Academic literature on the topic 'Deterrence'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Deterrence.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Deterrence"
Vuori, Juha A. "Deterring Things with Words: Deterrence as a Speech Act1." New Perspectives 24, no. 2 (September 2016): 23–50. http://dx.doi.org/10.1177/2336825x1602400203.
Full textElhag, E. A., A. H. El Nadi, and A. A. Zaitoon. "Ovipositional Deterrence of Methanolic and Etherial Extracts of Five Plants to the Cowpea Bruchid, Callosobruchus maculatus (F.) (Coleoptera: Bruchidae)." Journal of Agricultural and Marine Sciences [JAMS] 4, no. 2 (June 1, 1999): 27. http://dx.doi.org/10.24200/jams.vol4iss2pp27-33.
Full textKajla, Mayur K., Gregory A. Barrett-Wilt, and Susan M. Paskewitz. "Bacteria: A novel source for potent mosquito feeding-deterrents." Science Advances 5, no. 1 (January 2019): eaau6141. http://dx.doi.org/10.1126/sciadv.aau6141.
Full textTurunen, Maija, and Martti Kari. "Cumulative Cyber Deterrence." International Conference on Cyber Warfare and Security 17, no. 1 (March 2, 2022): 433–39. http://dx.doi.org/10.34190/iccws.17.1.55.
Full textGuo, Zhenhua, and John C. Snyder. "MITE DETERRENCE OF TOMATO GENOTYPES IS CLOSELY RELATED TO LEAF SURFACE CHEMISTRY." HortScience 27, no. 6 (June 1992): 646a—646. http://dx.doi.org/10.21273/hortsci.27.6.646a.
Full textHirtenlehner, Helmut, and Per-Olof H. Wikström. "Experience or deterrence? Revisiting an old but neglected issue." European Journal of Criminology 14, no. 4 (October 12, 2016): 485–502. http://dx.doi.org/10.1177/1477370816671750.
Full textPark, MiRang. "A preliminary Study on the 1:1 Electronic Supervision System and Crime Deterrence of Sex Offenders." Korean Association of Public Safety and Criminal Justice 31, no. 3 (September 30, 2022): 147–92. http://dx.doi.org/10.21181/kjpc.2022.31.3.147.
Full textBanasik, Mirosław. "Znaczenie odstraszania strategicznego dla bezpieczeństwa międzynarodowego." Przegląd Wschodnioeuropejski 12, no. 1 (September 24, 2021): 165–78. http://dx.doi.org/10.31648/pw.6467.
Full textDorrian, Jillian, and Kevin Purse. "Deterrence and Enforcement of Occupational Health and Safety Law." International Journal of Comparative Labour Law and Industrial Relations 27, Issue 1 (March 1, 2011): 23–39. http://dx.doi.org/10.54648/ijcl2011003.
Full textTalbot, Brent. "Getting Deterrence Right: The Case for Stratified Deterrence." Journal of Strategic Security 13, no. 1 (April 2020): 26–40. http://dx.doi.org/10.5038/1944-0472.13.1.1748.
Full textDissertations / Theses on the topic "Deterrence"
Baade, Hans Petter. "Acquiring Deterrence : Defence Procurements’ Role in Deterrence." Thesis, Försvarshögskolan, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7457.
Full textRekasius, Mindaugas. "Unconventional deterrence strategy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FRekasius.pdf.
Full textKolliniatis, Vasilios A. "On entry deterrence." Thesis, University of Essex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.302813.
Full textHemmer, Patrick T. "DETERRENCE AND CYBER-WEAPONS." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32836.
Full textRapid technological advancements and societal inclusion of these technologies have expanded civil and defense capabilities but have also created significant vulnerabilities. Cyber-weapons have the potential to affect interaction between states by exploiting this vulnerability. To better understand the mechanics of how cyber-weapons affect state relations this research applies a common framework to explore the attributes of traditional weaponsconventional, nuclear, and RMAand how they typically influence this behavior. After proposing selected factors that influence the effectiveness of a cyber-attack, the research examines the cyber-attacks in 2007 on Estonia and 2008 on Georgia in order to refine and provide nuanced analysis on the role of the proposed causal factors. The proposed factors are government involvement, level of attack sophistication, and the degree to which the state is dependent upon digitally connected technology. The research indicates that the role of the state is one of the most significant factors in influencing the effectiveness of a cyber-attack and highlights the role that plausible deniability plays in this relationship. Some initial policy recommendations are made based on the finding that the use of cyber-weapons as a deterrent is still ill-defined and that the focus should be on decreasing state vulnerability to these attacks.
Park, Jusik. "Rationality in nuclear deterrence /." The Ohio State University, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=osu148775905515793.
Full textMoore, Ryan J. "Prospects for cyber deterrence." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMoore.pdf.
Full textThesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
Rasmussen, David C. "Credible nuclear deterrence for Japan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378257.
Full textThesis advisor(s): Wirtz, James J. ; Olsen, Edward A. "March 2000." Includes bibliographical references (p. 73-80). Also available in print.
KODERA, Toshiki. "Software Compatibility Alters Entry Deterrence." 名古屋大学大学院経済学研究科, 2007. http://hdl.handle.net/2237/8596.
Full textStephenson, John D. "Countering terrorism engagement, development, deterrence." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5019.
Full textThe war on terrorism has not reduced the threat from terrorism. Terrorism as a tactic cannot be defeated. States policies cannot rely on force alone in an attempt to defeat the use of a tactic. States need to use more effective counterterrorism policy options than coercion and force to deter groups from using terrorism. Groups choose to use terrorism as a tactic as a means to bring attention to be engaged and their grievances addressed. Engaging groups that use terrorism to address and resolve their grievances can prevent the cycle of violence of a terrorism campaign and delegitimize their use of force to resolve grievances. Economic development of developing nations can produce strong institutions necessary for minority groups to resolve grievances and build internally balanced market economies in developing nations that allow them to fully participate in economic globalization and reap the security benefits of globalization.
Kolbas, Patrick Joseph. "Beyond Armageddon : deterrence with less." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28016.
Full textBooks on the topic "Deterrence"
Lowther, Adam B., ed. Deterrence. New York: Palgrave Macmillan US, 2012. http://dx.doi.org/10.1057/9781137289810.
Full textFilippidou, Anastasia, ed. Deterrence. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3.
Full textAdhikari, Shekhar. Deterrence. Allahabad: Dept. of Defence and Strategic Studies, University of Allahabad, 2002.
Find full textRamsbotham, Oliver, and Hugh Miall. Beyond Deterrence. London: Palgrave Macmillan UK, 1991. http://dx.doi.org/10.1007/978-1-349-21720-5.
Full textWare, Roger. Entry deterrence. Kingston, Ont: Institute for Economic Research, Queen's University, 1991.
Find full textGeorge, Levinger, ed. Beyond deterrence. New York: Plenum, 1987.
Find full textWare, Roger. Entry deterrence. Kingston, Ont: Institute for Economic Research, Queen's University, 1991.
Find full textQuackenbush, Stephen L. Understanding General Deterrence. New York: Palgrave Macmillan US, 2011. http://dx.doi.org/10.1057/9780230370791.
Full textBobbitt, Philip. Democracy and Deterrence. London: Palgrave Macmillan UK, 1988. http://dx.doi.org/10.1007/978-1-349-18991-5.
Full text1944-, Stern Paul C., National Research Council (U.S.). Committee on Contributions of Behavioral and Social Science to the Prevention of Nuclear War., and National Research Council (U.S.). Commission on Behavioral and Social Sciences and Education., eds. Perspectives on deterrence. New York: Oxford University Press, 1989.
Find full textBook chapters on the topic "Deterrence"
Loughran, Thomas A., Ray Paternoster, and Douglas B. Weiss. "Deterrence." In The Handbook of Criminological Theory, 50–74. Hoboken, NJ: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781118512449.ch4.
Full textRitchie, Nick. "Deterrence." In A Nuclear Weapons-Free World?, 51–73. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137284099_5.
Full textCanton, Rob. "Deterrence." In Why Punish?, 83–101. London: Macmillan Education UK, 2017. http://dx.doi.org/10.1057/978-1-137-44904-7_5.
Full textApel, Robert, and Daniel S. Nagin. "Deterrence." In Encyclopedia of Criminology and Criminal Justice, 998–1005. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-5690-2_606.
Full textFilippidou, Anastasia. "Deterrence: Concepts and Approaches for Current and Emerging Threats." In Deterrence, 1–18. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_1.
Full textAnastasopoulos, Charis. "Linking the Deterrence Concept to Migration." In Deterrence, 157–76. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_10.
Full textKennedy, Greg. "Anglo-American Strategic Relations, Economic Warfare and the Deterrence of Japan, 1937–1942: Success or Failure?" In Deterrence, 177–91. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_11.
Full textWilkinson, Edith. "Resilience and Deterrence: Exploring Correspondence Between the Concepts." In Deterrence, 19–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_2.
Full textAshraf, Afzal. "Deterrence and Diplomacy." In Deterrence, 35–56. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_3.
Full textSteff, Reuben. "Nuclear Deterrence in a New Age of Disruptive Technologies and Great Power Competition." In Deterrence, 57–75. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_4.
Full textConference papers on the topic "Deterrence"
Libicki, Martin C. "Obnoxious Deterrence." In 2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon). IEEE, 2022. http://dx.doi.org/10.23919/cycon55549.2022.9811024.
Full textBrantly, Aaron F. "The cyber deterrence problem." In 2018 10th International Conference on Cyber Conflict (CyCon). IEEE, 2018. http://dx.doi.org/10.23919/cycon.2018.8405009.
Full textJaeki Lee. "Union competition and entry deterrence." In 2007 International Forum on Strategic Technology. IEEE, 2007. http://dx.doi.org/10.1109/ifost.2007.4798581.
Full textDobson, Andrew, EJ Milner-Gulland, Colin Beale, Harriet Ibbett, and Aidan Keane. "Detecting deterrence from patrol data." In 5th European Congress of Conservation Biology. Jyväskylä: Jyvaskyla University Open Science Centre, 2018. http://dx.doi.org/10.17011/conference/eccb2018/107778.
Full textFuller, G. H. "Tactical Deterrence - "Why" - "How" - "What"." In Warship 90 - The Future for Surface Warships. RINA, 1990. http://dx.doi.org/10.3940/rina.warship.1990.22.
Full textAtkinson, Simon Reay, David Walker, Kevin Beaulne, and Liaquat Hossain. "Cyber -- Transparencies, Assurance and Deterrence." In 2012 International Conference on Cyber Security (CyberSecurity). IEEE, 2012. http://dx.doi.org/10.1109/cybersecurity.2012.22.
Full textSoper, Braden C. "A Cyber-Nuclear Deterrence Game." In 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019. http://dx.doi.org/10.1109/allerton.2019.8919910.
Full textReddie, Andrew. "Tracing House: Wargaming Cyber Deterrence." In Proposed for presentation at the 89th MORS Symposium held June 21-25, 2021. US DOE, 2021. http://dx.doi.org/10.2172/1871419.
Full textFeigenbaum, Joan, James A. Hendler, Aaron D. Jaggard, Daniel J. Weitzner, and Rebecca N. Wright. "Accountability and deterrence in online life." In the 3rd International Web Science Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2527031.2527043.
Full textWanic, Elizabeth, and Neil Rowe. "Assessing Deterrence Optinos for Cyber Weapons." In 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00011.
Full textReports on the topic "Deterrence"
Harbaugh, William, Naci Mocan, and Michael Visser. Theft and Deterrence. Cambridge, MA: National Bureau of Economic Research, May 2011. http://dx.doi.org/10.3386/w17059.
Full textMartz, Joseph. Capability Based Deterrence. Office of Scientific and Technical Information (OSTI), November 2020. http://dx.doi.org/10.2172/1716770.
Full textJacobson, E. Towards Integrated Strategic Deterrence - 3rd Annual Cross-Domain Deterrence Seminar, 2016. Office of Scientific and Technical Information (OSTI), April 2017. http://dx.doi.org/10.2172/1635782.
Full textGoychayev, Rustam, Geoffrey A. Carr, Rachel A. Weise, David A. Donnelly, Samuel L. Clements, Jacob M. Benz, Kabrena E. Rodda, Rachel A. Bartholomew, Archibald D. McKinnon, and Richard B. Andres. Cyber Deterrence and Stability. Office of Scientific and Technical Information (OSTI), September 2017. http://dx.doi.org/10.2172/1405058.
Full textValle Jr, Vicente. Chaos, Complexity and Deterrence. Fort Belvoir, VA: Defense Technical Information Center, April 2000. http://dx.doi.org/10.21236/ada432927.
Full textSinnis, Constantine, Mark Benjamin Chadwick, Kimberly Carole New Scott, and Stephen Val Milton. LANSCE 21st Century Deterrence. Office of Scientific and Technical Information (OSTI), April 2020. http://dx.doi.org/10.2172/1608676.
Full textOtterson, Kirk Grant. Nuclear Weapons Deterrence Concepts. Office of Scientific and Technical Information (OSTI), January 2020. http://dx.doi.org/10.2172/1615645.
Full textScarlett, Harry Alan. Nuclear Weapon Deterrence Principles. Office of Scientific and Technical Information (OSTI), July 2020. http://dx.doi.org/10.2172/1638615.
Full textHayes, Richard E., and Gary Wheatley. Information Warfare and Deterrence. Fort Belvoir, VA: Defense Technical Information Center, October 1996. http://dx.doi.org/10.21236/ada385748.
Full textErickson, S. A. Jr. A theory of deterrence. Office of Scientific and Technical Information (OSTI), March 1991. http://dx.doi.org/10.2172/10127443.
Full text