Dissertations / Theses on the topic 'Regional security analysis'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 40 dissertations / theses for your research on the topic 'Regional security analysis.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Khoo, How San, and xiaosan@starhub net sg. "Approaches to the Regional Security Analysis of Southeast Asia." The Australian National University. Choose one, 1999. http://thesis.anu.edu.au./public/adt-ANU20050617.140925.
Full textDarboe, Ndey Ramou. "REGIONAL SECURITY ANALYSIS : ECOWAS AND THE CONSTITUTIONAL CRISIS IN THE GAMBIA." Thesis, Karlstads universitet, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-78750.
Full textAnum, Samuel Adotey. "A security analysis of the Ivorian conflict : 1993-2003." Diss., University of Pretoria, 2010. http://hdl.handle.net/2263/27391.
Full textDissertation (MSecurity Studies)--University of Pretoria, 2010.
Political Sciences
unrestricted
Abusidu-Al-Ghoul, Fady Y. "Why has the Arab League failed as a regional security organisation? An analysis of the Arab League¿s conditions of emergence, characteristics and the internal and external challenges that defined and redefined its regional security role." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6333.
Full textAbusidu-Al-Ghoul, Fady Y. "Why has the Arab League failed as a regional security organisation? : an analysis of the Arab League's conditions of emergence, characteristics and the internal and external challenges that defined and redefined its regional security role." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/6333.
Full textKusuma, Agus Renaldi. "Future Indonesia-East Timor relations an analysis of the regional security practices in the Cold War and after /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA392072.
Full textThesis advisor(s): Christoffersen, Gaye. "June 2001." Includes bibliographical references (p. 139-142). Also Available in print.
Mabon, Simon Paul. "The impact of identity incongruence upon regional security : an analysis of bi-lateral competition between Iran and Saudi Arabia post 1979." Thesis, University of Leeds, 2011. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.574520.
Full textMeyer, Ross H. "SOF regional engagement : an analysis of the effectiveness of current attempts to shape future battlefields /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FMeyer.pdf.
Full textForsman, Todd Patrick. "Foreign direct investment and security: simplifying the complexities." reponame:Repositório Institucional do FGV, 2016. http://hdl.handle.net/10438/17998.
Full textApproved for entry into archive by Janete de Oliveira Feitosa (janete.feitosa@fgv.br) on 2017-02-23T20:43:44Z (GMT) No. of bitstreams: 1 Todd.pdf: 1104896 bytes, checksum: fcb20db5c4f43bd841fa271202a91405 (MD5)
Made available in DSpace on 2017-03-03T14:09:19Z (GMT). No. of bitstreams: 1 Todd.pdf: 1104896 bytes, checksum: fcb20db5c4f43bd841fa271202a91405 (MD5) Previous issue date: 2016-12-14
The relationship between foreign direct investment and the security situation of a given country is complex and difficult to define. To further complicate matters, security is only one of many variables that drives the decision of a firm to invest in a particular country. This paper simplifies some of the complexities related to the study of this topic, especially as it relates to security, by expanding on previous research done at the country level and applying it at the regional level. It concludes that the security situation of a given country can be approximated through the the independent variable of the annual per capita murder rate and that this rate is directly related with FDI in a given area. Business leaders can use this simple analysis as a starting point to aid in the decision in which country to invest in and why.
Binaj, Dhimiter. "An analysis of United States-Albanian security relations in light of the War on Terrorism." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FBinaj.pdf.
Full textMason, Robert Wallace Jr. "The Effect of Regional Security Environments on State Attitudes Regarding the Use of Force and International Law: A Quantitative Analysis Utilizing International Positions on Operation Iraqi Freedom." Thesis, Virginia Tech, 2005. http://hdl.handle.net/10919/32799.
Full textMaster of Arts
Mthamo, Khayalandile Lwando. "The responsibility to protect in the context of the NATO intervention in Libya in 2011: a human rights analysis." University of the Western Cape, 2017. http://hdl.handle.net/11394/6322.
Full textThe international human rights architecture experienced a shift from states to individual rights within a state. This is mainly informed by the fact that states committed human rights atrocities against their own civilians. This necessitated a shift from an emphasis on sovereignty and noninterference to intervention on grave human rights violations. Article 2 of the UN Charter calls for respect of sovereignty and discourages the use of armed force against the territorial integrity of any state.1 To reinforce this position, the United Nations (UN) member states adopted the Responsibility to Protect (R2P) doctrine through the UN World Summit outcome document in 2005. This document effectively gave the international community the right to intervene into the affairs of a member state if the state is failing to halt human rights abuses within its territory.
Hanova, Selbi. "Understanding Central Asian cooperation through state narratives : cases of Kyrgyzstan and Turkmenistan." Thesis, University of St Andrews, 2017. http://hdl.handle.net/10023/11096.
Full textDietz, Robert D. "Spatial competition, conflict and cooperation." Columbus, Ohio : Ohio State University, 2003. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=osu1058471128.
Full textTitle from first page of PDF file. Document formatted into pages; contains xiii, 268 p.; also includes graphics (some col.). Includes abstract and vita. Adviser: Donald Haurin, Dept. of Economics. Includes bibliographical references (p. 256-268).
Vanhanen, Tuuli. "The European Strategic Autonomy Dilemma : French and German Interpretations by Means of Comparative Analysis and Realist Theory." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-179892.
Full textHur, Mi-yeon. "Examining the Six-Party Talks Process on North Korea: Dynamic Interactions among the Principal States." Thesis, University of Bradford, 2015. http://hdl.handle.net/10454/14880.
Full textYeung, Alex Tak Lok. "A competitive analysis of digital video surveillance products' manufacturers in Asia Pacific region." access full-text access abstract and table of contents, 2005. http://libweb.cityu.edu.hk/cgi-bin/ezdb/dissert.pl?msc-meem-b1991300xa.pdf.
Full textTitle from title screen (viewed on Jan. 10, 2006) "A dissertation submitted in partial fulfillment of the requirements for the degree of Master of Science in Engineering Management." Includes bibliographical references.
Nasif, Mahmoud Abdullah. "A Possible Framework for Analysing National Security. The Saudi Arabian Perspective." Thesis, University of Bradford, 2014. http://hdl.handle.net/10454/7272.
Full textRivas, Althea. "Revisiting the security-development nexus : a critical analysis of the international intervention in Afghanistan." Thesis, University of Sussex, 2014. http://sro.sussex.ac.uk/id/eprint/47863/.
Full textGustafsson, Anna. "Vilka motiv ligger bakom den svenska regionreformen? : En idéanalys av vilka motiv som lyfts fram för att legitimera regionreformen där län ska bli regioner senast år 2023." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-49515.
Full textShobha, Poudel. "Analysis of Climate Change Impacts on Food Security and Livelihoods in the Mountainous Region of Nepal: A Case Study of Lamjung District." 京都大学 (Kyoto University), 2017. http://hdl.handle.net/2433/225765.
Full textKyoto University (京都大学)
0048
新制・課程博士
博士(地球環境学)
甲第20540号
地環博第161号
新制||地環||32(附属図書館)
京都大学大学院地球環境学舎地球環境学専攻
(主査)教授 舟川 晋也, 准教授 真常 仁志, 准教授 西前 出
学位規則第4条第1項該当
Roos, Johanna Adriana. "Food system analysis and the development of a system dynamics approach to improve food security for a vulnerable community in the Breede River Region, Western Cape Province, South Africa." Thesis, Stellenbosch : Stellenbosch University, 2012. http://hdl.handle.net/10019.1/20238.
Full textENGLISH ABSTRACT: The current food system is failing to effectively serve the urban poor. The modernisation and globalisation of the food system solves one set of problems, regarding food security, but at the same time it results in the creation of other complex challenges. Technically the food system ensures adequate food availability on a macro scale, but the structure of the system contributes to the creation of food deserts. Food deserts are areas in which there is a lack of food retail outlets where affordable, nutritious food is available. Communities living in these areas usually struggle to obtain a nutritious diet and the residents are characterised as poverty-stricken and of a poor nutritional status. The aim of this research is to support local authorities in the management and strategic planning of community food security. The research was conducted in Avian Park, a low-income community in the Breede Valley of the Western Cape, South Africa. The food retail environment of Avian Park was investigated to determine the availability and accessibility of food in the community. Furthermore, a system dynamics model was developed to identify those areas in the food system which need attention, in order to achieve greater food security. In addition strategies are suggested to improve community food security; specifically for Avian Park. These research outcomes, however, also serve as a general guideline for managing food security in low-income communities more effectively.
AFRIKAANSE OPSOMMING: Die huidige voedsel sisteem slaag nie daarin om arm mense in stede effektief te dien nie. Die ontwikkeling en globalisering van die voedsel sisteem los een stel probleme rondom voedselsekerheid op, maar skep terselfdetyd ander komplekse uitdagings. Tegnies verseker die voedsel sisteem die beskikbaarheid van genoegsame voedsel op 'n makro skaal, maar die struktuur van die sisteem dra by tot die ontwikkeling van “food deserts.” “Food deserts” is areas waar daar „n tekort aan voedsel kleinhandel afsetpunte is waar daar bekostigbare, voedsame kos beskikbaar is. Gemeenskappe wat in hieride areas leef sukkel gewoonlik om „n voedsame dieet te bekom en die inwoners word geken aan armoede en 'n ongewenste voedingstatus. Die doel van hierdie navorsing is om plaaslike owerhede te ondersteun om gemeenskap voedselsekerheid meer efektief te bestuur. Die navorsing was in Avian Park, „n lae-inkomste gemeensakp in die Breede Vallei van die Wes-Kaap, Suid-Afrika uitgevoer. Die voedsel kleinhandel omgewing van Avian Park is ondersoek om die voedsel beskikbaarheid en toegangklikheid te bepaal. Verder is „n “system dynamics” model ontwikkel om die areas in die voeldsel sisteem wat aandag verg, ten einde voedselsekuriteit te bekom, te identifiseer. Ten slotte word daar strategieë voorgestel om gemeenskap voeldselsekuriteit in Avian Park te verbeter. Hierdie navorsingsuitkomste dien egter ook as algemene riglyne om lae inkomste gemeenskappe se voedselsekerheid meer effektief te bestuur.
Ed-Daoui, Ilyas. "Towards systems-of-systems structural resilience assessment Resilience assessment as a foundation for systems-of-systems safety evaluation : application to an economic infrastructure An approach to systems-of-systems structural analysis through interoperability assessment : application on Moroccan Case A study of an adaptive approach for systems-of-systems integration A contribution to systems-of-systems concept standardization Unstructured peer-to-peer systems : towards swift Routing A deterministic approach for systems-of-systems resilience quantification Vers des systèmes de systèmes robustes Security enhancement architectural model for IMS based networks Towards reliable IMS-based networks." Thesis, Normandie, 2019. http://www.theses.fr/2019NORMIR07.
Full textNowadays, we expect of SoS (systems-of-systems) more than just to be functional, but also to be reliable, to preserve their performance, to complete the required fonctions and rnost importantly to anticipate potential defects. The relationship with resilience is among the numerous perspectives tackling reliability in the context of SoS. It is about the consequences in case of disturbances and associated uncertainties. Resilience is defined as the ability of systems to withstand a major disruption within acceptable degradation parameters and to recover within an acceptable time, composite costs and risks. In this thesis, two complementary approaches are proposed in an attempt to analyze SoS structural resilience. First is related to extensibility which is a specific characteristic of SoS as they are in continuous evolvement and change. A major focus is to evaluate SoS structural resilience with regards to its dynamic aspect and through interoperability assessment. On the other hand, a consideration of the SoS structure and inner workflow pathways represents the second approach. This perspective leads to structural resilience assessment through a set of indicators. Both proposed approaches are deterministic and can be used to evaluate the current state of SoS structure or to anticipate its resilience in future scenarios. Futhermore, a prototype is designed in order to process the structural resilience assessment. Considering spatial objects, it has been used to conduct experiments on real-based industrial infrastructures approached as SoS
Haywood, Ashley. "Exploring plausible futures and its implications for the governance of local food systems using local actors’ expertise in the Witzenberg region." University of Western Cape, 2020. http://hdl.handle.net/11394/7303.
Full textDespite having a significant agri-food sector, South Africa is faced with strong food security issues related to high inequalities and the legacy of the apartheid regime. The South African food system finds itself at risk of alienating the majority of its citizens from realizing their right to access food granted by the South African Constitution (1996) Section 27(1)(b). Increasing poverty, unemployment and poor governance are making it harder for ordinary South African citizens to put safe and nutritious food on the table. Part of the food security issue in South Africa is that there is an inefficiency in public policies. It can be explained by the extreme segmentation of public action between departments and also by the limitations and ineffectiveness of decentralization resulting in little to no involvement from local governments. Like most socio-economic issues, the effects of food insecurity are first experienced on the ground at the local level where municipalities are at the forefront. The absence of effective policy around food security and food systems at the local level in South Africa leaves room for research on improved local food governance. Municipalities should be best suited to understand the consequences of food insecurity and could therefore use some of their constitutional mandate which provides some room for manoeuvre with regard to food issues. The aim of this study is to raise awareness of food security issues at the municipal level and to identify ways to facilitate engagement by municipalities. Its main objective was to adopt a foresight approach, using scenarios with local actors, and to understand how it can help improve the engagement of municipalities and citizens in the food security debate and take possible action. This research has made use of an existing collaboration between the Centre of Excellence in Food Security (CoE-FS) and the South African Local Government Association (SALGA) developed in the Western Cape. The collaboration focuses on the understanding of the food policy space in South Africa, the results of existing policies, and how the co-production of knowledge between stakeholders, notably at the local level, can contribute to policy improvement.
Strand, Ida. "What does the Increased Fossil Fuel Scarcity mean for the Arctic Region? A Quantitative and Qualitative Content Analysis of Canada, Denmark, Norway, the United States and Russia's Arctic Strategy." Thesis, Malmö universitet, Fakulteten för kultur och samhälle (KS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-21199.
Full textAlmeida, Felipe de Castro Brum. "Avaliação do desempenho dos dispositivos de controle e modelagem de carga a partir de regiões de segurança estática." Universidade Federal de Juiz de Fora, 2011. https://repositorio.ufjf.br/jspui/handle/ufjf/2169.
Full textApproved for entry into archive by Adriana Oliveira (adriana.oliveira@ufjf.edu.br) on 2016-07-22T15:30:27Z (GMT) No. of bitstreams: 1 felipedecastrobrumalmeida.pdf: 1845415 bytes, checksum: 51a0b14098a88f1127e6d6291d69e2f7 (MD5)
Made available in DSpace on 2016-07-22T15:30:27Z (GMT). No. of bitstreams: 1 felipedecastrobrumalmeida.pdf: 1845415 bytes, checksum: 51a0b14098a88f1127e6d6291d69e2f7 (MD5) Previous issue date: 2011-03-29
CAPES - Coordenação de Aperfeiçoamento de Pessoal de Nível Superior
Este trabalho tem por objetivo principal a avaliação do desempenho de dispositivos de controle e da modelagem da carga a partir de Regiões de Segurança Estática. Trata-se de uma importante ferramenta para avaliação da segurança de sistemas elétricos de potência, utilizadas tanto em ambiente off-line de planejamento da expansão e operação, quanto em tempo real nos centros de controle e operação (sistemas on-line VSA). Estas regiões são obtidas através de sucessivas soluções de casos de fluxo de potência e seu objetivo principal é verificar as condições de atendimento a carga (mercado) a partir de diversas condições de despacho da geração. Inicialmente, portanto, é apresentado de forma detalhada o processo de construção das Regiões de Segurança Estática, bem como os principais aspectos construtivos e considerações relevantes que podem influenciar de forma significativa a análise do desempenho do sistema. Com este objetivo, foi desenvolvido um programa para construção automática das Regiões de Segurança Estática na plataforma MatLab®. Um ambiente de processamento paralelo, intrínseco ao próprio MatLab®, foi utilizado com o intuito de aprimorar o desempenho computacional, o que permite a avaliação tanto de sistemas de pequeno porte, de valor tutorial, quanto de sistemas de médio/grande porte. Numa segunda etapa, este trabalho objetiva avaliar o desempenho de importantes dispositivos de controle e modelagem de carga a partir da construção automática das Regiões de Segurança. Os dispositivos de controle avaliados são: (i) Controle Remoto de Tensão; (ii) Controle de Tensão por Bancos Shunt Chaveados Automaticamente; (iii) Controle Automático de Tensão por Transformadores tipo LTC (Load Tap Changer); (iv) Controle Secundário de Tensão. A influência da modelagem da carga na avaliação da segurança do sistema é investigada a partir dos modelos ZIP e motor de indução. Os resultados obtidos demonstram que a representação de dispositivos de controle e da modelagem da carga podem influenciar significativamente as Regiões de Segurança Estática de sistemas elétricos de potência.
The main objective of this work is to evaluate the performance of control devices and load modelling through Static Security Regions. This is an important tool for security assessment of electric power systems, which can be used for both the operating environment (on-line systems VSA) and planning studies. These regions are obtained through successive power flow solutions and its main objective is to verify the steady-state security conditions from different configurations of generation dispatch for a given constant demand. Initially, the construction process of the Static Security Regions, as well as the key aspects of the construction and relevant considerations that may significantly impact the analysis of the system performance, is presented in detail. In this sense, a program for automatic construction of the Static Security Regions have been developed using the MatLab® platform. An intrinsic parallel processing environment was used to improve the computational performance, which allowed the evaluation of a small tutorial system and medium/large scale systems. As a second step, this work proposes the evaluation of the impact of important control devices and load modelling on the Static Security Regions construction. The control devices investigated are: (i) Remote Voltage Control; (ii) Shunt Devices with Automatic and Discrete Switching; (iii) Voltage Control by Automatic Load Tap Changing (LTC) Transformers; (iv) Secondary Voltage Control. The impact of load modelling is investigated through ZIP and induction motors models. The results obtained indicated that the representation of control devices and load modelling may significantly impact the Static Security Regions of the electrical power systems.
Kun-Hui, Liu, and 劉坤輝. "The Influence of PRC’ s Deterrence Strategy to the Security of Asia-Pacific regional-Functional Analysis Approach." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/48163509679993695420.
Full text國防大學政治作戰學院
政治研究所
101
The end of the Second World War in 1945, followed by the United States and the Soviet Union to compete, but to avoid large-scale outbreak of the war, through local proxy war, science and technology, the arms race and intense diplomatic surging undercurrent, namely " mutual containment, but do not resort to the use of force ", so called" Cold War ", which is the origin of “curbing theory” of the US, after indirectly changed into " deterrence theory "of military development which would be a strategy as an alternative. To avoid it being like Western "deterrence theory", after the reform and opening up in 1978, the PRC’ s combines traditional Chinese "Art of War" and "deterrence theory” to form Chinese characteristics" deterrence strategy ". At the PRC’ s Central Military Commission enlarged meeting, in 1985, Deng Xiaoping stressed that "Faced with the threat of US-Soviet hegemony, China should develop its own deterrent strength , and upgrade it to a strategic position, adhere to the people's war deterrent, valuing the importance of building of deterrent, and improve the show of strength. The PRC’ s requirement is a deterrent to win without fighting in peace times; combat and victory to win the war during the war times. The "deterrence strategy" is an important strategy ideology of the Chinese Communist Party. The Cold War turned to the end till the 1991, collapse of the Soviet Union and East and West Germany unified. Under the international trend of moderate conditions, the goal of "deterrence strategy" also focus on stopping the war, avoiding the war expanding, so that create a country enough to affect the security of the Asia-Pacific region. In the study, through the research of the influence of PRC’ s "deterrence strategy" on the security of the Asia-Pacific region, using the research approach of "strategic" ,"functional analysis "," historical research "to do deep research and discussion about the three functions of PRC’ s deterrence strategy " stop the war ","avoid the expansion of the war "," reach a specific goal. Adapt "Parsons (Talcott Parsons), the structural functional approach (adaptation), goals (Goal Attainment) integration (Integration) mode to maintain (Latency)-oriented, in order to understand the factors and structure of the PRC’ s deterrence strategy. For the actually circumstance of safe operation of the Asia-Pacific region, realize the role and positioning of PRC’ s deterrence strategy.
Lee, Mei-Hsien, and 李玫憲. "New Research Approach to Regional Security Governance in Europe-A Comprehensive Analysis of Power, Institute, and Idea." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/52646599932664286735.
Full text國立中興大學
國際政治研究所
98
Because of its oncoming conceptualization, security governance neither becomes a popular research approach, nor has any acceptable operation-definition. This thesis aims to re-construct the analyzing framework of the security governance, and test its applicability for contemporary European security research. First, it re-constructs the security governance research model by combining governance with eclecticism analysis included power, institute, and idea. Second, it comprehensively analyzes the development, practice, and challenge of security governance toward Europe by case-study among Central and Eastern Europe, Arctic Ocean, and South Europe. Finally, it sums up all discussions and verifies research propositions and model. This thesis finds that, in order to deal with multilateral security threats, main regional actors have developed a synthetic governance strategy based on the need to handle different security threats in each sub-region. Regional actors have different choices of governing approach; however, under the same goal of resolving regional security problems, they still work on common principles included policy co-ordination, strategic co-management, and security co-operation.
CHEN, CHIA-YU, and 陳佳佑. "Levels of Analysis: A Study on the Changes of U.S.-Japan Alliance with A Regional Security Perspective." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/gk99xp.
Full text國立中正大學
戰略暨國際事務研究所
105
The Security Treaty Between the United States and Japan was signed on 8 September, 1951. For over 50 years, there are many associated researches on the U.S.-Japan security alliance, yet most of the researchers adapt in only one single theory to study the alliance partnership, instead of a levels-of-analysis approach which could possibly analyze the factors of the change, development and transformation of U.S.-Japan security alliance in a comprehensive perspective. Thus, due to respect of globalization and information transfer efficiency, I believe levels-of-analysis is a proper research approach to interpret and study international affairs in the era of dynamic. This research focuses on why the U.S.-Japan security alliance system changes over time, with a perspective on regional security. Putting the regional security into perspective, the levels-of-analysis approach of this research is slightly different from the usual approach. By taking an outside-in method as the primary factor analizing way and inside-out as a secondary factor analyzing way, I suggest it will be able to avoid the demerits and constraints caused by taking only one single level as a research approach. In addition, I also analyze whether since 1951, Japan’s changing role in the U.S.-Japan security alliance system acceleterate with the RMC assessment.
CHIEN, SSU-YI, and 簡思毅. "An Analysis of the Impact of North Korea's Development of Nuclear Weapons Regional Security in Northeast Asia." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/86618569052260587501.
Full text銘傳大學
社會與安全管理學系兩岸關係與安全管理碩士在職專班
105
Since Kim Jong-un, the leader of North Korea, has been in power since his father, Kim Jong-il has implemented nuclear control, and has conducted three nuclear tests in February 2013 and 2016 in January and September 2013, while actively conducting medium-range missiles, submarine-launched missiles and nuclear bombs South Korea, in the face of North Korea's nuclear threat, has also adopted a counter-system, including the expansion of the scale of military exercises with the United States, announced the deployment of "THAAD" (Terminal High Altitude Area Defense, THAAD), and strengthen cooperation with Japan's military defense, military deterrence to stop North Korea continued nuclear explosion test; in this situation, the Northeast Asian regional tensions become increasingly serious. This paper attempts to analyze the positive attitude of North Korea's development of nuclear weapons and the attitude of Northeast Asia, including China, South Korea, Japan, the United States and Russia, to analyze the impact of Kim Jong-un's regime on the development of regional security in Northeast Asia, And further explore the characteristics and changes of Kim Jong-un's national policy. At the same time, it is more important to judge the development trend of North Korea's nuclear issue in the future by means of expert comments and related literatures, and to master the regional security situation in Northeast Asia Change pulsation. In addition, the recent international situation, the United States Republican candidate Donald Trump new elected president, Donald Trump during the campaign has said that the North Korean nuclear issue should continue to take pressure policy, and even encourage Japan and South Korea to develop nuclear weapons against North Korea; The future of the nuclear issue, the future of the United States will continue to dominate the situation in Northeast Asia? And what kind of policy will the new US government take on North Korea? Will the regional security situation in Northeast Asia also face significant changes? Is also one of the focus of this article to explore.
Haringová, Ingrida. "Afghánistán jako izolátor regionálních komplexů? Sektorová analýza afghánské bezpečnosti." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-365086.
Full textLei, Yow-Tai, and 雷又台. "Study on P.R.C''s Regional Security Strategy After Cold War Era: Analysis of Shanghai Cooperation Organization.(1991-2004)." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/10816268190060747452.
Full text淡江大學
國際事務與戰略研究所
93
The two main geostrategy the United States adopts after the Cold War Era are building strong military alliance with the Japanese and North Atlantic Treaty Organization (NATO) eastward enlargement. The characteristic of these two actions express The United States’ attempt to keep P.R.C. in strageical containment, therefore; achieve the goal of controlling Eurasia and gain global hegemony. This theory greatly reflects Harlford Mackinder’s Heartland theory and Nicolas J. Spykman’s Rimland theory. NATO’s eastward enlargement to P.R.C. western border limits its geostrategy and impact on the benefits in Central Asia, which has been concerned by P.R.C. The enlargement of NATO also creates military threats to western border leading to the crsis of P.R.C. being containminated. Shanghai Cooperation Organization (SCO) is founded based on P.R.C. regional security strategy which politically prevent the independence of Xinjiang while providing regional security; In the meantime, developing economic realtionship with Central Asia’s petroleum resource supply will accelerate P.R.C.’s “Western Development” policy and this will indeed stop the converging attack from the United States. The thesis will be focused on the role of SCO and how P.R.C. act through SCO to procure its goal on regional security strategy. SCO is the only organization that has not been influenced by the United States; not only that, Nato led by the United States purport to expand to Russian border making it easier to envelop Russia and R.P.C.; However, The foundation of the SCO certainly reconciles United States’ strategy. After the September 11 event, the United States zealously interfere Eurasia’ affairs by anti-terrorism, providing emmense economic support to countries in Central Asia; on the other hand, because of the anti-terrorism led by the U.S. in Central Asia, it has made Russia and members of SCO such as Uzbekistan, Tajikistan, and Kazakhstan to give immediate effective support by allowing the garrisoning of American troops. The above contradiction may have great impact on the relationship between SCO members; therefore, if the SCO can extend its economic area and set military security as an auxiliary, then the SCO will not be easily replaced by the Americans.
Francis, David J. "US strategy in Africa: AFRICOM, terrorism and security challenges." 2010. http://hdl.handle.net/10454/5826.
Full textObadire, Olusegun Samson. "Analysis of stakeholder participation in the comprehensive rural development programme : the case of Muyexe In Limpopo Province, South Africa." Thesis, 2015. http://hdl.handle.net/11602/254.
Full textKuo, Chin-ying, and 郭金鷹. "Security Vulnerability Analysis of Chemical Transport in the Central Region of Taiwan." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/73364635877757288147.
Full text雲林科技大學
環境與安全工程系碩士班
98
After the the 911 events of 2001, the prevention efforts to avoid intentional attacked has become the focus of public concerns. An event of threatening water poison in one university was occurred in 2005. This event reminded us that intentional attacked was also possible here. This study surveyed sixty-eight drivers/managers of chemical transportation in the central region of Taiwan. Using questionnaires and security vulnerability analysis (SVA) to and preventive management program for selected transportation industries by general questionnaires in order to investigate the execution results and debate transport routes and accident in the central region of Taiwan . The conclusions from this study can be summarized as below: The major accident types of chemical transport are traffic accidents and followed by the leakage of chemicals. The most of chemical transport material are flammable substances and the accident rate was the highest.The results show about the all chemical transport had no conducted SVA. That also show the chemical transport in Taiwan of management SVA need to strengthen the transport routes’Consequesce Analysis, access control measures, security measures, emergency response plan’s integrity, team support and the first aid equipment;In the transport SVA show that the most of industries need to required under the threat that may arise, review and update the existing security processes;a few industries only need to maintain security cognition. More than half of the chemical transportation accident were only collision or exterior of a traffic accident, it often need to take a full or partial road closure in the security considerations, we not only pay attention to security incidents, but also need to carefully consider the traffic control or alternative rutes The suggestions from this study are: Suggest chemical transport industries in Taiwan should follow the API to introduce SVA. Suggest government refer to American SVA,and development related method for Taiwan. Suggest subsequent researchers can combine shipper’s site,transportation routes and receiver’s site and had to do a whole transports security vulnerability analysis.
Vickers, Katherine Elise. "Ghanaian women, creating economic security : an analysis of gender, development, and power in the Volta Region of Ghana, West Africa." Thesis, 2001. http://hdl.handle.net/1957/28424.
Full textGraduation date: 2001
Ngobeni, Tinyiko Lawrence. "A critical analysis of the security of foreign investments in the Southern African Development Community (SADC) region." Thesis, 2018. http://hdl.handle.net/10500/25054.
Full textMercantile Law
LL. D.
Kou, Chin-Hsiang, and 寇景翔. "Sun of the Taiwan region in the field of social security mechanism the citation analysis of Doctoral thesis and Master's thesis." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/32714028706586530656.
Full text國防大學政治作戰學院
政治研究所
96
ABSTRACT This study is based on the National Doctoral thesis and Master's thesis record of the information network for graduate thesis research of the National Library, and for Chinese Culture University, National Taiwan Normal University, National Taiwan University, National Chengchi University,National Sun Yat-sen University and School of the political warfare, such as San-min Sun and the Institute for Research Related Research Institute Analysis of the six schools, to describe the impact on the development by Sun of the Taiwan region. The research methods for the use of Library Science Citation analysis to analiyse Sun of the Taiwan region in the field of social security mechanism, and to establish of the database study by Sun citation analysis to study more full of vitality and creativity. In thecouclusion,I will propose the study of the direction of Sun in the field of social security mechanism in future, and it objectively reflects the economic and livelihood issues to resolve.The people can be engaged in political, religious and other activities. Aims at Taiwan's unification and independence issue must be headed , but is by no means must take the issue of people's livelihood.It’s the final objective of Dr. Sun Yat-sen’s social security mechanism. Key words: social security mechanism, citation analysis
Simonneau, Claire. "Gérer la ville au Bénin : la mise en œuvre du Registre foncier urbain à Cotonou, Porto-Novo et Bohicon." Thèse, 2015. http://hdl.handle.net/1866/13501.
Full textThe management of West African cities is problematic nowadays: uncontrolled urban sprawl, insufficient basic services, and land insecurity. Yet, major reforms had been put in place with the assistance of international aid to enhance the effectiveness of urban management; which seems to have failed. Going beyond this policy failure statement, the present dissertation aims at understanding how “managing the city” takes place in the particular context of West Africa. The implementation of the Urban Land Registry (RFU), a municipal and multi-purpose land information system that has been put in place in Benin through development programmes in the early 1990s, is the lens through which urban management is examined. Urban management is then studied through the actions taken rather than through the discourses. With a socio-anthropological approach, the implementation of the instrument is analysed from the stakeholders’ perspectives and according to a double analysis grid. On the one hand, the analysis aims at understanding the local appropriation of the RFU inside public administrations; and on the other hand, its aims at comprehending the interaction of the RFU with the territory, in particular with the complex dynamics of access to the land and land security. A multiple case study was conducted in three municipalities: Cotonou, Porto-Novo, and Bohicon. This study led to two main conclusions. First, the RFU is recognized as the key instrument of local taxation, but it is minimally implemented. This particular functioning is an optimal adaptation to a context made of: 1) professional rivalries in a compartmentalized administration, 2) political and financial stakes related to different sources of local revenues, and 3) political and institutional tensions provoked by the late decentralisation. Then, the RFU’s impacts in terms of national professional capacities are insufficient to reform urban management from inside municipal administration. Second, a key function of the RFU that is centralizing information on presumed landowners is impeded by the commodification of land information and by the territorialisation of land regulatory modes. This affects the implementation of the RFU as it takes part in this land information market, but with little success; and its impact is differentiated according to the ‘land regulation territory’ it applies. Finally, ‘managing the city’ in Benin is not an automatic task, even with the introduction of management instruments such as the RFU. Administration and politics continue to shape municipal policies, and the pluralistic city is managed in a differentiated manner. To the designers of public action (policies), this dissertation encourages to take into account existing regulation modes in African societies, even if they are multiple and complex, and it recognises the singular process of institution building in Africa.
Nyambi, Gwendoline. "A Comparative SWOT Analysis of the National Agricultural Extension Program Organization to Determine Best-Fit Program Model: A Case Study of the North West and South West Regions of Cameroon." Thesis, 2012. http://hdl.handle.net/1969.1/ETD-TAMU-2012-05-10983.
Full text