81 |
Developing an operational and tactical methodology for Incorporating existing technologies to produce the highest Probability of detecting an individual wearing an IEDBinstock, John. Minukas, Michael. January 2010 (has links) (PDF)
Thesis (M.S. in Information Technology Management and M.S. in Systems Technology (Command, Control & Communications))--Naval Postgraduate School, June 2010, John Binstock. Thesis (M.S. in Systems Technology (Command, Control & Communications))--Naval Postgraduate School, June 2010, Michael Minukas. / Thesis Advisor(s): Fox, William ; Second Reader: Pfeiffer, Karl. "June 2010." Description based on title screen as viewed on July 14, 2010. Author(s) subject terms: Improvised Explosive Device, IED, Suicide Vest, Suicide Bomber, Standoff Detection, Detection Methodology. Includes bibliographical references (p. 103-109). Also available in print.
|
82 |
Air base defense different times call for different methods /Ditlevson, Jeffery T. January 2006 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, December 2006. / Thesis Advisor(s): Maria Rasmussen. "December 2006." Includes bibliographical references (p. 103-109). Also available in print.
|
83 |
Geopolitical analysis of terror in selected U. S. countriesGoodman, Aaron M. January 2005 (has links)
Theses (M.A.)--Marshall University, 2005. / Title from document title page. Includes abstract. Document formatted into pages: contains 35 p. including illustrations and maps. Bibliography: p. 35.
|
84 |
Emergency preparedness and response systemsAlvarez, Maria Doris. January 2006 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, September 2006. / Thesis Advisor(s): Alex Bordertsky. "September 2006." Includes bibliographical references. Also available in print.
|
85 |
Impact of Homeland Security communities of learning Developing a strategy for training and collabloration /Braziel, Rick. January 2006 (has links) (PDF)
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2006. / Thesis Advisor(s): Richard Bergin. "September 2006." Includes bibliographical references (p. 87-89). Also available in print.
|
86 |
A non-conventional interdiction strategy for the global war on terrorBrizek, Jason M. Morris, Erwin C. January 2007 (has links) (PDF)
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, June 2007. / Thesis Advisor(s): Peter J. Gustaitis II. "June 2007." Includes bibliographical references (p. 95-104). Also available in print.
|
87 |
Slaying the dragon an analysis of how to dismantle a terrorist organization /Kelly, Caroline. January 2009 (has links)
Thesis (M.A.)--Duquesne University, 2009. / Title from document title page. Abstract included in electronic submission form. Includes bibliographical references (p. 67-70) and index.
|
88 |
Structural Causes of Transnational Terrorism: a Cross-National Longitudinal AnalysisWendel, Dierdre L. (Dierdre Lynelle) 08 1900 (has links)
This study provides a first attempt at building a multivariate model to explain terrorist activity by including six national factors proposed to have a relationship to the number of terrorist events occurring in a given nation and the number of terrorist incidents attributed to groups primarily identified with a given nation. These factors include rate of population growth, level of economic development, economic growth rate, level of democracy, presence of leftist regime type, and level of repression. After applying Ordinary Least Squares to these national factors in both a cross-sectional and a pooled cross-sectional time series analysis, only the level of democracy, the level of repression, and the lagged endogenous variables representing previous terrorist activity demonstrated strong and statistically significant relationships to the two dependent variables tested in both designs.
|
89 |
When bombs explode mass print media's construction of the terrorist bombings of U.S. targets /Leonette, Thomas Joseph. January 1900 (has links)
Thesis (M.A.)--West Virginia University, 2002. / Title from document title page. Document formatted into pages; contains vi, 62 p. Includes abstract. Includes bibliographical references (p. 59-62).
|
90 |
Squaring the circle : West European terrorism, EC/EU counter-terrorism and liberal democratic acceptabilityChalk, Peter 05 1900 (has links)
This dissertation is concerned with an analysis of the dynamic of
West European terrorism and European Community/Union (EC/EU)
counter-terrorism as it has evolved since the late 1960s. The first half
of the study is devoted to an investigation of the nature of the
terrorist phenomenon itself; the factors that were primarily responsible
for its escalation from the late 1960s onwards; the new and continuing
trends that are likely to affect the future course of terrorism within
Western Europe into the 1990s. The main focus of the second half of the
project centers on an examination of the effectiveness and
appropriateness of the latest EU provision to counter terrorism (and
other major threats to internal security) - the Maastricht third "pillar."
This assessment is made from a perspective that takes into account
questions of both operational anti-terrorist proficiency and liberal
democratic acceptability.
Police and security forces throughout the EU have strongly
endorsed the third pillar as providing an efficient response to serious
criminality. However, from a liberal democratic point of view, the
Maastricht provisions raise critical questions concerning the underlying
ideological rationale that appears to be guiding the Twelve's evolving
internal security cooperation, the lack of public debate surrounding this
coordination and the absence of any effective means to control closer EU
judicial and law enforcement action. All this poses a serious problem for the future of EU counterterrorism
cooperation. Close coordination between the EU member states
is absolutely necessary if the continuing threat of terrorism in Western
Europe is to be effectively quashed in the 1990s. However, one cannot
realistically expect this to happen if fundamental fears exist over the
desirability and legitimacy of establishing ever closer internal security
cooperation. It is therefore vital that in the headlong rush to provide
for an enhanced international operational capacity to deal with terrorism
critical considerations of democratic control and acceptability (both of
which the EU as well as individual member states are sworn to uphold
by virtue of their "status" as a liberal democratic entities) are not lost
by the Union Twelve.
|
Page generated in 0.0672 seconds