorist violence?, "Why do some individuals become terrorists and others do not?" and "Under what conditions will terrorists end their violence?" The results of the study presents the complexity of the terrorism problem as a social experience and impossibility of a single solution or remedy for the global problem of terrorism. The researcher through his examination of the findings of the data, presented that terrorism is a social phenomenon with criminal consequences that needs to be dealt by means of two dimensional approaches. The first is the social dimension of terrorism and the second is the criminal dimension of terrorism. Based on this, the researcher constructed a conceptual model which addresses both of these dimensions under the titles of long-term solutions and short-term solutions. The long-term solutions deal with the social aspects of terrorism under the title of Proactive Approach to Terrorism and the short-term solutions deal with the criminal aspects of terrorism under the title of The Immediate Fight against Terrorism. The researcher constructed this model because there seems to be a tendency of not asking the question of "Why does terrorism occur?" Instead, the focus is usually on dealing with the consequences of terrorism and future terrorist threats. While it is essential that the governments need to provide the finest security measures for their societies, at the same time they need to address the reasons behind terrorism. This research, from stated perspective, offered a conceptual model to address both aspects of terrorism for a more complete fight against today's most painful problem.
10

Driving a hard bargain: U.S. sanctions strategies

Unknown Date (has links)
Policymakers and scholars are deeply divided on the purpose and effectiveness of sanctions, but recent work has given attention to the strategy of using positive sanctions or incentives. This study investigates the conditions under which the U.S. uses a punitive sanctions policy (indicated by all negative sanctions) or an engagement policy (indicated by a mix of positive and negative sanctions). Applying materialist (Schelling, 1960, 1966; Snyder and Diesing, 1977; Axelrod, 1984; Fearon, 1994) and sociological (Schoppa, 1999; Wendt, 2000; Lebow, 2007) bargaining perspectives, this study will consider factors such as the level of target threat, the target's nuclear weapons capability, the extent of international support for sanctions, and the relationship between the U.S. and target. This study analyzes the case studies of the U.S-led sanctions against Iraq (1990-2003), North Korea (1993-present), and Libya (1972-2006). / by Jason Levitt. / Thesis (M.A.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.

Page generated in 0.1329 seconds