Dissertations / Theses on the topic 'Deterrence'

To see the other types of publications on this topic, follow the link: Deterrence.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Deterrence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Baade, Hans Petter. "Acquiring Deterrence : Defence Procurements’ Role in Deterrence." Thesis, Försvarshögskolan, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7457.

Full text
Abstract:
A major Norwegian defence procurement project takes decades from project initiation to the desired military capability is delivered and has reached full operational capability. The Norwegian Armed Forces’ primary mission is to maintain a credible deterrence and prevent armed conflicts arising, meaning that the capability acquired through military procurement projects must play into future general deterrence. Do Norway’s strategic military capability procurement projects contribute to a credible and capable deterrence? The purpose of this study is to gain a deeper understanding of the deterrence potential of two chosen Norwegian military procurement projects of strategic importance. The capabilities studied are the acquisition of the US fifth generation fighter, F-35 Lightning II and the 212CD submarine to be designed and built by Germany. The two projects have a combined estimated investment cost of 113 billion NOK. Deterrence is a large area in social science and the discipline of War Studies. This study applies a deterrence theory lens, primarily based on the conclusion in Zagare’s and Kilgour’s perfect deterrence theory regarding the importance of capable and credible threats, operationalised through Dalsjö’s five dimensions of threshold defence. The analysis identifies a clear credibility issue with one of the projects and the paradox that cost saving decisions intended to ensure operational availability and increase credibility also make the capability more vulnerable and less credible due to lack of redundancy.
APA, Harvard, Vancouver, ISO, and other styles
2

Rekasius, Mindaugas. "Unconventional deterrence strategy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FRekasius.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Kolliniatis, Vasilios A. "On entry deterrence." Thesis, University of Essex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.302813.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hemmer, Patrick T. "DETERRENCE AND CYBER-WEAPONS." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32836.

Full text
Abstract:
Approved for public release; distribution is unlimited
Rapid technological advancements and societal inclusion of these technologies have expanded civil and defense capabilities but have also created significant vulnerabilities. Cyber-weapons have the potential to affect interaction between states by exploiting this vulnerability. To better understand the mechanics of how cyber-weapons affect state relations this research applies a common framework to explore the attributes of traditional weaponsconventional, nuclear, and RMAand how they typically influence this behavior. After proposing selected factors that influence the effectiveness of a cyber-attack, the research examines the cyber-attacks in 2007 on Estonia and 2008 on Georgia in order to refine and provide nuanced analysis on the role of the proposed causal factors. The proposed factors are government involvement, level of attack sophistication, and the degree to which the state is dependent upon digitally connected technology. The research indicates that the role of the state is one of the most significant factors in influencing the effectiveness of a cyber-attack and highlights the role that plausible deniability plays in this relationship. Some initial policy recommendations are made based on the finding that the use of cyber-weapons as a deterrent is still ill-defined and that the focus should be on decreasing state vulnerability to these attacks.
APA, Harvard, Vancouver, ISO, and other styles
5

Park, Jusik. "Rationality in nuclear deterrence /." The Ohio State University, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=osu148775905515793.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moore, Ryan J. "Prospects for cyber deterrence." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMoore.pdf.

Full text
Abstract:
Thesis (M.S. in Information Operations)--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Rasmussen, David C. "Credible nuclear deterrence for Japan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378257.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, March 2000.
Thesis advisor(s): Wirtz, James J. ; Olsen, Edward A. "March 2000." Includes bibliographical references (p. 73-80). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
8

KODERA, Toshiki. "Software Compatibility Alters Entry Deterrence." 名古屋大学大学院経済学研究科, 2007. http://hdl.handle.net/2237/8596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Stephenson, John D. "Countering terrorism engagement, development, deterrence." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5019.

Full text
Abstract:
Approved for public release; distribution is unlimited
The war on terrorism has not reduced the threat from terrorism. Terrorism as a tactic cannot be defeated. States policies cannot rely on force alone in an attempt to defeat the use of a tactic. States need to use more effective counterterrorism policy options than coercion and force to deter groups from using terrorism. Groups choose to use terrorism as a tactic as a means to bring attention to be engaged and their grievances addressed. Engaging groups that use terrorism to address and resolve their grievances can prevent the cycle of violence of a terrorism campaign and delegitimize their use of force to resolve grievances. Economic development of developing nations can produce strong institutions necessary for minority groups to resolve grievances and build internally balanced market economies in developing nations that allow them to fully participate in economic globalization and reap the security benefits of globalization.
APA, Harvard, Vancouver, ISO, and other styles
10

Kolbas, Patrick Joseph. "Beyond Armageddon : deterrence with less." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28016.

Full text
Abstract:
This thesis examines the implications for nuclear deterrence between the United States and the Soviet Union brought about by the dramatic changes in the strategic environment during the 1980s. Specifically, it examines the potential for a new criteria of deterrence at significantly lower levels of strategic weapons. The analysis indicates that a targeting strategy which emphasizes economic and industrial facilities will deter the Soviet Union. This targeting strategy allows for a reduction to 1500 strategic weapons while maintaining the robustness of nuclear deterrence between the United States and the Soviet Union. Using as its criteria arms race stability, breakout stability, crisis stability, verification, predictability, consequences of war, and the security of friends and allies, this thesis concludes that a force structure comprised of the Trident D-5 Submarine-launched ballistic missile and the B-2 bomber best ensures deterrence both against the Soviet Union and any other nuclear power regardless of changes in their political or ideological orientation. To provide maximum flexibility while negotiating the agreement and to hedge against a breakdown in U.S/Soviet relations prior to implementation, the thesis recommends a modernization program for U.S. strategic forces including funding for the restructured Strategic Defense Initiative which is now named Global Protection Against Limited Strikes. *Nuclear Deterrence, limited Nuclear Options, *Arms Control, Strategic Nuclear Weapons, START
APA, Harvard, Vancouver, ISO, and other styles
11

Jasper, Scott. "U.S. strategic cyber deterrence options." Thesis, University of Reading, 2018. http://centaur.reading.ac.uk/79976/.

Full text
Abstract:
The U.S. government appears incapable of creating an adequate strategy to alter the behavior of the wide variety of malicious actors seeking to inflict harm or damage through cyberspace. This thesis provides a systematic analysis of contemporary deterrence strategies and offers the U.S. the strategic option of active cyber defense designed for continuous cybered conflict. It examines the methods and motivations of the wide array of malicious actors operating in the cyber domain. The thesis explores how the theories of strategy and deterrence underpin the creation of strategic deterrence options and what role deterrence plays with respect to strategies, as a subset, a backup, an element of one or another strategic choice. It looks at what the government and industry are doing to convince malicious actors that their attacks will fail and that risk of consequences exists. The thesis finds that contemporary deterrence strategies of retaliation, denial and entanglement lack the conditions of capability, credibility, and communications that are necessary to change the behavior of malicious actors in cyberspace. This research offers a midrange theory of active cyber defense as a way to compensate for these failings through internal systemic resilience and tailored disruption capacities that both frustrate and punish the wide range of malicious actors regardless of origin or intentions. The thesis shows how active cyber defense is technically capable and legally viable as an alternative strategy in the U.S. to strengthen the deterrence of cyber attacks.
APA, Harvard, Vancouver, ISO, and other styles
12

Odhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.

Full text
Abstract:
Deterrence as a military strategy aims to discourage an aggressor from initiating unwanted courses of actions by convincing the aggressor that cost exceeds the profit. In cyberspace, where the costs are lower, deterrence is disputed because of the natural interconnectedness and constant actions. The aim of this study is to investigate how the US understands cyber deterrence. This study is motivated by the current ambiguity regarding whether deterrence works in cyberspace or not. Using both theories of conventional and cyber deterrence together with theories of offense and defense, the study focuses on the US since they remain at the center of development regarding cyber deterrence. Through a discourse analysis using Bacchis What´s the problem represented to be approach, the investigation of US policy from 2018 shows that the US has adopted theories of cyber deterrence in their policy. However, the presumptions of the problem presentation have rather descended from theories of conventional deterrence. The solutions implemented indicate that the US has an advantage in cyber offense capabilities, but the study also shows that they are moving towards more defense-oriented capabilities in the future. In the stress of taking action, the US end up interfusing premises and actions which may affect the principle of intervention and thus the security of the American population.
APA, Harvard, Vancouver, ISO, and other styles
13

McCutcheon, Michael. "Testing Specific Deterrence In The National Basketball Association: An Application Of Beccaria's Theory Of Deterrence." Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3165.

Full text
Abstract:
While the concept of deterrence has been applied to punishment in America’s criminal justice system, the empirical data is mixed on whether is effectively deters crime. This lack of consensus may be a result of missing elements from deterrence theory; namely, that punishment is often neither swift nor certain. Similar to the criminal justice system, professional sports leagues aim to control behavior of athletes by having guidelines that, when violated, result in punishment. However, these punishments are delivered much quicker and there is a higher level of certainty. The current study examines specific deterrence in the National Basketball Association by using longitudinal data of fines and suspension from the 2000-2001 season to the 2015-2016 season to test whether punishment that is swift and certain can deter rule-breaking behavior. Results from the study showed no deterrent effect when deterrence was analyzed by punishment type (suspension or fine) and severity of punishment.
APA, Harvard, Vancouver, ISO, and other styles
14

Briscoe, Suzanne Marie Social Science &amp Policy UNSW. "Deterrence, punishment severity and drink-driving." Awarded by:University of New South Wales. Social Science and Policy, 2005. http://handle.unsw.edu.au/1959.4/23442.

Full text
Abstract:
This thesis tests one of the major propositions of deterrence theory: that increases in the severity of punishment can reduce the likelihood of offending. To this end, a case study in which the statutory penalties were doubled for almost all drink-driving offences in New South Wales, Australia, is examined. Two quasi-experimental studies were undertaken to assess the impact of these legislative changes: an interrupted time-series analysis of road crash rates (Study 1) and an analysis of drink-driving reoffending rates before and after the penalty changes were implemented (Study 2). Study 1 showed a significant increase in a surrogate measure of alcohol-related road crashes after the tougher drink-driving penalties were introduced. Further analyses suggested that this increase was driven primarily by a secular rise in non alcohol-related crashes that coincided with the policy???s implementation. Two possible conclusions about the deterrent effect of the policy are drawn from these findings: (1) that there was a reduction in alcohol-related road crashes which was overwhelmed by the rise in non alcohol-related crashes occurring around the same time or (2) that there was no change in crash rates. Study 2 found that drink-drivers who were convicted under the new penalty regime were less likely, and took longer, to reoffend than drink-drivers convicted before the introduction of the new penalties. This reduction in reoffending was only apparent for drink-drivers residing in country and regional areas and was small in magnitude.These latter findings are consistent with the possibility that the penalty changes coincided with a reduction in alcohol-related crashes but suggest that any decrease is likely to have been relatively small. A third study using a scenario-based survey methodology was also undertaken to examine the relationship between legal sanctions and willingness to drink-drive, controlling for other factors. The results of this study showed that participants who were more knowledgeable about drink-driving penalties were less likely to state that they would offend in the drink-driving scenario than participants who were less knowledgeable about the law. The implications of these findings for deterrence theory and criminal justice policy are discussed.
APA, Harvard, Vancouver, ISO, and other styles
15

Stephan, Andreas. "Enhancing deterrence in European cartel enforcement." Thesis, University of East Anglia, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.446165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Baik, Kyung Hwan. "Capacity, entry deterrence, and horizontal merger." Diss., Virginia Polytechnic Institute and State University, 1989. http://hdl.handle.net/10919/54483.

Full text
Abstract:
This dissertation examines the free-rider problem of entry deterrence, the profitability of a horizontal merger, and the effects of a horizontal merger on the outsiders’ profits and industry prices, in the markets where firms' capacity costs are sunk. We investigate the free-rider problem of entry deterrence in the subgame perfect Nash equilibria of a three-stage game in which in the first stage multiple incumbent firms choose their capacities simultaneously and independently, in the second stage a potential entrant, after observing the incumbent firms’ capacity vector, chooses its capacity, and in the third stage the firms engage in capacity-constrained Cournot competition. We show that the free-rider problem may occur: there are situations where both entry prevention and allowing entry are equilibria but entry prevention is Pareto superior for the incumbent firms. We also show that increasing the number of incumbent firms may cause the equilibrium price to increase and thus consumer welfare to decrease. The free-rider problem is still manifested in a modified model in which multiple potential entrants choose their capacities sequentially after the first stage incumbents’ capacity decisions. Several recent papers which theoretically analyze the profitability of a horizontal merger and its effects on the outsiders’ profits and industry prices, all observe that a merger never decreases industry prices, a merger to a monopoly is always profitable, and a merger never hurts the outsiders. However, we demonstrate, in a market for a homogeneous product where firms with sunk capacities compete in quantities and there are potential entrants, that a merger can decrease industry price and a merger of incumbent firms to a monopoly may not be profitable. We also show, in a market for a homogeneous product where firms with sunk capacities engage in capacity-constrained price competition, that a merger can hurt the outsiders.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
17

Leppmann, Kevin P. (Kevin Paul) Carleton University Dissertation International Affairs. "The social psychology of deterrence theory." Ottawa, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Frederick, Lorinda A. "Deterrence and space-based missile defense /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=2c4a986d-2074-4005-b963-1b697e841d8c&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

McMaster, Don. "Detention, deterrence, discrimination : Australian refugee policy /." Title page, abstract and contents only, 1999. http://web4.library.adelaide.edu.au/theses/09PH/09phm167.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Graham, Cheryl M. "Deterrence revalidated : an investigation of the practice and application of deterrence in the post-Cold War world." Thesis, University of Aberdeen, 2010. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=202573.

Full text
Abstract:
The end of the Cold War was briefly followed by many indications and hopes that the salience of nuclear weapons in national security strategies was in decline. However, there was soon a growing realisation in policy-making and academic circles that although the Soviet Union had disintegrated, the nuclear threat had not gone away. During this period the concepts of a ‘Second Nuclear Age' and ‘New Terrorism' entered the rhetoric of the academic and policy-making strategic community. Central themes of both of these concepts were that nuclear issues persisted in the post-Cold War world, albeit in a new format, and that reliance on nuclear deterrence as a means of maintaining peace was increasingly hazardous and decreasingly effective. The orthodox negative hypotheses regarding (i) the continuing reliability of nuclear deterrence, and (ii) the management and deterrence of the threat of nuclear terrorism, can be challenged on a number of levels. Despite frequent claims to the contrary, nuclear deterrence has never been viewed as infallible and, since the 1949 Soviet atomic test, policymakers and strategic thinkers have consistently refined deterrence strategies to ensure their relevance with regards to evolving threats. Furthermore, closer examination of the various historical tensions from the first nuclear age demonstrates that the challenges of the second nuclear age, at both the state and non-state level, are not necessarily as unique as many analysts assumed. Examination of contemporary nuclear-related issues, not least the implications of horizontal nuclear proliferation, and a comparison against the Cold War historical record indicates that the concepts of the ‘Second Nuclear Age' and ‘New Terrorism' can be found wanting when measured against empirical evidence. Defence of, and over-reliance on these artificial intellectual constructs could result in a number of negative political consequences. Those stressing the uniqueness of the post-Cold War strategic environment also encourage policymakers to view the turbulence of current affairs as posing unique challenges that require entirely new approaches and modes of thinking. In doing so they are likely to iii underestimate the value and relevance of many similar Cold War experiences and lessons; the most important lesson being the enduring importance of nuclear weapons and the concomitant deterrence strategies designed to inhibit their physical use while fully utilising their physical presence.
APA, Harvard, Vancouver, ISO, and other styles
21

Sörenson, Karl. "In Search of Lost Deterrence – Two essays on deterrence and the models employed to study the phenomenon." Licentiate thesis, KTH, Filosofi och historia, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240090.

Full text
Abstract:
To deter is central for strategic thinking. Some of the more astute observations regarding the dynamics of deterrence were made during the Cold War by game theorists. This set the stage for how deterrence has come to be studied. A strong methodological element like the research on deterrence’s reliance on game theory requires examination in order to understand what sort of knowledge it actually yields. What sort of knowledge does one acquire when deterrence is viewed through game theoretic models? How do they inform us about the phenomenon of deterrence? To understand the nature of a phenomenon through models requires idealization, which in turn presupposes assumptions. This licentiate thesis investigates the type of knowledge we attain when approaching deterrence from a game theoretic perspective. The two articles presented address two separate but related issues. The first article reviews a debate regarding which deterrence model best capture the phenomena of deterrence, i.e. how models can be compared to one and other. The article presents a framework for comparing models and then appraises how these different deterrence models inform us about deterrence. The second article uses one of the more central deterrence models in order to evaluate how and to what extent the naval operation Atalanta managed to deter the Somali piracy.

QC 20190201

APA, Harvard, Vancouver, ISO, and other styles
22

Beattie, Troy J. "Conventional deterrence and the Falkland Islands conflict." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FBeattie.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Defense Decision-Making And Planning))--Naval Postgraduate School, March 2010.
Thesis Advisor(s): Russell, James. ; Moran, Daniel. "March 2010." Description based on title screen as viewed on April 30, 2010. Author(s) subject terms: Deterrence (Strategy); Conventional Deterrence (Strategy); Deterrence-Psychology; Falkland Islands War, 1982; Great Britain; Argentina; Defense Policy Includes bibliographical references (p. 109-112). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
23

Jafarian, Jafar Haadi. "Cyber Agility for Attack Deterrence and Deception." Thesis, The University of North Carolina at Charlotte, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10686943.

Full text
Abstract:

In recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either identifying and patching exploits, or detecting and filtering them. These techniques are only effective when intrusions are known or detectable. However, unknown (zero-day) vulnerabilities are constantly being discovered, and known vulnerabilities are not often patched promptly. Even worse, while defenders need to patch all vulnerabilities and intrusions paths against unknown malicious entities, the attackers only need to discover only one successful intrusion path in a system that is known and static. These asymmetric advantages have constantly kept attackers one step ahead of defenders.

To reverse this asymmetry in cyber warfare, we aim to propose new proactive defense paradigms that can deter or deceive cyber attackers without relying on intrusion detection and prevention and by offering cyber agility as a system property. Cyber agility allows for system configuration to be changed dynamically without jeopardizing operational and mission requirements of the system. In this thesis, we introduce two novel cyber agility techniques based on two paradigms of cyber deterrence and cyber deception. Cyber deterrence techniques aim to deter cyber threats by changing system configurations randomly and frequently. In contrast, cyber deception techniques aim to deflect attacks to fake targets by misrepresenting system configurations strategically and adaptively.

In the first part of this dissertation, we propose a multi-strategy, multi-parameter and multi-dimensional host identity mutation technique for deterring reconnaissance attacks. This deterrence is achieved by mutating IP addresses and anonymizing fingerprints of network hosts both proactively and adaptively. Through simulation and analytical investigation, we show that our approach significantly increases the attack cost for coordinated scanning worms, advanced network reconnaissance techniques, and multi-stage APT attacks.

In the second part, we propose a formal framework to construct active cyber deception plans that are goal-oriented and dynamic. Our framework introduces a deception logic that models consistencies and conflicts among various deception strategies (e.g., lies) and quantifies the benefit and cost of potential deception plans.

In the third part, we demonstrate and evaluate our deception planning framework by constructing an effective deception plan against multi-stage attacks. Through our experimentation, we show that the generated deception plans are effective and economical, and outperform existing or random deception plans.

APA, Harvard, Vancouver, ISO, and other styles
24

Wesley, Kevin R. "Triangular deterrence : a formidable rogue state strategy." Thesis, Monterey, California ; Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13486.

Full text
Abstract:
In an effort to counter the overwhelming U.S. predominance in conventional forces, rogue states such as Iraq and North Korea have adopted a strategy based upon the use of weapons of mass destruction (WMD); that is, nuclear, chemical, or biological arms. Moreover, rogue states have refocused their efforts to deter U.S. action from direct confrontation with the United States to threatening U.S. allies or neutral parties in potential contingencies. This strategy might enable a rogue state to avoid direct engagement with the United States as well as to make the most effective use of a small WMD program. Robert Harkavy has labeled this concept triangular or indirect deterrence. This thesis analyzes triangular deterrence as a credible strategy that might be implemented by rogue states throughout the world. The thesis examines historical case studies as well as plausible hypothetical future scenarios, and bases its analysis on a broad body of deterrence theory. It concludes that triangular deterrence presents new challenges for U.S. defense policy and that partial solutions may reside in missile defenses and adjustments in declaratory policy.
APA, Harvard, Vancouver, ISO, and other styles
25

Kiskis, Rolandas. "Deterrence and reassurance in Lithuanian-Russian relations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FKiskis.pdf.

Full text
Abstract:
Thesis (M.S. in National Security Affairs)--Naval Postgraduate School, June 2004.
Thesis advisor(s): David S. Yost, Anne Clunan. Includes bibliographical references (p. 71-74). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
26

Lee, Quan Eugene. "Effective Cost Allocation for Deterrence of Terrorists." Scholarship @ Claremont, 2007. https://scholarship.claremont.edu/hmc_theses/201.

Full text
Abstract:
The attacks on the World Trade Center in New York, the subway and bus bombings in London, and the suicide bombings in Casablanca are only a few of the examples in which in recent years, terrorists have opted to attack multiple targets at once. Often, their strong determination to attack makes it impossible to completely deter terrorists from attacking altogether, and instead, counterterrorist units must consider how to defend targets effectively to minimize damages. We attempt to model a version of this scenario by presenting a two target sequential game where two players try to attack and defend the targets respectively. The probability of successfully destroying a target is a function of resource allocations from both players, who are also subject to budget constraints. We attempt to find the defender’s strategy that will minimize expected damages by first exploring the attacker’s optimal strategy. We show that the attacker’s decision to attack only one or both targets is dependent on the size of the attacker’s allowed budget relative to other game parameters, and use that information to evaluate the defender’s strategy. We also numerically determine the optimal defender security investment, as well its sensitivity to other game parameters. We conjecture that as the damage and expected reward at a target increases, the defender’s allocation towards that target tends to increase, while an increase in the punishment results in the opposite effect. Such conjectures allow for the creation of a flexible defense policy in the more applicable bigger picture.
APA, Harvard, Vancouver, ISO, and other styles
27

Pjetraj, Walter M. "Conflict containment in the Balkans : testing extended deterrence /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA297658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Palmer, Jess D. Stebbins Mark L. Zacherl Andrew M. "The gunfighter's dilemma : multiple adversary deterrence and coercion /." Monterey, Calif. : Naval Postgraduate School, 2000. http://handle.dtic.mil/100.2/ADA387319.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Cook, Amanda Paige. "CAPITAL AND PUNISHMENT: SUPPORTING THE DEATH OF DETERRENCE." MSSTATE, 2007. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04262007-171049/.

Full text
Abstract:
Previous research has examined certainty and severity of punishment as serving a deterrent function. This research examines the effects of economic, cultural, and social capital, as well as the effects of certainty, severity, and prior punishment on likelihood of re-offending. Data collected at the Central Mississippi Correctional Facility suggest that traditional deterrence indicators are insufficient for predicting likelihood of re-offending. This research finds that prior punishment increases likelihood of re-offending, a finding completely counter to that of traditional deterrence. Re-offending may be best understood by considering the effects of punishment on increasing prison capital and decreasing real world capital. The argument is that inmates consider their potential in the real world as compared to that in a prison when reporting likelihood of re-offending. Such considerations should better explain likelihood of re-offending as compared to traditional deterrence indicators, such as certainty, severity, and prior punishment.
APA, Harvard, Vancouver, ISO, and other styles
30

Wieninger, William A. "Nuclear deterrence : neither necessary nor sufficient for peace." Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85030.

Full text
Abstract:
This thesis carefully examines the question of the effect of nuclear weapons possession on international relations through a detailed examination of all international crises between nuclear powers, as identified by the International Crisis Behavior Project (ICB). It distinguishes itself from similar studies in four key areas. First, by including the recent dyadic nuclear crises between India and Pakistan, this study significantly expands the number of cases under consideration. Next, the India-Pakistan crises provide an opportunity for a novel comparison to the US-USSR crises of the Cold War.
Third, this work is unique among studies of nuclear deterrence in its combined use of qualitative and quantitative methodology. The quantitative analysis uses ordered logit with the ICB data set on a variety of variables, discussed below, that do not lend themselves to standard regression techniques. The qualitative analysis examines whether or not nuclear weapons caused decision-makers on both sides of each crises to refrain from escalation due to fear of nuclear catastrophe. Finally, this study compares the effect of mutual nuclear weapons capability with the effects of democracy and interdependence on the level of violence in crises.
Ultimately, this thesis finds that nuclear proliferation is far less successful at preventing war among states in dyadic nuclear crises than is commonly believed. In only one of 17 crises (the Cuban Missile Crisis) is it clear that mutual possession of nuclear weapons caused leaders on both sides to eschew war. Relative to nuclear weapons possession, democracy and trade were found to be significantly more effective at limiting violence in crises and preventing war. Moreover, regimes suffering a lack of legitimacy in either the international community or among their neighbors had a significantly higher level of violence in crises.
Taken together, these findings have significant implications for public policy regarding nuclear proliferation, suggesting that the international community should work even more diligently to prevent nuclear proliferation, while working to strengthen democratic regimes, increase interstate trade, and reduce the international isolation of states such as North Korea and Iran.
APA, Harvard, Vancouver, ISO, and other styles
31

Dawson, Ashley. "Addressing cyber warfare : bolstering deterrence through developing norms." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45001.

Full text
Abstract:
This paper is interested in two things: one, exploring the ways in which states can deploy cyber-attacks that aim at disrupting, paralyzing and possibly destroying another state’s assets, with direct bearing on national security; and two, the potential strategies for limiting the scope and number of these attacks in the absence of viable deterrence. There is an ongoing debate about the nature and possibility of a ‘cyber war’ in the international system. By revisiting traditions conceptions of war, this paper argues a large-scale cyber war can be deterred using a strategy of deterrence by punishment, but deterrence fails to prevent ongoing limited-aims cyber attacks due to the issue of plausible deniability. Moreover, international legal frameworks fall short because states cannot credibly commit, even states could credible commitment the issue of adequately balancing humanitarian concerns and military necessity poses a challenge. As controlling behavior through traditional deterrence or purely rationalist legal frameworks fail with respect to limited-aims cyber attacks, this paper considers the possibility of changing states’ preferences as a means of addressing the problem. By allowing an agency/structure dichotomy to enter into the analysis, this paper explores the potential for norms in bolstering cyber deterrence. Although the development of new norms of behaviour is still in its early stages, there is evidence of states asserting their role in the process, acting as norms entrepreneurs in an attempt to shape state preferences in cyberspace.
APA, Harvard, Vancouver, ISO, and other styles
32

Palmer, Jess D., Mark L. Stebbins, and Andrew M. Zacherl. "The gunfighter's dilemma: multiple adversary deterrence and coercion." Thesis, Monterey, California. Naval Postgraduate School, 2000, 2000. http://hdl.handle.net/10945/9213.

Full text
Abstract:
Throughout history great powers have had to wrestle with the problem of maintaining their influence over the world around them. Often these powers were simultaneously faced with more than one opponent. In order to meet multiple challenges, leading nations have had to maximize the number of potential adversaries they could influence with each action or policy. Those faced with this dilemma have included the Romans, Byzantines, and the British Empire. Studying these nations in their struggle to maintain control revealed tactics and techniques that proved effective. Forward deployment, statements of perseverance, the use of coalitions, strategic distraction of opponents, and the demonstration of their relative superiority over adversaries all helped to preserve the longevity of these empires. Additionally, an effective information campaign, which amplified successes, proved invaluable to these world powers. This thesis explores how a single action often affects more than just the two parties taking and receiving action. It then discusses the flow of how the information content of foreign policy actions transfers from the primary actor to multiple secondary actors. We then use historical cases of multi-adversary deterrence and coercion as models of how our hypotheses, coupled with a good information strategy, maximized the studied powers' effectiveness.
APA, Harvard, Vancouver, ISO, and other styles
33

Ward, Christopher. "Applying deterrence strategy to agents of asymmetrical threats." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44028.

Full text
Abstract:
Approved for public release; distribution is unlimited
CHDS State/Local
Deterrence was quickly dismissed as a possible counterterrorism (CT) strategy after 9/11. With temporal distance from the impact, however, the concept has been given a fresh, in-depth look. The encouraging results brought the policy back to national security strategy, but today deterrence of asymmetrical threats remains largely intractable. Use of deterrence strategy, beyond the common notion of Cold War deterrence, holds promise for sustainable U.S. CT policy. The implications for U.S. foreign policy of such strategic enactments are likely more satisfactory than those employed in the first decade of the war on terror. This thesis seeks to explore the possibility of tailored deterrence toward the threat from radical Islamic terrorists, by gauging what is known about the strategy against what is known of the adversary, and determining the most effective path forward.
APA, Harvard, Vancouver, ISO, and other styles
34

Corbett, Andrew Scott. "The British Government, the public, and nuclear deterrence." Thesis, King's College London (University of London), 2017. https://kclpure.kcl.ac.uk/portal/en/theses/the-british-government-the-public-and-nuclear-deterrence(165940d4-2781-4df2-acf9-eac2e939495c).html.

Full text
Abstract:
This thesis offers a novel insight into the relationship between British government engagement with the public on nuclear deterrence policy, and the factors which influence that policy development. It considers the evolution of a complex, and largely unacknowledged aversion to the implications of total war, in particular the notion of inflicting non-combatant casualties as a deliberate, if not intentional, aspect of national strategy. This aversion was evident in the reluctance to engage in reprisals for bombing raids on London during the First World War, and the tensions it caused between operational strategy and public policy during the bombing campaign of the Second World War. The same aversion influenced early British understanding of nuclear deterrence, and public government engagement on nuclear deterrence policy tends to have been limited to technical detail such as performance or cost ever since. This is symptomatic of a reluctance to engage in complex moral debates in public, and modern media have exacerbated the problems by a tendency to reduce such issues to polarised arguments inhibiting genuine discussion while producing eye-catching studio drama. The public messaging implications of the challenging relationship between contemporary ‘rights-based’ ethical concepts and the more consequentialist ‘just war’ ethics that tend to dominate government policy have not been satisfactorily examined before. This thesis considers that relationship and its impact. It concludes that only government must face all aspects of moral choices: while antinuclear opposition can afford selective deontological absolutes, governments must have recourse to consequentialist moral concepts to provide for national defence, and this is difficult to portray in public, particularly through modern media. Government must engage in more than technical arguments if the strategic requirement for retention of the nuclear deterrent is to be perceived as legitimate and not rendered vulnerable to public misapprehension driven by vocal minorities.
APA, Harvard, Vancouver, ISO, and other styles
35

Aboutajdine, Reda. "Deterrence and learning effects in insurance fraud audits." Thesis, Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAX016.

Full text
Abstract:
La fraude à l'assurance est une menace majeure pour les marchés assurantiels dont le traitement passe par la conception de politiques d’audit crédibles et ciblées. Cette thèse étudie les mécanismes de dissuasion et d’apprentissage dans l’audit de la fraude l’assurance, notamment quand des prestataires (garagistes, opticiens, etc.) jouent le rôle d'intermédiaires entre l'assureur et les assurés. Le premier chapitre est une étude empirique des effets dissuasifs de l’audit, fruit d’une collaboration avec IBM France et PRO BTP, dans le cadre du déploiement de la solution anti-fraude Solon. Cette analyse montre que les audits subis par un opticien ont pour effet de réduire sa fraude future. Plus spécifiquement, l’effet dissuasif est d’autant plus fort que la menace d’audit est crédible, soulignant l’importance de l’engagement dans la lutte contre la fraude. Les deuxième et troisième chapitres étudient un problème d’audit dynamique où l'information joue un rôle central. L’auditeur y interagit de façon répétée avec des prestataires non-stratèges et peut apprendre à propos de leur propension à frauder sur la base des résultats de l'audit. Le deuxième chapitre utilise un modèle à deux périodes pour mettre en évidence cet effet d’apprentissage, dont la conséquence est qu’il est optimal d’auditer plus intensément au début de la relation. Le troisième chapitre étend ce modèle à un nombre arbitraire ou infini de périodes, et montre que l’audit optimal est d’autant plus intense qu’il reste un nombre important d’interactions futures. L’intuition réside dans le fait que davantage d'audit au présent, quoique coûteux, a des répercussions informationnelles positives sur toutes les périodes suivantes. Enfin, le quatrième chapitre réunit les mécanismes de dissuasion et d’apprentissage dans un même modèle dynamique de réputation, avec des prestataires stratèges. Il montre l'existence d'une forme de dissuasion réputationnelle où l’apprentissage transforme la dissuasion en une menace intertemporelle. En d’autres termes, un prestataire sera davantage dissuadé dans le présent car il risque de détériorer sa réputation future s’il se fait attraper en train de frauder
Insurance fraud is a serious threat to insurance markets and is tackled through the design of credible and targeted auditing policies. This thesis studies the deterrence and learning mechanisms of insurance fraud audits, especially when service providers (car repairers, opticians, etc.) act as intermediaries between the insurer and the policyholders. The first chapter is an empirical assessment of the deterrence effects of auditing. It was conducted in collaboration with IBM France and PRO BTP, in the context of the deployment of the Solon counter-fraud solution. This assessment shows that incurred audits decrease an optician’s subsequent fraud. More specifically, the more credible the audit threat, the stronger this deterrence effect, emphasizing the importance of commitment in counter-fraud efforts. The second and third chapters examine a dynamic auditing problem where information plays a central role. The auditor interacts repeatedly with non-strategic service providers and can learn about their propensity to defraud from the auditing outcomes. The second chapter relies on a two-period model to show the existence of this learning effect, whose consequence is that it is optimal to audit more at the beginning of the relationship. The third chapter extends this model to an arbitrary or infinite number of periods, and shows that the further away the time horizon, the larger the optimal auditing efforts. Intuition stems from the fact that more auditing in the present, though costly, has a positive informational impact on all future periods. Finally, the fourth chapter combines the deterrence and learning mechanisms in the same dynamic reputation model, with strategic service providers. It reveals a reputation-based deterrence effect, where learning turns deterrence into an intertemporal threat. In other words, a service provider will be deterred more strongly in the present because of the risk of seeing his future reputation deteriorate if he gets caught defrauding
APA, Harvard, Vancouver, ISO, and other styles
36

Arbuckle, Larry J. "The deterrence of nuclear terrorism through an attribution capability." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483633.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, June 2008.
Thesis Advisor(s): O'Connell, Robert. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 45-47). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
37

Tan, Li Huang Joyce. "An analysis of internal controls and procurement fraud deterrence." Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39022.

Full text
Abstract:
Approved for public release; distribution is unlimited.
The rise in globalization, coupled with the use of technology to accelerate approval, and payable cycles, the increase of outsourcing of goods and services, and the pressure to cut costs, have resulted in government organizations being more exposed to the risk of fraud in their procurement process. Hence, appropriate internal controls and fraud prevention strategies are necessary for deterring, detecting, and managing procurement fraud. The purpose of this research was to develop a guideline to help government organizations design an effective system of internal controls to deter fraud in public procurement processes and practices. This was done through a review, analysis, and discussion of 20 case studies of actual fraud incidents. In each case study, internal control weaknesses were identified and analyzed in terms of the fundamental principles that are associated with the five internal control components. The analysis revealed that the majority of the organizations in the case studies lacked three internal control components, namely control environment, control activities, and monitoring activities. Recommendations for improvements for each case study were presented by applying relevant internal controls into its procurement process to deter procurement fraud. The areas for further research were also provided.
APA, Harvard, Vancouver, ISO, and other styles
38

Shames, Shauna Lani. "The Rational Non-Candidate: A Theory of Candidate Deterrence." Thesis, Harvard University, 2014. http://dissertations.umi.com/gsas.harvard:11438.

Full text
Abstract:
This research presents results of a multi-year, multi-site investigation into the political ambition of young eligible candidates, with a focus on ambition gaps in gender and race. Using an original survey and interviews with an untested population (law and policy school students at elite
Government
APA, Harvard, Vancouver, ISO, and other styles
39

Estoch, Christopher. "Nuclear deterrence : insecurity and the proliferation of nuclear weapons." Honors in the Major Thesis, University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1258.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf.edu/Systems/DigitalInitiatives/DigitalCollections/InternetDistributionConsentAgreementForm.pdf You may also contact the project coordinator, Kerri Bottorff, at kerri.bottorff@ucf.edu for more information.
Bachelors
Sciences
Political Science
APA, Harvard, Vancouver, ISO, and other styles
40

Gunning, Edward G. "Germany and the future of nuclear deterrence in Europe." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23687.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Gray, Jacqueline. "Psychological predictors of deterrence from travel due to terrorist action." Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411558.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Bonanno, Giacomo. "Topics in oligopoly : local equilibria, choice of product, entry deterrence." Thesis, London School of Economics and Political Science (University of London), 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.267267.

Full text
Abstract:
The first chapter is an introductory one. In chapter 2 I study the existence of oligopoly equilibria when firms have only a local knowledge of their demand curves. I introduce two notions of equilibrium: "local" and "first-orde'r" Nash equilibria. The first is a point where all firms are at a local maximum of their profit functions, the latter is.a point wh~re the first-order conditions for profit maximization are simultaneously satisfied for all firms (this is an equilibrium if each firm only knows the linear approximation to its own demand curve at that point). The main result is that a first-order equilibrium exists always, that is, with arbitrary demand functions. In chapter 3 I consider the problem of choice of product quality by two firms which enter the market simultaneously. I show that Hotelling's principle of minimum differentiation may hold or not, depending on the solution concept which is adopted for the post-entry game and on the structure of costs. In chapter 4 I re-examine the common claim that in the presence of threat of entry firms tend to produce more products than they would otherwise. I show that entry deterrence is always optimal, but it need not be achieved through p~oduct proliferation: in some cases the incumbent monopolist resorts to an entry-deterring strategy based on location choice rather than product proliferation. I also show that in some cases the number of products chosen by the incumbent facing the threat of entry is strictly greater than the minimum number required to deter entry. ,In chapter 5'1 show that advertising can be used as a barrier to entry even if there are no asymmetries in the effectiveness of advertising between existing ... f!irms ,and, new entrants .HI also show-that entry deterrence is achieved through "excessive" advertising.
APA, Harvard, Vancouver, ISO, and other styles
43

Valenzuela, Joseph John. "Non-nuclear deterrence in U.S. strategic policy incentives and limitations /." Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA256700.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Hassan, Eslam. "Reducing Road Offending Behaviour Using an Integrated Deterrence-based Model." Thesis, Griffith University, 2022. http://hdl.handle.net/10072/418639.

Full text
Abstract:
Road safety is a challenging problem for most countries including Australia. Reducing the road toll is a challenging goal and a shared responsibility that requires joint efforts between all levels of government, law enforcement agencies, individuals, and communities. There are many reasons for road crashes including environmental conditions, road conditions, and vehicle factors. However, the human factor plays a significant role. In Australia, the human factor includes drivers’ behaviours such as excessive speeding, drink driving, driving under the influence of drugs, reckless and deliberate risk-taking driving, distracted driving behaviours, driver fatigue, running red lights, and failure to wear seat belts. Deterring illegal driving behaviours is an important policy area for policing. The true rate of traffic offences is likely far greater than for other types of illegal activities; indeed, with respect to some types of offences, e.g., exceeding speed limits, an “everyone does it and few get caught” view likely pervades the public mind. What deters individuals from road offending behaviour is, therefore, an important question. Exploring the effectiveness of deterrence for drivers is therefore important and a key gap in the literature to be explored. In the road policing context, deterrence theory is the traditional framework used to develop enforcement initiatives and countermeasures (Bates et al., 2012; Fleiter et al., 2013). Previous research has considered the classical deterrence theory, Stafford and Warr’s (1993) reconceptualised deterrence model and informal deterrence individually (Allen et al., 2015; Freeman et al., 2020; Homel, 1988; Kaviani et al., 2020b; Piquero & Paternoster, 1998). This program of research had four main objectives to reduce road offending behaviours. The first objective was to develop an integrated deterrence-based model. Thus, this research took a nuanced approach by integrating three predominant deterrence models, namely classical deterrence model, Stafford and Warr’s (1993) reconceptualised deterrence model, which extends the original focus on direct experiences with punishment to direct experiences with punishment avoidance as well as indirect experiences with both punishment and punishment avoidance and the most recent extension, informal deterrence. The second objective was to use the integrated deterrence-based model to explore the self-reported driving offences among general drivers and traffic offenders, separately. The third objective was to explore other factors and theoretical constructs that influence road offending behaviour and how these factors influence deterrence mechanisms. The last objective was to test the integrated deterrence-based model on a specific driving offence, the illegal use of mobile phones while driving, to determine what influences this distracting behaviour. This program of research tested the integrated deterrence-based model with other theoretical constructs in three separate but interrelated studies. In the first study, the integrated deterrence model was tested with sensation seeking to examine the interconnections between deterrence principles and sensation seeking among a group of general drivers. The second study builds on the first study. In the second study, traffic offenders were identified from Study 1 and the integrated deterrence model and perceptions of risk were tested to predict repeat traffic offenders. The final study in this program of research was designed to provide insights into how traffic offenders perceive Queensland’s most recent deterrence-based intervention of mobile phone detection cameras to deter the illegal behaviour of mobile phone use while driving among a group of traffic offenders. The integrated deterrence-based model was a significant predictor of self-reported traffic offences. The results highlight the significant influence of punishment avoidance on self-reported road offending behaviours and mobile phone use. In all three studies, direct punishment avoidance had a negative deterrent effect on the offending behaviour among general drivers and traffic offenders. Informal deterrence was another key significant finding. The threat of social sanctions in the form of feelings of shame and embarrassment, losing family or friends' respect and the fear of material sanctions were predictive of reduced offending behaviour on the roads for general drivers and traffic offenders. Despite the importance of this finding, informal deterrence did not influence the specific offence of self-reported mobile phone use among traffic offenders. None of the classical deterrence variables influenced the self-reported offending behaviours on the road for general drivers and traffic offenders. Most importantly, these results show that traffic offenders are not influenced by their previous punishment experiences for traffic offences. However, only the construct of the severity of punishment influenced the specific offence of self-reported mobile phone use among traffic offenders. The results regarding other theoretical constructs were significant and equally important. For example, this research highlights the role of sensation seeking on traffic offending behaviours. Sensation seeking was measured using a general sensation seeking scale and a driving specific sensation seeking scale and both scales significantly predicted the self-reported offending behaviour among general drivers. In particular, the driving-related sensation seeking scale was more influential and accounted for a higher percentage of the variation in self-reported offending behaviour than the general sensation seeking scale. A significant mediation relationship was observed between sensation seeking and road offending behaviour through punishment avoidance. More importantly, direct punishment avoidance partially mediated this relationship which suggests that direct punishment avoidance has a high tendency to be present when sensation seeking is high, and the drivers’ desire to increase the intensity of their experiences may covary or fluctuate with experiences of direct punishment avoidance. Further, this research highlights the importance of exploring the role of perception of risk on levels of offending. There were significant negative correlations between perceptions of risks and self-reported offending behaviours among repeat and infrequent traffic offenders. Additionally, perceptions of risk mediated the relationship between direct punishment avoidance and levels of road offending that could result in reoffending. Similarly, perceptions of risk mediated the relationship between informal deterrence and levels of road offending. The results highlight that informal sanctions imposed previously on traffic offenders would allow them to see those offending behaviours as high risk and potentially deter them from re-offending. In addition, the perceived safety of using mobile phones while driving was another significant finding in this research. The results from this research highlight the importance of understanding the effects of perceptions of safety on the illegal use of mobile phones while driving. This program of research has a number of practical implications for road policing. Firstly, regarding limiting punishment avoidance events, drivers will continuously engage in risk-taking behaviours and traffic offences if they frequently avoid detection. Therefore, it is important for police operations to ensure that every detection is punished. Further, relying on automated enforcement measures to detect road offences is important in reducing the occurrence of punishment avoidance. Highly visible police operations and implementing warning and police presence signs are important measures to stimulate perceptions of the likelihood of apprehension. This will generate and sustain a general deterrent effect and reinforce the idea of safer driving behaviours. Secondly, this research highlights the importance of looking beyond punishment to identify other methods of increasing awareness and encouraging compliance. Road safety policies including advertising campaigns and educational programs that focus on behavioural change towards road offending could be effective in reducing road offending behaviour. Widely spread advertising campaigns can emphasise the risks associated with various road offending behaviours and explicitly inform drivers that engaging in such behaviours has negative consequences. Maybe this time you got away with it, but next time you will not. During police interactions, officers might take the initiative to simulate consciousness and thoughts around the risks associated with dangerous driving. For example, when a speeding driver is being pulled over, police officers might inform drivers about the severe risks and recent statistics of road crashes resulting from speeding. Police officers might also emphasise that it will not be safe every time. In addition, it is a great opportunity for police officers to inform drivers that it is morally wrong and unacceptable to engage in risky driving behaviours and simulate consciousness and thoughts around morality and norms. Overall, this program of research has shown the importance of using an integrated deterrence model in road policing. Given classical deterrence variables did not predict road offending behaviours, it is important to include Stafford and Warr’s reconceptualised deterrence model as well as informal deterrence mechanisms to better understand the offending behaviours on the roads. In addition, the inclusion of sensation seeking, perceptions of risk and safety perceptions showed significant improvements to the integrated deterrence-based model and had important practical and theoretical implications.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Crim & Crim Justice
Arts, Education and Law
Full Text
APA, Harvard, Vancouver, ISO, and other styles
45

Maume, Michael Owen. "Drug Use and Deterrence: A Test of Silberman's General Theory." W&M ScholarWorks, 1994. https://scholarworks.wm.edu/etd/1539625938.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Rasouli, Alireza. "Calibrating the Distance-Deterrence Function for the Perth Metropolitan Area." Thesis, Curtin University, 2018. http://hdl.handle.net/20.500.11937/59663.

Full text
Abstract:
The Perth metropolitan area and its surrounding regions have been expanding rapidly. With this rapid growth, consideration should be given to strategic modelling. Development of reliable model depends significantly on the calibrated parameters to reflect the existing situation. Deterrence functions play an important role for distribution of the trips and would simulate the trip distances. Therefore they should be calibrated for any particular models. This study aims to review the most common deterrence functions and calibrate them for the work trips.
APA, Harvard, Vancouver, ISO, and other styles
47

Navias, Martin Stephen. "The Sandys White Paper of 1957 and the move to the British new look : an analysis of nuclear weapons, conventional forces and strategic planning 1955-57." Thesis, King's College London (University of London), 1989. https://kclpure.kcl.ac.uk/portal/en/theses/the-sandys-white-paper-of-1957-and-the-move-to-the-british-new-look--an-analysis-of-nuclear-weapons-conventional-forces-and-strategic-planning-195557(bd864f27-997b-427d-8f3c-9f75e7934bbd).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Grant, Rebecca. "Eisenhower and the evolution of strategic thinking 1953-58." Thesis, London School of Economics and Political Science (University of London), 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.273966.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Steele, Alaina Dawn. "A THEORETICAL INTEGRATION OF PROCEDURAL JUSTICE AND DETERRENCE: A TALE OF TWO THEORIES." OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1854.

Full text
Abstract:
This research study used negative binomial regression to examine the individual and interactive effects of deterrence and procedural justice on frequency of offending counts among serious juvenile offenders. To test the research question, this study utilized the Pathways to Desistance study to test the efficacy of the integration of deterrence theory and procedural justice theory. Deterrence theory is grounded in the classical school of criminology and its rational choice perspective. It argues that individuals will weigh the costs and benefits associated with a criminal act and choose to act in such a manner that will maximize benefits and minimize costs (Cullen & Jonson, 2012). A growing body of research suggests that fairness (i.e., procedural justice) process within the criminal justice process can be effective in the fight against crime, disorder, and recidivism. Procedural justice, sometimes referred to as procedural fairness, refers to perceived fairness within the criminal justice process, even when outcomes are not viewed as favorable (Gold & Bradley, 2013). It accomplishes this by fostering a “buy-in” to laws and directives that enhances cooperation and consent.Because laws are only as good as our ability to enforce them, substituting procedural justice for deterrence would essentially remove the teeth from such laws. However, that does not preclude the development of a theoretical integration of the two. Specifically, such an integration might be more effective in reducing crime and disorder than each would be able to achieve on its own. To test the research question, this study integrated the theories of deterrence and procedural justice and examined whether the additive interaction of procedural justice and deterrence predicted decreased offending counts to a greater extent than what was obtained separately.Study results indicated that overall, deterrence, procedural justice, and their interaction all predicted decreases in offending. That said, overall findings suggested their interaction more consistently supported decreases in offending. That said, study findings also suggested that deterrence was driving the predictions of decreased frequency of offending counts with procedural justice playing a supportive role. Thus, the recommendation is that procedural justice should be integrated into the current deterrence framework. This can be accomplished through training criminal justice actors in the nuances of procedural justice that can be incorporated into their interactions with citizens to foster immediate acceptance and long-term compliance.
APA, Harvard, Vancouver, ISO, and other styles
50

Tuchman, Paula Schrier. "Weak but not meek an international society explanation of asymmetric deterrence /." access full-text, 1995. http://libweb.cityu.edu.hk/cgi-bin/ezdb/umi-r.pl?9601994.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography