Dissertations / Theses on the topic 'Security complex'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security complex.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Hamad, Mohammed Hassan Ahmed. "Regional security complex theory and IGAD's regime." Thesis, University of Reading, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.422800.
Full textThompson, A. I. "Digital watermarking for multimedia security using complex wavelets." Thesis, Queen's University Belfast, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492336.
Full textMadia, James D. "Homeland security organizations design contingencies in complex environments." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/5559.
Full textApproved for public release; distribution is unlimited
Protecting America from terrorism, natural disasters, and other threats has never been more important or as complex an endeavor as it is today. From asymmetrical warfare to economic meltdown, the environments are increasingly unstable, dynamic and complex, yet many U.S. homeland security organizations are designed around a 19th century model created for the Industrial Age. Information Age challenges demand new ideas for organizational design. Traditional mechanistic and hierarchical bureaucracies must be re-examined. This thesis explores case studies that include an intelligence organization fighting bioterrorism and a military unit battling insurgents in asymmetrical warfare. Case study research was selected to examine "how" and "why" questions related to organic organizational design in dynamic and complex environments. Organic designs provide a better fit because they leveraged three critical capabilities for these environments: communication dissemination, sense-making, and timely conversion of information to action. This fit is accomplished through elements, such as decentralized decision authority, emergent leadership, low specialization, low formalization, use of liaisons, and a reliance on performance controls, which in turn, contribute to decentralized allocation of decision rights, unconstrained patterns of interaction, and broad distribution of information. Organizations of the future will benefit from the insights that emerged from this research.
Franke, Benedikt. "Rethinking complex security cooperation with special reference to Africa's emerging peace and security architecture." Thesis, University of Cambridge, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.612245.
Full textTaylor, Barry. "Identitying vulnerabilities and controls in complex composite security architectures." Thesis, University of Aberdeen, 2014. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=225757.
Full textAl-Khalifa, Talal Mohammed. "The Gulf and Southeast Asia : regional security complex and regional security community : a comparative study." Thesis, University of Exeter, 2012. http://hdl.handle.net/10036/3625.
Full textGreen, Andrew Brian. "Is there a Central Asian security complex?, an application of security complex theory and securitization to problems relating to identity in Central Asia." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2000. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp03/MQ52990.pdf.
Full textKiss, Kristina, and P. G. Pererva. "Strategic problems of economic security of Ukraine." Thesis, Національний технічний університет "Харківський політехнічний інститут", 2018. http://repository.kpi.kharkov.ua/handle/KhPI-Press/40227.
Full textRaszewski, Slawomir. "European Union energy policy and the Black Sea/Caspian region : between security community and security complex?" Thesis, University of Leeds, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590293.
Full textKhalid, Muhammad Adnan, and Qamar Nazir. "Security Issue of BGP in complex Peering and Transit Networks." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-2447.
Full textBorder Gateway Protocol (BGP) is a critical routing protocol of the internet, used to
exchange routing information between autonomous systems (ASes). BGP is highly
vulnerable to many attacks that can cause routing disturbance on the internet. This
paper describes BGP attacks, misconfigurations, causes of misconfigurations, impact
of these attacks and misconfigurations in BGP and counter measures. Also we
analyze new security architectures for BGP, comparison of these security protocols
and their deployment issues. At the end we propose new security solution that is
Defensive Routing Policy (DRP) to prevent BGP from malicious attacks and
misconfigurations. DRP is operationally deployable and very effective to solve BGP
problems.
Boening, Astrid Bettina. "From the Barcelona Process to the Union for the Mediterranean: Sectors and Levels of Integration and Trust in the Mediterranean Region." Scholarly Repository, 2009. http://scholarlyrepository.miami.edu/oa_dissertations/642.
Full textTang, Dawei. "Container Line Supply Chain security analysis under complex and uncertain environment." Thesis, University of Manchester, 2012. https://www.research.manchester.ac.uk/portal/en/theses/container-line-supply-chain-security-analysis-under-complex-and-uncertain-environment(2b058744-e0fc-4b4f-9222-6a4b41cf7348).html.
Full textZeitoun, Mark, Bruce Lankford, Tobias Krueger, Tim Forsyth, Richard Carter, Arjen Y. Hoekstra, Richard Taylor, et al. "Reductionist and integrative research approaches to complex water security policy challenges." ELSEVIER SCI LTD, 2016. http://hdl.handle.net/10150/621212.
Full textAchenbach, Dirk [Verfasser], and J. [Akademischer Betreuer] Müller-Quade. "On Provable Security for Complex Systems / Dirk Achenbach. Betreuer: J. Müller-Quade." Karlsruhe : KIT-Bibliothek, 2016. http://d-nb.info/1084112426/34.
Full textYin, Xin. "Operational security monitoring technology and cooperative control principles for complex industrial processes." Thesis, University of Manchester, 2016. https://www.research.manchester.ac.uk/portal/en/theses/operational-security-monitoring-technology-and-cooperative-control-principles-for-complex-industrial-processes(ee55c32d-3d72-4ced-82e5-7050852dda63).html.
Full textCostanzo, David. "Formal End-to-End Verification of Information-Flow Security for Complex Systems." Thesis, Yale University, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10584941.
Full textProtecting the confidentiality of information manipulated by a computing system is one of the most important challenges facing today's cybersecurity community. Many complex systems, such as operating systems, hypervisors, web browsers, and distributed systems, require a user to trust that private information is properly isolated from other users. Real-world systems are full of bugs, however, so this assumption of trust is not reasonable.
The goal of this dissertation is to apply formal methods to complex security-sensitive systems, in such a way that we can guarantee to users that these systems really are trustworthy. Unfortunately, there are numerous prohibitive challenges standing in the way of achieving this goal.
One challenge is how to specify the desired security policy of a complex system. In the real world, pure noninterference 'is too strong to be useful. It is crucial to support more lenient security policies that allow for certain well-specified information flows between users, such as explicit declassifications. Furthermore, the specified policy must be comprehensible to users at a high level of abstraction, but also must apply to the low-level system implementation.
A second challenge is that real-world systems are usually written in low-level languages like C and assembly, but these languages are traditionally difficult to reason about. Additionally, even if we successfully verify individual C and assembly functions, how do we go about linking them together? The obvious answer is to do the linking after the C code gets compiled into assembly, but this requires trusting that the compiler did not accidentally or maliciously introduce security bugs. This is a very difficult problem, especially considering that a compiler may fail to preserve security even when it correctly preserves functional behavior.
A third challenge is how to actually go about conducting a security proof over low-level code. Traditional security type systems do not work well since they require a strongly-typed language, so how can a security violation be detected in untyped C or assembly code? In fact, it is actually common for code to temporarily violate a security policy, perhaps for performance reasons, but then to not actually perform any observable behavior influenced by the violation; how can we reason that this kind of code is acceptably secure? Finally, how do we conduct the proof in a unified way that allows us to link everything together into a system-wide guarantee?
In this dissertation, we make two major contributions that achieve our goal by overcoming all of these challenges. The first contribution is the development of a novel methodology allowing us to formally specify, prove, and propagate information-flow security policies using a single unifying mechanism, called the "observation function" . A policy is specified in terms of an expressive generalization of classical noninterference, proved using a general method that subsumes both security-label proofs and information-hiding proofs, and propagated across layers of abstraction using a special kind of simulation that is guaranteed to preserve security.
To demonstrate the effectiveness of our new methodology, our second major contribution is an actual end-to-end security proof, fully formalized and machine-checked in the Coq proof assistant, of a nontrivial operating system kernel. Our artifact is the first ever guaranteed-secure kernel involving both C and assembly code, including compilation from the C code into assembly. Our final result guarantees the following notion of isolation: as long as direct inter-process communication is not used, user processes executing over the kernel cannot influence each others' executions in any way. During the verification effort, we successfully discovered and fixed some interesting security holes in the kernel, such as one that exploits child process IDs as a side channel for communication.
We also demonstrate the generality and extensibility of our methodology by extending the kernel with a virtualized time feature allowing user processes to time their own executions. With a relatively minor amount of effort, we successfully prove that this new feature obeys our isolation policy, guaranteeing that user processes cannot exploit virtualized time as an information channel.
Kim, Hyoungshick. "Complex network analysis for secure and robust communications." Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610134.
Full textJoyce, Nola. "Can you lead me now? leading in the complex world of Homeland Security." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FJoyce.pdf.
Full textThesis Advisor(s): Bellavita, Christopher ; Bach, Robert. "September 2007." Description based on title screen as viewed on October 23, 2007. Includes bibliographical references (p.79-83). Also available in print.
Khoo, How San, and xiaosan@starhub net sg. "Approaches to the Regional Security Analysis of Southeast Asia." The Australian National University. Choose one, 1999. http://thesis.anu.edu.au./public/adt-ANU20050617.140925.
Full textHassan, Talal. "AFGHANISTAN COMPLEX SITUATION AND ITS IMPLICATIONS ON PAKISTAN." Thesis, Malmö högskola, Fakulteten för kultur och samhälle (KS), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-22705.
Full textPiekarz, M. J. "Tourism in an unstable and complex world? Searching for relevant a political risk paradigm and model for tourism organisations." Thesis, Department of Applied Sciences, Security and Resilience, 2009. http://hdl.handle.net/1826/4018.
Full textPearce, Jenny V. "Oil and armed conflict in Casanare/Colombia: complex contexts and contingent moments." Pluto Press, 2007. http://hdl.handle.net/10454/4013.
Full textAre oil-rich countries prone to war? And, if so, why? There is a widely held belief that contemporary wars are motivated by the desire of great powers like the United States or Russia to control precious oil resources and to ensure energy security. This book argues that the main reason why oil-rich countries are prone to war is because of the character of their society and economy. Sectarian groups compete for access to oil resources and finance their military adventures through smuggling oil, kidnapping oil executives, or blowing up pipelines. Outside intervention only makes things worse. The use of conventional military force as in Iraq can bring neither stability nor security of supply. This book examines the relationship between oil and war in six different regions: Angola, Azerbaijan, Colombia, Indonesia, Nigeria and Russia. Each country has substantial oil reserves, and has a long history of conflict. The contributors assess what part oil plays in causing, aggravating or mitigating war in each region and how this relation has altered with the changing nature of war. It offers a novel conceptual approach bringing together Kaldor's work on 'new wars' and Karl's work on the petro-state.
Clark, Christopher R. "Design of Efficient FPGA Circuits For Matching Complex Patterns in Network Intrusion Detection Systems." Thesis, Georgia Institute of Technology, 2004. http://hdl.handle.net/1853/5137.
Full textPiekarz, Mark J. "Tourism in an unstable and complex world? : searching for a relevant political risk paradigm and model for tourism organisations." Thesis, Cranfield University, 2008. http://dspace.lib.cranfield.ac.uk/handle/1826/4018.
Full textvan, Calster Patrick. "Crime, control and complexity on the 'crime and security complex' in modern Western society." Thesis, University of Huddersfield, 2015. http://eprints.hud.ac.uk/id/eprint/27855/.
Full textHenning, Rhonda R. "Security Policies That Make Sense for Complex Systems: Comprehensible Formalism for the System Consumer." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/9.
Full textChaplin, Aliviah N. "The Ontological Security Complex: The Impact of System Altering Events on States’ Existential Identities." Ohio University Honors Tutorial College / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=ouhonors1556210264741664.
Full textÖsterberg, Yngve. "Hur förklarar Regional Security Complex Theory Mistralaffären : en undersökning gällande RSCT och försvarsmateriella handelsavbrott." Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6723.
Full textBaghdadi, Nima. "Dynamics of Iranian-Saudi Relations in the Persian Gulf Regional Security Complex (1920-1979)." FIU Digital Commons, 2018. https://digitalcommons.fiu.edu/etd/3652.
Full textO'Donovan, David, and Alexandra Marshakova. "Overcoming the security quagmire: behavioural science and modern technology hold the key to solving the complex issue of law firm cyber security." Universität Leipzig, 2018. https://ul.qucosa.de/id/qucosa%3A21216.
Full textTurton, Anthony Richard. "The political aspects of institutional developments in the water sector: South Africa and its international river basins." Thesis, University of Pretoria, 2003. http://hdl.handle.net/2263/25233.
Full textThesis (DPhil (International Politics))--University of Pretoria, 2005.
Political Sciences
unrestricted
Rosemont, Hugo David. "A UK 'security-industrial complex'? : a reassessment of the origins, characteristics, and consequences of private sector involvement in the counter-terrorism aspects of contemporary UK national security strategy." Thesis, King's College London (University of London), 2015. http://kclpure.kcl.ac.uk/portal/en/theses/a-uk-securityindustrial-complex(625c69b3-c890-40b7-86cd-417ca567d39e).html.
Full textXiao, Jiaxi. "Information theoretic approach in detection and security codes." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43620.
Full textHartwig, Jason. "Flexibility, fluidity, and flux : the complex dynamics of international politics /." view abstract or download file of text, 2007. http://proquest.umi.com/pqdweb?did=1404353641&sid=1&Fmt=2&clientId=11238&RQT=309&VName=PQD.
Full textTypescript. Includes vita and abstract. Includes bibliographical references (leaves 276-365). Also available for download via the World Wide Web; free to University of Oregon users.
Hanikat, Marcus. "Centralized log management for complex computer networks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-254292.
Full textI moderna datornätverk så produceras loggar på olika enheter i nätverket för att sedan samlas in och analyseras. Den data som finns i dessa loggar hjälper nätverksadministratörerna att få en överblick av hur nätverket fungerar, tillåter dem att upptäcka problem i nätverket samt blockera säkerhetshål. I detta projekt så analyseras flertalet relevanta system för centraliserad loggning utifrån de krav för säkerhet, prestanda och kostnad som är uppsatta. Dessa krav är uppsatta för att möta intressentens krav på loghantering och även tillåta för skalning jämsides med tillväxten av deras nätverk. För att bevisa att det valda systemet även fyller de uppsatta kraven så upprättades även en småskalig implementation av det valda systemet som ett ”proof of concept”. Slutsatsen som drogs var att det bästa centraliserade loggningssystemet utifrån de krav som ställs var ELK Stack som är baserat på tre olika mjukvarusystem med öppen källkod som heter Elasticsearch, Logstash och Kibana. I den småskaliga implementationen av detta system så påvisades även att det valda loggningssystemet uppnår samtliga krav som ställdes på systemet. Målet med detta projekt är att hjälpa till att utveckla kunskapen kring några välkända system för centraliserad loggning och varför användning av dessa är av stor betydelse för datornätverk. Detta kommer att göras genom att beskriva, jämföra och utvärdera de utvalda systemen för centraliserad loggning. Projektet kan även att hjälpa personer och organisationer med vägledning och rekommendationer inför val och implementation av ett centraliserat loggningssystem.
Serrano, Latorre Jairo D. "Vulnerability Assessment for Complex Middleware Interrelationships in Distributed Systems." Doctoral thesis, Universitat Autònoma de Barcelona, 2013. http://hdl.handle.net/10803/129506.
Full textThe fast adaptation of Cloud computing has led to an increased speedy rate of novel information technology threats. The targets of these new threats involve from large scale distributed system, such as the Large Hadron Collider by the CERN, up to industrial (nuclear, electricity, oil, etc.) distributed systems, i.e. SCADA networked systems. The use of automated tools for vulnerability assessment is quite attractive, but while these tools can find common problems in a program's source code, they miss a significant number of critical and complex vulnerabilities. In addition, frequently middleware systems base their security on mechanisms such as authentication, authorization, and delegation. While these mechanisms have been studied in depth and can control key resources, they are not enough to assure that all application's resources are safe. Therefore, security of distributed systems has been placed under the watchful eye of security practitioners in government, academia, and industry. To tackle the problem of assessing the security of critical middleware systems, we propose a new automated vulnerability assessment methodology, called Attack Vector Analyzer for Complex Middleware Interrelationships(AvA4cmi), which is able to automatically hint which middleware components should be assessed and why. AvA4cmi is based on automatizing part of the First Principles Vulnerability Assessment, an innovative analystic-centric (manual) methodology, which has been used successfully to evaluate several known middleware systems. AvA4cmi's results are language-independent, provide a comprehensive assessment of every possible attack vector in the middleware, and it is based on the Common Weakness Enumeration (CWE) system, a formal list for describing security weaknesses. Our results are contrasted against previous manual vulnerability assessment of the CrossBroker, and hint the most remarkable weaknesses for gLite WMS middleware, and corroborate which middleware components should be assessed and why.
Fleece, Richard J. "Suicide terrorism in America?: the complex social conditions of this phenomenon and the implications for homeland security." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27830.
Full textCHDS State/Local
Approved for public release; distribution is unlimited
This research applies social identity and intergroup relations theory to the phenomenon of suicide terrorism and develops a framework that can be used to better understand the threat of suicide terrorism and the implications for United States homeland security. Suicide terrorism is growing worldwide and is becoming more geographically diverse. Traditional studies of suicide terrorism tend to seek causal explanations of the phenomenon. This research uses a grounded theory approach to study the phenomenon that seeks to offer insight, enhance understanding, and provide a meaningful framework for understanding. The findings of this research recommend an alternate framework for understanding suicide terrorism based on the application of social identity theory and intergroup relations theory. Through the identification of alternative normative accounts in the choices that individuals make, this research is able to identify the complex social conditions of suicide terrorism and argues that the phenomenon is driven by powerful socio-cultural systems that prey on an individuals basic identity needs.
Laracy, Joseph R. (Joseph Raymond). "A systems-theoretic security model for large scale, complex systems applied to the US air transportation system." Thesis, Massachusetts Institute of Technology, 2007. http://hdl.handle.net/1721.1/39256.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 129-132).
Classical risk-based or game-theoretic security models rely on assumptions from reliability theory and rational expectations economics that are not applicable to security threats. Additionally, these models suffer from serious deficiencies when they are applied to software-intensive, socio-technical systems. Recent work by Leveson in the area of system safety engineering has led to the development of a new accident model for system safety that acknowledges the dynamic complexity of accidents. Systems-Theoretic Accident Models and Processes (STAMP) applies principles from control theory to enforce constraints on hazards and thereby prevent accidents. Appreciating the similarities between safety and security while still acknowledging the differences, this thesis extends STAMP to security problems. In particular, it is applied to identify and mitigate the threats that could emerge in critical infrastructures such as the Air Transportation System. Furthermore, recommendations are provided to assist systems engineers and policy makers in securely transitioning to the Next Generation Air Transportation System (NGATS).
by Joseph R. Laracy.
S.M.
Radhakrishnan, Rahul Lal. "A Method to Improve the Security of Information Diffusion in Complex Networks— Node Trust Value Management Mechanism." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42447.
Full textBorkoeva, Janargul. "Collecive Security Treaty Organization (csto) And The Limitations Of Russia." Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613625/index.pdf.
Full texts influence over its other member-states. It focuses on the origins of the CSTO and the development of security cooperation within the CSTO framework. The thesis argues that although the CSTO continues to be a Russia-centric regional security organization, Russia&rsquo
s influence over the other CSTO member states has been gradually limited throughout the 2000s due to the increasing diversity in the threat perception of the other CSTO member states and the increasing penetration of the other regional security organizations into the post- Soviet space. Following the Introduction chapter, the second chapter discusses the origins of security cooperation within the framework of the CIS. The third chapter analyzes the CSTO in terms of its structure and activities since its establishment in 2002. The next chapter outlines the transnational challenges to the security of the post-Soviet states and their threat perception, as well as the efforts to promote regional security by the regional actors. The fifth chapter analyzes the increasing involvement of other regional security organizations, such as SCO, OSCE, and NATO into the post-Soviet space. The concluding chapter discusses the main finding of the thesis.
Grabliauskaitė, Aušra. "ES šiaurinio regiono vaidmuo įgyvendinant ES energetinį saugumą XXI amžiuje." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2009. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2009~D_20090612_103411-39900.
Full textThe main object of this study is to analyze the role of the North region of European Union, ensuring energy security in the EU and foresee the possible perspectives of the EU’s energy policy in the nearest future. The North region is analyzed emphasizing two countries which are main energy suppliers for Europe – Russian Federation and Norway. For a better understanding of the object, the specific proposition has been formulated: the struggle of the national states for energy resources and individual decisions allow energy insecurity in the European Union since the EU’s declared objective „to speak in one voice“ is inconsistent with national interests of EU’s member states. Although the European Union can be defined as the complex of energy security in which the relation of dependence is comprehended as a threat (the main source of this threat is the Russian Federation’s energy monopoly), however the growing consumption and competition for energy resources encourage the countries to search for alternative energy resources and its suppliers. These actions disrupt the initiatives of the common European Union’s energy policy. The political consciousness is not yet grown in the EU’s countries and it determinates the weakness of the EU as a political construct in case of competition with the rising economical powers (such as India and China) for energy resources. On the other hand the consumption is growing in the Russian market as well, which implies possible insecurity of supply... [to full text]
Balchanos, Michael Gregory. "A probabilistic technique for the assessment of complex dynamic system resilience." Diss., Georgia Institute of Technology, 2012. http://hdl.handle.net/1853/43730.
Full textDemurtas, Alessandro. "El complejo europeo de seguridad regional entre 2001 y 2011 en relación a las amenazas del terrorismo islamista y de las armas de destrucción masiva." Doctoral thesis, Universitat Autònoma de Barcelona, 2014. http://hdl.handle.net/10803/284325.
Full textThis work uses a Security Studies theory elaborated by the Copenhagen School in order to determine if the European Union (EU) can be characterized as a regional security complex (RSC) in relation to the threats of Islamist terrorism and weapons of mass destruction (WMD) between 2001 and 2011. To accomplish this task, this research makes a combined use of two theories developed by the Copenhagen School: the theory of the RSC of Barry Buzan and Ole Waever, elaborated in 2003, and the theory of securitization that the two authors made together with Jaap de Wilde in 1998. The research has two goals. First, using the securitization theory, it tries to determine the interrelations between the analyzed units' security dynamics, treating the EU as the dependent variable, the States selected as independent and explanatory variables (Germany, Spain, France, Italy and United Kingdom), and NATO as an intervening variable. Second, it focus on the framework of units' strategic interrelations to describe and explain the presence of the European RSC, its structural variables and the trends towards the maintenance of the status quo or change between 2001 and 2011. To sum up, the thesis checks the explanatory potential of the theory of the RSC with a constructivist slant and some elements of the institutionalist focus, against other explanations, classic in International Relations field, based on the intentions, interests and the context. Put another way, this work proposes to study the strategic and security practices of the EU, NATO and of Spain, France, Italy, United Kingdom and Germany during ten years (2001-2011). Once relieved similarities and differences, compatibilities and incompatibilities - and through the use of operational instruments and guidelines of analysis offered by the theory of the RSC - the thesis tries to corroborate the existence of interrelationships between these practices and the securitization processes derived from them. The research questions are: 1. Starting from the analysis of discourses and security practices of the EU, NATO and the States analyzed, can we confirm the existence of the European RSC in relation to the threat of Islamist terrorism and the proliferation of WMD? 2. If so, how is RSC eventually structured? 3. In specific cases, do the EU and its Member States share threats perceptions? And which actions and concrete measures have the cases-study taken to ensure their security? 4. In the areas in which there's a sharing of the perception of the threats, is it possible to find a common action, or do divisions persist between the States and the EU? And what influence has NATO in these areas? To carry out research, a total of 2076 documents have been analyzed: 662 discourses, interventions, parliamentary hearings and interviews (speech acts) of elected public authorities; 1206 articles of five national newspapers; 131 normative acts and other documents and 77 national and Eurobarometer surveys.
Budurushi, Jurlind [Verfasser], Melanie [Akademischer Betreuer] Volkamer, and Karen [Akademischer Betreuer] Renaud. "Usable Security Evaluation of EasyVote in the Context of Complex Elections / Jurlind Budurushi. Betreuer: Melanie Volkamer ; Karen Renaud." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2016. http://d-nb.info/111214241X/34.
Full textBell, Patrick M. "Development of Local Homeland Security Networks in the State of Florida: A Social Network Analysis Approach." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/574.
Full textWiltshire, Serge William. "On The Application Of Computational Modeling To Complex Food Systems Issues." ScholarWorks @ UVM, 2019. https://scholarworks.uvm.edu/graddis/1077.
Full textYandas, Gokhan Osman. "Emerging Regional Security Complex In Central Asia: Shanghai Cooperation Organization (sco) And Challenges Of The Post 9/11 World." Master's thesis, METU, 2005. http://etd.lib.metu.edu.tr/upload/12606201/index.pdf.
Full texts security issues that emerged in the aftermath of 9/11 could be explained better by taking the emerging regional security complex in Central Asia as the main unit of analysis. The thesis consists of seven chapters: In Chapter 1, thesis is introduced. Chapter 2 develops a conceptual framework for the thesis by examining the nature of regional security complex theory. This is followed by the examination of the characteristics of regional security complex in Central Asia in Chapter 3. Next, Chapter 4 discusses the foreign policies of the United States, Russia and China towards Central Asia. Chapters 5 and 6 examine the Shanghai Cooperation Organization, its role in the struggle against international terrorism and their reflections on the changes of the characteristics of Central Asian regional security complex. Last chapter concludes the thesis.
Vural, Ebru. "The Middle East As A Regional Security Complex: Continuities And Changes In Turkish Foreign Policy Under The Jdp Rule." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12613208/index.pdf.
Full texts traditional cautious, relatively &ldquo
passive&rdquo
role and &ldquo
relative indifference&rdquo
stance towards the Middle East security complex. Hence, the framework of analysis is the regional security complex theory, attributed roles and role changes of Turkey within regional security complexes. This study, with a historical perspective and within the framework of the regional security complex theory, questions continuities and changes in the JDP period Turkish foreign policy, and comes to the conclusion that in the JDP era, Turkey&rsquo
s role is going beyond the insulator state function to the &ldquo
interface logic&rdquo
which adopts a loose form of geographical boundaries.
Walsh, Barnaby Jessop. "Exploiter or unwitting accomplice? : China's engagement in the East African community and Uganda's utilisation of the regional security complex." Thesis, King's College London (University of London), 2016. https://kclpure.kcl.ac.uk/portal/en/theses/exploiter-or-unwitting-accomplice(9c2b98b9-d82f-47da-8535-03a9830470a1).html.
Full textCole, Mara [Verfasser], and Harald [Akademischer Betreuer] Schaub. "Knowledge-Based Decision Making in Complex Environments: Methodological Aspects of Proactive Airport Security Management / Mara Cole. Betreuer: Harald Schaub." Bamberg : University of Bamberg Press, 2015. http://d-nb.info/1079523952/34.
Full text