Dissertations / Theses on the topic 'Security complex'

To see the other types of publications on this topic, follow the link: Security complex.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security complex.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Hamad, Mohammed Hassan Ahmed. "Regional security complex theory and IGAD's regime." Thesis, University of Reading, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Thompson, A. I. "Digital watermarking for multimedia security using complex wavelets." Thesis, Queen's University Belfast, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492336.

Full text
Abstract:
Digital data hiding has gained popularity in recent years as a way of settling intellectual property rights disputes, the ease with which digital media can be copied and distributed has led to a need for a method of identifying the original owner ofthe media. Data hiding allows for the embedding of information in a host signal that can later be extracted as proof of ownership or for some other purpose. Robustness, imperceptibility and capacity are the three conflicting attributes of data hiding systems. This thesis is dedicated to the establishment of data hiding algorithms that will achieve new standards of imperceptibility and robustness and consequently lead to higher data hiding capacity. It is proposed to apply Spread Transform embedding that combines the two main methods of data hiding, Spread Spectrum (SS) and Quantization Index Modulation (QIM). Complex wavelets are employed as the watermark embedding domain. These wavelet transforms have several advantages over discretely sampled wavelet transforms such as improved directional selectivity. Visual models are developed for these wavelet transforms. The application of these wavelet transforms to the area of digital watermarking is considered including an information theoretic approach to derive the optimal capacity limits ofthe considered watermarking algorithms. In addition to grey scale image watermarking the application of the considered wavelet transforms and embedding algorithms are extended to the case of video and colour image watermarking.
APA, Harvard, Vancouver, ISO, and other styles
3

Madia, James D. "Homeland security organizations design contingencies in complex environments." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5559.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
Protecting America from terrorism, natural disasters, and other threats has never been more important or as complex an endeavor as it is today. From asymmetrical warfare to economic meltdown, the environments are increasingly unstable, dynamic and complex, yet many U.S. homeland security organizations are designed around a 19th century model created for the Industrial Age. Information Age challenges demand new ideas for organizational design. Traditional mechanistic and hierarchical bureaucracies must be re-examined. This thesis explores case studies that include an intelligence organization fighting bioterrorism and a military unit battling insurgents in asymmetrical warfare. Case study research was selected to examine "how" and "why" questions related to organic organizational design in dynamic and complex environments. Organic designs provide a better fit because they leveraged three critical capabilities for these environments: communication dissemination, sense-making, and timely conversion of information to action. This fit is accomplished through elements, such as decentralized decision authority, emergent leadership, low specialization, low formalization, use of liaisons, and a reliance on performance controls, which in turn, contribute to decentralized allocation of decision rights, unconstrained patterns of interaction, and broad distribution of information. Organizations of the future will benefit from the insights that emerged from this research.
APA, Harvard, Vancouver, ISO, and other styles
4

Franke, Benedikt. "Rethinking complex security cooperation with special reference to Africa's emerging peace and security architecture." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612245.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Taylor, Barry. "Identitying vulnerabilities and controls in complex composite security architectures." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757.

Full text
Abstract:
The ability to design and reason about architectures (here understood as organisations which are designed according to hierarchies of roles and those processes that link them) which co-exist and interact within complex environments is of increasing importance. With the introduction of more interconnected technology affecting the way in which stakeholders manage information and conduct their operations, the need for such a capability is clear. Current approaches either address this issue with a mathematical approach which presents an obstacle to most non-specialist analysts, or they choose not to incorporate the full spread of factors that fall within the scope of this thesis. This thesis aims to develop a capability that provides those decision-makers who have information security management responsibilities with the means to analyse isolated, as well as interacting, security and business architectures. It aims to provide this capability at a level of modelling abstraction that is accessible to such non-technical specialists. The first stage of the thesis builds on earlier work on hierarchical structures by Beautement and Pym (2010b). It is dedicated to the development of a suitable conceptual framework which is both general and flexible enough to embody the required properties of a system, as well as their method of implementation spread across hierarchies of rˆoles describing organisations. This concept is expanded to describe how such architectures may interact with one another, and notation which is helpful in discussing these operations carefully is also developed. The framework is then applied to three broad areas within information security, those of trust (which is interpreted as a specific property within a given domain), heuristics (which are broadly treated as actions that should be undertaken during certain conditions), and access control. In each case the suitability of the framework is investigated, leading to refinements in the model which support the common goal of providing a novel view on these approaches to security analysis. This view is characterised by a unified consideration of the underlying architectures, to properties and policies applied across organisations. A key driver in conducting this analysis is to enable the description of how properties, fundamental to the legitimacy of systems, may firstly be established and then by how they may be compromised—providing a view on system vulnerabilities in that controls may fail or be circumvented. Following this, the framework is also intended as a tool to address such vulnerabilities, and to provide a means by which to scope measures designed to mitigate them.
APA, Harvard, Vancouver, ISO, and other styles
6

Al-Khalifa, Talal Mohammed. "The Gulf and Southeast Asia : regional security complex and regional security community : a comparative study." Thesis, University of Exeter, 2012. http://hdl.handle.net/10036/3625.

Full text
Abstract:
The study covers two regions. These are shown to constitute ‘Regional security complexes’. The Gulf region and the Gulf Cooperation Council (GCC) and the Association of Southeast Asian Nations (ASEAN) in the Southeast Asian region are the focus of study. The defence and security circumstances of the two regions and the responses of the regions’ governments severally and cooperatively are examined. The study has had to take account of the geographic, historical, ethno-cultural differences between the two regions. These are shown to be influential in their respective security responses. Nonetheless, the thesis demonstrates how the regions can be understood in terms of a common theoretical framework. The study is undertaken primarily within the framework of the theory of ‘Regional Security Complex’ (RSCT), as developed by Buzan and Waever in Regions and Power. Regional security complexes are areas of internal “security interdependence” and securitisation. The theory (RSCT) is discussed critically. ‘Security Communities’ is a major comparative feature of the study. Amitav Acharya develops this approach in Constructing a Security Community in Southeast Asia. Emphasis is on the “creative construction” of a ‘security community’. The Gulf Cooperation Council may also be viewed in this way. ‘Regional security complex’ and ‘regional security community’ are not alternative theories of regional inter-state relations. The second is superstructural on the prior facts of regional security complexity. The GCC is a partial response to regional security and is a securitising actor in the region. ASEAN is an attempt at region-wide inclusiveness and conflict avoidance. Institutional management of security is described. The two regional approaches differ as beliefs that the “enmity/amity balance” is amenable to official regional policy and action: the Gulf and GCC are apparently locked in a dominant ‘enmity’ scenario; ASEAN seeks to establish a regime of ‘amity’. Whether ASEAN is notably less militarily oriented than the Gulf is questioned. States’ insistence on national security ‘resilience’ and ASEAN norms of ‘sovereignty’, ‘non-interference’ and conflict avoidance’ impede regional security development. ASEAN’s progress towards an ‘ASEAN Security Community’ is examined. The study discusses practicalities of these policies. The application and limitations of ‘Revolution in military affairs’ (RMA) are discussed. The military are viewed as a principal operational actor in any regional security response to conditions of regional security complexity. An examination of state-military relations is based on the concepts of ‘grand strategy’ and ‘military doctrine’.
APA, Harvard, Vancouver, ISO, and other styles
7

Green, Andrew Brian. "Is there a Central Asian security complex?, an application of security complex theory and securitization to problems relating to identity in Central Asia." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ52990.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kiss, Kristina, and P. G. Pererva. "Strategic problems of economic security of Ukraine." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40227.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raszewski, Slawomir. "European Union energy policy and the Black Sea/Caspian region : between security community and security complex?" Thesis, University of Leeds, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590293.

Full text
Abstract:
The return of energy security, as an issue of growing importance in international relations. has been a hallmark of the post-Cold War period. The systemic rift of 9/11 served as a 'wake-up call' in creating awareness of energy dependence and the associated political instability nexus, leading to energy diversification and conservation measures being initiated in major energy-consuming regions. Owing to its differing trade and supply structures, the role of natural gas as a fuel of choice to fill the gap between the era of oil and the era of nuclear/renewable energy bas become part of the energy security agenda while exposing it to a number of factors which have made it a key regional issue. Originally a bearer of an identity of an 'energy community', the European Union (EU) has been a leading proponent of this process. This thesis will provide a systematic re-examination of the foreign energy policy of the EU towards the Black Sea/Caspian region providing an explanation for EU policy failures during the critical years from 2004 to 2009. Despite a mature gas trade relationship with and its proximity to the energy rich nations of the Former Soviet Union (FSU), EU-Russia energy relations experienced a severe refreezing following the change of political leadership in Russia after 2000, which took place against a backdrop of rising global market prices for oil and, linked. to this, similar rises in the price of gas. During the same period the two transformative enlargements into Central and Eastern Europe (CEE) promised new energy policy opportunities. yet they have also created looming challenges in the process of creating a broader energy security community. The emerging conflation of the Caspian Sea region with the Black Sea region in energy terms, with Turkey as the conduit linking the energy-producing regions of the Caucasus and Central Asia with consuming states in Europe, have mutually become exposed to geopolitical realities that are clustered in the broader region. Drawing on extensive fieldwork data collected both in Brussels and Ankara the thesis provides vital information and analysis on the criticality of energy supply and the transit side of the policy and sheds new light on this process in the case study. The thesis identifies the causes of the deadlock affecting the policy-making process at the EU level and at the regional level in the Black/Caspian Sea region by examining both the internal and external dynamics which have frustrated the policymaking process. A focus in the EU on liberalisation and energy diversification have been hallmarks of the internal dynamics of the EU's policymaking processes. This has direct1y further added to the increased 'bureaucratisation' of the EU's energy policymaking process. Drawing on Allison's Foreign Policy Analysis Bureaucratic Politics (BPO) paradigm, primary and secondary data, including primary interviews with policy-makers, the thesis illuminates this little studied area and fills a gap in the literatures. The thesis also highlights at the regional level Ankara's new foreign and diplomacy-based energy policy dynamism juxtaposed with Moscow's omnipresence in regional energy security affairs. This regional juxtaposition of Ankara's energy needs and Moscow's omnipresence in the region poses difficult challenges for the implementation of EU energy policy as is discussed in the thesis.
APA, Harvard, Vancouver, ISO, and other styles
10

Khalid, Muhammad Adnan, and Qamar Nazir. "Security Issue of BGP in complex Peering and Transit Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2447.

Full text
Abstract:

Border Gateway Protocol (BGP) is a critical routing protocol of the internet, used to

exchange routing information between autonomous systems (ASes). BGP is highly

vulnerable to many attacks that can cause routing disturbance on the internet. This

paper describes BGP attacks, misconfigurations, causes of misconfigurations, impact

of these attacks and misconfigurations in BGP and counter measures. Also we

analyze new security architectures for BGP, comparison of these security protocols

and their deployment issues. At the end we propose new security solution that is

Defensive Routing Policy (DRP) to prevent BGP from malicious attacks and

misconfigurations. DRP is operationally deployable and very effective to solve BGP

problems.

APA, Harvard, Vancouver, ISO, and other styles
11

Boening, Astrid Bettina. "From the Barcelona Process to the Union for the Mediterranean: Sectors and Levels of Integration and Trust in the Mediterranean Region." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_dissertations/642.

Full text
Abstract:
This dissertation is a case study of the EuroMed Partnership (EMP). It aims to examine the complex political, economic and social interrelationships in the EMP, and their impact on regional security in the Euro-Mediterranean region. The main thesis proposed here is that regional integration is taking place to the point of a regional security complex being established among EMP-member countries. This would contrast with the Middle East Regional Security Complex suggested by Buzan and Waever (2003). The dynamics observed reflect realist concerns with security among members. They also display neo-liberal integration approaches as well as the regional reciprocal (re-)constructions of structure, interests, and identities as suggested in the constructivist literature. A triangulated mix of qualitative research methods is utilized with primary data from elite interviews, as well as from official publications of member governments and institutes. Secondary data from analyses by other researchers provide comparison data for this dissertation. It will contribute to a framework for understanding the shifting security environment in the Euro-Mediterranean region from 1995 to the present in terms of regional integration, peacemaking and peacekeeping.
APA, Harvard, Vancouver, ISO, and other styles
12

Tang, Dawei. "Container Line Supply Chain security analysis under complex and uncertain environment." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/container-line-supply-chain-security-analysis-under-complex-and-uncertain-environment(2b058744-e0fc-4b4f-9222-6a4b41cf7348).html.

Full text
Abstract:
Container Line Supply Chain (CLSC), which transports cargo in containers and accounts for approximately 95 percent of world trade, is a dominant way for world cargo transportation due to its high efficiency. However, the operation of a typical CLSC, which may involve as many as 25 different organizations spreading all over the world, is very complex, and at the same time, it is estimated that only 2 percent of imported containers are physically inspected in most countries. The complexity together with insufficient prevention measures makes CLSC vulnerable to many threats, such as cargo theft, smuggling, stowaway, terrorist activity, piracy, etc. Furthermore, as disruptions caused by a security incident in a certain point along a CLSC may also cause disruptions to other organizations involved in the same CLSC, the consequences of security incidents to a CLSC may be severe. Therefore, security analysis becomes essential to ensure smooth operation of CLSC, and more generally, to ensure smooth development of world economy. The literature review shows that research on CLSC security only began recently, especially after the terrorist attack on September 11th, 2001, and most of the research either focuses on developing policies, standards, regulations, etc. to improve CLSC security from a general view or focuses on discussing specific security issues in CLSC in a descriptive and subjective way. There is a lack of research on analytical security analysis to provide specific, feasible and practical assistance for people in governments, organizations and industries to improve CLSC security. Facing the situation mentioned above, this thesis intends to develop a set of analytical models for security analysis in CLSC to provide practical assistance to people in maintaining and improving CLSC security. In addition, through the development of the models, the thesis also intends to provide some methodologies for general risk/security analysis problems under complex and uncertain environment, and for some general complex decision problems under uncertainty. Specifically, the research conducted in the thesis is mainly aimed to answer the following two questions: how to assess security level of a CLSC in an analytical and rational way, and according to the security assessment result, how to develop balanced countermeasures to improve security level of a CLSC under the constraints of limited resources. For security assessment, factors influencing CLSC security as a whole are identified first and then organized into a general hierarchical model according to the relations among the factors. The general model is then refined for security assessment of a port storage area along a CLSC against cargo theft. Further, according to the characteristics of CLSC security analysis, the belief Rule base Inference Methodology using the Evidential Reasoning approach (RIMER) is selected as the tool to assess CLSC security due to its capabilities in accommodating and handling different forms of information with different kinds of uncertainty involved in both the measurement of factors identified and the measurement of relations among the factors. To build a basis of the application of RIMER, a new process is introduced to generate belief degrees in Belief Rule Bases (BRBs), with the aim of reducing bias and inconsistency in the process of the generation. Based on the results of CLSC security assessment, a novel resource allocation model for security improvement is also proposed within the framework of RIMER to optimally improve CLSC security under the constraints of available resources. In addition, it is reflected from the security assessment process that RIMER has its limitations in dealing with different information aggregation patterns identified in the proposed security assessment model, and in dealing with different kinds of incompleteness in CLSC security assessment. Correspondently, under the framework of RIMER, novel methods are proposed to accommodate and handle different information aggregation patterns, as well as different kinds of incompleteness. To validate the models proposed in the thesis, several case studies are conducted using data collected from different ports in both the UK and China. From a methodological point of view, the ideas, process and models proposed in the thesis regarding BRB generation, optimal resource allocation based on security assessment results, information aggregation pattern identification and handling, incomplete information handling can be applied not only for CLSC security analysis, but also for dealing with other risk and security analysis problems and more generally, some complex decision problems. From a practical point of view, the models proposed in the thesis can help people in governments, organizations, and industries related to CLSC develop best practices to ensure secure operation, assess security levels of organizations involved in a CLSC and security level of the whole CLSC, and allocate limited resources to improve security of organizations in CLSC. The potential beneficiaries of the research may include: governmental organizations, international/regional organizations, industrial organizations, classification societies, consulting companies, companies involved in a CLSC, companies with cargo to be shipped, individual researchers in relevant areas etc.
APA, Harvard, Vancouver, ISO, and other styles
13

Zeitoun, Mark, Bruce Lankford, Tobias Krueger, Tim Forsyth, Richard Carter, Arjen Y. Hoekstra, Richard Taylor, et al. "Reductionist and integrative research approaches to complex water security policy challenges." ELSEVIER SCI LTD, 2016. http://hdl.handle.net/10150/621212.

Full text
Abstract:
This article reviews and contrasts two approaches that water security researchers employ to advance understanding of the complexity of water-society policy challenges. A prevailing reductionist approach seeks to represent uncertainty through calculable risk, links national GDP tightly to hydro-climatological causes, and underplays diversity and politics in society. When adopted uncritically, this approach limits policy-makers to interventions that may reproduce inequalities, and that are too rigid to deal with future changes in society and climate. A second, more integrative, approach is found to address a range of uncertainties, explicitly recognise diversity in society and the environment, incorporate water resources that are less-easily controlled, and consider adaptive approaches to move beyond conventional supply-side prescriptions. The resultant policy recommendations are diverse, inclusive, and more likely to reach the marginalised in society, though they often encounter policy-uptake obstacles. The article concludes by defining a route towards more effective water security research and policy, which stresses analysis that matches the state of knowledge possessed, an expanded research agenda, and explicitly addresses inequities.
APA, Harvard, Vancouver, ISO, and other styles
14

Achenbach, Dirk [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "On Provable Security for Complex Systems / Dirk Achenbach. Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2016. http://d-nb.info/1084112426/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Yin, Xin. "Operational security monitoring technology and cooperative control principles for complex industrial processes." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/operational-security-monitoring-technology-and-cooperative-control-principles-for-complex-industrial-processes(ee55c32d-3d72-4ced-82e5-7050852dda63).html.

Full text
Abstract:
The development of modern process industries, and increasingly fierce competition in the world market, has inevitably led to new demands on process control from industrial sectors. An important question for process control is how to secure the security operation of complex industries. The power system is one of the most complex industrial systems in the world, and faults in transmission lines pose a threat to the safe and stable operation of power systems. An inspection and monitoring system for transmission lines is proposed in this thesis, and, as a case study, a comprehensive early-warning scheme for assessing the icing condition of transmission lines with probability density function (PDF) based image recognition technology is carried out. In addition, fault location technologies for both transmission lines and distribution networks are discussed as another important component of the operational security of power systems. These provide fault location methods based on distribution characteristics of faulty currents in optical ground wire (OPGW) and the travelling wave scheme with distribution generations. Finally, control algorithms for optimising the power distribution network are also discussed. Cooperative control, based upon physical network connectivity, is proposed. This is used to maintain a group of generators operating at the identical ratio in terms of their available power, which is known as fair utilisation.
APA, Harvard, Vancouver, ISO, and other styles
16

Costanzo, David. "Formal End-to-End Verification of Information-Flow Security for Complex Systems." Thesis, Yale University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10584941.

Full text
Abstract:

Protecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. Many complex systems, such as operating systems, hypervisors, web browsers, and distributed systems, require a user to trust that private information is properly isolated from other users. Real-world systems are full of bugs, however, so this assumption of trust is not reasonable.

The goal of this dissertation is to apply formal methods to complex security-sensitive systems, in such a way that we can guarantee to users that these systems really are trustworthy. Unfortunately, there are numerous prohibitive challenges standing in the way of achieving this goal.

One challenge is how to specify the desired security policy of a complex system. In the real world, pure noninterference 'is too strong to be useful. It is crucial to support more lenient security policies that allow for certain well-specified information flows between users, such as explicit declassifications. Furthermore, the specified policy must be comprehensible to users at a high level of abstraction, but also must apply to the low-level system implementation.

A second challenge is that real-world systems are usually written in low-level languages like C and assembly, but these languages are traditionally difficult to reason about. Additionally, even if we successfully verify individual C and assembly functions, how do we go about linking them together? The obvious answer is to do the linking after the C code gets compiled into assembly, but this requires trusting that the compiler did not accidentally or maliciously introduce security bugs. This is a very difficult problem, especially considering that a compiler may fail to preserve security even when it correctly preserves functional behavior.

A third challenge is how to actually go about conducting a security proof over low-level code. Traditional security type systems do not work well since they require a strongly-typed language, so how can a security violation be detected in untyped C or assembly code? In fact, it is actually common for code to temporarily violate a security policy, perhaps for performance reasons, but then to not actually perform any observable behavior influenced by the violation; how can we reason that this kind of code is acceptably secure? Finally, how do we conduct the proof in a unified way that allows us to link everything together into a system-wide guarantee?

In this dissertation, we make two major contributions that achieve our goal by overcoming all of these challenges. The first contribution is the development of a novel methodology allowing us to formally specify, prove, and propagate information-flow security policies using a single unifying mechanism, called the "observation function" . A policy is specified in terms of an expressive generalization of classical noninterference, proved using a general method that subsumes both security-label proofs and information-hiding proofs, and propagated across layers of abstraction using a special kind of simulation that is guaranteed to preserve security.

To demonstrate the effectiveness of our new methodology, our second major contribution is an actual end-to-end security proof, fully formalized and machine-checked in the Coq proof assistant, of a nontrivial operating system kernel. Our artifact is the first ever guaranteed-secure kernel involving both C and assembly code, including compilation from the C code into assembly. Our final result guarantees the following notion of isolation: as long as direct inter-process communication is not used, user processes executing over the kernel cannot influence each others' executions in any way. During the verification effort, we successfully discovered and fixed some interesting security holes in the kernel, such as one that exploits child process IDs as a side channel for communication.

We also demonstrate the generality and extensibility of our methodology by extending the kernel with a virtualized time feature allowing user processes to time their own executions. With a relatively minor amount of effort, we successfully prove that this new feature obeys our isolation policy, guaranteeing that user processes cannot exploit virtualized time as an information channel.

APA, Harvard, Vancouver, ISO, and other styles
17

Kim, Hyoungshick. "Complex network analysis for secure and robust communications." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Joyce, Nola. "Can you lead me now? leading in the complex world of Homeland Security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FJoyce.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2007.
Thesis Advisor(s): Bellavita, Christopher ; Bach, Robert. "September 2007." Description based on title screen as viewed on October 23, 2007. Includes bibliographical references (p.79-83). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
19

Khoo, How San, and xiaosan@starhub net sg. "Approaches to the Regional Security Analysis of Southeast Asia." The Australian National University. Choose one, 1999. http://thesis.anu.edu.au./public/adt-ANU20050617.140925.

Full text
Abstract:
The purpose of this study is to critically evaluate three scholarly perspectives -- balance of power, institutional, and security complex -- to examine the evolving dynamics of security interdependence and inter-state relations among Southeast Asian states and external powers since 1945. This study is thus a comparative evaluation of the strengths and weaknesses of the three methods in their empirical analysis of the regional security dynamics of Southeast Asia.¶ There is much merit in the balance of power approach. It tracked the consequences of the bipolar Cold War rivalry on Southeast Asia. Its logical construction led it to be concerned with alliances, coalitions and alignments. But it has not satisfactorily explained the relatively benign conditions after the Cold War. The institutional approach similarly emphasizes material explanatory factors (although, in its case, not exclusively so). It identifies the emergence of institutions when groups of countries find it in their mutual interest to cooperate through rules and norms. But the approach may prove to be incomplete in assessing ASEAN's post-Cold War behaviour. As an analytical device, the security complex is deployed to provide a corrective to the over-emphasis (of the other two approaches) on the systemic dynamics. By identifying regional and local dynamics interacting with systemic dynamics via patterns of amity and enmity, it offers explanatory accounts of the behaviour of regional states in situations where the other two approaches fail to do satisfactorily. Moreover, it provides a framework for the deployment of constructivism, which identifies the ideational process whereby interdependent regional states respond to changes in both the power and amity-enmity attributes.¶ This study concludes that security relations among Southeast Asian states and in their relations with external powers after the Cold War, are better examined using the three approaches in a complementary manner. In this way, the influence of local amity-enmity patterns is seen to impact on balance of power and institutional situations.
APA, Harvard, Vancouver, ISO, and other styles
20

Hassan, Talal. "AFGHANISTAN COMPLEX SITUATION AND ITS IMPLICATIONS ON PAKISTAN." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22705.

Full text
Abstract:
The aim of this thesis to high lights the Afghanistan complex situation and itsimplications on Pakistan. Though out the history, Afghanistan complex situation andweak government create a security threat for Pakistan. Since the late 1970s Afghanistanhad suffered brutal civil war in addition to foreign interventions in the form of the 1979Soviet invasion and the 2001 U.S. invasion. Pakistan is significantly and directly affectedby the foreign invasion in Afghanistan. Pakistan is facing a variety of security threats; aninternal threat, an Indian threat, and the threat from Afghanistan. In order to comprehendPakistan's security dilemma, it is necessary to start our discussion with analyze theAfghanistan geographically importance, foreign intervention in Afghanistan, pak-afghanrelation, Pakistan’s foreign policies towards Afghanistan, the resistance movement andrefugee problems, and then evaluate the security situation. Admittedly, the India factorcannot be ignored in studying Pakistan's security dilemma.
APA, Harvard, Vancouver, ISO, and other styles
21

Piekarz, M. J. "Tourism in an unstable and complex world? Searching for relevant a political risk paradigm and model for tourism organisations." Thesis, Department of Applied Sciences, Security and Resilience, 2009. http://hdl.handle.net/1826/4018.

Full text
Abstract:
This work has a single aim, focusing on developing a political risk model relevant for tourism organisations, which are operating in an increasingly complex and turbulent international environment. It pays particular attention to the language of risk (how risks are articulated and described), the culture of risk (how risks are viewed), and the risk process (how they are analysed and assessed). The work critically evaluates a variety of methods that can be utilised to scan, analyse and assess political hazards and risks. It finds that many of the existing methods of political and country risk assessment are limited and not sufficiently contextualised to the needs of the tourism industry. Whilst many models can have an attractive façade of using positivistic methods to calculate political risks, in practice these are fraught with problems. The study also highlights a more complex relationship between tourism and political instability, whereby tourism can be characterised as much by its robustness, as its sensitivity. A model is developed which primarily adapts a systems theory approach, whereby a language, culture and practical process is developed through which the analysis of various factors and indicators can take place. The approach adopted has a number of stages, which vary in the amount of data necessary for the analysis and assessment of political risks. The model begins by utilising existing travel advice databases, moving onto an analysis of the frequency of past events, then to the nature of the political system itself, finishing with an analysis and assessment of more complex input factors and indicators which relate to notions of causation. One of the more provocative features of the model is the argument that it is more than possible to make an assessment of the risks that the political environment can pose to a tourism organisation, without necessarily understanding theories of causation.
APA, Harvard, Vancouver, ISO, and other styles
22

Pearce, Jenny V. "Oil and armed conflict in Casanare/Colombia: complex contexts and contingent moments." Pluto Press, 2007. http://hdl.handle.net/10454/4013.

Full text
Abstract:
No
Are oil-rich countries prone to war? And, if so, why? There is a widely held belief that contemporary wars are motivated by the desire of great powers like the United States or Russia to control precious oil resources and to ensure energy security. This book argues that the main reason why oil-rich countries are prone to war is because of the character of their society and economy. Sectarian groups compete for access to oil resources and finance their military adventures through smuggling oil, kidnapping oil executives, or blowing up pipelines. Outside intervention only makes things worse. The use of conventional military force as in Iraq can bring neither stability nor security of supply. This book examines the relationship between oil and war in six different regions: Angola, Azerbaijan, Colombia, Indonesia, Nigeria and Russia. Each country has substantial oil reserves, and has a long history of conflict. The contributors assess what part oil plays in causing, aggravating or mitigating war in each region and how this relation has altered with the changing nature of war. It offers a novel conceptual approach bringing together Kaldor's work on 'new wars' and Karl's work on the petro-state.
APA, Harvard, Vancouver, ISO, and other styles
23

Clark, Christopher R. "Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems." Thesis, Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5137.

Full text
Abstract:
The objective of this research is to design and develop a reconfigurable string matching co-processor using field-programmable gate array (FPGA) technology that is capable of matching thousands of complex patterns at gigabit network rates for network intrusion detection systems (NIDS). The motivation for this work is to eliminate the most significant bottleneck in current NIDS software, which is the pattern matching process. The tasks involved with this research include designing efficient, high-performance hardware circuits for pattern matching and integrating the pattern matching co-processor with other NIDS components running on a network processor. The products of this work include a system to translate standard intrusion detection patterns to FPGA pattern matching circuits that support all the functionality required by modern NIDS. The system generates circuits efficient enough to enable the entire ruleset of a popular NIDS containing over 1,500 patterns and 17,000 characters to fit into a single low-end FPGA chip and process data at an input rate of over 800 Mb/s. The capacity and throughput both scale linearly, so larger and faster FPGA devices can be used to further increase performance. The FPGA co-processor allows the task of pattern matching to be completely offloaded from a NIDS, significantly improving the overall performance of the system.
APA, Harvard, Vancouver, ISO, and other styles
24

Piekarz, Mark J. "Tourism in an unstable and complex world? : searching for a relevant political risk paradigm and model for tourism organisations." Thesis, Cranfield University, 2008. http://dspace.lib.cranfield.ac.uk/handle/1826/4018.

Full text
Abstract:
This work has a single aim, focusing on developing a political risk model relevant for tourism organisations, which are operating in an increasingly complex and turbulent international environment. It pays particular attention to the language of risk (how risks are articulated and described), the culture of risk (how risks are viewed), and the risk process (how they are analysed and assessed). The work critically evaluates a variety of methods that can be utilised to scan, analyse and assess political hazards and risks. It finds that many of the existing methods of political and country risk assessment are limited and not sufficiently contextualised to the needs of the tourism industry. Whilst many models can have an attractive façade of using positivistic methods to calculate political risks, in practice these are fraught with problems. The study also highlights a more complex relationship between tourism and political instability, whereby tourism can be characterised as much by its robustness, as its sensitivity. A model is developed which primarily adapts a systems theory approach, whereby a language, culture and practical process is developed through which the analysis of various factors and indicators can take place. The approach adopted has a number of stages, which vary in the amount of data necessary for the analysis and assessment of political risks. The model begins by utilising existing travel advice databases, moving onto an analysis of the frequency of past events, then to the nature of the political system itself, finishing with an analysis and assessment of more complex input factors and indicators which relate to notions of causation. One of the more provocative features of the model is the argument that it is more than possible to make an assessment of the risks that the political environment can pose to a tourism organisation, without necessarily understanding theories of causation.
APA, Harvard, Vancouver, ISO, and other styles
25

van, Calster Patrick. "Crime, control and complexity on the 'crime and security complex' in modern Western society." Thesis, University of Huddersfield, 2015. http://eprints.hud.ac.uk/id/eprint/27855/.

Full text
Abstract:
The dominant scientific methodology utilised by social scientists to study problems of crime and disorder is a macroscopic perspective that focuses on order and control; the molar. It assumes the ‘outside’ position of the researcher who focuses on functionality. Researchers construct their object of research as a distinct phenomenon and try to find links between it and its environment: the research object is assumed to be goal-driven. However, social reality is much more complex than this dominant perspective is able to research. This thesis argues that the molar cannot be fully understood without the molecular, a concept that expresses the idea of the unpredictable: sentiments, such as misunderstandings, fears and aspirations are key. However, the molar and the molecular are inextricably connected and emerge at the same time. Consequently, small changes on the molecular level could have huge and unpredictable effects on the molar level. Then, it becomes key to study the emergence of systems of control, such as law and partnerships, in relation to these molecular liquidities. Such an approach might teach us how crime policies deviate from the goals intended and start to produce undesirable side-effects. The thesis explores an alternative epistemology for examining issues of criminological concern which centers the molecular. It presents three case studies to illustrate the way both levels are interconnected. The first is concerned with the messiness and unpredictability of everyday relations and interactions in a criminal network. The second explores two Dutch police partnerships. Molecular elements such as personal preferences, frustrations and tensions are found to have a significant impact on the outcome of these partnerships. The third examines a measure introduced to prevent anti-social behaviour in the Netherlands which made shopkeepers and security personnel co-responsible for detecting and punishing acts such as shoplifting and fraud. The case is embedded in civil, not criminal, law and it is the diffuse nature of quasicriminal law that leads shopkeepers to refer to internal rules to justify their own actions. The cases show that the molecular is crucial in understanding crime problems and possible solutions, and the thesis concludes that the molecular should form the basis of a new epistemology for criminology research.
APA, Harvard, Vancouver, ISO, and other styles
26

Henning, Rhonda R. "Security Policies That Make Sense for Complex Systems: Comprehensible Formalism for the System Consumer." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/9.

Full text
Abstract:
Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by the hour, minute, or number of instances required to complete a processing task. An access control policy mediates access requests between authorized users of an information system and the system's resources. Access control policies are defined at any given level of abstraction, such as the file, directory, system, or network, and can be instantiated in layers of increasing (or decreasing) abstraction. For the system end-user, the functional allocation of security policy to discrete system components, or subsystems, may be too complex for comprehension. In this dissertation, the concept of a metapolicy, or policy that governs execution of subordinate security policies, is introduced. From the user's perspective, the metapolicy provides the rules for system governance that are functionally applied across the system's components for policy enforcement. The metapolicy provides a method to communicate updated higher-level policy information to all components of a system; it minimizes the overhead associated with access control decisions by making access decisions at the highest level possible in the policy hierarchy. Formal definitions of policy often involve mathematical proof, formal logic, or set theoretic notation. Such policy definitions may be beyond the capability of a system user who simply wants to control information sharing. For thousands of years, mankind has used narrative and storytelling as a way to convey knowledge. This dissertation discusses how the concepts of storytelling can be embodied in computational narrative and used as a top-level requirements specification. The definition of metapolicy is further discussed, as is the relationship between the metapolicy and various access control mechanisms. The use of storytelling to derive the metapolicy and its applicability to formal requirements definition is discussed. The author's hypothesis on the use of narrative to explain security policy to the system user is validated through the use of a series of survey instruments. The survey instrument applies either a traditional requirements specification language or a brief narrative to describe a security policy and asks the subject to interpret the statements. The results of this research are promising and reflect a synthesis of the disciplines of neuroscience, security, and formal methods to present a potentially more comprehensible knowledge representation of security policy.
APA, Harvard, Vancouver, ISO, and other styles
27

Chaplin, Aliviah N. "The Ontological Security Complex: The Impact of System Altering Events on States’ Existential Identities." Ohio University Honors Tutorial College / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1556210264741664.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Österberg, Yngve. "Hur förklarar Regional Security Complex Theory Mistralaffären : en undersökning gällande RSCT och försvarsmateriella handelsavbrott." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6723.

Full text
Abstract:
Regional Security Complex Theory (RSCT) innefattar analysenheter som är nära kopplade till försvarsmateriella handelavtal och har därför ett teoretiskt ramverk som kan hjälpa förstå och förklara avtalen i detalj. Det är dock oklart exakt hur detta ska göras eftersom det inte tas upp i Regions and Powers: The Structure of International Security. Syftet med denna uppsats är att med hjälp av RSCT förklara Mistralaären för att sedan undersöka om det finns en underliggande process gemensamt för liknande fall.
APA, Harvard, Vancouver, ISO, and other styles
29

Baghdadi, Nima. "Dynamics of Iranian-Saudi Relations in the Persian Gulf Regional Security Complex (1920-1979)." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3652.

Full text
Abstract:
This dissertation is an exploration of the dynamics of Iranian-Saudi relations from the earliest days of their encounter in the 1920s through 1979 Islamic Revolution in Iran. This is a period in the relations of the two states that has rarely been the subject of intellectual inquiry in the existing literature. This present research provides an analytical historiography of Iranian-Saudi relations with an aim to examine the elements constituting the dynamics of their relations. This is attained by contextualizing the milestones of Iranian-Saudi relations, triangulating historical accounts to identify the narrative among alternatives that best fits the meaningful causal processes explaining continuity and change, and weighing the impacts of factors playing a role in any given period of the Iranian-Saudi relations.
APA, Harvard, Vancouver, ISO, and other styles
30

O'Donovan, David, and Alexandra Marshakova. "Overcoming the security quagmire: behavioural science and modern technology hold the key to solving the complex issue of law firm cyber security." Universität Leipzig, 2018. https://ul.qucosa.de/id/qucosa%3A21216.

Full text
Abstract:
While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not While all industries that handle valuable data have been subject to increasing levels of cyber attack, there is a set of inter-related factors in the law firm cyber security ecosystem that makes such firms more susceptible to attack and also serves to prevent them from taking action to counteract attack vulnerability. As a result of the inter-related external and internal factors affecting law firm cyber security, the human element of firm security infrastructure has been neglected, thereby making humans, at once law firms’ greatest asset, their main cyber security weakness. 1There has been some movement of late, and regulators and clients alike are right to demand law firms do more to improve their cyber security posture.2 However, much of the scrutiny to which their conduct has been subjected has tended to overlook the complexities of the law firm cyber security quagmire, and unless these issues are addressed in the context of a potential solution, meaningful change is not likely. Part 1 of this paper outlines the current threat landscape and details the integral role of human error in successful cyber breaches before turning to discuss recent cyber security incidents involving law firms. In Part 2, we analyse elements of law firm short-termism and the underregulation of law firm cyber security conduct and how these, when combined, play a key role in shaping law firm cyber security posture. Finally, in Part 3 we outline a realistic solution, incorporating principles from behavioural science and modern technological developments.
APA, Harvard, Vancouver, ISO, and other styles
31

Turton, Anthony Richard. "The political aspects of institutional developments in the water sector: South Africa and its international river basins." Thesis, University of Pretoria, 2003. http://hdl.handle.net/2263/25233.

Full text
Abstract:
This research set out to develop a deeper theoretical component to the emerging discipline of hydropolitics by studying the political aspects of institutional developments in the water sector. The focal point was the four international river basins that are shared between South Africa and six of its neighbouring states. The study found that while there is a lot of evidence for the securitization of water resource management in South Africa’s international river basins, there are also a number of examples of regimes. The creation of these regimes was driven primarily by threat perceptions relating to state security, mostly during the period of apartheid and the Cold War. These regimes were mostly robust and served as a valuable instrument for the de-escalation of conflict, which was primarily of a high politics nature. Examples of both plus-sum and zero-sum outcomes have been isolated. Plus-sum outcomes arose when the non-hegemonic state chose to view the offer of a regime in terms of national self-interest with four examples of this condition. In all four cases the non-hegemonic state benefited from cooperation with South Africa. Zero-sum outcomes arose when the non-hegemonic state chose to view the offer of a regime in terms of ideology with two examples of this condition. In both cases the non-hegemonic state did not benefit and was sidelined to the extent that they became marginalized and worse off than before. In all cases the hegemonic state benefited from the regime. The research consequently showed that a hydropolitical complex is emerging in Southern Africa, clustered around two international river basins, the Orange and Limpopo, which have been defined as pivotal basins. Both of these basins have reached the limit of their readily available water resources and future development is not possible on any great scale. Four of the most economically developed states in Southern Africa (Namibia, Botswana, Zimbabwe and South Africa) are riparians on these two international river basins, and have been defined as pivotal states. Other less developed countries that share any international river basin with a pivotal state have been defined as an impacted state, because their own development aspirations have been capped through this association. Any international river basin that has at least one of the pivotal states in it has been defined an impacted basin. Finally, this research showed that regimes create a plus-sum outcome in closed international river basins because they reduce the levels of uncertainty and institutionalize the conflict potential. As such regimes are a useful instrument with which to regulate inter-state behavior, leading over time to the development of institutions consisting of rules and procedures.
Thesis (DPhil (International Politics))--University of Pretoria, 2005.
Political Sciences
unrestricted
APA, Harvard, Vancouver, ISO, and other styles
32

Rosemont, Hugo David. "A UK 'security-industrial complex'? : a reassessment of the origins, characteristics, and consequences of private sector involvement in the counter-terrorism aspects of contemporary UK national security strategy." Thesis, King's College London (University of London), 2015. http://kclpure.kcl.ac.uk/portal/en/theses/a-uk-securityindustrial-complex(625c69b3-c890-40b7-86cd-417ca567d39e).html.

Full text
Abstract:
An argument has arisen that a ‘security-industrial complex’ (SIC) exists in, and is damaging to, the United Kingdom. The oft-repeated assessment is that, like the ‘military-industrial complex’ (MIC) which existed before (and continues to operate alongside) it, a damaging system of public-private sector interaction has emerged in the non-military aspects of national security strategy. Critics portray the purported system - the SIC - as an organised alliance of self-interested government and profit-making entities that exploits the security environment for its own gain. The suitability of using ‘SIC’ terminology is untested within security studies, however. This thesis reassesses how to conceptualise the public-private sector cooperation that has arisen in the contemporary security environment by analysing the origins, characteristics and consequences of the private sector’s involvement in the domestic counter-terrorism (CT) aspects of contemporary UK national security strategy following the terrorist attacks on the US on 11 September 2001. It demonstrates through reference to existing theory on the MIC, original interviews, and analysis of certain contracts and other case studies concerning companies’ involvement in the UK Government’s CT strategy that, instead of replicating the MIC in the new security context exactly, a more nuanced system of public-private interaction has arisen. Whilst some of the dynamics associated with the MIC exist in the CT sector, this thesis questions whether the aggregation of these dynamics in the CT field should be understood and presented in the same way. A lack of systemic scholarly research on ‘the SIC’ in the UK has hindered the development of policy-making and debate in respect of the private sector’s involvement in the non-military aspects of national security. The thesis seeks to address this gap, making an original, policy-orientated contribution, which aims to stimulate informed discussion and policy improvements in the field.
APA, Harvard, Vancouver, ISO, and other styles
33

Xiao, Jiaxi. "Information theoretic approach in detection and security codes." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43620.

Full text
Abstract:
Signal detection plays a critical role in realizing reliable transmission through communication systems. In this dissertation, by applying information theoretic approach, efficient detection schemes and algorithms are designed for three particular communication systems. First, a computation efficient coding and detection algorithm is developed to decode two dimensional inter-symbol interference (ISI) channels. The detection algorithm significantly reduces the computation complexity and makes the proposed equalization algorithm applicable. A new metric, the post-detection mutual information (PMI), is established to quantify the ultimate information rate between the discrete inputs and the hard detected output. This is the first time that the information rate loss caused by the hard mapping of the detectors is considered. Since the hard mapping step in the detector is irreversible, we expect that the PMI is reduced compared to the MI without hard mapping. The conclusion is confirmed by both the simulation and the theoretic results. Random complex field code is designed to achieve the secrecy capacity of wiretap channel with noiseless main channel and binary erasure eavesdroppers' channel. More importantly, in addition to approaching the secrecy capacity, RCFC is the first code design which provides a platform to tradeoff secrecy performance with the erasure rate of the eavesdropper's channel and the secrecy rate.
APA, Harvard, Vancouver, ISO, and other styles
34

Hartwig, Jason. "Flexibility, fluidity, and flux : the complex dynamics of international politics /." view abstract or download file of text, 2007. http://proquest.umi.com/pqdweb?did=1404353641&sid=1&Fmt=2&clientId=11238&RQT=309&VName=PQD.

Full text
Abstract:
Thesis (Ph. D.)--University of Oregon, 2007.
Typescript. Includes vita and abstract. Includes bibliographical references (leaves 276-365). Also available for download via the World Wide Web; free to University of Oregon users.
APA, Harvard, Vancouver, ISO, and other styles
35

Hanikat, Marcus. "Centralized log management for complex computer networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254292.

Full text
Abstract:
In modern computer networks log messages produced on different devices throughout the network is collected and analyzed. The data from these log messages gives the network administrators an overview of the networks operation, allows them to detect problems with the network and block security breaches. In this thesis several different centralized log management systems are analyzed and evaluated to see if they match the requirements for security, performance and cost which was established. These requirements are designed to meet the stakeholder’s requirements of log management and allow for scaling along with the growth of their network. To prove that the selected system meets the requirements, a small-scale implementation of the system will be created as a “proof of concept”. The conclusion reached was that the best solution for the centralized log management system was the ELK Stack system which is based upon the three open source software Elasticsearch, Logstash and Kibana. In the small-scale implementation of the ELK Stack system it was shown that it meets all the requirements placed on the system. The goal of this thesis is to help develop a greater understanding of some well-known centralized log management systems and why the usage of them is important for computer networks. This will be done by describing, comparing and evaluating some of the functionalities of the selected centralized log management systems. This thesis will also be able to provide people and entities with guidance and recommendations for the choice and implementation of a centralized log management system.
I moderna datornätverk så produceras loggar på olika enheter i nätverket för att sedan samlas in och analyseras. Den data som finns i dessa loggar hjälper nätverksadministratörerna att få en överblick av hur nätverket fungerar, tillåter dem att upptäcka problem i nätverket samt blockera säkerhetshål. I detta projekt så analyseras flertalet relevanta system för centraliserad loggning utifrån de krav för säkerhet, prestanda och kostnad som är uppsatta. Dessa krav är uppsatta för att möta intressentens krav på loghantering och även tillåta för skalning jämsides med tillväxten av deras nätverk. För att bevisa att det valda systemet även fyller de uppsatta kraven så upprättades även en småskalig implementation av det valda systemet som ett ”proof of concept”. Slutsatsen som drogs var att det bästa centraliserade loggningssystemet utifrån de krav som ställs var ELK Stack som är baserat på tre olika mjukvarusystem med öppen källkod som heter Elasticsearch, Logstash och Kibana. I den småskaliga implementationen av detta system så påvisades även att det valda loggningssystemet uppnår samtliga krav som ställdes på systemet. Målet med detta projekt är att hjälpa till att utveckla kunskapen kring några välkända system för centraliserad loggning och varför användning av dessa är av stor betydelse för datornätverk. Detta kommer att göras genom att beskriva, jämföra och utvärdera de utvalda systemen för centraliserad loggning. Projektet kan även att hjälpa personer och organisationer med vägledning och rekommendationer inför val och implementation av ett centraliserat loggningssystem.
APA, Harvard, Vancouver, ISO, and other styles
36

Serrano, Latorre Jairo D. "Vulnerability Assessment for Complex Middleware Interrelationships in Distributed Systems." Doctoral thesis, Universitat Autònoma de Barcelona, 2013. http://hdl.handle.net/10803/129506.

Full text
Abstract:
La rápida adaptación de la computación Cloud, ha llevado a un incremento veloz en la tasa de amenazas de las tecnologías de la información. El objetivo de estas nuevas amenazas cubren desde sistemas distribuidos a gran escala, tal como el Gran Colisionador de Partículas del CERN, hasta sistemas industriales (plantas nucleares, de electricidad, petróleo, etc.) distribuidos, es decir sistemas interconectados SCADA El uso de herramientas automáticas para el análisis de vulnerabilidades es realmente atractivo, pero mientras que estas herramientas pueden encontrar problemas comunes en el código fuente de un programa, estas no detectan un número significativo de vulnerabilidades críticas y complejas. Además, los sistemas middleware de los sistemas distribuidos basan su seguridad en mecanismos como son la autenticación, la autorización y la delegación. A pesar que estos mecanismos han sido ampliamente estudiados en profundidad, y deberían tener control sobre los recursos, estos no son suficientes para asegurar que todos los recursos de la aplicación están protegidos. Por lo tanto, la seguridad de los sistemas distribuidos ha sido puesta bajo la mirada vigilante de profesionales de la seguridad de la academia, industria y gobierno. Para abordar el problema de evaluar la seguridad de sistemas middleware críticos, proponemos una nueva metodología automatizada de análisis de vulnerabilidades, llamada “Análisis de Vectores de Ataque para Complejas Interrelaciones Middleware” (AvA4cmi), la cual es capaz de indicar cuales componentes middleware deben ser analizados y por qué. AvA4cmi está basada en la automatización de una parte de la novedosa metodología de análisis manual “Primeros Principios de Análisis de Vulnerabilidades” (FPVA), la cual ha sido usada satisfactoriamente para evaluar sistemas middleware reconocidos. Los resultados de AvA4cmi son independientes del lenguaje de programación, proveen una evaluación completa de cada vector de ataque en el middleware, y está basada en la taxonomía “Enumeración Común de Debilidades” (CWE), un catálogo formal para describir fallos de seguridad. Nuestros resultados se contrastaron contra el análisis manual de vulnerabilidades realizado al middleware CrossBroker, y nuestros resultados indicaron las debilidades más notables de los vectores de ataque del middleware gLite WMS, corroborando cuales componentes middleware deben ser analizados y por qué.
The fast adaptation of Cloud computing has led to an increased speedy rate of novel information technology threats. The targets of these new threats involve from large scale distributed system, such as the Large Hadron Collider by the CERN, up to industrial (nuclear, electricity, oil, etc.) distributed systems, i.e. SCADA networked systems. The use of automated tools for vulnerability assessment is quite attractive, but while these tools can find common problems in a program's source code, they miss a significant number of critical and complex vulnerabilities. In addition, frequently middleware systems base their security on mechanisms such as authentication, authorization, and delegation. While these mechanisms have been studied in depth and can control key resources, they are not enough to assure that all application's resources are safe. Therefore, security of distributed systems has been placed under the watchful eye of security practitioners in government, academia, and industry. To tackle the problem of assessing the security of critical middleware systems, we propose a new automated vulnerability assessment methodology, called Attack Vector Analyzer for Complex Middleware Interrelationships(AvA4cmi), which is able to automatically hint which middleware components should be assessed and why. AvA4cmi is based on automatizing part of the First Principles Vulnerability Assessment, an innovative analystic-centric (manual) methodology, which has been used successfully to evaluate several known middleware systems. AvA4cmi's results are language-independent, provide a comprehensive assessment of every possible attack vector in the middleware, and it is based on the Common Weakness Enumeration (CWE) system, a formal list for describing security weaknesses. Our results are contrasted against previous manual vulnerability assessment of the CrossBroker, and hint the most remarkable weaknesses for gLite WMS middleware, and corroborate which middleware components should be assessed and why.
APA, Harvard, Vancouver, ISO, and other styles
37

Fleece, Richard J. "Suicide terrorism in America?: the complex social conditions of this phenomenon and the implications for homeland security." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27830.

Full text
Abstract:
Outstanding Thesis
CHDS State/Local
Approved for public release; distribution is unlimited
This research applies social identity and intergroup relations theory to the phenomenon of suicide terrorism and develops a framework that can be used to better understand the threat of suicide terrorism and the implications for United States homeland security. Suicide terrorism is growing worldwide and is becoming more geographically diverse. Traditional studies of suicide terrorism tend to seek causal explanations of the phenomenon. This research uses a grounded theory approach to study the phenomenon that seeks to offer insight, enhance understanding, and provide a meaningful framework for understanding. The findings of this research recommend an alternate framework for understanding suicide terrorism based on the application of social identity theory and intergroup relations theory. Through the identification of alternative normative accounts in the choices that individuals make, this research is able to identify the complex social conditions of suicide terrorism and argues that the phenomenon is driven by powerful socio-cultural systems that prey on an individuals basic identity needs.
APA, Harvard, Vancouver, ISO, and other styles
38

Laracy, Joseph R. (Joseph Raymond). "A systems-theoretic security model for large scale, complex systems applied to the US air transportation system." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/39256.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, 2007.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 129-132).
Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, socio-technical systems. Recent work by Leveson in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. Systems-Theoretic Accident Models and Processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this thesis extends STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructures such as the Air Transportation System. Furthermore, recommendations are provided to assist systems engineers and policy makers in securely transitioning to the Next Generation Air Transportation System (NGATS).
by Joseph R. Laracy.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
39

Radhakrishnan, Rahul Lal. "A Method to Improve the Security of Information Diffusion in Complex Networks— Node Trust Value Management Mechanism." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42447.

Full text
Abstract:
In a sensing field-based placement of nodes the communication happens from the data acquisition points to the control center which is the receiver of data acquisition. In this project an algorithm based on data sense points trust value updating is used which will find out the value of the trust level dynamically once the trust level is found out it will pick the forwarded data sense points based on highest value of trust. The NTTUA algorithm is then compared with baysian trust method and then pick the path which has the highest baysian trust. The comparison between NTTUA and baysian method is done with respect to multiple parameters which give good performance and better residual energy along with throughput
APA, Harvard, Vancouver, ISO, and other styles
40

Borkoeva, Janargul. "Collecive Security Treaty Organization (csto) And The Limitations Of Russia." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613625/index.pdf.

Full text
Abstract:
This thesis aims to discuss the Collective Security Treaty Organization (CSTO) and the sources of Russia&rsquo
s influence over its other member-states. It focuses on the origins of the CSTO and the development of security cooperation within the CSTO framework. The thesis argues that although the CSTO continues to be a Russia-centric regional security organization, Russia&rsquo
s influence over the other CSTO member states has been gradually limited throughout the 2000s due to the increasing diversity in the threat perception of the other CSTO member states and the increasing penetration of the other regional security organizations into the post- Soviet space. Following the Introduction chapter, the second chapter discusses the origins of security cooperation within the framework of the CIS. The third chapter analyzes the CSTO in terms of its structure and activities since its establishment in 2002. The next chapter outlines the transnational challenges to the security of the post-Soviet states and their threat perception, as well as the efforts to promote regional security by the regional actors. The fifth chapter analyzes the increasing involvement of other regional security organizations, such as SCO, OSCE, and NATO into the post-Soviet space. The concluding chapter discusses the main finding of the thesis.
APA, Harvard, Vancouver, ISO, and other styles
41

Grabliauskaitė, Aušra. "ES šiaurinio regiono vaidmuo įgyvendinant ES energetinį saugumą XXI amžiuje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090612_103411-39900.

Full text
Abstract:
Pagrindinis darbo tikslas yra išanalizuoti Europos Sąjungos šiaurinio regiono, akcentuojant Rusijos Federacijos ir Norvegijos Karalystės įtaką regione, vaidmenį, užtikrinant energetinį saugumą Europos Sąjungoje, bei numatyti galimas ES energetikos politikos perspektyvas netolimoje ateityje. Siekiant geriau atskleisti darbo tikslą, keliami šie uždaviniai: apibrėžti saugumo sąvokos pagrindines dimensijas, veiksnius bei regioninio saugumo komplekso svarbą ir reikšmę Europos Sąjungos kontekste; atskleisti Europos Sąjungos šiaurinio ir Arkties regionų vaidmenį ES energetikos politikoje; išanalizuoti dabartinę ES energetinę padėtį ir priklausomybę nuo energetinių išteklių importo; išsiaiškinti Rusijos Federacijos ir Norvegijos Karalystės vietą ES energetinio saugumo kontekste; numatyti ES kaip galimo energetinio saugumo komplekso energetikos politikos ateities gaires. Parašius darbą pavyko patvirtinti iškeltą ginamąjį teiginį, jog nacionalinių valstybių kova dėl energetinių išteklių ir individualūs sprendimai sudaro sąlygas energetiniam nesaugumui Europos Sąjungoje, kadangi ES deklaruojamas siekis kalbėti „vienu balsu“ ir įgyvendinti bendrą energetinę politiką, prasilenkia su valstybių nacionaliniais interesais ir lieka neįgyvendintas. Nors Europos Sąjunga gali būti laikoma energetiniu saugumo kompleksu, kuriame energetinės priklausomybės santykis tarp šalių yra suvokiamas kaip grėsmė (kurios šaltinis iš esmės yra vienas – Rusijos Federacija), tačiau didėjantis vartojimas ir... [toliau žr. visą tekstą]
The main object of this study is to analyze the role of the North region of European Union, ensuring energy security in the EU and foresee the possible perspectives of the EU’s energy policy in the nearest future. The North region is analyzed emphasizing two countries which are main energy suppliers for Europe – Russian Federation and Norway. For a better understanding of the object, the specific proposition has been formulated: the struggle of the national states for energy resources and individual decisions allow energy insecurity in the European Union since the EU’s declared objective „to speak in one voice“ is inconsistent with national interests of EU’s member states. Although the European Union can be defined as the complex of energy security in which the relation of dependence is comprehended as a threat (the main source of this threat is the Russian Federation’s energy monopoly), however the growing consumption and competition for energy resources encourage the countries to search for alternative energy resources and its suppliers. These actions disrupt the initiatives of the common European Union’s energy policy. The political consciousness is not yet grown in the EU’s countries and it determinates the weakness of the EU as a political construct in case of competition with the rising economical powers (such as India and China) for energy resources. On the other hand the consumption is growing in the Russian market as well, which implies possible insecurity of supply... [to full text]
APA, Harvard, Vancouver, ISO, and other styles
42

Balchanos, Michael Gregory. "A probabilistic technique for the assessment of complex dynamic system resilience." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43730.

Full text
Abstract:
In the presence of operational uncertainty, one of the greatest challenges in systems engineering is to ensure system effectiveness, mission capability and survivability. Safety management is shifting from passive, reactive and diagnosis-based approaches to autonomous architectures that will manage safety and survivability through active, proactive and prognosis-based solutions. Resilience engineering is an emerging discipline, with alternative recommendations on safer and more survivable system architectures. A resilient system can "absorb" the impact of change due to unexpected disturbances, while it "adapts" to change, in order to maintain its physical integrity and mission capability. A framework of proposed resilience estimations is the basis for a scenario-based assessment technique, driven by modeling and simulation-based (M&S) analysis, for obtaining system performance, health monitoring, damage propagation and overall mission capability responses. For the technique development and testing, a small-scale canonical problem has been formulated, involving a reconfigurable spring-mass-damper system, in a multi-spring configuration. Operational uncertainty is introduced through disturbance factors, such as external forces with varying magnitude, input frequency, event duration and occurrence time. Case studies with varying levels of damping and alternative reconfiguration strategies return the effects of operational uncertainty on system performance, mission capability, and survivability, as well as on the "restore", "absorb", and "adapt" resilience capacities. The Topological Investigation for Resilient and Effective Systems, through Increased Architecture Survivability (TIRESIAS) technique is demonstrated for a reduced scale, reconfigurable naval cooling network application. With uncertainty effects modeled through network leak combinations, TIRESIAS provides insight on leak effects to survival times, mission capability degradations, and on resilience function capacities, for the baseline configuration. Comparative case studies were conducted for different architecture configurations, which have been generated for different total number of control valves and valve locations on the topology.
APA, Harvard, Vancouver, ISO, and other styles
43

Demurtas, Alessandro. "El complejo europeo de seguridad regional entre 2001 y 2011 en relación a las amenazas del terrorismo islamista y de las armas de destrucción masiva." Doctoral thesis, Universitat Autònoma de Barcelona, 2014. http://hdl.handle.net/10803/284325.

Full text
Abstract:
Este trabajo utiliza una teoría enmarcada en los estudios de la Escuela de Copenhague con el objetivo de determinar si la Unión Europea (UE) puede caracterizarse como un complejo de seguridad regional (RSC en su acrónimo inglés) en relación a las amenazas del terrorismo de matriz islamista y de las armas de destrucción masiva (ADM) entre los años 2001 y 2011. Para realizar esta tarea, la presente investigación hace un uso combinado de dos teorías elaboradas por la Escuela de Copenhague: la teoría de los RSC de Barry Buzan y Ole Waever del año 2003 y la teoría de la securitización que los dos autores elaboran junto con Jaap de Wilde en 1998. La investigación tiene dos objetivos. En primer lugar, utilizando la teoría de la securitización, intenta determinar las interrelaciones entre las dinámicas de seguridad de las unidades analizadas, tratando la UE como variable dependiente, los Estados seleccionados como variables independientes y explicativas (Alemania, España, Francia, Italia y Reino Unido), y la OTAN como variable interviniente. En segundo lugar, focaliza en el marco de las interrelaciones securitarias de las unidades para describir y explicar la eventual existencia del RSC europeo, las variables que lo componen y las tendencias hacia el mantenimiento del estatus quo o de cambio que ha vivido entre 2001 y 2011. Se trata en suma, de comprobar el potencial explicativo de la teoría de los RSC, con un sesgo constructivista y algunos elementos institucionalistas, frente a otras explicaciones, clásicas en Relaciones Internacionales, basadas en las intenciones, los intereses y el contexto. Dicho de otra forma, el presente trabajo se propone estudiar las prácticas estratégicas y de seguridad de la UE, de la OTAN y de España, Francia, Italia, Reino Unido y Alemania durante diez años (2001-2011). Una vez relevadas similitudes y diferencias, compatibilidades e incompatibilidades – y a través del uso de los instrumentos operativos y de las pautas de análisis ofrecidas por la teoría del RSC – la tesis quiere corroborar la existencia de interrelaciones entre estas prácticas y entre los procesos de securitización derivados de ellas. Las grandes preguntas de investigación de la tesis son: 1. A partir del análisis de los discursos y de las prácticas estratégicas y de seguridad de la UE, de la OTAN y de los Estados analizados, ¿podemos confirmar la existencia del RESC en relación a la amenaza del terrorismo islamista y de la proliferación de ADM? 2. De serlo, ¿cómo se estructura, eventualmente, el RESC? 3. En los casos concretos, ¿la UE y sus Estados miembros comparten las amenazas? Y ¿cuáles acciones y actuaciones concretas han tomado las unidades estudiadas para garantizar su seguridad? 4. En los ámbitos donde comparten la percepción de las amenazas, ¿es posible encontrar una actuación común, o persiste la división entre los Estados y la UE? Y ¿cuál influencia tiene la OTAN en estos ámbitos? Para llevar a cabo la investigación se analizaron un total de 2076 documentos: 662 discursos, intervenciones, comparecencias parlamentarias y entrevistas (actos de habla) de las autoridades públicas elegidas; 1206 artículos de cinco periódicos nacionales; 131 actos normativos y otros documentos oficiales y 77 sondeos demoscópicos nacionales y del Eurobarómetro.
This work uses a Security Studies theory elaborated by the Copenhagen School in order to determine if the European Union (EU) can be characterized as a regional security complex (RSC) in relation to the threats of Islamist terrorism and weapons of mass destruction (WMD) between 2001 and 2011. To accomplish this task, this research makes a combined use of two theories developed by the Copenhagen School: the theory of the RSC of Barry Buzan and Ole Waever, elaborated in 2003, and the theory of securitization that the two authors made together with Jaap de Wilde in 1998. The research has two goals. First, using the securitization theory, it tries to determine the interrelations between the analyzed units' security dynamics, treating the EU as the dependent variable, the States selected as independent and explanatory variables (Germany, Spain, France, Italy and United Kingdom), and NATO as an intervening variable. Second, it focus on the framework of units' strategic interrelations to describe and explain the presence of the European RSC, its structural variables and the trends towards the maintenance of the status quo or change between 2001 and 2011. To sum up, the thesis checks the explanatory potential of the theory of the RSC with a constructivist slant and some elements of the institutionalist focus, against other explanations, classic in International Relations field, based on the intentions, interests and the context. Put another way, this work proposes to study the strategic and security practices of the EU, NATO and of Spain, France, Italy, United Kingdom and Germany during ten years (2001-2011). Once relieved similarities and differences, compatibilities and incompatibilities - and through the use of operational instruments and guidelines of analysis offered by the theory of the RSC - the thesis tries to corroborate the existence of interrelationships between these practices and the securitization processes derived from them. The research questions are: 1. Starting from the analysis of discourses and security practices of the EU, NATO and the States analyzed, can we confirm the existence of the European RSC in relation to the threat of Islamist terrorism and the proliferation of WMD? 2. If so, how is RSC eventually structured? 3. In specific cases, do the EU and its Member States share threats perceptions? And which actions and concrete measures have the cases-study taken to ensure their security? 4. In the areas in which there's a sharing of the perception of the threats, is it possible to find a common action, or do divisions persist between the States and the EU? And what influence has NATO in these areas? To carry out research, a total of 2076 documents have been analyzed: 662 discourses, interventions, parliamentary hearings and interviews (speech acts) of elected public authorities; 1206 articles of five national newspapers; 131 normative acts and other documents and 77 national and Eurobarometer surveys.
APA, Harvard, Vancouver, ISO, and other styles
44

Budurushi, Jurlind [Verfasser], Melanie [Akademischer Betreuer] Volkamer, and Karen [Akademischer Betreuer] Renaud. "Usable Security Evaluation of EasyVote in the Context of Complex Elections / Jurlind Budurushi. Betreuer: Melanie Volkamer ; Karen Renaud." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/111214241X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Bell, Patrick M. "Development of Local Homeland Security Networks in the State of Florida: A Social Network Analysis Approach." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/574.

Full text
Abstract:
How do local homeland security organizations respond to catastrophic events such as hurricanes and acts of terrorism? Among the most important aspects of this response are these organizations ability to adapt to the uncertain nature of these “focusing events” (Birkland 1997). They are often behind the curve, seeing response as a linear process, when in fact it is a complex, multifaceted process that requires understanding the interactions between the fiscal pressures facing local governments, the institutional pressures of working within a new regulatory framework and the political pressures of bringing together different levels of government with different perspectives and agendas. This dissertation has focused on tracing the factors affecting the individuals and institutions planning, preparing, responding and recovering from natural and man-made disasters. Using social network analysis, my study analyzes the interactions between the individuals and institutions that respond to these “focusing events.” In practice, it is the combination of budgetary, institutional, and political pressures or constraints interacting with each other which resembles a Complex Adaptive System (CAS). To investigate this system, my study evaluates the evolution of two separate sets of organizations composed of first responders (Fire Chiefs, Emergency Management Coordinators) and community volunteers organized in the state of Florida over the last fifteen years. Using a social network analysis approach, my dissertation analyzes the interactions between Citizen Corps Councils (CCCs) and Community Emergency Response Teams (CERTs) in the state of Florida from 1996- 2011. It is the pattern of interconnections that occur over time that are the focus of this study. The social network analysis revealed an increase in the amount and density of connections between these organizations over the last fifteen years. The analysis also exposed the underlying patterns in these connections; that as the networks became more complex they also became more decentralized though not in any uniform manner. The present study brings to light a story of how communities have adapted to the ever changing circumstances that are sine qua non of natural and man-made disasters
APA, Harvard, Vancouver, ISO, and other styles
46

Wiltshire, Serge William. "On The Application Of Computational Modeling To Complex Food Systems Issues." ScholarWorks @ UVM, 2019. https://scholarworks.uvm.edu/graddis/1077.

Full text
Abstract:
Transdisciplinary food systems research aims to merge insights from multiple fields, often revealing confounding, complex interactions. Computational modeling offers a means to discover patterns and formulate novel solutions to such systems-level problems. The best models serve as hubs—or boundary objects—which ground and unify a collaborative, iterative, and transdisciplinary process of stakeholder engagement. This dissertation demonstrates the application of agent-based modeling, network analytics, and evolutionary computational optimization to the pressing food systems problem areas of livestock epidemiology and global food security. It is comprised of a methodological introduction, an executive summary, three journal-article formatted chapters, and an overarching discussion section. Chapter One employs an agent-based computer model (RUSH-PNBM v.1.1) developed to study the potential impact of the trend toward increased producer specialization on resilience to catastrophic epidemics within livestock production chains. In each run, an infection is introduced and may spread according to probabilities associated with the various modes of contact between hog producer, feed mill, and slaughter plant agents. Experimental data reveal that more-specialized systems are vulnerable to outbreaks at lower spatial densities, have more abrupt percolation transitions, and are characterized by less-predictable outcomes; suggesting that reworking network structures may represent a viable means to increase biosecurity. Chapter Two uses a calibrated, spatially-explicit version of RUSH-PNBM (v.1.2) to model the hog production chains within three U.S. states. Key metrics are calculated after each run, some of which pertain to overall network structures, while others describe each actor’s positionality within the network. A genetic programming algorithm is then employed to search for mathematical relationships between multiple individual indicators that effectively predict each node’s vulnerability. This “meta-metric” approach could be applied to aid livestock epidemiologists in the targeting of biosecurity interventions and may also be useful to study a wide range of complex network phenomena. Chapter Three focuses on food insecurity resulting from the projected gap between global food supply and demand over the coming decades. While no single solution has been identified, scholars suggest that investments into multiple interventions may stack together to solve the problem. However, formulating an effective plan of action requires knowledge about the level of change resulting from a given investment into each wedge, the time before that effect unfolds, the expected baseline change, and the maximum possible level of change. This chapter details an evolutionary-computational algorithm to optimize investment schedules according to the twin goals of maximizing global food security and minimizing cost. Future work will involve parameterizing the model through an expert informant advisory process to develop the existing framework into a practicable food policy decision-support tool.
APA, Harvard, Vancouver, ISO, and other styles
47

Yandas, Gokhan Osman. "Emerging Regional Security Complex In Central Asia: Shanghai Cooperation Organization (sco) And Challenges Of The Post 9/11 World." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12606201/index.pdf.

Full text
Abstract:
The aim of this thesis is to examine the changing characteristics of the regional security complex in Central Asia. The thesis focuses on the changes in the roles that the Shanghai Cooperation Organization (SCO) plays in promoting regional security in Central Asia, especially since the formation of the international coalition against international terrorism in the aftermath of the terrorist attacks on 11 September 2001. Contrary to the mainstream literature that focuses mainly on the security concerns of either regional powers or of great powers that considered this region as their own sphere of influence, this thesis argues that Central Asia&rsquo
s security issues that emerged in the aftermath of 9/11 could be explained better by taking the emerging regional security complex in Central Asia as the main unit of analysis. The thesis consists of seven chapters: In Chapter 1, thesis is introduced. Chapter 2 develops a conceptual framework for the thesis by examining the nature of regional security complex theory. This is followed by the examination of the characteristics of regional security complex in Central Asia in Chapter 3. Next, Chapter 4 discusses the foreign policies of the United States, Russia and China towards Central Asia. Chapters 5 and 6 examine the Shanghai Cooperation Organization, its role in the struggle against international terrorism and their reflections on the changes of the characteristics of Central Asian regional security complex. Last chapter concludes the thesis.
APA, Harvard, Vancouver, ISO, and other styles
48

Vural, Ebru. "The Middle East As A Regional Security Complex: Continuities And Changes In Turkish Foreign Policy Under The Jdp Rule." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12613208/index.pdf.

Full text
Abstract:
This thesis aims to contribute to the debates on the Justice and Development Party (JDP) era Turkish foreign policy by putting Turkey into the regional security complex theory and examines changes and continuities of Turkey&rsquo
s traditional cautious, relatively &ldquo
passive&rdquo
role and &ldquo
relative indifference&rdquo
stance towards the Middle East security complex. Hence, the framework of analysis is the regional security complex theory, attributed roles and role changes of Turkey within regional security complexes. This study, with a historical perspective and within the framework of the regional security complex theory, questions continuities and changes in the JDP period Turkish foreign policy, and comes to the conclusion that in the JDP era, Turkey&rsquo
s role is going beyond the insulator state function to the &ldquo
interface logic&rdquo
which adopts a loose form of geographical boundaries.
APA, Harvard, Vancouver, ISO, and other styles
49

Walsh, Barnaby Jessop. "Exploiter or unwitting accomplice? : China's engagement in the East African community and Uganda's utilisation of the regional security complex." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/exploiter-or-unwitting-accomplice(9c2b98b9-d82f-47da-8535-03a9830470a1).html.

Full text
Abstract:
The global rise of China occurs at a time when Africa undergoes an institutional effort to reshape its internal security dynamics. President Museveni of Uganda has utilised this context to centralise his position within an East African regional security environment which remains fluctuating and unstable, and offers an outstanding example of African agency. A continental overview of Africa using Buzan and Wæver’s Regional Security Complex Theory (RSCT) shows China impacting on security dynamics by creating a structural context in which African leaders must operate, as well as contributing to low-level security issues. A case study analysis of the East African Community (EAC) uncovers nuances therein, by establishing China’s role in the ongoing security issues related to ‘Terrorism’ and the ‘Oil Sector.’ Detailed interrogation of Uganda and President Museveni’s role within this environment, shows that China’s role in Small Arms and Light Weapons (SALW) proliferation and global ivory trade; and it being a market for oil, involved in developing the sector, and a key partner in mega-infrastructure construction, has greatly aided Museveni. The EAC is stabilising into a pre-complex, where a set of bilateral security relations potentially seem able to bind into a Regional Security Complex (RSC), and shows clear signs of moving to proto-complex status, where sufficient manifest security interdependence delineates it as a region (although thinly and weakly). Museveni’s role in this becoming of an RSC is crucially important. He has utilised Chinese engagement to a great extent, in order to shape this process in a way beneficial to himself and Uganda. China’s attempted exploitation of East Africa’s various opportunities has ultimately seen it become an unwitting accomplice in aiding President Museveni’s machinations. Museveni has successfully incorporated and deflected Chinese interests so as to maintain his domestic position and regional aspirations.
APA, Harvard, Vancouver, ISO, and other styles
50

Cole, Mara [Verfasser], and Harald [Akademischer Betreuer] Schaub. "Knowledge-Based Decision Making in Complex Environments: Methodological Aspects of Proactive Airport Security Management / Mara Cole. Betreuer: Harald Schaub." Bamberg : University of Bamberg Press, 2015. http://d-nb.info/1079523952/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography