• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 186
  • 141
  • 51
  • 25
  • 9
  • 5
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 1
  • 1
  • 1
  • Tagged with
  • 472
  • 177
  • 99
  • 86
  • 77
  • 67
  • 65
  • 60
  • 59
  • 56
  • 49
  • 42
  • 39
  • 38
  • 37
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

South Africa's official external threat perceptions : 1994-2012

Mabanga, Silingile Portia January 2013 (has links)
The aim of this study is to analyse and critically assess the nature, scope and basis of South Africa‟s official external threat perception as it developed during the period from 1994 to 2012. Accordingly, the assessment allows for the identification of shortcomings in the current national security policy on external security threats, based on the alignment of external threat perceptions with the Government Programme of Action. Essentially what had to be determined is whether perceived official threats correspond with the actual situation. Accordingly, the main research question of the study is: What is the nature, scope and basis of the post-1994 official external threat perception of South Africa? The research problem generated four subsidiary questions: When does a security issue become a national threat? What types of threat are there? How does the South African government perceive these threats? And whose security is threatened? In responding to the main research questions, the study‟s findings note a change in perceptions during the post-Cold War era as to what constituted threats to security. The focus shifted from traditional to non-traditional threats to national security, because most current threats are non-military and transnational in nature. The analysis of South Africa‟s official external threat perception is informed by the changed views of Government towards what are considered the main threats to national security. The study concludes with key findings in response to the stated problem and with specific recommendations. The study confirmed that the nature of threats and security debates post-1994 have changed constantly with the expansion of the security agenda beyond state and military security. The official viewpoint is that South Africa at present is not faced with any military threats. Emphasis is currently placed on human beings as the main object of security. Most identified threats are transnational in nature and these relate to the illegal flow of immigrants, terrorism, organised crime, climate change (linked to food and water security), regional instability and other socio-economic threats. These threats are being perceived and articulated by Government through policy announcements and public speeches, also validated in the critical analysis of various scholars. The concept of non-traditional threats still lacks a commonly accepted definition; hence the study proposes the need for South Africa to define and outline non-military security threats in a comprehensive manner, preferably through the development of a South African External Threat Perception Framework. Developing such a framework will assist security agencies (such as analysts) and other stakeholders in providing advice and guidance to Government in identifying external security threats. This initiative could eliminate the abuse of power by various stakeholders in securitising any issue as a threat to national security, and instead divert those resources to other Government services. Provision should also be made in the form of policy initiatives on the role of military force and other agencies in addressing non-military security threats. Thus, the development of key elements of an integrated national security strategy in order to address external security issues and threats is essential. / Dissertation (MSecurity Studies)--University of Pretoria, 2013. / gm2015 / Political Sciences / MSecurity Studies / Unrestricted
72

Dynamics of Napier stunt phytoplasma between the cultivated and wild graminae in East Africa / George Ochieng Asudi

Asudi, George Ochieng January 2015 (has links)
Cultivation of Napier grass, Pennisetum purpureum, the most important livestock crop in East Africa is severely constrained by Napier Grass Stunt (NGS) disease. The disease spreads via an insect vector or vegetative propagation of infected plant material and is caused by a phytoplasma. This necessitates the development of an integrated management approach for the disease. Therefore, objectives of this study were to assess the incidence of the disease and its severity, to identify its wild hosts and farmers‟ knowledge on these hosts, to assess the threat of NGS disease to cultivated grasses and to establish the role of wild inoculum sources in its spread. The study showed NGS incidence ranging from 33% in Uganda to 95% in Kenya with 49% of the farmers interviewed, being able to discern NGS disease by its symptoms. Most farmers cited roguing and use of alternative fodder grasses as control measures, making these strategies the likely components of an integrated management approach for the disease. Responders named Sedge grass (Cyperus spp.) and Star grass (Cynodon dactylon) as the likely hosts of diseases caused by phytoplasma. Phytoplasmas were detected in leaves of 11 of 33 wild grass species collected using polymerase chain reaction (PCR) based on the highly conserved phytoplasma-specific 16S ribosomal DNA fragment. Sequence determination of amplified PCR fragments revealed the presence of NGS-related phytoplasmas in 11 grass species, Bermuda grass white leaf (BGWL) phytoplasmas in three and goosegrass white leaf (GGWL) in two wild grass species, showing that the geographical distribution and diversity of phytoplasmas and their grass hosts are greater than previously thought. The relationships between NGS and Hyparrhenia grass white leaf (HGWL) phytoplasmas were determined using sequences based on secA gene and immunodominant protein (imp). Results showed a very low genetic diversity between NGS and HGWL and produced a phylogenetic tree congruent to that produced by the 16S, affirming the inclusion of HGWL in the 16SrXI group. NGS phytoplasma was transmissible to food crops through Maiestas banda Kramer (Hemiptera: Cicadellidae) under screen-house conditions. With 56.3%, Saccharum officinarum showed the highest infection level followed by Eleusine coracana with 50%, Sorghum bicolor with 43.8%, Oryza sativa with 31.3% and Zea mays with 18.8%. All the phytoplasma-infected plants were asymptomatic except S. officinarum plants, which showed mild to moderate symptoms consisting of foliar yellow leaves and bright white or yellow midribs. This hints that besides wild hosts, food crops may also serve as alternative source of inoculum enabling a complex NGS disease cycle, which may add to challenges in the development of the disease control strategies. However, failure by M. banda to transmit HGWL and BGWL phytoplasmas back to Napier grass is an indication that it could be the exclusive vector of NGS. Therefore, there is need to initiate transmission trials using planthoppers and leafhoppers occurring on HGWL and BGWL phytoplasma-infected grasses to determine whether insect vectors capable of transmitting phytoplasmas from native grasses to Napier grass, are present in the region. / PhD (Environmental Sciences), North-West University, Potchefstroom Campus, 2015
73

Dynamics of Napier stunt phytoplasma between the cultivated and wild graminae in East Africa / George Ochieng Asudi

Asudi, George Ochieng January 2015 (has links)
Cultivation of Napier grass, Pennisetum purpureum, the most important livestock crop in East Africa is severely constrained by Napier Grass Stunt (NGS) disease. The disease spreads via an insect vector or vegetative propagation of infected plant material and is caused by a phytoplasma. This necessitates the development of an integrated management approach for the disease. Therefore, objectives of this study were to assess the incidence of the disease and its severity, to identify its wild hosts and farmers‟ knowledge on these hosts, to assess the threat of NGS disease to cultivated grasses and to establish the role of wild inoculum sources in its spread. The study showed NGS incidence ranging from 33% in Uganda to 95% in Kenya with 49% of the farmers interviewed, being able to discern NGS disease by its symptoms. Most farmers cited roguing and use of alternative fodder grasses as control measures, making these strategies the likely components of an integrated management approach for the disease. Responders named Sedge grass (Cyperus spp.) and Star grass (Cynodon dactylon) as the likely hosts of diseases caused by phytoplasma. Phytoplasmas were detected in leaves of 11 of 33 wild grass species collected using polymerase chain reaction (PCR) based on the highly conserved phytoplasma-specific 16S ribosomal DNA fragment. Sequence determination of amplified PCR fragments revealed the presence of NGS-related phytoplasmas in 11 grass species, Bermuda grass white leaf (BGWL) phytoplasmas in three and goosegrass white leaf (GGWL) in two wild grass species, showing that the geographical distribution and diversity of phytoplasmas and their grass hosts are greater than previously thought. The relationships between NGS and Hyparrhenia grass white leaf (HGWL) phytoplasmas were determined using sequences based on secA gene and immunodominant protein (imp). Results showed a very low genetic diversity between NGS and HGWL and produced a phylogenetic tree congruent to that produced by the 16S, affirming the inclusion of HGWL in the 16SrXI group. NGS phytoplasma was transmissible to food crops through Maiestas banda Kramer (Hemiptera: Cicadellidae) under screen-house conditions. With 56.3%, Saccharum officinarum showed the highest infection level followed by Eleusine coracana with 50%, Sorghum bicolor with 43.8%, Oryza sativa with 31.3% and Zea mays with 18.8%. All the phytoplasma-infected plants were asymptomatic except S. officinarum plants, which showed mild to moderate symptoms consisting of foliar yellow leaves and bright white or yellow midribs. This hints that besides wild hosts, food crops may also serve as alternative source of inoculum enabling a complex NGS disease cycle, which may add to challenges in the development of the disease control strategies. However, failure by M. banda to transmit HGWL and BGWL phytoplasmas back to Napier grass is an indication that it could be the exclusive vector of NGS. Therefore, there is need to initiate transmission trials using planthoppers and leafhoppers occurring on HGWL and BGWL phytoplasma-infected grasses to determine whether insect vectors capable of transmitting phytoplasmas from native grasses to Napier grass, are present in the region. / PhD (Environmental Sciences), North-West University, Potchefstroom Campus, 2015
74

Hotbilder och dess utmanare : De mediala opinionsbildarnas filtrering av hotbilder och maktutövande i den svenska Nato-debatten

Sigfrid, Olof January 2016 (has links)
This study examines perceptions of threats and the actors in the Swedish Nato-debate. The particular sequence of debate which is investigated took place in Swedish media during the summer of 2015. The objects examined in this study are the actors involved in the debate and the perceptions of threats formed by these actors. Lack of knowledge regarding how debates are formed by actors, through their perceptions of threats, makes us unable to fully comprehend how and why these perceptions are formed. This lack of knowledge makes us unable to evaluate the debate beyond the claims of the participating actors. This study seeks to explain how perceptions of threats in the chosen debate-sequence were formed through filtration. Theory considering filtration of perceived threats states that the actors forming perceived threats does this through psychological-, bureaucratic-, political- and medial processes. Actors and their perceived threats can also exercise power. Whether the actors and their discourses have exercised power in the Swedish Nato-debate is examined through a relational- and productive power perspective. Results show that the participating actors examined, scientists, journalists and politicians, have all formed perceived threats through different forms of filtration, and all actors have in some way exercised relational or productive power in the debate.
75

Hot och våld i arbetslivet : - En kvalitativ studie om socialsekreterares utsatthet

Hugosson, Louise January 2010 (has links)
The purpose of this study was to investigate how social services workers describe, the risk of being exposed to threats and violence in their profession. Six social services workers were interviewed, four from the Welfare Office in a major city and two from the Child and Family Services in a minor city. Results showed that the majority of social services workers consider themselves exposed in their profession, meaning that they feel there's a risk of a violent or threatening situation occurring in their work situation. All interviewees had experiences from some sort of threat or violence in a work related context and they attested that non-personal assaults, such as threats made through telephone, email and answering machines are more common than verbal assaults made in personal meetings. Being prepared and listening to ones intuition is a way of dealing with exposure when meeting with a client. By working in pairs you can decrease the risk of being exposed in a violent/threatening situation. Several of the interviewees pointed out that they are more tolerant to certain clients in order to cope with their work situation.
76

Constructing a Cyber Preparedness Framework (CPF): The Lockheed Martin Case Study

Beyer, Dawn Marie 01 January 2014 (has links)
The protection of sensitive data and technologies is critical in preserving United States (U.S.) national security and minimizing economic losses. However, during a cyber attack, the operational capability to constrain the exfiltrations of sensitive data and technologies may not be available. A cyber preparedness methodology (CPM) can improve operational capability and cyber security. The CPM enables a corporation to (a) characterize cyber threats; (b) determine the level of preparedness necessary to ensure mission success; (c) facilitate strategic planning for cyber security (CS); and (d) establish priorities for CS investment planning and management decisions. The cyber preparedness framework (CPF) underlies the CPM. A corporation's leadership articulates its fundamental approach to risk management (RM) and mission assurance, and determines its target level of preparedness. Typically, corporations utilize the CPF to (a) characterize the caliber of the threat; (b) assess the technical and operational capabilities to counter the threat; and (c) develop the governance and processes necessary to achieve its cyber preparedness level. The problem that was investigated in this case study was how to construct a CPF for Lockheed Martin (LM) that works in conjunction with a risk management process (RMP). The goal was to extend the CPF into an RMP to construct a risk management framework (RMF) paradigm that can aid similarly large-sized private sector U.S. Government (USG) contractors in implementing the CPM. In this investigation, the author identified the corporate (a) security categorization, (b) cyber threats, (c) cyber threat level, (d) cyber preparedness level, (e) capabilities the corporation should utilize to counter cyber threats, and (f) governance and processes necessary to achieve the cyber preparedness level for a large-sized private sector USG contractor. The results of this investigation were organized in terms of RMP phases. Based on the results, the author constructed an RMF paradigm that can aid similarly large-sized USG contractors in implementing a CPM.
77

Ekologinio saugumo Baltijos jūros regione užtikrinimas: HELCOM vaidmens Švedijoje ir Lietuvoje palyginimas / Ecological security in the Baltic sea region: a comparison of the Helsinki Commission’s role in Lithuania and Sweden

Černiauskaitė, Inga 12 June 2009 (has links)
Svarstymai apie ekologinio saugumo sampratą bei šio sektoriaus reikšmę valstybių nacionalinių interesų kontekste prasidėjo dar praeito šimtmečio viduryje. Dėl spartaus ekonominio vystymosi kilo daugybė aplinkos saugumo problemų, tiek visame pasaulyje, tiek Baltijos jūros regione. Ekologinio saugumo problemos bei jų sprendimas savo prigimtimi peržengia nacionalinių valstybių sienas. Dėl šios priežasties pradėtos kurti tarptautinės institucijos arba režimai, atsirado poreikis tarptautiniam bendradarbiavimui. Siekiant spręsti aplinkos saugumo klausimus Baltijos jūros regiono valstybės įkūrė Helsinkio Komisiją bei aktyviai dirba šioje srityje. Pagrindinis darbo tikslas yra susipažinti ekologinio saugumo problematika Baltijos jūros regione, įvardijant pagrindinus tikslus bei iššūkius, bei jų įgyvendinimo galimybes ir efektyvumą. Siekiant geriau atskleisti temą darbe yra lyginami Švedijos ir Lietuvos atvejai. Pagrindiniai darbo uždaviniai yra apibrėžti valstybių nacionalinių interesų saugumo sampratą ir plačiau apžvelgti pagrindinius ekologinio arba aplinkos saugumo apibrėžimus ir perspektyvas politikos mokslų teorijoje. Aptarti svarbiausias grėsmes ir iššūkius Baltijos jūros regiono ekologiniam saugumui, atkreipiant dėmesį į pagrindines aplinkos saugumo problemas su kuriomis susiduria Švedija ir Lietuva. Susipažinti su Helsinkio Komisijos vaidmeniu Baltijos jūros regiono ekologinio saugumo srityje. Siekiant įgyvendinti darbo tikslą bei uždavinius naudojamas aprašomasis... [toliau žr. visą tekstą] / Ecological security problems, such as climate change and severe air and water pollution, have reached global attention over the last couple of decades. Environmental threats are usually caused not only by one state and can have impacts well beyond national borders. Hence, there is an obvious need for cross-national cooperation. The main object of this study is the challenges of ecological security in the Baltic Sea region and the efforts to meet them through cooperation within the Helsinki Commission. The Helsinki Commission is one of the main institutions seeking to ensure marine environment protection in the Baltic Sea through international cooperation between Denmark, Estonia, Finland, Germany, Latvia, Lithuania, Poland, Russia, Sweden and the wider European Union. To better understand the role and possible effects of the Helsinki Commission, a comparison between Sweden and Lithuania is being made. The main focus is on recent developments of ecological security, particularly after the adoption of the Helsinki Commission’s Baltic Sea Action Plan in 2007. The central question of this work is: what are the main ecological security problems and objectives set by the Helsinki Commission and what are the challenges for implementation in Sweden and Lithuania? Descriptive, comparative, and analytical research methods are employed in order to analyze this question. Numerous studies have revealed that pollution, caused by the agricultural sector, marine transportation and other... [to full text]
78

U.S. coercive diplomacy towards North Korea

Lee, Giseong January 2009 (has links)
Since the end of the Korean War tensions have continued on the Korean peninsula. This research focuses on the role of coercive persuasion employed by the United States when North Korea provoked several crises from the late 1960 to the early 1990s.  The case studies include the USS <i>Pueblo</i> incident in 1968, the EC-121 incident in 1969, the axe-murder incident in 1976, and the North Korean nuclear inspection crisis in 1993-94.  In addition to examining crisis negotiations, each case introduces an overview of the changing environment surrounding the Korean peninsula, and analyses North Korea’s motives and intentions in causing crises during that given period. In the theoretical debate on international relations, this study introduces two distinct theories about the explanation of state behaviour.   On the one hand, realists predict that states seek security and survival as the most important objective of their national interests when they are faced with outside threats.  Culturalists meanwhile seek to explain states’ behavioural patterns as distinct and different from state to state due to their unique strategic cultures, which are deeply rooted in historical experience, national self-image, and unique ideology.  Overall, the North Korean responses in the several crises under investigation could be best explained by a combination of these two theories, but this study aims at evaluating the persuasiveness of the two theories in the chosen case histories of US-North Korean relations. To assess the cases more thoroughly with historical evidences, this study draws on primary source materials.  It relies substantially on declassified US government documents, although it also examines South Korean and North Korean materials in order to offer a balanced and objective account of the crises.
79

Transformation of the Israel Defense Forces an application of the U.S. military transformation?

Arikan, Mehmet Okan 12 1900 (has links)
Approved for public release; distribution in unlimited. / The thesis studies the Israel Defense Forces' (IDF) transformation in the context of the U.S. military transformation. The thesis argues that the uniqueness of the U.S. military transformation does not prevent other militaries from applying the relevant concepts and considers the IDF as a good candidate for such a demonstration. Therefore, the thesis explores the U.S. military transformation as a model to be benefited in the IDF's continuing transformation. The thesis also studies IDF from many perspectives to identify the transformational imperatives and the relevance of the current IDF transformational efforts. Main areas of interest are the Israeli security environment, societal transformation, and the features of the IDF's transformational efforts. During the analysis, the thesis discovers weak points concerning, both, the U.S. military transformation and the IDF's current organization. The examination of the IDF's transformation in relation to the U.S. transformation reveals similarities between the two transformations and comes up with recommendations, primarily for the IDF, but to a lesser extent for the U.S. military. / First Lieutenant, Turkish Army
80

Trust and security risks in mobile banking

Messaggi Kaya, Monica January 2013 (has links)
With the development and growth of mobile technologies, mobile phones enable users to perform a number of different tasks with their devices: from sending simple text messages, checking e-mails and browsing the internet, to running elaborated applications. Nowadays, the mobile phone platform creates great opportunities for businesses, especially due to its capabilities and population coverage: the number of mobile subscriptions approaches global population figures. In order to explore such opportunities, most banks have already launched their mobile applications and/or re-designed mobile version of their websites. One of the benefits of using mobile banking is the possibility for users to carry out bank transactions, such online payments or transfers, at anytime and anywhere. Expectations for the adoption of mobile banking were high; however, it represents about 20% of mobile phone users at the present. One factor has been recognised as being a strong reason for users not to adopt mobile banking: their concerns about security. This dissertation focuses on the relationship between the trust users have in mobile banking and the security risks that the use of mobile devices potentially pose. A questionnaire was created in order to gather users’ perception of security about mobile banking, and its results compared with recognised security issues.

Page generated in 0.0835 seconds