Dissertations / Theses on the topic 'Regional security analysis'

To see the other types of publications on this topic, follow the link: Regional security analysis.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 40 dissertations / theses for your research on the topic 'Regional security analysis.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Khoo, How San, and xiaosan@starhub net sg. "Approaches to the Regional Security Analysis of Southeast Asia." The Australian National University. Choose one, 1999. http://thesis.anu.edu.au./public/adt-ANU20050617.140925.

Full text
Abstract:
The purpose of this study is to critically evaluate three scholarly perspectives -- balance of power, institutional, and security complex -- to examine the evolving dynamics of security interdependence and inter-state relations among Southeast Asian states and external powers since 1945. This study is thus a comparative evaluation of the strengths and weaknesses of the three methods in their empirical analysis of the regional security dynamics of Southeast Asia.¶ There is much merit in the balance of power approach. It tracked the consequences of the bipolar Cold War rivalry on Southeast Asia. Its logical construction led it to be concerned with alliances, coalitions and alignments. But it has not satisfactorily explained the relatively benign conditions after the Cold War. The institutional approach similarly emphasizes material explanatory factors (although, in its case, not exclusively so). It identifies the emergence of institutions when groups of countries find it in their mutual interest to cooperate through rules and norms. But the approach may prove to be incomplete in assessing ASEAN's post-Cold War behaviour. As an analytical device, the security complex is deployed to provide a corrective to the over-emphasis (of the other two approaches) on the systemic dynamics. By identifying regional and local dynamics interacting with systemic dynamics via patterns of amity and enmity, it offers explanatory accounts of the behaviour of regional states in situations where the other two approaches fail to do satisfactorily. Moreover, it provides a framework for the deployment of constructivism, which identifies the ideational process whereby interdependent regional states respond to changes in both the power and amity-enmity attributes.¶ This study concludes that security relations among Southeast Asian states and in their relations with external powers after the Cold War, are better examined using the three approaches in a complementary manner. In this way, the influence of local amity-enmity patterns is seen to impact on balance of power and institutional situations.
APA, Harvard, Vancouver, ISO, and other styles
2

Darboe, Ndey Ramou. "REGIONAL SECURITY ANALYSIS : ECOWAS AND THE CONSTITUTIONAL CRISIS IN THE GAMBIA." Thesis, Karlstads universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-78750.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Anum, Samuel Adotey. "A security analysis of the Ivorian conflict : 1993-2003." Diss., University of Pretoria, 2010. http://hdl.handle.net/2263/27391.

Full text
Abstract:
The objective of this study is to examine the role of the political élite in the analysis of the causes of conflicts and insecurity as well as the determination of threats to national security in the Third World with particular reference to West Africa using Côte d’Ivoire as a case study. To achieve this aim, the study employed a conceptual framework of national security that highlighted the concept of security and the distinction between the traditional notions and widening views of security as manifested in the post-Cold War approaches to the subject. The differences between the various levels of security, namely national security and state and regime security were examined. A distinction was made between minimal and maximal states on the one hand, and strong and weak states on the other which enabled the application of the concepts to Third World countries, including Africa. The concept of threats and vulnerabilities and how subjective elements of threat assessment blurred the difference between national security and regime security, were also analyzed including the causes of armed conflicts in developing countries and in Africa specifically. Based on these concepts, the study analyzed the political, socio-economic and security conditions of the Ivory Coast in the period before and during French rule, including the post-independence era. The aim of the historical analysis was to highlight the critical role played by the élite in the identification of threats to national security. This role invariably identified with the protection of élite interest or regime security and often reflected a subjective view of threats to security, the management of which created high levels of insecurity leading to the armed conflict in Côte d’Ivoire in 2002. The study established that the preservation of élite interests and power is the root cause of conflicts in Africa and West Africa. Subsequently, élite cohesion becomes critical to the security of the state as élite disunity leads to manipulation of objective threats or risks that generates insecurity that not only transcends borders, but also creates a security dilemma for states as well as conditions for irredentism.
Dissertation (MSecurity Studies)--University of Pretoria, 2010.
Political Sciences
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
4

Abusidu-Al-Ghoul, Fady Y. "Why has the Arab League failed as a regional security organisation? An analysis of the Arab League¿s conditions of emergence, characteristics and the internal and external challenges that defined and redefined its regional security role." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6333.

Full text
Abstract:
This study presents a detailed examination of the Arab League¿s history, development, structure and roles in an effort to understand the cause of its failure as a regional security organisation. The research¿s point of departure is a questioning of the nature and scope of this failure in terms of the interplay between the conditions under which it was formed and the many actors and dynamics that had a long term-impact on the prospects for the League. To this end, the study looks at the League¿s conditions of emergence and Arab-Arab relations with the focus on Arab national security as the main concept determining its security role. The research synthesises methods of analysis from the existing literature and schools of thought so as to identify where and why failure and success occurred in relation to international relations theories, the security and international organisations literature, and comparable international models. The development and conditions affecting the League as discussed in the research demonstrate that none of the existing broad theories or approaches can fully explain the League¿s failure; however, the constructivist approach, although never before applied in this context, is shown to offer the most relevant approach for explaining this organisation and its unique parameters. The research also examines the role played by the Arab League in regional peacekeeping and conflict prevention in the context of Arab national security, with Palestine as a case study.
APA, Harvard, Vancouver, ISO, and other styles
5

Abusidu-Al-Ghoul, Fady Y. "Why has the Arab League failed as a regional security organisation? : an analysis of the Arab League's conditions of emergence, characteristics and the internal and external challenges that defined and redefined its regional security role." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6333.

Full text
Abstract:
This study presents a detailed examination of the Arab League's history, development, structure and roles in an effort to understand the cause of its failure as a regional security organisation. The research's point of departure is a questioning of the nature and scope of this failure in terms of the interplay between the conditions under which it was formed and the many actors and dynamics that had a long term-impact on the prospects for the League. To this end, the study looks at the League's conditions of emergence and Arab-Arab relations with the focus on Arab national security as the main concept determining its security role. The research synthesises methods of analysis from the existing literature and schools of thought so as to identify where and why failure and success occurred in relation to international relations theories, the security and international organisations literature, and comparable international models. The development and conditions affecting the League as discussed in the research demonstrate that none of the existing broad theories or approaches can fully explain the League's failure; however, the constructivist approach, although never before applied in this context, is shown to offer the most relevant approach for explaining this organisation and its unique parameters. The research also examines the role played by the Arab League in regional peacekeeping and conflict prevention in the context of Arab national security, with Palestine as a case study.
APA, Harvard, Vancouver, ISO, and other styles
6

Kusuma, Agus Renaldi. "Future Indonesia-East Timor relations an analysis of the regional security practices in the Cold War and after /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA392072.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, June 2001.
Thesis advisor(s): Christoffersen, Gaye. "June 2001." Includes bibliographical references (p. 139-142). Also Available in print.
APA, Harvard, Vancouver, ISO, and other styles
7

Mabon, Simon Paul. "The impact of identity incongruence upon regional security : an analysis of bi-lateral competition between Iran and Saudi Arabia post 1979." Thesis, University of Leeds, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.574520.

Full text
Abstract:
Despite the apparent resilience of the state as the primary actor across the Middle East myriad competing identities exist at the state, sub-state and trans- state levels that are often in direct competition with each other. The interaction of these identities can perhaps best be seen in the Gulf region and in particular, in relations between Iran and Saudi Arabia, where strong ethno-national and religious identities reside, often engaged in zero-sum competition with each other. Indeed, within both Iran and Saudi Arabia there exists incongruence between national, religious, and ethno-tribal identities. These identities threaten the ideological and territorial integrity of the regimes in question, while also challenging the legitimacy of ruling elites. This thesis considers the impact of this identity incongruence upon the bi-Iateral relationship between Iran and Saudi Arabia post 1979, focussing upon competition within ideological and geopolitical spheres. Given the threats to ideological and territorial integrity of the state, identity incongruence can be understood as an internal security dilemma. The thesis argues that attempts to manage internal security dilemmas manifest themsevles inan external security dilemma. The relationship between internal and external security is referred to here as the Incongruence Dilemma. The Incongruence Dilemma builds upon a Classical Realist position, but by giving credence to identity and internal dynamics it challenges several of the assumptions held by Realists. The move from internal security dilemmas to external security dilemmas occurs as ruling elites seek to remove the threat posed by internal security dilemmas by referring to rhetoric and narratives of a nationalist and religious nature. The history of the Persian Gulf contains a record of conquest by both Arab and Persian armies, along with a legacy of intra-Islamic competition, which engendered a shared normative environment. Thus, in attempting to resolve internal security dilemmas through the use of religious and nationalist rhetoric, the state becomes embroiled in an external security dilemma fuelled by ideology. As such, in order to fully understand the bi-Iateral relationship between Iran and Saudi Arabia, one must examine the internal dynamics of each state. iv
APA, Harvard, Vancouver, ISO, and other styles
8

Meyer, Ross H. "SOF regional engagement : an analysis of the effectiveness of current attempts to shape future battlefields /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMeyer.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Forsman, Todd Patrick. "Foreign direct investment and security: simplifying the complexities." reponame:Repositório Institucional do FGV, 2016. http://hdl.handle.net/10438/17998.

Full text
Abstract:
Submitted by Daniele Santos (danielesantos.htl@gmail.com) on 2017-02-23T14:51:13Z No. of bitstreams: 1 Todd.pdf: 1104896 bytes, checksum: fcb20db5c4f43bd841fa271202a91405 (MD5)
Approved for entry into archive by Janete de Oliveira Feitosa (janete.feitosa@fgv.br) on 2017-02-23T20:43:44Z (GMT) No. of bitstreams: 1 Todd.pdf: 1104896 bytes, checksum: fcb20db5c4f43bd841fa271202a91405 (MD5)
Made available in DSpace on 2017-03-03T14:09:19Z (GMT). No. of bitstreams: 1 Todd.pdf: 1104896 bytes, checksum: fcb20db5c4f43bd841fa271202a91405 (MD5) Previous issue date: 2016-12-14
The relationship between foreign direct investment and the security situation of a given country is complex and difficult to define. To further complicate matters, security is only one of many variables that drives the decision of a firm to invest in a particular country. This paper simplifies some of the complexities related to the study of this topic, especially as it relates to security, by expanding on previous research done at the country level and applying it at the regional level. It concludes that the security situation of a given country can be approximated through the the independent variable of the annual per capita murder rate and that this rate is directly related with FDI in a given area. Business leaders can use this simple analysis as a starting point to aid in the decision in which country to invest in and why.
APA, Harvard, Vancouver, ISO, and other styles
10

Binaj, Dhimiter. "An analysis of United States-Albanian security relations in light of the War on Terrorism." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FBinaj.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Mason, Robert Wallace Jr. "The Effect of Regional Security Environments on State Attitudes Regarding the Use of Force and International Law: A Quantitative Analysis Utilizing International Positions on Operation Iraqi Freedom." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/32799.

Full text
Abstract:
The US-led war to oust the regime of Saddam Hussein elicited a wide range of responses among liberal states, from active diplomatic opposition in the prelude to war to actual combat support once hostilities commenced. These divergent responses, in part, reflected different perceptions of the legitimacy of force and international law. Furthermore, I contend that these perceptions are rooted in the unique regional security environment in which each state is situated, with states located in relatively insecure regional environments being more favorably disposed to view US military preponderance and use of force as a legitimate public good. Consequently, I hypothesize that the more insecure a stateâ s regional security environment, the more likely it was to support, either diplomatically or militarily, the â major combatâ phase of Operation Iraqi Freedom. To this end, I develop a measure of regional security based on concepts of power and polarity adapted from John Mearsheimerâ s The Tragedy of Great Power Politics. I then test this measure using a logistic regression analysis for 85 states located in 10 regions. The results indicate support for the hypothesis, but also illuminate the need for more research on the implications of power distributions within regional settings for international conflict in the post-Cold War era.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
12

Mthamo, Khayalandile Lwando. "The responsibility to protect in the context of the NATO intervention in Libya in 2011: a human rights analysis." University of the Western Cape, 2017. http://hdl.handle.net/11394/6322.

Full text
Abstract:
Magister Legum - LLM (Public Law and Jurisprudence)
The international human rights architecture experienced a shift from states to individual rights within a state. This is mainly informed by the fact that states committed human rights atrocities against their own civilians. This necessitated a shift from an emphasis on sovereignty and noninterference to intervention on grave human rights violations. Article 2 of the UN Charter calls for respect of sovereignty and discourages the use of armed force against the territorial integrity of any state.1 To reinforce this position, the United Nations (UN) member states adopted the Responsibility to Protect (R2P) doctrine through the UN World Summit outcome document in 2005. This document effectively gave the international community the right to intervene into the affairs of a member state if the state is failing to halt human rights abuses within its territory.
APA, Harvard, Vancouver, ISO, and other styles
13

Hanova, Selbi. "Understanding Central Asian cooperation through state narratives : cases of Kyrgyzstan and Turkmenistan." Thesis, University of St Andrews, 2017. http://hdl.handle.net/10023/11096.

Full text
Abstract:
This thesis examines the influence of state identity narratives on regional cooperation frameworks in Central Asia. It applies the perspectives of ontological security theory to the self-articulation of state identities of Kyrgyzstan and Turkmenistan to decipher socialization mechanisms in each of the cases. Consequently, it traces the routinization of the state narratives of Kyrgyzstan and Turkmenistan toward the region and regional organizations. Ontological security theory argues that, in addition to physical security, states seek ideational security, security of identity and security of being. Using a grounded theory approach to study the formation of the state narratives of Kyrgyzstan and of Turkmenistan and utilizing official and media sources and interviews conducted during fieldwork, the thesis analyzes the process of routinization of state identity narratives, showcasing the narrators, the narratives and the processes of self-articulation. The key process that is traced is the routinization of the state narratives, i.e. the sequence of repeated actions (inter-textualized through speech acts and textual references) that transform the self-articulated stories of the states into the realm of the habitual. This process of routinization is then analyzed within the regional context, examining how these routinized narratives influence inter-state cooperation in Central Asia. As such, the thesis contributes to two main bodies of literature: the growing literature on the ideational aspects of regional cooperation in Central Asia; and existing research on the role of state identification practices in the foreign policies of Central Asian states.
APA, Harvard, Vancouver, ISO, and other styles
14

Dietz, Robert D. "Spatial competition, conflict and cooperation." Columbus, Ohio : Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1058471128.

Full text
Abstract:
Thesis (Ph. D.)--Ohio State University, 2003.
Title from first page of PDF file. Document formatted into pages; contains xiii, 268 p.; also includes graphics (some col.). Includes abstract and vita. Adviser: Donald Haurin, Dept. of Economics. Includes bibliographical references (p. 256-268).
APA, Harvard, Vancouver, ISO, and other styles
15

Vanhanen, Tuuli. "The European Strategic Autonomy Dilemma : French and German Interpretations by Means of Comparative Analysis and Realist Theory." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-179892.

Full text
Abstract:
This research focuses on the concept of European strategic autonomy and what it really is. Through two different European Union Member States, France and Germany, the research will compare how European strategic autonomy is interpreted and why. The research will use different concepts from the theory of realism to focus on the conventional perspective of strategic autonomy in Europe. The research will show how France pushes for greater European strategic autonomy to secure the future of Europe through strategic hedging strategy when again Germany wants to strengthen European strategic autonomy to be taken more seriously by European external allies and by strengthening European bandwagoning strategy. Based on the previously mentioned, the research will analyze how France and Germany interpret the meaning of European strategic autonomy. The research suggests that France’s approach to European security is through Europeanism when Germany’s approach is through Atlanticism. The research will conclude with findings that the significance of European strategic autonomy is in its meaning of increasing Europe’s and European Union’s credibility, sovereignty, and European integration, to name a few.
APA, Harvard, Vancouver, ISO, and other styles
16

Hur, Mi-yeon. "Examining the Six-Party Talks Process on North Korea: Dynamic Interactions among the Principal States." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14880.

Full text
Abstract:
This doctoral thesis aims to provide a comprehensive and historical analysis of foreign policy behaviour of the principal states involved in nuclear talks on North Korea known as the Six-Party Talks (SPT). Despite the failure in achieving a primary objective of denuclearizing North Korea, the SPT were believed to provide interesting and informative cases to investigate dynamic interactions among states engaged in security talks with different motives and interests. For a holistic approach to foreign policy analysis, the thesis adopts a newly introduced theoretical framework called Interactionist Role Theory (IRT) which integrates the levels of analysis from individuals to international system by incorporating the concept of ‘roles’. Based on IRT, the thesis examines what drove the concerned states’ foreign policy shifts; what kinds of discrepancies the states experienced between or among competing roles (role conflicts); how successful their deliberate policy implementations were (role-makings); and what structural effects their foreign policy decisions had on the overall Six-Party Talks process. The thesis findings support the IRT premise that it is critical to understand a state’s perceived ideal roles to accurately identify the state’s motives for actions regarding particular foreign policy issues. The prevalence of inter-role conflicts at the time of states’ role-makings evinces that the SPT as social constraints did exert competing role expectations that challenged the member states’ role conceptions. Above all, the sequential analysis of the SPT process clearly shows the mutual influence between the member states (agents) and the SPT (social structure), which implies successful multilateral negotiations require reciprocal relations among participating states where all parties’ desired roles (role conceptions) are mutually verified and affirmed. The thesis is deemed to give insightful messages to conventional foreign policy readings that predominantly view the nuclear drama in the Northeast Asia region from a binary focus of US-DPRK mutual deterrence.
APA, Harvard, Vancouver, ISO, and other styles
17

Yeung, Alex Tak Lok. "A competitive analysis of digital video surveillance products' manufacturers in Asia Pacific region." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?msc-meem-b1991300xa.pdf.

Full text
Abstract:
Thesis (M.Sc.)--City University of Hong Kong, 2005.
Title from title screen (viewed on Jan. 10, 2006) "A dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering Management." Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
18

Nasif, Mahmoud Abdullah. "A Possible Framework for Analysing National Security. The Saudi Arabian Perspective." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/7272.

Full text
Abstract:
This study will focus on explaining the dynamics of Saudi Arabia’s national security. In explaining these dynamics, the study will consider two of Buzan’s frameworks for analysing national security. Further enhancement will be given by conceptualising specific assumptions about Saudi Arabia’s national security – these will be based on the manner in which certain features are utilised within the Saudi state. Semistructured interviews will be utilised to examine the findings from the adapted frameworks. By studying the state’s domestic, regional and international concerns, as well as the specific threats that each level pose with regards to several security sectors (including the: social, political, economic, militant and environmental), this study will provide a distinctive analysis of national security within the Saudi state. Initially, this study acknowledges that only a few studies have been conducted into Saudi Arabia’s national security; furthermore, these have focused on the internal perspective by considering Saudi national security in terms of its military and strategic partnerships. Secondly, the study proposes that Saudi Arabia is unique (and unlike any other state) as it holds various important social and religious aspects that are not fully understood by external sources. Consequently, this study conceptualises Saudi national security from the internal perspective by considering the Saudi state’s specific features.
APA, Harvard, Vancouver, ISO, and other styles
19

Rivas, Althea. "Revisiting the security-development nexus : a critical analysis of the international intervention in Afghanistan." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/47863/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Gustafsson, Anna. "Vilka motiv ligger bakom den svenska regionreformen? : En idéanalys av vilka motiv som lyfts fram för att legitimera regionreformen där län ska bli regioner senast år 2023." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-49515.

Full text
Abstract:
The aim of this study is to identify the political motives behind the aspiration of the Swedish government to transform 21 counties into 6-9 regions by the year 2023. Two regions were successfully formed in the late 1990’s, yet today little interest is shown by the rest of the country to follow in their footsteps. Despite this, the government shows persistence in its aim to create greater uniformity in how Sweden is geographically divided. A categorization of the motives will indicate whether the new regions will have an administrative, functional or cultural emphasis.      The method is an analysis of ideas of two official reports of the Swedish government. By applying four dimensions as the analytical tool, I can conclude that the main motive is more efficiency in public administration. To some extent a demand for more regional democracy and better legal security also prompts the reform. The theoretical frame of the study consists of three types of regionalism. The analysis shows that a combination of region building and old regionalism explains the priorities that seem to shape more clear administrative and symmetrical regions.
APA, Harvard, Vancouver, ISO, and other styles
21

Shobha, Poudel. "Analysis of Climate Change Impacts on Food Security and Livelihoods in the Mountainous Region of Nepal: A Case Study of Lamjung District." 京都大学 (Kyoto University), 2017. http://hdl.handle.net/2433/225765.

Full text
Abstract:
付記する学位プログラム名: グローバル生存学大学院連携プログラム
Kyoto University (京都大学)
0048
新制・課程博士
博士(地球環境学)
甲第20540号
地環博第161号
新制||地環||32(附属図書館)
京都大学大学院地球環境学舎地球環境学専攻
(主査)教授 舟川 晋也, 准教授 真常 仁志, 准教授 西前 出
学位規則第4条第1項該当
APA, Harvard, Vancouver, ISO, and other styles
22

Roos, Johanna Adriana. "Food system analysis and the development of a system dynamics approach to improve food security for a vulnerable community in the Breede River Region, Western Cape Province, South Africa." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20238.

Full text
Abstract:
Thesis (MScEng)--Stellenbosch University, 2012.
ENGLISH ABSTRACT: The current food system is failing to effectively serve the urban poor. The modernisation and globalisation of the food system solves one set of problems, regarding food security, but at the same time it results in the creation of other complex challenges. Technically the food system ensures adequate food availability on a macro scale, but the structure of the system contributes to the creation of food deserts. Food deserts are areas in which there is a lack of food retail outlets where affordable, nutritious food is available. Communities living in these areas usually struggle to obtain a nutritious diet and the residents are characterised as poverty-stricken and of a poor nutritional status. The aim of this research is to support local authorities in the management and strategic planning of community food security. The research was conducted in Avian Park, a low-income community in the Breede Valley of the Western Cape, South Africa. The food retail environment of Avian Park was investigated to determine the availability and accessibility of food in the community. Furthermore, a system dynamics model was developed to identify those areas in the food system which need attention, in order to achieve greater food security. In addition strategies are suggested to improve community food security; specifically for Avian Park. These research outcomes, however, also serve as a general guideline for managing food security in low-income communities more effectively.
AFRIKAANSE OPSOMMING: Die huidige voedsel sisteem slaag nie daarin om arm mense in stede effektief te dien nie. Die ontwikkeling en globalisering van die voedsel sisteem los een stel probleme rondom voedselsekerheid op, maar skep terselfdetyd ander komplekse uitdagings. Tegnies verseker die voedsel sisteem die beskikbaarheid van genoegsame voedsel op 'n makro skaal, maar die struktuur van die sisteem dra by tot die ontwikkeling van “food deserts.” “Food deserts” is areas waar daar „n tekort aan voedsel kleinhandel afsetpunte is waar daar bekostigbare, voedsame kos beskikbaar is. Gemeenskappe wat in hieride areas leef sukkel gewoonlik om „n voedsame dieet te bekom en die inwoners word geken aan armoede en 'n ongewenste voedingstatus. Die doel van hierdie navorsing is om plaaslike owerhede te ondersteun om gemeenskap voedselsekerheid meer efektief te bestuur. Die navorsing was in Avian Park, „n lae-inkomste gemeensakp in die Breede Vallei van die Wes-Kaap, Suid-Afrika uitgevoer. Die voedsel kleinhandel omgewing van Avian Park is ondersoek om die voedsel beskikbaarheid en toegangklikheid te bepaal. Verder is „n “system dynamics” model ontwikkel om die areas in die voeldsel sisteem wat aandag verg, ten einde voedselsekuriteit te bekom, te identifiseer. Ten slotte word daar strategieë voorgestel om gemeenskap voeldselsekuriteit in Avian Park te verbeter. Hierdie navorsingsuitkomste dien egter ook as algemene riglyne om lae inkomste gemeenskappe se voedselsekerheid meer effektief te bestuur.
APA, Harvard, Vancouver, ISO, and other styles
23

Ed-Daoui, Ilyas. "Towards systems-of-systems structural resilience assessment Resilience assessment as a foundation for systems-of-systems safety evaluation : application to an economic infrastructure An approach to systems-of-systems structural analysis through interoperability assessment : application on Moroccan Case A study of an adaptive approach for systems-of-systems integration A contribution to systems-of-systems concept standardization Unstructured peer-to-peer systems : towards swift Routing A deterministic approach for systems-of-systems resilience quantification Vers des systèmes de systèmes robustes Security enhancement architectural model for IMS based networks Towards reliable IMS-based networks." Thesis, Normandie, 2019. http://www.theses.fr/2019NORMIR07.

Full text
Abstract:
De nos jours, nous attendons des systèmes de systèmes d'être plus que simplement fonctionnel, mais aussi fiable, de préserver leurs performances, de mener les actions requises et, surtout, d'anticiper d'éventuelles défaillances. La résilience fait partie des nombreuses approches d'évaluation de la fiabilité. Elle est directement liée aux conséquences de perturbations et incertitudes. Il s'agit des conséquences en cas de perturbations et des incertitudes associées. La résilience est définie comme la capacité des systèmes à résister à une perturbation majeure selon paramètres de dégradation et à récupérer dans un délai, des coûts et des risques acceptables. Dans cette thèse, deux approches complémentaires sont proposées pour tenter d'analyser la résilience structurelle des systèmes de systèmes. La première est liée à l'extensibilité qui est une caractéristique des systèmes de systèmes puisqu'ils sont en continuelle évolution. L'un des principaux objectifs est d'évaluer la résilience structurelle en tenant compte de l'aspect dynamique et moyennant une évaluation de l'interopérabilité. D'autre part, un examen de la structure d'un système de systèmes et des flux internes représente la deuxième approche. Cela conduit à une évaluation de la résilience structurelle grâce à un ensemble d'indicateurs. Les deux approches proposées sont déterministes et peuvent être utilisées pour évaluer l'état courant de la structure du système de systèmes ou pour anticiper sa résilience dans des scénarios futurs. Un démonstrateur a été développé pour l'évaluation de la résilience structurelle. Dans la considération de territoires, il a servi à l'évaluation d'infrastructures industrielles réelles selon une approche systèmes de systèmes
Nowadays, we expect of SoS (systems-of-systems) more than just to be functional, but also to be reliable, to preserve their performance, to complete the required fonctions and rnost importantly to anticipate potential defects. The relationship with resilience is among the numerous perspectives tackling reliability in the context of SoS. It is about the consequences in case of disturbances and associated uncertainties. Resilience is defined as the ability of systems to withstand a major disruption within acceptable degradation parameters and to recover within an acceptable time, composite costs and risks. In this thesis, two complementary approaches are proposed in an attempt to analyze SoS structural resilience. First is related to extensibility which is a specific characteristic of SoS as they are in continuous evolvement and change. A major focus is to evaluate SoS structural resilience with regards to its dynamic aspect and through interoperability assessment. On the other hand, a consideration of the SoS structure and inner workflow pathways represents the second approach. This perspective leads to structural resilience assessment through a set of indicators. Both proposed approaches are deterministic and can be used to evaluate the current state of SoS structure or to anticipate its resilience in future scenarios. Futhermore, a prototype is designed in order to process the structural resilience assessment. Considering spatial objects, it has been used to conduct experiments on real-based industrial infrastructures approached as SoS
APA, Harvard, Vancouver, ISO, and other styles
24

Haywood, Ashley. "Exploring plausible futures and its implications for the governance of local food systems using local actors’ expertise in the Witzenberg region." University of Western Cape, 2020. http://hdl.handle.net/11394/7303.

Full text
Abstract:
Masters of Commerce
Despite having a significant agri-food sector, South Africa is faced with strong food security issues related to high inequalities and the legacy of the apartheid regime. The South African food system finds itself at risk of alienating the majority of its citizens from realizing their right to access food granted by the South African Constitution (1996) Section 27(1)(b). Increasing poverty, unemployment and poor governance are making it harder for ordinary South African citizens to put safe and nutritious food on the table. Part of the food security issue in South Africa is that there is an inefficiency in public policies. It can be explained by the extreme segmentation of public action between departments and also by the limitations and ineffectiveness of decentralization resulting in little to no involvement from local governments. Like most socio-economic issues, the effects of food insecurity are first experienced on the ground at the local level where municipalities are at the forefront. The absence of effective policy around food security and food systems at the local level in South Africa leaves room for research on improved local food governance. Municipalities should be best suited to understand the consequences of food insecurity and could therefore use some of their constitutional mandate which provides some room for manoeuvre with regard to food issues. The aim of this study is to raise awareness of food security issues at the municipal level and to identify ways to facilitate engagement by municipalities. Its main objective was to adopt a foresight approach, using scenarios with local actors, and to understand how it can help improve the engagement of municipalities and citizens in the food security debate and take possible action. This research has made use of an existing collaboration between the Centre of Excellence in Food Security (CoE-FS) and the South African Local Government Association (SALGA) developed in the Western Cape. The collaboration focuses on the understanding of the food policy space in South Africa, the results of existing policies, and how the co-production of knowledge between stakeholders, notably at the local level, can contribute to policy improvement.
APA, Harvard, Vancouver, ISO, and other styles
25

Strand, Ida. "What does the Increased Fossil Fuel Scarcity mean for the Arctic Region? A Quantitative and Qualitative Content Analysis of Canada, Denmark, Norway, the United States and Russia's Arctic Strategy." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21199.

Full text
Abstract:
This bachelor thesis asks the question, what does the increased fossil fuel scarcity mean for the Arctic region? It further investigates the aim and motives by the five main Arctic states. With the use of structural realism, existing research on the parallels between resource scarcity and conflict and, the combination of two methodological approaches: quantitative and qualitative content analysis, I argue in this study that the five states will act in accordance with the structural realist way and exploit the Arctic due to the protection of their national interests and security. This thesis highlights that, firstly, there is a process of climate change enabling the accessibility to extracting fossil fuel. Secondly, there is an ongoing militarization of the region. With that being said, I argue that the race for fossil fuel will prevail and this will create a destabilizing Arctic region with environmental impacts and militarization that can lead to problematic disputes and even conflicts. Therefore, the Arctic is a vulnerable region with a questionable future due to its economic stakes and militarization.
APA, Harvard, Vancouver, ISO, and other styles
26

Almeida, Felipe de Castro Brum. "Avaliação do desempenho dos dispositivos de controle e modelagem de carga a partir de regiões de segurança estática." Universidade Federal de Juiz de Fora, 2011. https://repositorio.ufjf.br/jspui/handle/ufjf/2169.

Full text
Abstract:
Submitted by Renata Lopes (renatasil82@gmail.com) on 2016-07-21T13:36:30Z No. of bitstreams: 1 felipedecastrobrumalmeida.pdf: 1845415 bytes, checksum: 51a0b14098a88f1127e6d6291d69e2f7 (MD5)
Approved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2016-07-22T15:30:27Z (GMT) No. of bitstreams: 1 felipedecastrobrumalmeida.pdf: 1845415 bytes, checksum: 51a0b14098a88f1127e6d6291d69e2f7 (MD5)
Made available in DSpace on 2016-07-22T15:30:27Z (GMT). No. of bitstreams: 1 felipedecastrobrumalmeida.pdf: 1845415 bytes, checksum: 51a0b14098a88f1127e6d6291d69e2f7 (MD5) Previous issue date: 2011-03-29
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Este trabalho tem por objetivo principal a avaliação do desempenho de dispositivos de controle e da modelagem da carga a partir de Regiões de Segurança Estática. Trata-se de uma importante ferramenta para avaliação da segurança de sistemas elétricos de potência, utilizadas tanto em ambiente off-line de planejamento da expansão e operação, quanto em tempo real nos centros de controle e operação (sistemas on-line VSA). Estas regiões são obtidas através de sucessivas soluções de casos de fluxo de potência e seu objetivo principal é verificar as condições de atendimento a carga (mercado) a partir de diversas condições de despacho da geração. Inicialmente, portanto, é apresentado de forma detalhada o processo de construção das Regiões de Segurança Estática, bem como os principais aspectos construtivos e considerações relevantes que podem influenciar de forma significativa a análise do desempenho do sistema. Com este objetivo, foi desenvolvido um programa para construção automática das Regiões de Segurança Estática na plataforma MatLab®. Um ambiente de processamento paralelo, intrínseco ao próprio MatLab®, foi utilizado com o intuito de aprimorar o desempenho computacional, o que permite a avaliação tanto de sistemas de pequeno porte, de valor tutorial, quanto de sistemas de médio/grande porte. Numa segunda etapa, este trabalho objetiva avaliar o desempenho de importantes dispositivos de controle e modelagem de carga a partir da construção automática das Regiões de Segurança. Os dispositivos de controle avaliados são: (i) Controle Remoto de Tensão; (ii) Controle de Tensão por Bancos Shunt Chaveados Automaticamente; (iii) Controle Automático de Tensão por Transformadores tipo LTC (Load Tap Changer); (iv) Controle Secundário de Tensão. A influência da modelagem da carga na avaliação da segurança do sistema é investigada a partir dos modelos ZIP e motor de indução. Os resultados obtidos demonstram que a representação de dispositivos de controle e da modelagem da carga podem influenciar significativamente as Regiões de Segurança Estática de sistemas elétricos de potência.
The main objective of this work is to evaluate the performance of control devices and load modelling through Static Security Regions. This is an important tool for security assessment of electric power systems, which can be used for both the operating environment (on-line systems VSA) and planning studies. These regions are obtained through successive power flow solutions and its main objective is to verify the steady-state security conditions from different configurations of generation dispatch for a given constant demand. Initially, the construction process of the Static Security Regions, as well as the key aspects of the construction and relevant considerations that may significantly impact the analysis of the system performance, is presented in detail. In this sense, a program for automatic construction of the Static Security Regions have been developed using the MatLab® platform. An intrinsic parallel processing environment was used to improve the computational performance, which allowed the evaluation of a small tutorial system and medium/large scale systems. As a second step, this work proposes the evaluation of the impact of important control devices and load modelling on the Static Security Regions construction. The control devices investigated are: (i) Remote Voltage Control; (ii) Shunt Devices with Automatic and Discrete Switching; (iii) Voltage Control by Automatic Load Tap Changing (LTC) Transformers; (iv) Secondary Voltage Control. The impact of load modelling is investigated through ZIP and induction motors models. The results obtained indicated that the representation of control devices and load modelling may significantly impact the Static Security Regions of the electrical power systems.
APA, Harvard, Vancouver, ISO, and other styles
27

Kun-Hui, Liu, and 劉坤輝. "The Influence of PRC’ s Deterrence Strategy to the Security of Asia-Pacific regional-Functional Analysis Approach." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/48163509679993695420.

Full text
Abstract:
碩士
國防大學政治作戰學院
政治研究所
101
The end of the Second World War in 1945, followed by the United States and the Soviet Union to compete, but to avoid large-scale outbreak of the war, through local proxy war, science and technology, the arms race and intense diplomatic surging undercurrent, namely " mutual containment, but do not resort to the use of force ", so called" Cold War ", which is the origin of “curbing theory” of the US, after indirectly changed into " deterrence theory "of military development which would be a strategy as an alternative. To avoid it being like Western "deterrence theory", after the reform and opening up in 1978, the PRC’ s combines traditional Chinese "Art of War" and "deterrence theory” to form Chinese characteristics" deterrence strategy ". At the PRC’ s Central Military Commission enlarged meeting, in 1985, Deng Xiaoping stressed that "Faced with the threat of US-Soviet hegemony, China should develop its own deterrent strength , and upgrade it to a strategic position, adhere to the people's war deterrent, valuing the importance of building of deterrent, and improve the show of strength. The PRC’ s requirement is a deterrent to win without fighting in peace times; combat and victory to win the war during the war times. The "deterrence strategy" is an important strategy ideology of the Chinese Communist Party. The Cold War turned to the end till the 1991, collapse of the Soviet Union and East and West Germany unified. Under the international trend of moderate conditions, the goal of "deterrence strategy" also focus on stopping the war, avoiding the war expanding, so that create a country enough to affect the security of the Asia-Pacific region. In the study, through the research of the influence of PRC’ s "deterrence strategy" on the security of the Asia-Pacific region, using the research approach of "strategic" ,"functional analysis "," historical research "to do deep research and discussion about the three functions of PRC’ s deterrence strategy " stop the war ","avoid the expansion of the war "," reach a specific goal. Adapt "Parsons (Talcott Parsons), the structural functional approach (adaptation), goals (Goal Attainment) integration (Integration) mode to maintain (Latency)-oriented, in order to understand the factors and structure of the PRC’ s deterrence strategy. For the actually circumstance of safe operation of the Asia-Pacific region, realize the role and positioning of PRC’ s deterrence strategy.
APA, Harvard, Vancouver, ISO, and other styles
28

Lee, Mei-Hsien, and 李玫憲. "New Research Approach to Regional Security Governance in Europe-A Comprehensive Analysis of Power, Institute, and Idea." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/52646599932664286735.

Full text
Abstract:
博士
國立中興大學
國際政治研究所
98
Because of its oncoming conceptualization, security governance neither becomes a popular research approach, nor has any acceptable operation-definition. This thesis aims to re-construct the analyzing framework of the security governance, and test its applicability for contemporary European security research. First, it re-constructs the security governance research model by combining governance with eclecticism analysis included power, institute, and idea. Second, it comprehensively analyzes the development, practice, and challenge of security governance toward Europe by case-study among Central and Eastern Europe, Arctic Ocean, and South Europe. Finally, it sums up all discussions and verifies research propositions and model. This thesis finds that, in order to deal with multilateral security threats, main regional actors have developed a synthetic governance strategy based on the need to handle different security threats in each sub-region. Regional actors have different choices of governing approach; however, under the same goal of resolving regional security problems, they still work on common principles included policy co-ordination, strategic co-management, and security co-operation.
APA, Harvard, Vancouver, ISO, and other styles
29

CHEN, CHIA-YU, and 陳佳佑. "Levels of Analysis: A Study on the Changes of U.S.-Japan Alliance with A Regional Security Perspective." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/gk99xp.

Full text
Abstract:
碩士
國立中正大學
戰略暨國際事務研究所
105
The Security Treaty Between the United States and Japan was signed on 8 September, 1951. For over 50 years, there are many associated researches on the U.S.-Japan security alliance, yet most of the researchers adapt in only one single theory to study the alliance partnership, instead of a levels-of-analysis approach which could possibly analyze the factors of the change, development and transformation of U.S.-Japan security alliance in a comprehensive perspective. Thus, due to respect of globalization and information transfer efficiency, I believe levels-of-analysis is a proper research approach to interpret and study international affairs in the era of dynamic. This research focuses on why the U.S.-Japan security alliance system changes over time, with a perspective on regional security. Putting the regional security into perspective, the levels-of-analysis approach of this research is slightly different from the usual approach. By taking an outside-in method as the primary factor analizing way and inside-out as a secondary factor analyzing way, I suggest it will be able to avoid the demerits and constraints caused by taking only one single level as a research approach. In addition, I also analyze whether since 1951, Japan’s changing role in the U.S.-Japan security alliance system acceleterate with the RMC assessment.
APA, Harvard, Vancouver, ISO, and other styles
30

CHIEN, SSU-YI, and 簡思毅. "An Analysis of the Impact of North Korea's Development of Nuclear Weapons Regional Security in Northeast Asia." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/86618569052260587501.

Full text
Abstract:
碩士
銘傳大學
社會與安全管理學系兩岸關係與安全管理碩士在職專班
105
Since Kim Jong-un, the leader of North Korea, has been in power since his father, Kim Jong-il has implemented nuclear control, and has conducted three nuclear tests in February 2013 and 2016 in January and September 2013, while actively conducting medium-range missiles, submarine-launched missiles and nuclear bombs South Korea, in the face of North Korea's nuclear threat, has also adopted a counter-system, including the expansion of the scale of military exercises with the United States, announced the deployment of "THAAD" (Terminal High Altitude Area Defense, THAAD), and strengthen cooperation with Japan's military defense, military deterrence to stop North Korea continued nuclear explosion test; in this situation, the Northeast Asian regional tensions become increasingly serious. This paper attempts to analyze the positive attitude of North Korea's development of nuclear weapons and the attitude of Northeast Asia, including China, South Korea, Japan, the United States and Russia, to analyze the impact of Kim Jong-un's regime on the development of regional security in Northeast Asia, And further explore the characteristics and changes of Kim Jong-un's national policy. At the same time, it is more important to judge the development trend of North Korea's nuclear issue in the future by means of expert comments and related literatures, and to master the regional security situation in Northeast Asia Change pulsation. In addition, the recent international situation, the United States Republican candidate Donald Trump new elected president, Donald Trump during the campaign has said that the North Korean nuclear issue should continue to take pressure policy, and even encourage Japan and South Korea to develop nuclear weapons against North Korea; The future of the nuclear issue, the future of the United States will continue to dominate the situation in Northeast Asia? And what kind of policy will the new US government take on North Korea? Will the regional security situation in Northeast Asia also face significant changes? Is also one of the focus of this article to explore.
APA, Harvard, Vancouver, ISO, and other styles
31

Haringová, Ingrida. "Afghánistán jako izolátor regionálních komplexů? Sektorová analýza afghánské bezpečnosti." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-365086.

Full text
Abstract:
The goal of master thesis Afghanistan as an insulator of regional complexes? Sectoral analysis of Afghan security was to analyze security of Afghanistan based on sectors and from the viewpoint of Regional security complex theory developed by Barry Buzan and Ole Wæver. The purpose of the thesis was to review categorization of Afghanistan as an insulator and identify factors which undermine his status as such. Afghanistan's location is very much unique because it lies among three different regional security complexes - Central Asia, The Middle East, and South Asia. The analysis was conducted through combination of a) discourse analysis of statements and speeches of president Ashraf Ghani and CEO Abdullah Abdullah (2014 - ) and added with information from the Ministry of Foreign Affairs and b) material relations in regions, such as trade routes, military aid etc. and c) history. Analysis is based on military, political, and economic sectors. The discursive analysis pays attention to the perception of Afghanistan on itself with focus on institutional discourse and broader debate in the English-speaking afghan media.
APA, Harvard, Vancouver, ISO, and other styles
32

Lei, Yow-Tai, and 雷又台. "Study on P.R.C''s Regional Security Strategy After Cold War Era: Analysis of Shanghai Cooperation Organization.(1991-2004)." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/10816268190060747452.

Full text
Abstract:
碩士
淡江大學
國際事務與戰略研究所
93
The two main geostrategy the United States adopts after the Cold War Era are building strong military alliance with the Japanese and North Atlantic Treaty Organization (NATO) eastward enlargement. The characteristic of these two actions express The United States’ attempt to keep P.R.C. in strageical containment, therefore; achieve the goal of controlling Eurasia and gain global hegemony. This theory greatly reflects Harlford Mackinder’s Heartland theory and Nicolas J. Spykman’s Rimland theory. NATO’s eastward enlargement to P.R.C. western border limits its geostrategy and impact on the benefits in Central Asia, which has been concerned by P.R.C. The enlargement of NATO also creates military threats to western border leading to the crsis of P.R.C. being containminated. Shanghai Cooperation Organization (SCO) is founded based on P.R.C. regional security strategy which politically prevent the independence of Xinjiang while providing regional security; In the meantime, developing economic realtionship with Central Asia’s petroleum resource supply will accelerate P.R.C.’s “Western Development” policy and this will indeed stop the converging attack from the United States. The thesis will be focused on the role of SCO and how P.R.C. act through SCO to procure its goal on regional security strategy. SCO is the only organization that has not been influenced by the United States; not only that, Nato led by the United States purport to expand to Russian border making it easier to envelop Russia and R.P.C.; However, The foundation of the SCO certainly reconciles United States’ strategy. After the September 11 event, the United States zealously interfere Eurasia’ affairs by anti-terrorism, providing emmense economic support to countries in Central Asia; on the other hand, because of the anti-terrorism led by the U.S. in Central Asia, it has made Russia and members of SCO such as Uzbekistan, Tajikistan, and Kazakhstan to give immediate effective support by allowing the garrisoning of American troops. The above contradiction may have great impact on the relationship between SCO members; therefore, if the SCO can extend its economic area and set military security as an auxiliary, then the SCO will not be easily replaced by the Americans.
APA, Harvard, Vancouver, ISO, and other styles
33

Francis, David J. "US strategy in Africa: AFRICOM, terrorism and security challenges." 2010. http://hdl.handle.net/10454/5826.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Obadire, Olusegun Samson. "Analysis of stakeholder participation in the comprehensive rural development programme : the case of Muyexe In Limpopo Province, South Africa." Thesis, 2015. http://hdl.handle.net/11602/254.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Kuo, Chin-ying, and 郭金鷹. "Security Vulnerability Analysis of Chemical Transport in the Central Region of Taiwan." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/73364635877757288147.

Full text
Abstract:
碩士
雲林科技大學
環境與安全工程系碩士班
98
After the the 911 events of 2001, the prevention efforts to avoid intentional attacked has become the focus of public concerns. An event of threatening water poison in one university was occurred in 2005. This event reminded us that intentional attacked was also possible here. This study surveyed sixty-eight drivers/managers of chemical transportation in the central region of Taiwan. Using questionnaires and security vulnerability analysis (SVA) to and preventive management program for selected transportation industries by general questionnaires in order to investigate the execution results and debate transport routes and accident in the central region of Taiwan . The conclusions from this study can be summarized as below: The major accident types of chemical transport are traffic accidents and followed by the leakage of chemicals. The most of chemical transport material are flammable substances and the accident rate was the highest.The results show about the all chemical transport had no conducted SVA. That also show the chemical transport in Taiwan of management SVA need to strengthen the transport routes’Consequesce Analysis, access control measures, security measures, emergency response plan’s integrity, team support and the first aid equipment;In the transport SVA show that the most of industries need to required under the threat that may arise, review and update the existing security processes;a few industries only need to maintain security cognition. More than half of the chemical transportation accident were only collision or exterior of a traffic accident, it often need to take a full or partial road closure in the security considerations, we not only pay attention to security incidents, but also need to carefully consider the traffic control or alternative rutes The suggestions from this study are: Suggest chemical transport industries in Taiwan should follow the API to introduce SVA. Suggest government refer to American SVA,and development related method for Taiwan. Suggest subsequent researchers can combine shipper’s site,transportation routes and receiver’s site and had to do a whole transports security vulnerability analysis.
APA, Harvard, Vancouver, ISO, and other styles
36

Vickers, Katherine Elise. "Ghanaian women, creating economic security : an analysis of gender, development, and power in the Volta Region of Ghana, West Africa." Thesis, 2001. http://hdl.handle.net/1957/28424.

Full text
Abstract:
In June 1999, I was a volunteer for a United States non-governmental organization, Crossroads Africa. I joined six other American women traveling to Ghana, West Africa to participate in a collaborative program designed by the Ghana Red Cross Society and Crossroads Africa. Specifically our group was assigned to work on a Women in Development (WID) project with three rural women's collectives, "Mothers Clubs," assisting them with income-generating projects in the Volta Region of Ghana. The projects varied among the villages. hi village one, Anfoeta Tsebi, the women extracted oil from palm fruit and kernels. They sold palm oil at regional markets and used the oil domestically to make stews and soap for washing. In village two, Heffi, Mothers Club members baked bread and processed gari from cassava yarns. In village three, Anyirawase, the women made batiks, tie-dye, beadwork, and woven mats from corn husks. My research objective was to evaluate the role that gender, the WID design, and power played in each project. I also sought to use my observations and the voices of African women to assess the successes and failures of the collaborative program of the Ghana Red Cross and Crossroads Africa. I used participant observation to gather this information. The sample was inclusive of project participants. I found that the womens' collectives provided positive networks of support for members. The women taught our Crossroads volunteers about how they were creating change. The collectives also showed how successful development depends on improving the quality of life for individuals. The women gained skills in leadership and health education, while they improved their economic situation. Women were becoming collectively empowered through their role as active agents for change in their communities. Their hard work, dedication, and widespread recognition of their accomplishments contributed to group empowerment. My findings suggest that the primary obstacles to project success were lack of resources and time and physical exhaustion from an increased workload Poor preparation and training for Crossroads volunteers and their ideological fragmentation prevented effective assistance and collaboration with the Mothers Clubs. One of my recommendations for future improvements is to integrate men into the development process to play a constructive role and minimize their opportunity for unwanted interference. Another recommendation is to encourage Ghana Red Cross leaders to hold seminars for women from different villages to allow for an exchange of knowledge about development projects. Finally, recommend that Crossroads Africa and Ghana Red Cross leaders make a greater effort to collaborate and improve preparation and training for participants.
Graduation date: 2001
APA, Harvard, Vancouver, ISO, and other styles
37

Ngobeni, Tinyiko Lawrence. "A critical analysis of the security of foreign investments in the Southern African Development Community (SADC) region." Thesis, 2018. http://hdl.handle.net/10500/25054.

Full text
Abstract:
Foreign investments in SADC are regulated by Annex 1 of the SADC Protocol on Finance and Investments (SADC FIP), as well as the laws of SADC Member States. At present, SADC faces the challenge that this regime for the regulation of foreign investments is unstable, unsatisfactory and unpredictable. Furthermore, the state of the rule of law in some SADC Member States is unsatisfactory. This negatively affects the security of foreign investments regulated by this regime. The main reasons for this state of affairs are briefly explained below. The regulatory regime for foreign investments in SADC is unstable, due to recent policy reviews and amendments of key regulatory instruments that have taken place. Major developments in this regard have been the suspension of the SADC Tribunal during 2010, the amendment of the SADC Tribunal Protocol during 2014 to bar natural and legal persons from access to the Tribunal, and the amendment of Annex 1 during 2016 to remove investor access to international investor-state arbitration, better known as investor-state dispute settlement (ISDS). The regulation of foreign investments in SADC has been unsatisfactory, among others because some SADC Member States have failed or neglected to harmonise their investment laws with both the 2006 and the 2016 Annex 1. Furthermore, SADC Member States such as Angola, Democratic Republic of Congo (DRC), Malawi, Mauritius, Seychelles, Eswatini, Tanzania, Zambia, and Zimbabwe have multiple Regional Economic Community (REC) memberships. This places these Member States in a position whereby they have conflicting interests and treaty obligations. Finally, the future of the regime for the regulation of foreign investments in SADC is unpredictable, due to regional integration efforts such as the recent formation of the COMESA-EAC-SADC Tripartite Free Zone (T-FTA) and the African Continental Free Trade Area (AfCFTA). The T-FTA is entitled to have its investment protocol, while the AfCFTA investment protocol will be negotiated from 2018 until 2020. These developments entail that the 2016 Annex 1 will soon be replaced by an investment protocol at either the T-FTA or AfCFTA levels, thereby ushering a new regime for the regulation of foreign investments in SADC. The unknown nature of the future regulations create uncertainty and instability among foreign investors and host states alike. This study analyses the regulation of foreign investments in terms of Annex 1 and selected laws of SADC Member States. In the end, it makes the three findings mentioned above. In order to address these findings, the study makes four recommendations. The first is that foreign investments in SADC must be regulated at African Union (AU) level, by means of an AfCFTA investment protocol (which incidentally is now the case). Secondly, investor-state disputes must be referred to the courts of a host state, optional ISDS, the African Court of Justice and Human Rights (ACJ&HR) or other agreed forum. Thirdly, an African Justice Scoreboard (AJS) must be established. The AJS will act as a gateway to determine whether an investor-state dispute shall be referred to the courts of a host state, ISDS, the ACJ&HR or other forums. Fourthly, the office of an African Investment Ombud (AIO) must be created. The AIO shall facilitate the early resolution of investor-state disputes, so as to reduce the number of disputes that may end-up in litigation or arbitration.
Mercantile Law
LL. D.
APA, Harvard, Vancouver, ISO, and other styles
38

Kou, Chin-Hsiang, and 寇景翔. "Sun of the Taiwan region in the field of social security mechanism the citation analysis of Doctoral thesis and Master's thesis." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/32714028706586530656.

Full text
Abstract:
碩士
國防大學政治作戰學院
政治研究所
96
ABSTRACT This study is based on the National Doctoral thesis and Master's thesis record of the information network for graduate thesis research of the National Library, and for Chinese Culture University, National Taiwan Normal University, National Taiwan University, National Chengchi University,National Sun Yat-sen University and School of the political warfare, such as San-min Sun and the Institute for Research Related Research Institute Analysis of the six schools, to describe the impact on the development by Sun of the Taiwan region. The research methods for the use of Library Science Citation analysis to analiyse Sun of the Taiwan region in the field of social security mechanism, and to establish of the database study by Sun citation analysis to study more full of vitality and creativity. In thecouclusion,I will propose the study of the direction of Sun in the field of social security mechanism in future, and it objectively reflects the economic and livelihood issues to resolve.The people can be engaged in political, religious and other activities. Aims at Taiwan's unification and independence issue must be headed , but is by no means must take the issue of people's livelihood.It’s the final objective of Dr. Sun Yat-sen’s social security mechanism. Key words: social security mechanism, citation analysis
APA, Harvard, Vancouver, ISO, and other styles
39

Simonneau, Claire. "Gérer la ville au Bénin : la mise en œuvre du Registre foncier urbain à Cotonou, Porto-Novo et Bohicon." Thèse, 2015. http://hdl.handle.net/1866/13501.

Full text
Abstract:
La gestion des villes d’Afrique de l’Ouest pose problème à la période contemporaine : extension urbaine non maitrisée, services de base insuffisants, insécurité foncière. À travers l’aide internationale, d’importantes réformes visant à améliorer son efficacité ont pourtant été mises en place, mais elles semblent avoir été inefficaces. Dépassant ce constat d’échec, la thèse vise à comprendre comment se déroule l’acte de gérer la ville dans les circonstances particulières des villes d’Afrique de l’Ouest. La mise en œuvre du Registre foncier urbain (RFU), système d’information foncière municipal multi-fonctions introduit au Bénin à travers des programmes de développement au début des années 1990, constitue le prisme à travers lequel la gestion urbaine est analysée. Celle-ci est ainsi approchée par les actes plutôt que par les discours. S’appuyant sur une démarche socio-anthropologique, la mise en œuvre de l’instrument est analysée depuis le point de vue des acteurs locaux et selon une double grille de lecture : d’une part, il s’agit de saisir les logiques de l’appropriation locale dont le RFU a fait l’objet au sein des administrations; d’autre part, il s’agit de comprendre son interaction avec le territoire, notamment avec les dynamiques complexes d’accès au sol et de sécurisation foncière. Une étude de cas multiple a été menée dans trois communes : Cotonou, Porto-Novo et Bohicon. Deux ensembles de conclusions en découlent. Tout d’abord, le RFU s’est imposé comme l’instrument pivot de la fiscalité locale, mais est mis en œuvre de manière minimale. Ce fonctionnement particulier est une adaptation optimale à un contexte fait de rivalités professionnelles au sein d’administrations cloisonnées, d’enjeux politico-financiers liés aux différentes sources de revenus communaux et de tensions politico-institutionnelles liées à une décentralisation tardive. Les impacts du RFU en termes de développement des compétences professionnelles nationales sont insuffisants pour réformer la gestion urbaine depuis l’intérieur de l’administration municipale. Ensuite, alors qu’il vise à centraliser l’information sur les propriétaires présumés de la terre, le RFU se heurte à la marchandisation de cette information et à la territorialisation de la régulation foncière. La mise en œuvre du RFU s’en trouve affectée de deux manières : d’une part, elle s’insère dans ces circuits marchands de l’information foncière, avec cependant peu de succès ; d’autre part, elle a un impact différencié selon les territoires de la régulation foncière. En définitive, l’acte de gérer la ville au Bénin n’est pas devenu automatique avec l’introduction d’instruments comme le RFU. La municipalité se repose plutôt sur les piliers classiques de l’action publique, l’administration et le politique, pour gérer la ville plurielle de manière différenciée. À l’endroit des concepteurs d’action publique, cette thèse plaide pour une prise en compte des modes de régulation existant dans les sociétés africaines, fussent-ils pluriels, reconnaissant les voies originales que prend la construction des institutions en Afrique.
The management of West African cities is problematic nowadays: uncontrolled urban sprawl, insufficient basic services, and land insecurity. Yet, major reforms had been put in place with the assistance of international aid to enhance the effectiveness of urban management; which seems to have failed. Going beyond this policy failure statement, the present dissertation aims at understanding how “managing the city” takes place in the particular context of West Africa. The implementation of the Urban Land Registry (RFU), a municipal and multi-purpose land information system that has been put in place in Benin through development programmes in the early 1990s, is the lens through which urban management is examined. Urban management is then studied through the actions taken rather than through the discourses. With a socio-anthropological approach, the implementation of the instrument is analysed from the stakeholders’ perspectives and according to a double analysis grid. On the one hand, the analysis aims at understanding the local appropriation of the RFU inside public administrations; and on the other hand, its aims at comprehending the interaction of the RFU with the territory, in particular with the complex dynamics of access to the land and land security. A multiple case study was conducted in three municipalities: Cotonou, Porto-Novo, and Bohicon. This study led to two main conclusions. First, the RFU is recognized as the key instrument of local taxation, but it is minimally implemented. This particular functioning is an optimal adaptation to a context made of: 1) professional rivalries in a compartmentalized administration, 2) political and financial stakes related to different sources of local revenues, and 3) political and institutional tensions provoked by the late decentralisation. Then, the RFU’s impacts in terms of national professional capacities are insufficient to reform urban management from inside municipal administration. Second, a key function of the RFU that is centralizing information on presumed landowners is impeded by the commodification of land information and by the territorialisation of land regulatory modes. This affects the implementation of the RFU as it takes part in this land information market, but with little success; and its impact is differentiated according to the ‘land regulation territory’ it applies. Finally, ‘managing the city’ in Benin is not an automatic task, even with the introduction of management instruments such as the RFU. Administration and politics continue to shape municipal policies, and the pluralistic city is managed in a differentiated manner. To the designers of public action (policies), this dissertation encourages to take into account existing regulation modes in African societies, even if they are multiple and complex, and it recognises the singular process of institution building in Africa.
APA, Harvard, Vancouver, ISO, and other styles
40

Nyambi, Gwendoline. "A Comparative SWOT Analysis of the National Agricultural Extension Program Organization to Determine Best-Fit Program Model: A Case Study of the North West and South West Regions of Cameroon." Thesis, 2012. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10983.

Full text
Abstract:
Agriculture is crucial to the economic and social wellbeing of the Republic of Cameroon. A national need for increased productivity, farm incomes, food security and rural development requires more effective agricultural extension and advisory systems. The need is persistent. This study analyzed strengths, weaknesses, opportunities, and threats that existed within the current national extension program and examined how form, function, and policy influenced two regions in Cameroon. Analysis focused on 15-year time changes using a comparative case study design. Four regional focus groups and 28 individual interviews bounded 59 cases from four stakeholder groups of farmer leaders, non-governmental organizations, extension representatives, and governmental counterparts. Eighteen primary themes emerged with overlap of opportunities and threats among stakeholders. Incentives to program performance included staff competence and innovative technology transfer. Barriers included infrastructure, postharvest technology, market incentives, financial sustainability, and feedback. A lack of vision for sustainability, inadequate government funding, poor collaboration and linkages, uncoordinated parallel programs, and ineffective management systems reduced program potential. Four themes framed recommendations for improved programs: government investment, trainings, market incentives, and management. Options to improve program sustainability included subsidies that benefit all farmers, more council and private sector engagement with extension, rural infrastructure development, price standardization, and fees for service. Medium and large-scale farmers were willing to pay for extension services when and if available whereas small-scale farmers relied heavily on subsidized services. Accessibility to markets, farm size, and cash crop production are associated with farmers’ acceptance of fees for service. These findings highlighted areas where changes in the nation’s agricultural extension service could improve its relevance in meeting performance targets. Stakeholders’ recommendations for more effective agricultural extension and advisory systems included: 1) providing an autonomous extension service that focuses on specific needs and market opportunities and coordinates all support/parallel programs while collaborating among research and private advisory services; 2) implementing holistic government policies that integrate technology transfer, innovation, health, value-chains, and markets to benefit all farmers; 3) redesigning subsidies that equitability incentivize production and sound environmental practices that benefit all farmers; 4) increasing in-service trainings related to innovations; and 5) updating innovations and harmonizing program activities.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography