141 |
A plan of education for naval personnel on mission and capabilities of the Navy as an instrument of national defenseMoorhead, Kenneth January 1957 (has links)
Thesis (M.S.)--Boston University
|
142 |
The Strategic Defense Initiative and the bargaining chip approach to arms control /Le Bel, Joseph Pierre January 1992 (has links)
No description available.
|
143 |
Confrontations with the unconscious :: an intensive study of the dreams of women learning self-defense.Stier, Deborah S. 01 January 1992 (has links) (PDF)
No description available.
|
144 |
Adolescents' defense mechanisms and associations with behavioral symptomatology :: a longitudinal study.Wright, Virginia C. 01 January 1991 (has links) (PDF)
No description available.
|
145 |
Discrimination, Terrorist Violence and Secularist Policies: Challenges for the Integration of Muslims in Western EuropeDell'isola, Davide 01 January 2022 (has links) (PDF)
This dissertation examines three research questions related to Muslim minorities in Western Europe. The first chapter explores the question why some countries in Western Europe suffered terrorist attacks perpetrated by Islamist extremists whereas others did not. I argue that there is a positive association between level of discrimination towards Muslim minorities and number of terrorist attacks: the presence of cultural and religious networks in discriminated communities can enhance the socialization of grievances, resulting in the radicalization of a small portion of the community. I conduct a comparative analysis of the cases of Italy, France, and the U.K. In the second chapter, I examine factors that contribute to discriminatory laws against Muslims in Europe (laws like the hijab ban). I argue that more secular countries are more likely to pass such laws as they aim at a more comprehensive separation of the state from religion. On the other hand, less secular countries are less likely to approve this kind of legislation, because in doing so they might open the door to the regulation of the country's "favored" religion (or the majority religion, depending on the institutional architecture of the country). I use a multimethod approach consisting of quantitative and qualitative analyses. Lastly, the third chapter explores two questions; it seeks the effects of (1) geographical proximity of voters to terrorist attacks and (2) number of Muslim immigrants in a geographical area, on the vote share of far-right parties. I use a statistical model that incorporates alternative explanations and focus on the 2017 French Presidential elections. The findings of this dissertation yield relevant policy implications related to integration of Muslim minorities in the European host countries and makes a substantial contribution to the literature in this area of research.
|
146 |
Assessment of Information Security Culture in Higher EducationGlaspie, Henry 01 January 2018 (has links)
Information security programs are instituted by organizations to provide guidance to their users who handle their data and systems. The main goal of these programs is to protect the organization's information assets through the creation and cultivation of a positive information security culture within the organization. As the collection and use of data expands in all economic sectors, the threat of data breach due to human error increases. Employee's behavior towards information security is influenced by the organizations information security programs and the overall information security culture. This study examines the human factors of an information security program and their effect on the information security culture. These human factors consist of stringency of organizational policies, behavior deterrence, employee attitudes towards information security, training and awareness, and management support of the information security programs. A survey questionnaire was given to employees in the Florida College System to measure the human aspects of the information security programs. Confirmatory factor analysis (CFA) and Structural Equation Modeling (SEM) were used to investigate the relationships between the variables in the study using IBM® SPSS® Amos 24 software. The study results show that management support and behavior deterrence have a significant positive relationship with information security. Additionally, the results show no significant association between information security culture and organization policies, employee commitment and employee awareness. This suggests a need for further refinement of the model and the survey tool design to properly assess human factors of information security programs and their effects on the organizational security culture.
|
147 |
Federal, State and Local Law Enforcement Agency Interoperability Capabilities and Cyber VulnerabilitiesTrapnell, Tyrone 01 May 2019 (has links)
The National Data Exchange (N-DEx) System is the central informational hub located at the Federal Bureau of Investigation (FBI). Its purpose is to provide network subscriptions to all Federal, state and local level law enforcement agencies while increasing information collaboration across all domains. The National Data Exchange users must satisfy the Advanced Permission Requirements, confirming the terms of N-DEx information use, and the Verification Requirement (verifying the completeness, timeliness, accuracy, and relevancy of N-DEx information) through coordination with the record-owning agency (Management, 2018). A network infection model is proposed to simulate the spread impact of various cyber-attacks within Federal, state and local level law enforcement networks that are linked together through the topologies merging with the National Data Exchange (N-DEx) System as the ability to manipulate the live network is limited. The model design methodology is conducted in a manner that creates a level of organization from the state level to the local level of law enforcement agencies allowing for each organizational infection probability to be calculated and entered, thus making the model very specific in nature for determining spread or outbreaks of cyber-attacks among law enforcement agencies at all levels. This research will enable future researchers to further develop a model that is capable of detecting weak points within an information structure when multiple topologies merge, allowing for more secure operations among law enforcement networks.
|
148 |
Characterization of Integrin-Linked Kinase functions in cell wall immunityCooley, Emily 07 August 2020 (has links)
Plants have several defense systems used as protection from environmental stressors, and the plant cell wall (CW) is considered the “frontline” during attack. The CW is a complex structure essential for growth and development and is composed of components such as cellulose, polysaccharides, pectin, and lignin. Lignin is the central source of strength for the CW and helps form a water-impermeable barrier for defense. The extent of plant CW defense, immunity, and the components involved still need further investigation. Integrin-Linked Kinases (ILKs), a subfamily of Raf-like kinases (RAFs), are thought to participate in signal-processing pathways of the CW and plasma membrane via integrin-like receptors (ILRs). Histological characterization was used to observe how ILKs participate in CW surveillance, and an analysis revealed that ILK1 and ILK4 are negative regulators of isoxaben-induced lignin accumulation, while ILK5ox is positive. Collectively, ILK1, ILK4, and ILK5 play important roles in the modulation of CW structure.
|
149 |
Cognitive style and defense preference in a free association task /Bekker, Lee DeMoyne January 1968 (has links)
No description available.
|
150 |
Cost/Schedule Control Criteria for Selected Government ContractsHammond, Robert McDowell 01 January 1974 (has links) (PDF)
This report presents and interprets the Cost/Schedule Control System Criteria, management techniques which have been determined by the Department of Defense to represent appropriate methods for adequately controlling program costs and schedules. Applied to selected contracts of significantly large dollar value, these standards provide for a system which affords the contractor the ability for effective program management and the customer sufficient output visibility for proper program progress evaluation. These criteria differ from typical management methods in that they include a means for assessing the value of completed work in terms of its planned cost. Comparing this with the planned cost of work scheduled for the same period, and actual costs, results in a quantitative development of cost and schedule variances.
|
Page generated in 0.0495 seconds