To see the other types of publications on this topic, follow the link: National security.

Dissertations / Theses on the topic 'National security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'National security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Cramer, Jane Kellett 1964. "National security panics : overestimating threats to national security." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/8312.

Full text
Abstract:
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Political Science, 2002.
Includes bibliographical references (p. 415-427).
Three times in this century the US public has panicked with fear because of exaggerations of external threats to the nation. These panics peaked in 1950,1960, and 1980. Why did the U.S. markedly exaggerate the Soviet threat at these times? These periods of widespread public fear were "defining moments" when the US created confrontational and militarized containment policies. These panics ratcheted up the arms race tremendously between the US and the Soviet Union, and arguably these panics led to unnecessary confrontations and crises. In this study I test leading explanations of these cases--eight hypotheses drawn from three different perspectives. The Rational Perspective argues insufficient information and uncertainty about present and future capabilities and intentions causes overestimations. The Psychological Perspective argues cognitive errors could cause these overestimations (attribution theory and schema theory/analogical reasoning, tested here). The Domestic Politics Perspective argues oversell, logrolling, electoral politics and/or militarism causes public overestimations. Domestic Politics best explains the national misperceptions examined. In each case, the sources of the specific misperceptions examined were clearly rooted in domestic politics (1950: oversell and militarism; 1960 and 1980: electoral politics and militarism.) Uncertainty about the threat was found to be a significant contributing factor in 1950 (but not the source/elites did not unintentionally overestimate when the misperceptions first formed).
(cont.) Uncertainty was found to be a significant "permissive condition" for the misperceptions of 1960-but uncertainty was highest just after Sputnik in 1957, and sharply decreased by 1960, yet public fear increased and peaked in 1960. There was no significant uncertainty in the 1980 panic--uncertainty is not a necessary condition for panic. Psychological hypotheses were not detected playing a role in causing these panics. Leaders private deliberations were examined and did not exhibit the patterns of reasoning predicted by these theories (e.g. leaders were aware of provoking the threat). National misperceptions guide policy and shape many leaders' beliefs through "blowback" and psychological post hoc rationaliztion. These large, important misperceptions are rooted in domestic politics, while international relations scholars focus on psychological and rational reasons for misperceptions. The study of misperceptions in international relations needs to be re-oriented.
by Jane Kellett Cramer.
Ph.D.
APA, Harvard, Vancouver, ISO, and other styles
2

Al-Saud, Naef bin Ahmed. "Saudi national security policy." Thesis, University of Cambridge, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.613642.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Крапивний, Іван Васильович, Иван Васильевич Крапивный, Ivan Vasylovych Krapyvnyi, Віталій Анатолійович Омельяненко, Виталий Анатольевич Омельяненко, Vitalii Anatoliiovych Omelianenko, and V. O. Varakin. "Information security economic systems in national security country." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/43592.

Full text
Abstract:
In today's world, information security becomes vital for ensuring the interests of man, society and the state and the most important, part of the whole system of national security. Doctrine considers all the work in the field of information based on the Concept of National Security of Ukraine. The doctrine identifies four main components of Ukraine's national interests in the information sphere.
APA, Harvard, Vancouver, ISO, and other styles
4

Farr, Matthew A. "Homeland Security lessons for the United States /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FFarr.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Quaglia, Laura de Castro. "National security institutional change : the case of the US National Security Council (2001-2015)." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/174501.

Full text
Abstract:
O presente trabalho tem por objetivo analisar as mudanças institucionais ocorridas no Conselho de Segurança Nacional dos Estados Unidos entre 2001 e 2016. Ele se enquadra nas Resoluções nº 114/2014 e 115/2014 da Câmara de Pós-Graduação da Universidade Federal do Rio Grande do Sul e, portanto, é dividido em três partes. A PARTE I é composta por uma contextualização do objeto, contendo uma descrição geral do objetivo do trabalho, bem como a delimitação do objeto, marco teórico, e marco temporal. A PARTE II é comporta pelo artigo em si, que analisa as mudanças no sistema do Conselho de Segurança Nacional dos Estados Unidos através das administrações dos presidentes George W. Bush (2001-2008) e Barack Obama (2008-2016). O objetivo é demonstrar que mudanças em agencias de segurança nacional podem ser pontuais ou incrementais, dependendo das suas causas e consequências. Para tal, foram utilizadas técnicas de analise qualitativa e teoria do equilíbrio pontuado no exame de documentos oficiais e registros públicos. Primeiro, uma matriz institucional formada por normas, organizações, regras, capacidades e incentivos foi usada para comparar as mudanças no Conselho de Segurança Nacional para comparar as mudanças nas duas presidências. Em seguida, possíveis causas de mudanças selecionadas foram identificadas – design original da agencia, interesses dos atores burocráticos, ou eventos externos –, e finalmente, determinamos as consequências que essas mudanças podem ter para instituições ou politicas. A PARTE III apresenta a descrição da agenda de pesquisa a ser seguida.
This paper aims to analyze the institutional changes that took place in the National Security Council of the United States between 2001 and 2016. It is in accordance with Resolutions 114/2014 and 115/2014 of the Universidade Federal do Rio Grande do Sul, and therefore is divided into three parts. PART I is composed of a contextualization of the object, containing a general description of the objective of the work, as well as the delimitation of the object, theoretical framework, and time frame. PART II is composed by the article itself, which analyzes the changes in the system of the United States National Security Council through the administrations of Presidents George W. Bush (2001-2008) and Barack Obama (2008-2016). The objective is to demonstrate that changes in national security agencies can be punctual or incremental, depending on their causes and consequences. In order to do so we used techniques of qualitative analysis and theory of punctuated equilibrium in the examination of official documents and public records. First, an institutional matrix consisting of norms, organizations, rules, capabilities, and incentives was used to compare changes in the National Security Council to compare changes in the two presidencies. Then, possible causes for selected changes have been identified - original agency design, bureaucratic actors’ interests, or external events - and finally we determine the consequences that such changes can have for institutions or policies. PART III presents the description of the research agenda to be followed.
APA, Harvard, Vancouver, ISO, and other styles
6

Gruici, Simona. "International Security : Crossing Borders: International Migration and National Security." Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15242.

Full text
Abstract:
One of the most dynamic events of our time is the large extent of population movements within and across national boundaries. The causes of this movement of people include economic hardship due to various natural calamities such as earthquakes, droughts, famine and floods, as well as economic hardship due to lack of income. Political instabilities represent a central factor that is forcing the population movements at both national and international level. In most of the cases, reality is beeing perceived as follows: if international security is enhanced, so is national security. However, the phenomenon of migration is perceived as being a greater challenge in the field of security towards failure states, rather than it might affect any welfare postindustrial states. Nowadays we are facing a more globalized security environment, fact that is actually providing other states with the possibility to create a better security for their own nations. In order to gain this security immunity, the states should be able to enforce and protect the migration policies within international security. The relationship between migration and security became increasingly complex in the new millennium. As it follows, the focus of this theme is the correlation between migration´s consequences, both positive and negative, towards national security of host states. Furthermore, the topic of this paper is extending over ´what terrorism implies´. In order to reach a clear understanding, it has been analyzed the phenomenon of globalization and its forthcoming implications within both terrorism and migration. As a result of this transformation, terrorism has the power now to threat much more countries in the global area. Nevertheless, the purpose of this thesis is to examine which factors have an impact on international security, within a continental similarity. The central focus reflects over the Euro-Mediterranean area and to certain extends over the United States. The considered factors are: migration, loss/gain of governmental control, the political reaction after the attack of 9/11, spread of democracy (e.g. globalization), and creating citizenship.
APA, Harvard, Vancouver, ISO, and other styles
7

Estenberg, Gabriel. "The National Security Perspective Revisited. States’ Energy Security and the Environmental Security." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22800.

Full text
Abstract:
The purpose of this thesis is to counterargue Simon Dalby’s claim that the national security perspective should be replaced by a global security perspective. Dalby argues that the national security is inappropriate to capture the current issues regarding the environmental security. To counterargue Dalby’s claim, I represent the national security perspective by using the perspective of states’ energy security, and compare current trends and issues regarding states’ energy security and the environmental security. This is done to argue that states can either chose to enhance their own energy security or the environmental security. Prisoners' Dilemma is then used as a theoretical framework on an explanatory example to provide insights about a dilemma, called the Energy- Environment Dilemma in this thesis, that curbs states’ ability to commit themselves to the cause of protecting the environmental security. The explanatory example used is the strategic importance of the Northwest passage for the U.S. and Canada. The results of this thesis suggests that the national security perspective, in combination with Prisoners’ Dilemma, is useful to provide insights about the Energy-Environmental Dilemma. Replacing it with a global security perspective would be to ignore a perspective which can provide insights about a challenge for states to commit to the cause of protecting the environmental security.
APA, Harvard, Vancouver, ISO, and other styles
8

Tritten, James John. "Reconstituting national defense the new U.S. national security strategy." Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/24457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Couture, Christian. "Les nouveaux habits de la sécurité, le cas de l'Arctique dans la politique étrangère du Canada, 1987-1996." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ48917.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Hristov, Roman. "Bulgarian national security and special operations." Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FHristov.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2006.
Thesis Advisor(s): Peter Gustaitis, Kalev Sepp. "December 2006." Includes bibliographical references (p.77-80). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
11

Dukat, Robert Joseph. "Japanese technology and U.S. national security." Thesis, Monterey, California: Naval Postgraduate School, 1990. http://hdl.handle.net/10945/27575.

Full text
Abstract:
Approved for public release; distribution unlimited.
The United States relationship with Japan has evolved considerably since World War II. Japan, once defeated and occupied by the United States, now assails U.S. global economic and technological leadership. This thesis examines the effect Japanese technology has upon U.S. national security. Japanese technology has become a critical element of many U.S. defense weapons systems. A supply disruption could harm military readiness. Moreover, a decline in U.S. technological innovation, production, and sales, could severely harm U.S. global commitments and foreign policy. This rivalry is placing strains upon U.S.- Japanese relations. Debate has arisen in the United States about how these perceived problems should be handled. Some advocate letting the free market solve the problem while others propose managed trade solutions. The United States also needs to reevaluate its entire policy with Japan and the Asia- Pacific region, in light of a changing world environment and increasing U.S. financial difficulties.
APA, Harvard, Vancouver, ISO, and other styles
12

Dukat, Robert J. "Japanese technology and U.S. national security." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA246575.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 1990.
Thesis Advisor(s): Olsen, Edward. Second Reader: Looney, Robert. "December 1990." Description based on title screen as viewed on March 30, 2010. DTIC Identifier(s): International Trade, Western Security (International), United States, Critical Technology, Asia-Pacific Region, Theses. Author(s) subject terms: Japanese Technologly, U.S. National Security, U.S.-Japan Relations, U.S. Foreign Policy, U.S. Economic Policy, U.S. Technological Policy, Japanese Economic Policy, Japanese Foreign Policy, Japanese Governmental Policy, U.S.-Japan Trade, U.S. Trade Problems, U.S. Defense Policy, U.S. Industrial Policy. Includes bibliographical references (p. 143-156). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
13

McGriff, Mary-Ann. "Germany as a normal country : national identity and national security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA297927.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Viklund, Åsa. "National Security, Gendered Insecurity : Feminist Perspectives on Militarism, Masculinities & Security." Thesis, Teologiska högskolan Stockholm, Avdelningen för mänskliga rättigheter, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:ths:diva-219.

Full text
Abstract:
I denna uppsats granskas militariserad säkerhet i relation till kvinnors osäkerhet. Uppsatsen genomsyras av ett genusperspektiv och berör skadliga sociala normer såsom våldsuttryck knutna till maskulinitetsideal, nationens betydelse, maskuliniseringen av den säkerhetspolitiska arenan och hur den Amerikanska armén använde sig av feminisering som förhörsmetod i det skandalomsusade Irakiska fängelset Abu Ghraib. Uppsatsen finner att militariserad säkerhet utgör ett hot mot kvinnors säkerhet i och med den könsmaktsordning som upprätthålls och förstärks i samband med konflikt och militär närvaro och som resulterar i specifikt våld riktat mot kvinnor och feminiserade grupper.
APA, Harvard, Vancouver, ISO, and other styles
15

Griffiths, Jordan Luke. "Cyber security as an emerging challenge to South African national security." Diss., University of Pretoria, 2017. http://hdl.handle.net/2263/62639.

Full text
Abstract:
As South Africa is a rapidly developing country and has become more increasingly technologically advanced through the growth in information communications technology (ICT) and the expansion of modern state infrastructure. With this growth more of the country's citizens have also become connected as access to the internet has spread. However, this advancement has also introduced a new challenge to South African national security in the form of cyber security. The spread of technology has created new vulnerabilities within the cyber domain that may directly work to undermine the country's security. Computer hackers are developing advanced software and methods designed to infiltrate and disable critical state infrastructure, capture confidential state or corporate information, engage in identity theft and fraud, rob banks and financial institutions and even undermine democratic processes such as elections. Terrorists have also embraced cyber space as a domain where they can recruit followers, spread propaganda, and provide advice and encouragement to those who wish to conduct terrorist operations. States are now not only creating cyber teams that can counter these terrorists but they are also developing cyber weapons which can be deployed to disrupt the operations of other countries should the need arise. This study analyses the challenge that cyber security poses to South African national security. This research contextualises the concept of cyber security within the theoretical understanding of national security. In highlighting the destructive capabilities of cyber attacks, the study provides detail on four examples, namely the 2007 attacks against Estonia, the impact of the Stuxnet worm on Iranian centrifuges in 2010, Chinese hackers targeting the USA and the hack on the Democratic National Committee. This then provides a foundation through which South Africa's cyber security position can be evaluated. The study also analyses several public cyber attacks that have targeted South Africa and presents a number of research reports which identify the country as one of the most targeted nations in the world. Although South Africa has acknowledged the role of ICT in its development, the country has failed to engage on the importance of cyber security. This study examines the country's policy progress with regards to cyber security which has ultimately lead to the Cyber Security and Cyber Crimes bill which was released for public comment in December 2015. However, the country's cyber position is weakened by its lack of cyber skills and capacity, as such the research also provides some recommendations on how South Africa can strengthen its overall approach to cyber security.
Mini Dissertation (MSS)--University of Pretoria, 2017.
Political Sciences
MSS
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
16

Snead, David L. "United States national security policy under presidents Truman and Eisenhower : the evolving role of the National Security Council /." Thesis, This resource online, 1991. http://scholar.lib.vt.edu/theses/available/etd-03022010-020152/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Reed, Donald J. "An Examination of Tribal Nation Integration in Homeland Security National Preparedness." ScholarWorks, 2015. https://scholarworks.waldenu.edu/dissertations/598.

Full text
Abstract:
Research has established that national homeland security policy requires a whole community or all-of-nation approach to national security preparedness. What is less clear is whether all stakeholders are integrated into or benefit from this collective effort. This narrative policy analysis examined the relationship between a federally-recognized group of Native American tribal nations and homeland security national preparedness to explore whether tribal nations are effectively integrated with the collective effort for national preparedness. The theoretical framework stemmed from a convergence of social contract theory and conflict theory. Interviews (n = 21) were conducted with preparedness authorities from government agencies, and from tribal nations and nongovernmental organizations that advocate on behalf of tribal nations. Data were analyzed using Roe's narrative policy analysis technique. Results revealed areas of convergence of the government and tribal narratives on the historical disenfranchisement of tribal nations; findings also showed areas of divergence on how to better integrate tribal nations in homeland security national preparedness. The study concludes with a number of recommendations highlighting the manner in which national interests and tribal nation preparedness interests are intertwined. This study suggests that the nation's homeland security may be better served by greater inclusion of tribal nations in national preparedness efforts. The results of this study contribute to positive social change by giving voice to a heretofore disenfranchised social group, Native Americans, and by allowing them to strengthen the metanarrative of homeland security national preparedness.
APA, Harvard, Vancouver, ISO, and other styles
18

Funes, Ponce Rayne E. "Honduras' national security strategy to combat terrorism." Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FFunes%5FPonce.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2006.
Thesis Advisor(s): Douglas Borer. "December 2006." Includes bibliographical references (p. 85-88). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
19

Dashtseren, Dashdavaa. "Border protection and national security of Mongolia." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://handle.dtic.mil/100.2/ADA456961.

Full text
Abstract:
Thesis (M.A. in Security Studies (Defense Decision Making and Planning))--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Thomas C. Bruneau. "September 2006." Includes bibliographical references (p. 85-89). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
20

Kraverath, Scott C. "Reconciling environmental degradation and US national security." Thesis, Monterey, California. Naval Postgraduate School, 1994. http://hdl.handle.net/10945/28493.

Full text
Abstract:
Approved for public release; distribution is unlimited.
Although environmental concerns are nothing new, only recently have environmental issues been considered as having national security implications. Along with increased environmental awareness, the end of the Cold War has allowed security planners the latitude to reconcile and integrate nonmilitary concerns, including the environment, into what has traditionally been exclusively military oriented policy. This transition or broadening of national security policy to include these issues is proving slow and controversial. The nature of environmental issues is such that their inclusion into a national security framework is not an easy one. Because of the current and potential national security threats embodied in environmental degradation, a coherent environmental security policy needs to be formulated. Because of the scope, complexity, and unknown nature of environmental issues this has not yet been accomplished. By defining issues, setting criteria and examining individual cases of environmental degradation in the Western Hemisphere and case studies from Brazil and Mexico, this thesis attempts to facilitate the recognition of environmental degradation as a U.S. national security issue. The thesis seeks to provide a greater depth of understanding of environmental security issues and suggest methods by which solutions for environmental problems may be found
APA, Harvard, Vancouver, ISO, and other styles
21

Inuwa, Muhammat Nura. "Oil politics and national security in Nigeria." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5049.

Full text
Abstract:
Approved for public release; distribution is unlimited
In the last two decades, the federal government of Nigeria has employed several strategies in an effort to resolve the ongoing crisis in its Niger Delta Region. Two main approaches were adopted concurrently by both military and civilian regimes within the period of study, diplomatic and non-diplomatic. Unfortunately, both strategies failed to resolve the crisis. This thesis explains why the strategies failed, arguing that combination of an overly high military with low civil counterinsurgency strategies during the military regimes of 1990-1999 allowed an excessively repressive approach that did not only fail to end the crisis but eventually fuelled it to transform agitation into insurgency. In addition, the civilian regimes of 1999-2009, which engaged low military and relatively high civil counterinsurgency strategies, have also not been able to resolve the crisis. The study hence suggests a moderate approach comprising of both strategies; a professional military approach with moderate civil counterinsurgency strategies, and adopting measures that would assist the government to isolate its counterinsurgency strategies from political groups' interference, and resist responding to all pressures and complaints likely to sabotage its strategies.
APA, Harvard, Vancouver, ISO, and other styles
22

Fugate, Ashleigh A. "Narcocultura: a threat to Mexican national security?" Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27832.

Full text
Abstract:
This project analyzes the collective identity and narratives surrounding the culture of the drug trafficking organizations (DTOs), or narcocultura, in Mexico. It questions whether the visible cultural artifacts of the DTOs reflect a cultural identity or if they create an identity that threatens Mexican national security. The analysis establishes that narcocultura is a relevant framework to study Mexican transnational organized crime (TOC). The thesis utilizes both cultural and security studies to illuminate the development of narcocultura in Mexico. The author assesses the transmission of narcocultura through social media sites such as Facebook, Twitter, and YouTube. In addition, the study looks at past and present methods that the Mexican government at the municipal, state, and federal level uses to prevent the spread of narcocultura. Ultimately, the aforesaid theories applied to narcocultura reveal essential vulnerabilities that the Mexican government can exploit against the DTOs.
APA, Harvard, Vancouver, ISO, and other styles
23

Betts, Jennifer Ann. "Ethics, national security, and critical infrastructure protection." Thesis, Queen's University Belfast, 2015. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.695222.

Full text
Abstract:
This is an inter-disciplinary thesis that uses social science methodology to examine the impact of ethics, privacy and trust in areas as apparently diverse as online advertising, national security surveillance measures, and the protection of critical infrastructures. The issues examined range from behavioural advertising to the public reaction to revelations of mass data surveillance by government security agencies. Academic research on privacy and the threat to users posed by vast amounts of personal information available online is summarised, along with challenges this poses for legislators. The use of smartphone application permissions to circumvent data protection regulation is examined, and it is proposed that evidence of a growing regard for user privacy and trust in online marketing may exert peer pressure on advertising networks to respect user privacy where regulators have failed. The revelations of Edward Snowden in June 2013 afforded an opportunity to research public attitudes to mass data surveillance measures. Chapter 5 presents key research findings gained from an analysis of online comments from readers in response to media reports on the BBC and Guardian websites. These show a lack of trust in governments to safeguard the personal data they have gathered, and a growing gap in knowledge among technical experts and the general Internet user on privacy and security issues. Chapter 6 documents the development of a privacy tool as part of a project funded under the EU FP7 Programme for critical infrastructure protection. An online privacy impact assessment questionnaire raises awareness among critical infrastructure operators of privacy and security of confidential information. It provides a score measuring compliance with legislation and global standards that can be used regularly to improve and maintain privacy and security of information compliance.
APA, Harvard, Vancouver, ISO, and other styles
24

Funes, Ponce Raynel E. "Honduras' national security strategy to combat terrorism." Thesis, Monterey California. Naval Postgraduate School, 2006. http://hdl.handle.net/10945/2499.

Full text
Abstract:
After the September 11 attacks, Honduras committed to support the GWOT, but priorities in national objectives other than terrorism have kept the Honduran government from developing a strategy and the necessary counterterrorism infrastructure to combat this emerging threat. This research examines current threats in Latin America and Honduras in particular. It also suggests a developmental strategy to enhance the country[alpha]s capabilities to combat terrorism by the employment of instruments of national power in a multidimensional way capable to prevent, deter, and respond to terrorist acts. This study uses a brief analysis based on the concepts of suitability, feasibility, and acceptability in order to identify the risk that the proposed strategy could incur. The study concludes by proposing a series of recommendations that should minimize risk and make this strategy feasible for supporting the GWOT.
APA, Harvard, Vancouver, ISO, and other styles
25

Bruner, William W. "National Security Implications of Inexpensive Space Access." Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Allen, Keith W. "Future of the U.S.-Japan security alliance : foundation for a multilateral security regime in Asia? /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FAllen.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Edward A. Olsen, Gaye Christoffersen. Includes bibliographical references (p. 109-119). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
27

Friis, Ulla. "The European Security Architecture : the interaction between security institutions and national interest." Thesis, University of Kent, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.429791.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Huff, Ariella Rachel. "Parliamentary discourses on the European security and defence policy in Britain, Ireland and Poland, 1998-2008." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610552.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Behunin, Scott A. "Homeland Security advisory system." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FBehunin.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Hunter, Sri Mulyati. "The "changing dimensions" of the Australia-Indonesia bilateral relationship from 1996 to October 2002 in the defence and security context /." Diss., Title page, contents and introduction only, 2002. http://web4.library.adelaide.edu.au/theses/09AR/09arh947.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Syvak, Oleksiy. "The role of the National Security and Defense Council of Ukraine in political decision-making process." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FSyvak.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Donald Abenheim, Mikhail Tsypkin. Includes bibliographical references (p. 65-68). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
32

Hussain, Khawar. "Pakistan's Afghanistan policy." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHussain.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Oswald, Mace J. "Ukraine's relations with Russia competition or cooperation?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://bosun.nps.edu/uhtbin/hyperion.exe/02Dec%5FOswald.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, December 2002.
Thesis Advisor(s): Jeff Knopf, Mikhail Tsypkin. "December 2002." Includes bibliographical references (p. 117-120). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
34

Jipping, Ken. "Japanese Defense policy : legacies of the past, challenges for the future /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sep%5FJipping.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Van, Hook Matthew S. "Congress and national security interest, influence and speed /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FVan_Hook.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Defense Decision-Making and Planning))--Naval Postgraduate School, March 2010.
Thesis Advisor(s): Knopf, Jeffrey. Second Reader: Dahl, Erik. "March 2010." Description based on title screen as viewed on April 26, 2010. Author(s) subject terms: Congress, Intelligence, Defense, Reform, Reorganization, Goldwater- Nichols, Intelligence Reform and Terrorism Prevention Act of 2004. Includes bibliographical references (p. 89-99). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
36

Meir, Adiel. "Administrative detentions : balancing civil rights and national security." Thesis, University of British Columbia, 2007. http://hdl.handle.net/2429/31598.

Full text
Abstract:
In response to the threat of modern terrorism, democratic governments take steps which curtail civil rights, ostensibly to protect national security. Administrative detention is one of the more commonly taken steps. This paper traces the history of civil liberties and administrative detention in Britain, Canada, the United States, and Israel and examines why democracies deem the continued use of this tool necessary in dealing with perceived national security threats. The advantage of the perspective gained from historical distance, and ways in which democracies might learn from each other's experiences will be explored. The first chapter will examine eras in which administrative detentions have been used, reasons they were deemed necessary, whom they were used against, and the procedures employed in imposing them. This reflection provides insight into what constitutes a true crisis in the life of a democracy, and when it has been considered appropriate to take extraordinary steps to curtail civil liberties in order to protect a nation's democratic way of life. The second chapter will survey the legal tools used to combat terrorism by the United States following the attacks of September 11, 2001, as these pertain to detention of immigrants, and to the relevant provisions in the Patriot Act. The detention of non-citizens as well as American citizens detained and classified as enemy combatants, raises profoundly important issues central to the meaning of life under constitutional government. The third chapter will highlight Israel, a unique democracy which has grappled with terrorism from its very inception. The manner in which Israel has used administrative detentions provides valuable lessons regarding methods which work, and methods which should not be sanctioned. The fourth chapter will address the use of security certificates in Canada. Although Canada's recent Supreme Court ruling that security certificates are unconstitutional should be lauded, solutions to the issues raised in balancing individual rights to procedural fairness and fundamental justice, against public safety, remain largely unexplored. Practical methods used by other Western democracies in order to reach a "middle ground" which would afford the detainee an appropriate measure of due process, while preserving national security, will be discussed.
Law, Peter A. Allard School of
Graduate
APA, Harvard, Vancouver, ISO, and other styles
37

Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.

Full text
Abstract:
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, l examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. l argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations: 1) it is unlikely that Muslims are able to present a national security risk and 2) there are reasons to suspect that the national security policies of the Uzbek leadership target Islamic fundamentalism at least in part to legitimize the continued repression of most types of opposition.
L'existence d'une "menace islamique" à la sécurité nationale de l'Ouzbékistan est une idée répandue dans les médias et chez certains spécialistes. Le régime du Président ouzbek Islam Karimov a souligné cette menace à plusieurs reprises et a agi en conséquence. J'examine à la fois la capacité actuelle de différents groupes musulmans à défier les mécanismes de défense de l'état, ainsi que des éléments d'histoire récente de la stratégie de sécurité nationale ouzbèke liés à l'Islam. L'argument présenté est que la relation entre les musulmans et la sécurité nationale en Ouzbékistan est caractérisée par les deux observations suivantes: 1) il est peu probable que les musulmans soient capables de poser un risque à la sécurité nationale et 2) il existe des raisons de suspecter que les politiques de sécurité nationale du gouvernment s'attaquent à l'intégrisme musulman au moins en partie dans le but de légitimiser la répression continue de la majorité des forces d'opposition.
APA, Harvard, Vancouver, ISO, and other styles
38

Fugère, Charles. "Muslims, national security and the state in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98922.

Full text
Abstract:
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, I examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. I argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations: (1) it is unlikely that Muslims are able to present a national security risk and (2) there are reasons to suspect that the national security policies of the Uzbek leadership target Islamic fundamentalism at least in part to legitimize the continued repression of most types of opposition.
APA, Harvard, Vancouver, ISO, and other styles
39

Suvor, John. "Diversity Visa Lottery: Threats to U.S. National Security." ScholarWorks, 2015. http://scholarworks.waldenu.edu/dissertations/1302.

Full text
Abstract:
The diversity visa (DV) lottery was created as part of a larger immigration bill in 1990 in order to diversify an immigrant pool that has favored Asian and Hispanic immigrants since the passage of the Immigration and Nationality Act of 1965. Traditional research on the national security ramifications of immigration policy has focused on highly publicized issues, such as illegal immigration and asylum and amnesty programs, to the exclusion of the risks of fraud and terrorism inherent in the DV lottery. The purpose of this qualitative single case study was to explore the national security vulnerabilities of the DV lottery. Open-ended interviews were conducted with a snowball sample of 10 foreign service officers who adjudicate lottery visas for U.S. immigration from nations designated as state sponsors of terror. Guided by the framework of systems theory and the theory of constraints, content analysis was employed to reveal patterns and themes in the data. The findings were consonant with the framework, revealing the barriers and vulnerabilities of the DV lottery. Other findings showed both that the DV lottery has a negative impact on U.S. national security and fraud remains a serious concern, and yet there was no consensus on the scope and origin of potential terrorist threats. Recommendations include increasing collaboration and integration among agencies implementing the DV lottery, developing information-sharing agreements with other countries, and taking measures to eliminate fraud. The implications for social change include informing the public, immigration agencies, academics, and policy makers about the vulnerability of the DV lottery to fraud and misrepresentation; enhancing the debate about balancing immigration policies and national security; and possibly ending the DV lottery.
APA, Harvard, Vancouver, ISO, and other styles
40

Harris, Jr Andrew W. "Impacts of space system acquisition on national security." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27841.

Full text
Abstract:
This thesis examines a series of problems that the United States has encountered in its space systems acquisition process, and how these problems have impacted national security. This thesis has also examines several space system projects, and analyzes the various elements contributing to increased project cost and major project delays. Based on this assessment, it is concluded that although the space acquisition process has gone through a number of significant changes over the past 50 years, it is questionable that lessons learned from past acquisition experiences coupled with implemented space acquisition process changes has led to significant progress. Several recommendations are made to improve the acquisition process.
APA, Harvard, Vancouver, ISO, and other styles
41

Fellows, Terry A., and Jason L. Percy. "A whole of government approach for national security." Monterey, California: Naval Postgraduate School, 2009. http://hdl.handle.net/10945/10401.

Full text
Abstract:
Approved for public release, distribution unlimited
MBA Professional Report
The national security system the President uses today allows little flexibility and agility to protect this nation from ever changing national threats. The lack of a common national government culture that facilitates a shared vision is evident. Additionally, the lack of inter-agency coordination and cooperation forces departments to focus on their own objectives and goals. However, with today's challenges, the demand for inter-agency collaboration has grown, and it has been identified as a necessity to achieve an adequate level of national security for the nation. The national security structure needs to operate as a system rather than a collection of separate components. A whole of government approach to planning, and programming and budgeting national security is a concept that could establish a unified effort between inter-governmental agencies to maximize all available resources in a collaborative effort. "Addressing new security challenges is less about an objective of dominance and more about predicting, preventing, and managing disruptions, such as proliferation of weapons of mass destruction, terrorist acts, global contagions, and natural disasters. This has led to the call for a whole of government approach to national security" (Gockel, 2008, p. 6). This project investigates how this approach could be developed and implemented across the federal government.
APA, Harvard, Vancouver, ISO, and other styles
42

Chassee, Thomas J., and Michael M. Cobb. "Narcotics and national security : refining the military option." Thesis, Monterey, California: Naval Postgraduate School, 1990. http://hdl.handle.net/10945/27562.

Full text
Abstract:
Approved for public release; distribution unlimited.
A comprehensive study of the 'Drug War' with particular emphasis on the increased role of the U.S. Military. Application of military force should be based on an understanding of the political, social and economic impact of Andean narcotrafficking. This thesis addresses these issues, evaluates current anti- narcotic strategies, and defines the most prudent use of military resources. Initially, the thesis highlights the Latin American drug connection and its impact on political instability, guerrilla insurgencies, corruption and respective economies. Based on this foundation, the 'supply' and 'demand' strategies of the United States are presented and evaluated. Finally, the thesis proposes limited usage of U.S. air and naval assets in support of law enforcement agencies, while minimizing exposure of in-country U.S. ground forces.
APA, Harvard, Vancouver, ISO, and other styles
43

Al-Moalla, Sheikh Majid Abdulla. "Analysis of the United Arab Emirates' national security." Thesis, Durham University, 2017. http://etheses.dur.ac.uk/12282/.

Full text
Abstract:
This study addresses a gap in the literature on the United Arab Emirates’ (UAE) national security. It establishes a reference for further research into the analysis of national security of similar countries to the UAE based on established international relations theory. The UAE, since its establishment in 1971, has gone through exponential development and changes in terms of its politics, economics and social structures. However, attempts to develop a comprehensive approach to analysing the various aspects of maintaining the country’s existence are scarce. Any research focuses on narrow specific areas. This research analyses the UAE’s national security by using the most relevant analytical framework based on Buzan’s ‘Nature of the State’ hypothesis from the Copenhagen School of International Relations. The threats to the UAE’s impeding national security threats are addressed using the various elements in the hypothesis. These elements are the ‘idea of state’ which concentrates on the country’s state formation, the institutional framework of the UAE, and the structure of its physical base. Importantly, due to the dynamic interdependency of these elements, a threat to one can create a threat to the other elements. The researcher establishes a framework for the analysis of national security, which; because of the similarity of the political, economic and social base of the other Gulf Cooperation Council (GCC) countries (Bahrain, Kuwait, Oman, Qatar, and Saudi Arabia), can be used to analyse their national security systems. Furthermore, the researcher addresses the requirement for further exploration of the interdependencies between the three elements composing the state and the need for a coherent approach in addressing those threats. The study is structured in five parts. Chapter one highlights the research’s introductory material. Chapter two explores the theories of national security of the major schools of international relations theories, while chapter three theorizes the UAE’s national security according to the most relevant international relations theory (Buzan’s ‘Nature of the State’). Chapter four explores the specific threats to the UAE national security and finally chapter five demonstrates the researcher’s findings and recommendations.
APA, Harvard, Vancouver, ISO, and other styles
44

Fast, Ellinor. "National Security Act : Authoritarian legacies in South Korea." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-374468.

Full text
Abstract:
The aim of this paper is to examine the correlation between regime socialisation and censorship support in South Korea. The National Security Act is a policy that has been active in the country mentioned, since the 1950’s and restricts the freedom of speech. In a country like South Korea, which is a democracy, it is hard to understand the dual values that are being portrayed in the society. With the help of a theory about political socialisation by individual experience and by using a linear regression, this paper hypothesises that there will be people who are more supportive or completely against the backing for censorship if they have lived through an authoritarian regime. In the bivariate linear regression, the results indicate that there is a relation between the independent, regime socialisation and the dependent variable, support for censorship. However opposed to the theory of this paper, that inhabitants of countries with former authoritarian rule should be more supportive of censorship, the results from the multivariate linear regression show that with the control variables, gender, education, income and Asian values, the correlation between regime socialisation and the support for censorship is not statistically significant. Instead it shows that gender, education and income confound the relationship between regime socialisation and support for censorship.
APA, Harvard, Vancouver, ISO, and other styles
45

Gorban, Tetiana, and Yulia Polikarpova. "Environmental and economic security in a national perspective." Thesis, Видавництво СумДУ, 2011. http://essuir.sumdu.edu.ua/handle/123456789/9995.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Ferguson, Elizabeth May. "Re-conceptualising National Security : a Framework for Analysis." Diss., University of Pretoria, 2019. http://hdl.handle.net/2263/73031.

Full text
Abstract:
National security is used as a justification for policy decisions, a pretext to erode civil liberties and rights, a rallying call for exceptionalism of the ‘self’ at the exclusion of the ‘other’, and as a validation for war. In the name of national security just about any action is justifiable, any decision rational and any consequence moral. There is a danger in this ambiguity. This research has developed a contemporary, comprehensive and holistic framework of analysis using critical constructivism to re-conceptualise national security and to address the latent ambiguity of the concept. The critical literature review shows a comparison of the assumptions and limitations of traditional and critical security studies conceptualisations of national security. It was through this critical analysis that the researcher was able to determine that traditional security studies offers a limited and constrained conceptualisation of national security, that is necessary but insufficient. In contrast, critical security studies has failed to properly engage with the concept of national security. A reconceptualization of national security needs to draw on the strengths and address the limitations of both approaches, and critical constructivism provides the necessary theoretical infrastructure to do so. The national security quintet has been developed and constructed as a framework of analysis for reconceptualising national security using the five inter-related, mutually constituted and socially constructed concepts of national identity, national values, national interests, national power and national will. Each concept has been highlighted for its severable and collective utility in conceptualising national security, and that together form a powerful tool of analysis. Critical constructivism was chosen as the most appropriate theoretical framework for the quintet, although this does not preclude it from being used by other theoretical approaches. The national security quintet has the potential to re-conceptualise national security in theory and practice.
Mini Dissertation (MSS)--University of Pretoria, 2019.
Political Sciences
MSS
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
47

Fellows, Terry Percy Jason L. "A whole of government approach for national security." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/MBAPR/2009/Dec/09Dec%5FFellows%5FMBA.pdf.

Full text
Abstract:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2009."
Advisor(s): Jones, Lawrence ; Brook, Douglas. "December 2009." "MBA Professional report"--Cover. Description based on title screen as viewed on January 28, 2010. Author(s) subject terms: Whole of Government Approach, WOG, National Security, Budget Process. Includes bibliographical references (p. 49-52). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
48

Gjoni, Ilir. "Organized crime and national security: the Albanian case." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FGjoni.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Wilkinson, Nachelle M. "Leveraging National Guard counterdrug assets for Homeland Security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWilkinson.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Jeanne Giraldo. Includes bibliographical references (p. 71-77). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
50

Chassee, Thomas J. Cobb Michael M. "Narcotics and national security refining the military option /." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA243761.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 1990.
Thesis Advisor(s): Winterford, David. Second Reader: Bruneau, Thomas C. "December 1990." Description based on title screen as viewed on April 02, 2010. DTIC Descriptor(s): Military operations, drug smuggling, law enforcement, Latin America, narcotics, national security, military forces (United States), theses DTIC Identifier(s): Counternarcotics, drug war, narcoterrorism, blast furnace operation Author(s) subject terms: "Drug war", narcotrafficking, military options, insurgency and narcotics, political, social and economic impact of narcotrafficking Includes bibliographical references. Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography