• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 19
  • 8
  • 4
  • 4
  • 3
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 62
  • 21
  • 16
  • 10
  • 9
  • 9
  • 8
  • 8
  • 8
  • 8
  • 8
  • 8
  • 7
  • 7
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
41

Kybernetická bezpečnost: vztah USA a Číny / Cyber Security: US - Chinese Relations

Debnárová, Barbora January 2015 (has links)
This diploma thesis deals with cyber relation of the United States of America and the People's republic of China. The aim of this diploma thesis is to answer the following questions: What kind of cyber threat for the United States does China represent? How is China's cyber strategy characterised? How do USA react on this threat and what are the gaps in this reaction? The thesis is divided into four chapters. The first chapter deals with definition of cyberwarfare and its perception in Chinese context. The second chapter analyses USA - China relation and its implication for cyber security. The third chapter represents US reaction on Chinese cyber threat. The last chapter deals with the gaps in the reaction. Keywords USA, China, cyber threat, cyberwarfare, cyber espionage
42

The Form of Modernist Propaganda in Elizabeth Bowen's the Heat of the Day

Faragher, Megan 01 February 2013 (has links)
This article suggests that the formal elements of Elizabeth Bowen's novel The Heat of the Day underscore both the changing practice of propaganda and the extant tension about Irish neutrality during World War II. Bowen has often been cited as an author who embraces opacity in her fiction, and often this practice is connected in her work to political tensions that she first experienced in Ireland as a result of colonial conflict. The article suggests that a similar strategy, at use in this London-based World War II novel about espionage, highlights this history of tension. Bowen's own position as an intermediary between the Ministry of Information and Irish public opinion provided her a keen insight into British strategy towards Ireland's neutrality. Her Blitz novel, The Heat of the Day, mirrors much of Bowen's formal techniques in her letters to the Ministry of Information, and this article suggests that this reflects the impact of modern propaganda techniques on her war-time novel.
43

The Form of Modernist Propaganda in Elizabeth Bowen's the Heat of the Day

Faragher, Megan 01 February 2013 (has links)
This article suggests that the formal elements of Elizabeth Bowen's novel The Heat of the Day underscore both the changing practice of propaganda and the extant tension about Irish neutrality during World War II. Bowen has often been cited as an author who embraces opacity in her fiction, and often this practice is connected in her work to political tensions that she first experienced in Ireland as a result of colonial conflict. The article suggests that a similar strategy, at use in this London-based World War II novel about espionage, highlights this history of tension. Bowen's own position as an intermediary between the Ministry of Information and Irish public opinion provided her a keen insight into British strategy towards Ireland's neutrality. Her Blitz novel, The Heat of the Day, mirrors much of Bowen's formal techniques in her letters to the Ministry of Information, and this article suggests that this reflects the impact of modern propaganda techniques on her war-time novel.
44

To Spy the Lie. Detecting the Insider Threat of Espionage

Bergström, Emma January 2023 (has links)
Acts committed by insiders have risen during past years, and there is a need for a better understanding of how preventive measures can be used, not just remedial action after the fact. The current narrative in research when discussing espionage was motive; why someone committed espionage. The aim of this study was to create a theoretical model of a ‘risk individual’ and, with the use of the model, techniques for personality assessment and text analysis, develop an artefact, a self-assessment test, that could be used to assess if a person had a higher risk to commit the act of espionage. Design Science research was chosen as a main methodological approach with supporting methods throughout. A survey was chosen to collect the data and the data was analyzed quantitatively. The artefact is partly based on selfassessment questionnaires and partly on themes identified as necessary when a governmental agency conducted personal security interviews for potential new hires. In order to achieve the research goal, data from 52 individuals were collected and analyzed using various quantitative methods. When applying internal reliability testing to the risk factors proposed by the theoretical model, seven out of the eight factors had good reliability. One factor, stress, performed poorly. This was probably due to the width of the questions asked, from personal to professional stress. This resulted in stress being removed from further testing. The remaining seven factors correlated with each other, apart from one, entitlement. This risk factor correlated with ethical flexibility but not the other six risk factors. In order to test how well the Big Five correlated with risk, the mean of a risk individual was calculated and compared with the five factors of OCEAS. The five factors all correlated negatively with risk, with agreeableness having the highest negative correlation and extroversion having the lowest. Differences could be seen when comparing the ten participants with the highest mean risk score to the ten with the lowest for both the Big Five and the risk factors in the theoretical model. The differences for the Big Five were lower than those for the theoretical model, i.e., both Big Five and the theoretical model work as sorting out higher-risk individuals. However, they worked better together and provided a more profound picture than using just one or the other. The open-text questions were analyzed with the help of wordlists to calculate how the participants used different types of pronouns when writing. One wordlist provided potentially interesting results (the word list for ‘I’), while the others did not.
45

Wirtschaftsspionage in Verhandlungen aus Informationsökonomischer und Wirtschaftsetischer Perspektive : Eine Interdisziplinäre Analyse

Solberg Søilen, Klaus January 2004 (has links)
The dissertation examines a case of industrial espionage by one of the parties involved in a forthcoming international negotiation. We want to know what consequences a burglary has for the actual negotiation. The dissertation consist of five hypothesis, of which the three first were empirically tested. The discussion of thesis four and five is supported basically by research literature, but have also found indirect support in the empirical study. A game theoretical model of four information sets is used.Thesis 1: Pay-offs do not change significantly from one information set to the other. confirmedThesis 2: Behavior do not change significantly from one information set to the other. confirmedThesis 3: The perception of fairness do not change significantly from one information set to the other. confirmedThesis 4: International negotiations is socially so complex that it only makes sense to study the phenomena from an interdisciplinary angle. confirmedThesis 5: A descriptive evolutionary approach can be an alternative to neoclassical economic theory in understanding the study of international negotiations. confirmedThe study also confirms that economic theory is correct in excluding the ethical dimension from their models, as these factors have little influence on the end price. Fairness plays only a minor role in international negotiations.
46

Je třeba reformovat české zpravodajské služby? / Is it neccessary to reform Czech intelligence services?

Bulan, Jiří January 2011 (has links)
Bulan, Jiří. Je třeba reformovat české zpravodajské služby? Praha, 2011. 101 s. Diplomová práce (Mgr.) Univerzita Karlova, Fakulta sociálních věd, Institut politologických studií. Katedra mezinárodních vztahů. Vedoucí diplomové práce Gen. Ing. Andor Šándor. Abstract The thesis is a comparative analysis of the Czech intelligence system. It is trying to answer how and whether or not to reform the Czech intelligence services on the basis of scholarly articles and especially interviews with current and former intelligence officials and particular politicians. It turned out that among some of the Czech intelligence services and even within those services prevails the tense atmosphere, which had been caused by various personal failings. All the cases were the individual personal excesses, not the system errors. Representatives of the services assesses the ability to detect security threats very critically. The services miss particularly tight government management as well as the independent overview of the service operations. How to improve the intelligence services work? The intelligence community must establish a common vision that will emerge from a deeper internal discussion only. It is not possible to reform the system without it.
47

Hur diskuteras flyktingspionage som hot mot Sverige i digitaliseringens tidevarv? : En kvalitativ innehållsanalys av debatten om flyktingspionage i riksdag och media åren 2014- 2023 / How is refugee espionage discussed as a threat to Sweden in the age of digitisation? : A qualitative content analysis of the debate on refugee espionage in the Swedish parliament and media 2014-2023

Kristiansson, Daniel January 2023 (has links)
Refugee espionage, the act of spying on individuals to gather information for a foreign state, is illegal in Sweden. In this study, this phenomenon is considered part of transnational repression, an increasing threat against primarily dissidents posed by authoritarian states.  By using the method of qualitative content analysis on texts from the Swedish parliament and four large Swedish newspapers, the study attempts to answer questions about the debate on refugee espionage in the Swedish parliament and media. The timespan ranges from 2014- 2023. How do debaters talk about sovereignty and national security in relation to refugee espionage? Do debaters discuss the digital dimension: the opportunities, and risks from digital technology, in relation to refugee espionage?  The theoretical perspective is based on Lucas Kello’s cybertheory in international relations, on how cyberspace alters relations between states and has the possibility of expanding and enhancing ways to perform espionage.  Results reveal that debaters see refugee espionage as a threat to both Swedish sovereignty and national security. However, the debate rarely touches on concerns with digital technology as a mean to use refugee espionage against a state.
48

The sovereignty of the royal portrait in revolutionary and Napoleonic Europe : five case studies surrounding Maria Carolina, Queen of Naples

Goudie, Allison J. I. January 2014 (has links)
This study demonstrates how royal portraiture functioned during the Revolutionary and Napoleonic wars as a vehicle for visualizing and processing the contemporary political upheavals. It does so by considering a notion of the 'sovereignty of the portrait', that is, the semiotic integrity (or precisely the lack thereof) and the material territory of royal portraiture at this historical juncture. Working from an assumption that the precariousness of sovereignty which delineated the Revolutionary and Napoleonic wars goes hand in hand with the precariousness of representation during the same period, it reframes prevailing readings of royal portraiture in the aftermath of the French Revolution by approaching the genre less as one defined by the oneway propagation of a message, and more as a highly unstable intermedial network of representation. This theoretical undertaking is refracted through the figure of Maria Carolina, Queen of Naples (1752-1814), close sister and foil to Queen Marie- Antoinette of France, and who, as de facto ruler of the Kingdom of Naples, physically survived revolution but was twice dethroned and thrice exiled. A diverse ecology of royal portraiture revolving around Maria Carolina is presented across five case studies. Close attention to the materiality of a hyperrealistic wax bust of Maria Carolina reveals how portraiture absorbed the trauma of the French Revolution; Maria Carolina’s correspondence in invisible ink is used as a tool to read a highly distinctive visual language of 'hidden' silhouettes of sovereigns and to explore the in/visibility of exile; a novel reading of Antonio Canova's work for the Neapolitan Bourbons through the lens of contemporary caricature problematizes the binary between ancien régime and parvenue monarchy; and a unique miniature of Maria Carolina offers itself as a material metaphor for post-revolutionary sovereignty. Finally, Maria Carolina’s death mask testifies to how Maria Carolina herself became a relic of the ancien régime.
49

日本成立國家安全保障會議之研究 / The Research of The Establishment of Japanese National Security Council

謝冠群 Unknown Date (has links)
由美國911事件作為分水嶺,重新界定了日本對於現代情報戰爭的認知,當今21世紀的國際社會儼然成為情報戰場,換言之,情報研究科學早已隨社會需要,發展成跨越學科範疇之複合性知識。日本二戰後在國際上先以強大的情報力穩扎經濟領域,然其后陷入失落的二十年,國際影響力亦隨之萎靡,致使日本政府遂行原有情報組織體制之調整,及相關情報政策實務之運行,皆成為安倍政權引領日本必經的荊棘之道。 本文研究重點界分四面向:其一、戰後日本國家安全機制的發展與轉變,記錄其所歷經重大事態時之因應模式,介紹其安保政策結構化之過程;其二、從內外環境分析日本成立國家安全會議之意涵,先交代「南北韓仇日遺緒」、「中國崛起論」等當今亞太局勢,分析日本國家安全保障會議何以在歷史遺題中為安保政策解套;其三、解構日本國家安全保障會議制度,分析日本政治結構與社會,研究日本國家安全保障會議在創立後,其行政職權上如何調整日本情報組織之運作;其四、以特定秘密保護法分析日本國家安全保障會議之角色,闡述安倍政權必然以情報需求達到社會控制之強化,進而實踐其安保戰略。 日本情報組織隨國際環境變化而沿革,歷經1990至2000年的轉型期後,其於2000年迄今已表現出擴張之型態。在安倍內閣的戰略藍圖中是要以首相官邸為核心,使其成為統籌國家安全保障政策之司令塔,而日本國家安全保障會議與國家安全保障局之設立,即是其鞏固中央集權,並使首相意志能主導日本復興的戰略。 / The September 11 terrorist attacks marked a watershed moment for the recognition and dispose of intelligence, in other words, the research of intelligence has become an interdisciplinary knowledge. After the Second World War, Japan has consolidated its economic power by sound espionage system. But Japan has later on lost its international impact after gone through 20-Year-Recession. This made an intractable way for Shinzo Abe to readjust and innovate the espionage system. The thesis includes four dimensions: First, focusing on the transformation of national security mechanism in Japan after the Second World War, and the structuralization of Security Policy. Second, analyzing the implication of the found of Japan’s National Security Council(NSC) from domestic and international factors. Third, destructuring the NSC , try to analyze the social and political structure in Japan. Forth, analyzing the role of NSC from the perspective of Secret Protection Law, which for Abe is a way to further control the society and carry out the security strategy. The intelligence organization in Japan proceeds as the international situation changed. Till now it has strengthened its power and influence after going through a period of transforming from 1990 to 2000. Among Abe’s strategic viewpoints, making Prime Minister’s Office as a core to unify national security is the top priority. The found of NSC and National Security Agency(NSA) is also a way for Abe to centralize the authority and to carry out his will, which can eventually lead to the revival of Japan.
50

« Forcer, au besoin, leur obéissance » ? : la Gendarmerie nationale et la Grande Guerre des Français (1914-1918) / ‘To force, if need be, their obedience’? : the french gendarmerie during the First World War (1914-1918)

Panel, Louis N. 03 May 2010 (has links)
Par sa durée autant que par l’ampleur des effectifs engagés, la Première Guerre mondiale pose particulièrement la question du maintien de l’ordre et de la discipline aux armées. Déployés dans la zone des armées dès la déclaration de guerre, des détachements de gendarmerie y sont réorganisés à plusieurs reprises. Après avoir dirigé la mobilisation générale, ils veillent à la fluidité et à la sécurité de la circulation et assurent la régulation du trafic. Dans les cantonnements, les gendarmes des prévôtés interviennent également pour maintenir les hommes dans l’obéissance et le respect des directives du commandement. Ils sont aussi disposés en barrage, durant la bataille, pour réprimer la désertion qu’ils traquent jusqu’à l’intérieur. Leur échoient en outre la gestion et la surveillance des prisons prévôtales, bientôt réputées être le « cauchemar » de l’arme. En certaines circonstances, et alors que sont massées des troupes en nombre considérable, leur mission s’étend au contrôle de l’hygiène et aux soins des soldats. Pourtant, à l’issue de la guerre, l’image de la gendarmerie s’est considérablement dépréciée, comme en témoigne le développement du thème des gendarmes pendus par la troupe. / Because of its long duration as much as because of the vast number of troops engaged, the First World War posed the problem of maintaining order and discipline in the French armies in a particularly acute form. The task fell in a large part to the Gendarmerie, detachments of which were stationed in the armies’ sector since the outbreak of war. On several occasions the Gendarmerie had been reorganized. After having supervised the mobilization, it provided security for army movements and was responsible for traffic control. In the troop encampments the gendarmes of the military police enforced obedience to orders and ensured the implementation of directives from the (army) command. During the battle, they were arranged in roadblocks to repress deserters, whom they pursued up to the inland. Among their duties, there was also the administration and surveillance of military prisons, a task soon recognised to be a ‘nightmare’ for the service. In certain circumstances, when large masses of troops were jam-packed together, the Gendarmerie even assumed responsibility for soldiers’ personal hygiene and welfare. However, by the end of the war, the men’s respect for the Gendarmerie had declined markedly, evidenced by the spreading of the legend of gendarmes hanged by the rank-and-file.

Page generated in 0.0523 seconds