• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 46
  • 7
  • 4
  • 3
  • 1
  • Tagged with
  • 73
  • 25
  • 14
  • 12
  • 12
  • 12
  • 11
  • 11
  • 11
  • 11
  • 11
  • 10
  • 10
  • 10
  • 10
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Titrisation en droit Lituanien : théorie et pratique / Securitisation under lithuanian law : theory and pratice

Versinskas, Tomas 11 December 2014 (has links)
Dans le cadre de cette thèse doctorale, intitulée « Titrisation en droit lituanien : théorie et pratique », le phénomène de titrisation est apprécié vis-à-vis du droit lituanien. Pour pouvoir identifier la place du phénomène de titrisation au sein du système de droit lituanien, tout d'abord, sont analysés le stade de développement du droit financier et son autonomie vis-à-vis d'autres branches du droit, notamment, du droit civil et du droit des finances publiques. L'étude révèle que même si les éléments importants d'autonomie du droit financier sont présents, l'autonomie définitive de cette branche du droit n'est pas encore achevée. Cela est principalement dû à l'absence de clarté des limites entre le droit financier et le droit civil. La titrisation n'étant pas expressément réglementée par le droit lituanien, elle est qualifiée en tant qu'ensemble contractuel – phénomène émanant du droit civil. À la suite de la qualification des contrats de l'opération de titrisation en tant qu’ensemble contractuel, la structure, les limites et le contenu d'un tel ensemble sont identifiés. La suite de l'étude révèle les effets qu'une qualification évoquée pourrait porter sur les contrats de l'opération de titrisation. Notamment, les effets entre les contrats de l'ensemble et les « contractants extrêmes » sont appréciés. La deuxième partie de l'étude estconsacrée aux aspects pratiques de la mise en oeuvre des opérations de titrisation des actifs des PME en Lituanie. Notamment, il est démontré qu'il est possible de réaliser des opérations de titrisation des actifs des PME dans le cadre réglementaire lituanien actuel. Pourtant, une telle mise en oeuvre serait fortement encombrée par le cadreréglementaire, qui n'est pas adapté à ce type de montages juridico-financiers. Des propositions respectives quant aux modifications du cadre réglementaire lituanien sont faites. / In this doctor thesis, entitled “Securitisation Under Lithuanian Law: Theory and Practice”, the phenomenon of securitisation is analysed in respect of Lithuanian law. In order to identify the place of the phenomenon of securitisation within the legalsystem of Lithuania, firstly the state of development of the financial law and its autonomy with respect to other branches of law, such as civil law and public finance law, were analysed. The research revealed that despite the presence of importantelements, proving the autonomy of the financial law, its complete autonomy is note yet achieved. This is basically due to the absence of clarity as to the limits between the financial law and the civil law. As securitisation is not specifically regulated bythe Lithuanian law, it was qualified as a group of related contracts – phenomenon of the civil law. After qualifying of securitisation as a group of related contracts, the structure, limits and contents of such group of related contracts were identified. Further studies revealed the effects that such qualification could make on the contracts of the securitisation transaction. In particular, the effects of such qualification among related contracts and the “distinct contractors” were analysed. The second part of the study was dedicated to the practical issues of the realisation of the operations of securitisation of the SMEs' assets in Lithuania. It was demonstrated that it would be possible to put in place operations of securitisation of the SMEs' assets in the frame of existing legal regulations in Lithuania. However, such operations would be heavily restricted by the regulatory framework, which is not adapted to such type of legal-financial transactions. Relevant propositions regarding the amendments of the Lithuanian legal framework were made.
2

Hypoteční zástavní listy (MBS) v USA / Mortgage Backed Securities

Reznák, Pavel January 2011 (has links)
Má diplomová práce se zabývá Mortgage Backed Securities, což jsou cenné papíry kryté hypotékami. V první části práce jsou MBS zobrazeny jako část skupiny strukturovaných aktiv. Je zde provedeno jejich srovnání s ostatními sekuritizačními instrumenty z hlediska struktury a vlastností a také je znázorněno jaká část jim připadá na sekuritizačním trhu. V další části je věnován důraz na podkladová aktiva MBS, tedy hypotéky. Důkladně je rozebrán americký hypoteční trh, druhy a objem poskytnutých půjček a jejich specifika. Jsou popsány polovládní agentury specifické pro americký trh, které napomáhají rozvoji hypotečního trhu. Hlavní část práce je věnována popisu tvorby Mortgage Backed Security, značná část se zabývá jednotlivými druhy a charakteristikami MBS. Je zde popsáno, jaký druh je vhodný pro určité typy investorů. Důraz je kladen na riziko předčasného splacení, tedy riziko spojené pouze s hypotéčními produkty. Závěrečná kapitola se věnuje jednotlivým typům MBS ze statistického hlediska. Je znázorněn jejich celkový objem na dvou hlavních trzích, v USA a Evropě, dále jsou popsány počty emisí jednotlivých druhů a další zajímavé statistické údaje spojené s MBS trhy.
3

The role of intelligence in securitisation processes : a tool or an agent?

Yakubov, Ikrom January 2017 (has links)
A rapidly expanding literature in International Relations theory researches how certain domestic entities both craft and implement important security policies that have direct implications to either domestic or international environments. The study of the role of the Intelligence Service in securitisation processes best fits into this characterisation, as the Intelligence Service is specially designed to collect, analyse, interpret and disseminate information about domestic and international environments. Moreover, being an entity that has a particularly intimate relationship with political power, Intelligence Services also actively participate in implementing policies, explicitly performing its Instrumentality. This project provides a general framework for conceptualising the role – Agency and Instrumentality – of Intelligence Services in securitisation processes through assessing how the Intelligence Service behaves in various stages and phases of securitisation. In order to achieve the main aim – determining and assessing the Agency and Instrumentality of Intelligence in securitisation, the dissertation adopts a reformulated securitisation theory as an analytical framework. Securitisation is a special form of decision/policy making and implementation process that involves complex activities, like interactions, between a securitising actor and the targeted audience – whose receptivity is vital for the outcome of these interactions. What is known as securitisation is a routine and daily activity for the Intelligence Service in its interactions with the decision/policy makers and it is always prone to initiate securitisation, because securitisation grants Intelligence centrality and an undiminished access to resources. Applying a blended logic of inquiry, the thesis adopts an anti-foundationalist ontology and interpretivist/constructivist epistemology, qualitative methodology and triangulation technique to underpin the theoretical arguments. Moreover, out of the adopted ontological-epistemological positions and methodology, the thesis employs qualitative operationalisation. In order to substantiate the presented analytical claims with factual findings, the dissertation assesses the role of the CIA and SIS-MI6 in recent interconnected securitisation cases. The first pair of cases looks at the role (Agency and Instrumentality) of the CIA and SIS-MI6 in the securitisation of religion based terrorism, the “War on Terror” and the Invasion of Afghanistan. The second pair of cases scrutinises the role of the CIA and SIS-MI6 in the securitisation of Saddam’s regime and the Invasion of Iraq. The results of these case studies demonstrate that the Intelligence Service is one of the key constituents in securitisation processes and performs its Agency or Instrumentality depending on the phases of securitisation.
4

Apocalyptic Imaged Futures as Securitising Speech Acts in the Reconceptualisation of Outer Space as a Private Domain: Applied to Discourse from the Pro-Privatized Outer Space Epistemic Community

Arenson, Jonathan January 2015 (has links)
The privatization of outer space has in recent years crossed the boundary from science fiction to science fact. As such, this thesis argues that creating and diffusing an intersubjective shared idea of an apocalyptic imagined future through securitizing speech acts, where humanity's only chance of survival will be an established permanent privately owned and operated colony in outer space, will be a crucial aspect required to build an epistemic community large enough and with enough influence to reconceptualize outer space from an international regulatory and regime perspective. This in turn will serve as a catalyst for the normalization and legitimization of free-market private enterprise in outer space. Powered by TCPDF (www.tcpdf.org)
5

Identity and Security in Europe: A Constructivist Study of Germany, Great Britain, Sweden and Lithuania

Stasaityte, Edita January 2003 (has links)
This study examines different national constructions of contemporary European identities. The assumption is made that the construction of states'identities and identification of threats is a mutual process. For this reason special attention is paid to the construction of threats, embedded in a specific structure of the securitisation process. The author tries to answer to the questions of how identities are reproduced through the discourse on security and what information the analysis of national identities'constructions of Germany, Great Britain, Sweden andLithuania can provide about the contemporary ideas of a collective European identity using combination of Alexander Wendt's theoretical framework for analysing states'identities and the Copenhagen school's securitisation approach.
6

Identity and Security in Europe: A Constructivist Study of Germany, Great Britain, Sweden and Lithuania

Stasaityte, Edita January 2003 (has links)
<p>This study examines different national constructions of contemporary European identities. The assumption is made that the construction of states'identities and identification of threats is a mutual process. For this reason special attention is paid to the construction of threats, embedded in a specific structure of the securitisation process. The author tries to answer to the questions of how identities are reproduced through the discourse on security and what information the analysis of national identities'constructions of Germany, Great Britain, Sweden andLithuania can provide about the contemporary ideas of a collective European identity using combination of Alexander Wendt's theoretical framework for analysing states'identities and the Copenhagen school's securitisation approach.</p>
7

Official views on the environment and security in South Africa, 2007-2012 : a case of securitisation?

Stoltz, Abitt January 2015 (has links)
This research study emanates from the inclusion of environmental risks on the global security agenda. Although dating back to the Rio Summit on Environment and Development (UNEP, 1992), this trend gained momentum following the publication of the Fourth Assessment Report of the United Nations Intergovernmental Panel on Climate Change (IPCC) in February 2007 (IPCC, 2007a). The report warned that the global climate system is changing mainly because of man-made greenhouse gas emissions, exposing, amongst others, Africa as a continent most vulnerable to the impact of climate variability and change. Subsequent to the report, the security implications of climate change were discussed by the United Nations Security Council in April 2007 (UN, 2007a). With these developments as a point of departure, the aim of this exploratory study is to investigate the securitisation of environmental risks, particularly the impact of climate change, in South Africa, with specific reference to official perceptions of (and where applicable, policy responses to) environmental security between 2007 and 2012. As a literature and documentary case study on South Africa, the research utilises a conceptual framework that broadens and deepens the concept of security to include the environment as a non-traditional (non-military) aspect. In this context, environmental risks are discussed as a challenge to security, considering their contemporary relevance. Environmental security is discussed as an emerging security issue in the context of its global and regional scope; its linkage to and impact on food, water and energy security; and its influence on the political, economic, and social sectors of security. Further, the study indicates that Southern Africa in general, and South Africa in particular, are highly vulnerable to the impact of environmental risks such as climate change; and that such risks indeed exacerbate existing security risks and threats. Against this backdrop, the South African government’s securitisation (or lack of securitisation) of the environment is described and explored with reference to official views on environmental security. The analysis indicates that the Government securitises environmental risks such as climate change to a limited degree only (in terms of securitising speech and act); and the issue thus does not fall within the ambit of security, but rather that of sustainable development. The Government base their unsecuritised stance on the impact of environmental risks, on the country’s basic natural resources (such as food, water and energy) being overwhelmed by existing growth pressures; and that the Administration’s current priority is inter alia social development issues, such as employment and poverty eradication. The study concludes with a summary of key findings in response to the stated research problem, and with recommendations concerning the South African government’s response to environmental security. / Dissertation (MSS)--University of Pretoria, 2015. / Political Sciences / Unrestricted
8

Politizace migrační krize v Evropě: Visegradská sekuritizace ilegální migrace do Evropy / Viktor Orban's National Hungarian Identity Construct - Securitization of 2015-2016 European Migrant Crisis as Existential Threat

Stein, Kenneth Cavanagh January 2017 (has links)
Charles University in Prague Faculty of Social Sciences Institute of Political Studies Bc. Kenneth C. Stein Viktor Orbán's National Hungarian Identity Construct: Securitization of the 2015/2016 European Migrant Crisis as Existential Threat? Diplomová Práce Praha 2017 Autor práce: Bc. Kenneth C. Stein Vedoucí práce: PhDr. Vít Střitecký M. Phil., PhD. Oponent práce: Datum obhajoby: 2017 Hodnocení: Abstract: The current paper examines Hungarian Prime Minister Viktor Orbán's speech acts based on the preface that his language communicates political will, power, and serves as an outline for potential future political avenues. Orbán has been one of the most outspoken critics of the European Union's failure to adequately address the ongoing migrant crisis, as well as Europe's immigration issues. The aim of the thesis is to examine the language tools utilized by Orbán according to securitization theory. Utilizing elements of Wodak's Critical Discourse Analysis in combination with Tajfel and Turner's Social Identity Theory, the thesis provides analysis of the texts through the lens of Orbán's creation of a national Hungarian social identity construct as referent object being securitized against the migrant threat. Moreover, the thesis provides an overall analysis of Orbán's brand of Hungarian social identity...
9

Bezpečnost 5G - Případová studie sekuritizace švédských 5G sítí / 5G Security - A Case Study on the Securitisation of Sweden's 5G Networks

Ekfeldt, Therese January 2021 (has links)
Over the last couple of years, the world has witnessed an intensifying competition over 5G networks, triggered to a large extent but not exclusively by the geopolitical rivalry between the United States and China. To the backdrop of allegations that the Chinese government could force Chinese telecom company Huawei and ZTE to spy, sabotage or take other action's on Beijing's behalf, Washington ordered prompt restrictions on products from Huawei and pressured its allies to do the same. From a European perspective, Sweden stood out early as a country with a strong stance on 5G security by outright banning Chinese telecom providers Huawei and ZTE from taking part in Sweden's 5G frequency auction. This thesis seeks to understand how the securitising process of Sweden's 5G networks was initiated and evolved, through a comparative case study of the four main securitising actors' official discourses. Derived from previous studies on cybersecurity and securitisation, this thesis constructed an analytical framework tailored for the securitisation of 5G networks. The thesis is carried out as an idea analysis, looking for articulated threats pertaining to three distinct threat dimensions: 'network security', 'data and information protection' and 'China's assertiveness'. The analysis showed that all four...
10

The securitisation of information with reference to South Africa's Protection of State Information Bill 2010

Ellinas, Mikela January 2016 (has links)
The aim of this study is to analyse whether or not information has been securitised in South Africa. The degree of possible securitisation is assessed to determine the consequences of this securitised situation for the information-security nexus in South Africa. This premise is based primarily on the introduction of the Protection of State Information Bill, 2010 (hereinafter the Bill) which forms the case study. The Bill is posited by the state as a contribution to the country's information society and an enhancement of security-law to allow the State to combat threats in the Information Age. However, the Bill has received fierce criticism as a detractor to the democratic project of South Africa. The analysis of the paper is grounded in the framework of Securitisation Theory, derived from Critical Security Studies within the field of Security Studies. This theory explores the consideration of an issue or entity, as a security subject, ultimately removing the issue or entity from the public-political discourse. Accordingly, the study concludes that a partial securitisation of information has occurred in South Africa, but with justifiable defence and necessary cause. In spite of the often pejorative perspective of a securitised environment, this outcome is not necessarily detrimental to the democratic project. Not only does the proposed security law enhance the security of the country to facilitate the pursuit of national interests, it allows the state to compete more effectively and aggressively with its counterparts in the international milieu in the Information Age. / Mini Dissertation (M Security Studies)--University of Pretoria, 2016. / Political Sciences / M Security Studies / Unrestricted

Page generated in 0.1247 seconds