Dissertations / Theses on the topic 'Security interdependence'

To see the other types of publications on this topic, follow the link: Security interdependence.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 46 dissertations / theses for your research on the topic 'Security interdependence.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Robledo, Marcos P. "Democratization, economic interdependence, and security cooperation between Argentina, Brazil, and Chile." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA393092.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, June 2001.
Thesis advisors, Michael Barletta, Jeanne K. Giraldo. Includes bibliographical references (p. 165-191). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
2

Finocchio, Chris James. "Latin American regional cooperative security : civil-military relations and economic interdependence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFinocchio.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, September 2002.
Thesis advisor(s): Jeanne K. Giraldo, Harold A. Trinkunas. Includes bibliographical references (p. 67-71). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
3

Gerasimenko, Olga. "Security Rivalry between the US and China under Conditions of Economic Interdependence." Ohio University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1366373816.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Benovič, Jozef. "Politické aspekty nemecko ruských vzťahov v ére Putina a ich hlavné problémy." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-192493.

Full text
Abstract:
German Russian relations are key partnership for European security and energy. Many European states, including Czech and Slovak republic, are dependent on the German-Russian economic cooperation. Russia is for Germany historically a strategic partner and the importance of their relationship is rising currently, as well. The cooperation extends and the traditional contradictions are ignored. However, the Ukrainian crisis has brought a change of German policy towards Russia. The thesis describes the character of the relation and problems following the methodology of the international relations theories with real reflection. It analyses the relation from the political and economic dimensions and their close interconnection.
APA, Harvard, Vancouver, ISO, and other styles
5

Sung, Ki-Young. "Security crisis and economic interdependence : a case study of inter-Korean trade (2002-2006)." Thesis, University of Warwick, 2010. http://wrap.warwick.ac.uk/55779/.

Full text
Abstract:
Modern security studies have demonstrated that military insecurity or confrontation create crucial obstacles in trade relationships between states. Unlike this widely accepted conclusion, the trade relationship between the ROK and the DPRK from 2002 to 2006 showed a stable growth despite increasingly hostile political confrontation and military tension caused by the North Korean nuclear program. This study analyzes under what conditions the security instability did not undermine economic interdependence and which factors predominantly affected the actors' behavior by focusing on South Korean SMEs. It will conclude that substantial change of inter-Korean relations after the summit talks in 2000 enabled the SMEs to continue to engage with the DPRK under the nuclear crisis. In terms of what actually motivated SMEs in these transactions, it will argue that South Korean businessmen's desperate desire to took for lower-cost production provided a key driving force for them to risk the military instability. This study will substantiate this argument by providing a result of structured survey of South Korean entrepreneurs who actually were involved in the inter-Korea trade in this particular period. By analyzing how security agenda and economic interest relates each other, this study will overcome either security-dominated or economy-centered bias in capturing the changed essence of inter-Korean relations.
APA, Harvard, Vancouver, ISO, and other styles
6

Marwaha, Vivan. "Interdependence Amid Conflict: The Role of Domestic Actors in Solving the India-Pakistan Trade-Security Puzzle." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1593.

Full text
Abstract:
This thesis examines the recent exponential growth in trade between India and Pakistan which has occurred despite the persistence of heated tension and conflict. It will underscore my research on the factors behind this marked increase, and analyze the transformative effects of domestic actors such as political leaders and business communities in creating new constituencies for peace between the two nations. This thesis makes an important contribution to international relations literature, specifically to existing research in the field of international political economy. Economic interdependence and security have not been analyzed concurrently in the context of the India-Pakistan relationship. In analyzing these issues together, this thesis will highlight the role of domestic political considerations and third parties in facilitating conditions for dialogue even in times of conflict.
APA, Harvard, Vancouver, ISO, and other styles
7

Callen, David J. "The Diversification of (In)Security in 21st Century UAE and Qatar: Cultivating Capital, Interdependence and Uncertainty." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/347189.

Full text
Abstract:
Neoliberal preferences by the ruling families and elite of both the UAE and Qatar have informed their decision-making along the lines of investors or CEOs of country corporations. Therefore, 21st century development in these countries has followed the patterns of diversifying a portfolio. While the literature speaks to the diversification of the economy, this dissertation presents the diversification of security, wherein a neoliberal worldview shapes holistic approaches to security. Given the hard power weakness of these countries, built as it is upon the foundation of a temporary strength—resource wealth—that is rapidly becoming a future weakness, the leaders of these states have sought to maximize the efficient use of resource wealth by developing a broad array of capital and cooperation-producing activities that fill particular niche roles in the international community, thereby providing interdependence that contributes to maintaining the status quo and security. In the UAE this has followed the haven approach, a pattern that develops internally to offer a depth and breadth of activity that draws in the international community and its various forms of capital. Qatar has taken the broadcaster approach, building upon a haven-like foundation to project outward through media and diplomacy for the sake of producing interdependence. Interestingly, both countries leverage sport for the diversification of security in each approach. The UAE offers sheer numbers and scope of sport that contribute to and promote the sport capital of its haven while Qatar courts fewer but grander large-scale events that present a stage for projecting its sport power. Yet, as is the case with any strategy there are inherent risks to implementing these approaches for security purposes, chief among which is the exchange of one set of known risk—or insecurity—for another, below-the-surface set. Both countries have exacerbated or created internal sources of instability, from rapid, untenable development and the subsequent abuse of migrant workers to challenges to traditional values and identity. Ultimately, however, the UAE's haven approach has proven the most diverse and therefore most durable, especially in light of the Arab Spring. This is shown through the press profile measure, which uses keywords derived from the (in)security characteristics of each approach to ascertain the profile of each country based on articles in the international press. It, too, demonstrates that the depth and breadth of the UAE's diverse portfolio haven activities better situates it to present a profile of a viable partner for interdependence to the global community. In neoliberal and investment terms, during an economic downturn the UAE held cash and a wide assortment of bonds while Qatar doubled-down on high-risk, high-reward stocks like military and political engagement as well as the Muslim Brotherhood. On one hand, as the value of these stocks plummeted Qatar's portfolio has lost tremendous value and it continues to delay "realizing" its losses by cutting ties and rebalancing. On the other hand, the UAE now has the freedom to further rebalance and diversify its portfolio of security activities by selectively engaging in prestige-producing endeavors like using a female fighter pilot to spearhead the US-led coalition against ISIS.
APA, Harvard, Vancouver, ISO, and other styles
8

Safdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Security Building in Post-Conflict Environments))--Naval Postgraduate School, Dec. 2004.
Thesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
APA, Harvard, Vancouver, ISO, and other styles
9

Fritz, Alarik M. "How superpowers go to war and why other states help them the impact of asymmetric security interdependence on war coalition formation /." Connect to Electronic Thesis (ProQuest) Connect to Electronic Thesis (CONTENTdm), 2008. http://worldcat.org/oclc/453941583/viewonline.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bell, Patrick M. "Development of Local Homeland Security Networks in the State of Florida: A Social Network Analysis Approach." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/574.

Full text
Abstract:
How do local homeland security organizations respond to catastrophic events such as hurricanes and acts of terrorism? Among the most important aspects of this response are these organizations ability to adapt to the uncertain nature of these “focusing events” (Birkland 1997). They are often behind the curve, seeing response as a linear process, when in fact it is a complex, multifaceted process that requires understanding the interactions between the fiscal pressures facing local governments, the institutional pressures of working within a new regulatory framework and the political pressures of bringing together different levels of government with different perspectives and agendas. This dissertation has focused on tracing the factors affecting the individuals and institutions planning, preparing, responding and recovering from natural and man-made disasters. Using social network analysis, my study analyzes the interactions between the individuals and institutions that respond to these “focusing events.” In practice, it is the combination of budgetary, institutional, and political pressures or constraints interacting with each other which resembles a Complex Adaptive System (CAS). To investigate this system, my study evaluates the evolution of two separate sets of organizations composed of first responders (Fire Chiefs, Emergency Management Coordinators) and community volunteers organized in the state of Florida over the last fifteen years. Using a social network analysis approach, my dissertation analyzes the interactions between Citizen Corps Councils (CCCs) and Community Emergency Response Teams (CERTs) in the state of Florida from 1996- 2011. It is the pattern of interconnections that occur over time that are the focus of this study. The social network analysis revealed an increase in the amount and density of connections between these organizations over the last fifteen years. The analysis also exposed the underlying patterns in these connections; that as the networks became more complex they also became more decentralized though not in any uniform manner. The present study brings to light a story of how communities have adapted to the ever changing circumstances that are sine qua non of natural and man-made disasters
APA, Harvard, Vancouver, ISO, and other styles
11

Izosimova, Svetlana. "Understanding the Energy Interdependence Between the EU and Russia: Case of the Baltic Sea Region." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-124283.

Full text
Abstract:
This study is conducted with the purpose to unfold hidden sides of the EU – Russian energy cooperation and to shed a light on possible reasons for existing problems that have rarely been voiced before. This study provides an alternative view on the role of the Baltic Sea region in the overall EU – Russian energy dialogue and its current situation. In this research the historical observation of the energy interdependence regime development is examined and the crucial turning points in the energy interdependence like the EU enlargement 2004, the gas cut offs 2006 and 2009, and crises 2014 are reconsidered. The energy security policies of the EU and Russia are analyzed by adopting the realist approach and applied to the case of the Baltic Sea region. Furthermore, based on the regional complex security theory and interdependence theory, the way how interstate gas relations in the Baltic Sea region affect the EU – Russian interdependence is discussed.
APA, Harvard, Vancouver, ISO, and other styles
12

FIGUEIREDO, MARCOS VINICIUS MESQUITA ANTUNES DE. "HUMAN RIGHTS, MORAL INTERDEPENDENCE AND THE REDEFINITION OF THE USE OF FORCE BY UNITED NATIONS SECURITY COUNCIL: THE CASE OF UNPROFOR." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2006. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9876@1.

Full text
Abstract:
COORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
Este trabalho analisa as transformações normativas quanto à utilização da força pelo Conselho de Segurança (CS) das Nações Unidas e a maneira como United Nations Protection Force expressa essas mudanças. A expansão do regime de direitos humanos da ONU, combinada com o aumento da interdependência moral entre os Estados-membros dessa organização são a tônica das mudanças que desafiam os conceitos clássicos de segurança coletiva e soberania nacional. O primeiro, em razão da criação de instituições permanentes onde se debate o cumprimento desse regime, transformando, por isso, as expectativas dos Estados quanto ao comportamento dos demais. O segundo, por viabilizar o acesso às informações sobre possíveis violações aos direitos humanos. A forma como a ONU atuou no processo de desintegração da antiga Iugoslávia indica a ocorrência dessas transformações. A operação nesse país foi articulada de modo a garantir a integridade dos habitantes dessa região. As principais resoluções do CS relativas a esse conflito sinalizaram para um vínculo entre direitos humanos e o conceito de ameaça à paz previsto no art. 39 da Carta da ONU. Entretanto, os Estados membros não se demonstraram dispostos a arcar com os custos de uma operação de segurança que assegurasse o respeito a esses direitos. Isso indica que as normas favoráveis à intervenção humanitária coexistem com limitações baseadas nas políticas nacionais dos Estados. Porém, ao autorizar o uso da força para proteger grupos de seres humanos o CS adotou uma interpretação pós-westfaliana do sistema de segurança internacional da ONU, redefinindo o conceito clássico de soberania nacional.
The paper analyzes normative transformations in the use of force by the Security Council of the United Nations and the way in which the UNPROFOR (United Nations Protection Force) expresses these changes. The growing widespread of the UN human rights regime combined with the increase on levels of moral interdependence among UN member states are at the center of transformations that challenge classical concepts of collective security and sovereignty. First, because of the creation of permanent institutions in which the fulfillment of this regime is debated, since they change State expectations regarding the behavior of other States. Second, for making the access of information concerning human rights violations possible. The way in which the UN acted in the process of disintegration of the former Yugoslavia indicates the occurrence of such transformations. The operation was planned to guarantee the integrity of the people in the region. The main resolutions of the SC regarding the conflict signaled a connection between human rights and the concept of threat to peace in accordance to the art. 39 of the UN Charter. Nevertheless, the member states did not seem inclined to undertake the costs of security operations that would guarantee the respect for such rights. That indicates that the rules favoring humanitarian intervention coexist with limitations derived from the domestic realm of politics. Nonetheless by authorizing the use of force for the protection of human beings, the SC adopted a post- Westphalian interpretation of the UN international security system, redefining the classical concept of national sovereignty.
APA, Harvard, Vancouver, ISO, and other styles
13

Tanrikulu, Faik [Verfasser]. "The European Union’s Energy Security and Turkey’s Role in the Southern Gas Corridor : Interdependence on the Natural Gas Pipeline between Turkey and EU / Faik Tanrikulu." Frankfurt a.M. : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2018. http://d-nb.info/1173660909/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Kalkan, Övgu. "Reading the Common Foreign and Security Policy of the European Union in terms of the issue of Terrorism : An analysis on the evolution of the CFSP of the EU under the issue of Terrorism." Thesis, Linköping University, Department of Management and Economics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2707.

Full text
Abstract:

In the post Cold-War era, world politics was transforming itself through its emerging complex issues such as terrorism and influential and interdependent actors such as the European Union. In this new era, the European Union was developing its Common Foreign and Security Policy pillar both to present a coherent and unified EU policy and to prove its political potent in order to become an influential actor on world politics. On the other side, security environment was also transforming its content through emerging actors and issues. As one of the most prominent actors of the world politics, the EU was influenced by the transformation of security environment, whose economic ‘soft power’ proved necessary but insufficient for being a global power in this emerging security environment. Insufficiency of economic power in solving security problems became more visible with the terrorist attacks of September 11 and March 11 which proved the seriousness of a globalized security threat posed by terrorism. After the events took place, the EU’s security approach and threat assessment have been transformed in which the issue of terrorism occupied more profound place by ‘securitization’ of its context. The Common Foreign and Security Policy of the EU began to play more prominent role on EU policies together with incorporating the efforts on the issue of fight against terrorism both to EU’s external relations and to its security dimension. Therefore, in this study, the author analyzes the research question of the development of the CFSP of the EU together with the impact of the issue of terrorism in this transforming security environment. Since examination of such a complex security issue necessitates multidimensional approach, then liberal and realist theories are used as complementary analytical instruments guiding the theoretical framework of the study.

APA, Harvard, Vancouver, ISO, and other styles
15

Fráně, Luděk. "Potenciál Evropské politiky sousedství pro energetickou bezpečnost EU." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76475.

Full text
Abstract:
Relations between the EU and its neighbour countries and regions are very important for either side. One of the topics which joins them is the energy resource issue. Daily, millions of barrels of oil and billions of cubic meter of natural gas flow through this area into Europe. This diploma thesis deals exactly with this matter, e.i. European Union's energy security. It is a very topical, discussed but above all for the EU important theme. The purpose of this thesis is to connect the conception of EU's energy security through the European Neighbourhood Policy, e.i. the policy which the EU has established to create stability and prosperity with the neighbour regions of North Africa, Near East, Eastern Europe and the Caucasus states. The outcome of this paper should be to evaluate the potential of the countries in the European neighbourhood and the potential of the neighbourhood policy for strengthening the EU security policy, that means to summarize the possibilities for effective co-operation in the field of energy and to say if this co-operation could strengthen European Union's energy security.
APA, Harvard, Vancouver, ISO, and other styles
16

Sofic, Elvira. "The Role of the EU in the Israeli-Palestinian Conflict : A Qualitative Case Study on the Role of the EU in the Israeli-Palestinian Conflict approached through realism, liberalism and constructivism." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-90944.

Full text
Abstract:
For over four decades, the EU has been an active external actor in the Israeli-Palestinian peace process. However, the role that the EU has in the conflict, have many times been questioned. This thesis aims therefore to examine the role of the EU in the Israeli-Palestinian conflict by using three international relations theories; realism, liberalism and constructivism. With the research question of how the role of the EU can be understood and explained, a qualitative case study is being done. The theories are being approached in a theory consuming way focusing on following concepts; collective EU interests, security and military resources, democracy promotion, international law, and identity and norms. Following the results and analysis of the concepts, the EU does have an important, yet laid back role in the conflict. The EU has been an influential actor in many ways, however, the role has mostly been diplomatic and economic rather that political. This indicates that, for the EU to become a stronger political actor, the Union needs to take on more effective measures when acting and also handle the occurring changes within the Union.
APA, Harvard, Vancouver, ISO, and other styles
17

Pillai, Anil Ph D. "Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Karataş, Harun Fatih [Verfasser], Dogan [Akademischer Betreuer] Kesdogan, and Bernd [Akademischer Betreuer] Heinrich. "Interdependent Security and Compliance in Service Selection / Harun Fatih Karataş ; Dogan Kesdogan, Bernd Heinrich." Regensburg : Universitätsbibliothek Regensburg, 2016. http://d-nb.info/1118846338/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Karataş, Harun Fatih Verfasser], Dogan [Akademischer Betreuer] Kesdogan, and Bernd [Akademischer Betreuer] [Heinrich. "Interdependent Security and Compliance in Service Selection / Harun Fatih Karataş ; Dogan Kesdogan, Bernd Heinrich." Regensburg : Universitätsbibliothek Regensburg, 2016. http://d-nb.info/1118846338/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Xin. "Enhancing network robustness using software-defined networking." Diss., Kansas State University, 2017. http://hdl.handle.net/2097/38236.

Full text
Abstract:
Doctor of Philosophy
Department of Electrical and Computer Engineering
Don M. Gruenbacher
Caterina M. Scoglio
As today's networks are no longer individual networks, networks are less robust towards failures and attacks. For example, computer networks and power networks are interdependent. Computer networks provide smart control for power networks, while power networks provide power supply. Localized network failures and attacks are amplified and exacerbated back and forth between two networks due to their interdependencies. This dissertation focuses on finding solutions to enhance network robustness. Software-defined networking provides a programmable architecture, which can dynamically adapt to any changes and can reduce the complexities of network traffic management. This architecture brings opportunities to enhance network robustness, for example, adapting to network changes, routing traffic bypassing malfunction devices, dropping malicious flows, etc. However, as SDN is rapidly proceeding from vision to reality, the SDN architecture itself might be exposed to some robustness threats. Especially, the SDN control plane is tremendously attractive to attackers, since it is the "brain" of entire networks. Thus, researching on network robustness helps protect network from a destructive disaster. In this dissertation, we first build a novel, realistic interdependent network framework to model cyber-physical networks. We allocate dependency links under a limited budget and evaluate network robustness. We further revise a network flow algorithm and find solutions to obtain a basic robust network structure. Extensive simulations on random networks and real networks show that our deployment method produces topologies that are more robust than the ones obtained by other deployment techniques. Second, we tackle middlebox chain problems using SDN. In computer networks, applications require traffic to sequence through multiple types of middleboxes to accomplish network functionality. Middlebox policies, numerous applications' requirements, and resource allocations complicate network management. Furthermore, middlebox failures can affect network robustness. We formulate a mixed-integer linear programming problem to achieve a network load-balancing objective in the context of middlebox policy chain routing. Our global routing approach manages network resources efficiently by simplifying candidate-path selections, balancing the entire network and using the simulated annealing algorithm. Moreover, in case of middlebox failures, we design a fast rerouting mechanism by exploiting the remaining link and middlebox resources locally. We implement proposed routing approaches on a Mininet testbed and evaluate experiments' scalability, assessing the effectiveness of the approaches. Third, we build an adversary model to describe in detail how to launch distributed denial of service (DDoS) attacks to overwhelm the SDN controller. Then we discuss possible defense mechanisms to protect the controller from DDoS attacks. We implement a successful DDoS attack and our defense mechanism on the Mininet testbed to demonstrate its feasibility in the real world. In summary, we vertically dive into enhancing network robustness by constructing a topological framework, making routing decisions, and protecting the SDN controller.
APA, Harvard, Vancouver, ISO, and other styles
21

Duenas-Osorio, Leonardo Augusto. "Interdependent Response of Networked Systems to Natural Hazards and Intentional Disruptions." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7546.

Full text
Abstract:
Critical infrastructure systems are essential for the continuous functionality of modern global societies. Some examples of these systems include electric energy, potable water, oil and gas, telecommunications, and the internet. Different topologies underline the structure of these networked systems. Each topology (i.e., physical layout) conditions the way in which networks transmit and distribute their flow. Also, their ability to absorb unforeseen natural or intentional disruptions depends on complex relations between network topology and optimal flow patterns. Most of the current research on large networks is focused on understanding their properties using statistical physics, or on developing advanced models to capture network dynamics. Despite these important research efforts, almost all studies concentrate on specific networks. This network-specific approach rules out a fundamental phenomenon that may jeopardize the performance predictions of current sophisticated models: network response is in general interdependent, and its performance is conditioned on the performance of additional interacting networks. Although there are recent conceptual advances in network interdependencies, current studies address the problem from a high-level point of view. For instance, they discuss the problem at the macro-level of interacting industries, or utilize economic input-output models to capture entire infrastructure interactions. This study approaches the problem of network interdependence from a more fundamental level. It focuses on network topology, flow patterns within the networks, and optimal interdependent system performance. This approach also allows for probabilistic response characterization of interdependent networked systems when subjected to disturbances of internal nature (e.g., aging, malfunctioning) or disruptions of external nature (e.g., coordinated attacks, seismic hazards). The methods proposed in this study can identify the role that each network element has in maintaining interdependent network connectivity and optimal flow. This information is used in the selection of effective pre-disaster mitigation and post-disaster recovery actions. Results of this research also provide guides for growth of interacting infrastructure networks and reveal new areas for research on interdependent dynamics. Finally, the algorithmic structure of the proposed methods suggests straightforward implementation of interdependent analysis in advanced computer software applications for multi-hazard loss estimation.
APA, Harvard, Vancouver, ISO, and other styles
22

Kedidir, Mansour. "Le gaz naturel algérien dans la sécurité énergétique de l'Union Européenne : un enjeu géopolitique." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO20033.

Full text
Abstract:
Au lendemain de son indépendance, l’Algérie était confrontée au problème du développement de son potentiel gazier. Pour se soustraire à l’emprise de la France sur ses hydrocarbures, elle décida de placer son gaz dans le marché américain. Cette option visait à développer l’industrie du GNL et à optimiser la rente pour pouvoir financer le développement économique du pays. Après l’échec de ce choix, l’Algérie s’est retournée vers le marché européen. Depuis, les échanges se sont intensifiés au point où l’Algérie est considérée aujourd’hui comme un partenaire énergétique stratégique de l’Union européenne. Cette situation lui donnera-t-elle la possibilité de continuer à approvisionner l’Europe en gaz ? Au regard des contraintes liées à la gestion du secteur de l’énergie, la concurrence des deux gaz russe et qatari et l’entrée prévisible en production des gisements en Mediterrannée orientale, la part du gaz algérien dans la sécurité énergétique de l’Europe constitue-t-elle un enjeu géopolitique ? La présente thèse a pour objectif de confirmer ou d’infirmer la réalité de cet enjeu. Pour cela, elle pose des questions inhérentes aux différentes politiques initiées par l’Algérie durant plus d’un demi-siècle, à sa marge de manœuvre pour se maintenir au troisième rang des fournisseurs de gaz à l’Europe, et à la dépendance de cette dernière en matière de gaz et à ses perceptions géopolitiques à l’égard de ses fournisseurs (principalement, la Russie et les pays producteurs de la rive Sud)
After the National Independence (1962), Algeria was dealing with the difficulties of developing its gas potential. In order to escape the French hegemony of its hydrocarbons resources, Algeria decided to place and invest its gas resources in the US market. This economic option was motivated by the urgent need to develop the LNG industry and to maximize incomes in order to improve the national economic development. After the failure of this economic option, Algeria got back to the European market. Since then, EU – Algeria economic relations have been intensified. Nowadays, Algeria is considered as a strategic EU partner, in the field of energy resources. Does this situation enable Algeria to supply the European economy with gas for a long time? Given the international constraints related to the management of the energy sector, competition from both Russia and Qatar and the new discovered gas reserves in Eastern Mediterranean basin, does the Algerian gas and its importance in EU energy security represent a geopolitical issue?This thesis aims to examin the pertinence of this issue. It seeks to respond to questions related to the various policies initiated by Algeria for more than half a century, to Algeria’s strategy to maintain its position as the third strategic gas supplier of Europe, and to the European energy dependence and its geopolitical perceptions towards its suppliers (especially Russia and the South side of Mediterranean basin producers)
APA, Harvard, Vancouver, ISO, and other styles
23

Teixeira, Anderson Matos. "Cooperação no desenvolvimento de aeronaves militares a partir das estruturas regionais : lições do F-104 e Tornado para a Unasul." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/149522.

Full text
Abstract:
Poster scénario international Seconde Guerre mondiale, il y avait plusieurs efforts de coopération régionale et de l'intégration dans le monde. Certains avaient avancée majeure dans l'intégration, comme l'Union européenne. Mais le point est qu'il avancé plus d'efforts ont eu un programme de sécurité et de coopération en matière de défense, et économique. Cette recherche vise à comprendre comment les arrangements de coopération dans les équipements aéronautiques de la défense peuvent influencer l'intégration régionale et de tirer des conclusions applicables à Unasur. Nous commençons donc à la question de savoir comment les différents modèles de coopération dans le développement de l'impact des avions militaires sur le processus d'intégration régionale? Nous croyons que la coopération dans le développement des équipements des avions militaires, de la création d'une chaîne d'approvisionnement régionalisé a la capacité de contribuer à une meilleure relation entre les membres de l'UNASUR, surmonter les obstacles et les visions déformées qui entravent le processus d'intégration régionale. Pour cela, la recherche sera structurée autour de la politique comparée, appuyée par d'autres théories actuelles des relations internationales. Dans ce cas, nous allons examiner les leçons qui peuvent être tirées de l'élaboration de programmes européens, avec les combattants F-104 et Panavia Tornado. Vous thèse sera structuré en quatre chapitres: d'abord sur la question de la coopération de la défense, à la fois l'aspect conceptuel et théorique, que le biais pratique, avec le débat sur le régionalisme. Après, dans la deuxième partie, avec une analyse de l'industrie de l'aviation et de sa réflexion en tant que puissance dans le système international. Dans la troisième partie, nous analysons les programmes F-104 et Tornado et contribué au processus d'intégration en Europe. Enfin, dans la quatrième partie, je discute comment les leçons des programmes analysés dans le chapitre 3, peuvent être appliquées dans le cas de l'UNASUR, mettant l'accent sur l'ingérence des pouvoirs et des points de vue extérieurs sur la coopération entre les membres du bloc.
No cenário internacional do pós Segunda Guerra Mundial, surgiram vários esforços de cooperação e integração regional em todo o mundo. Alguns tiveram maior avanço na integração, como a União Europeia. Mas o ponto é que, os esforços que mais avançaram possuíam uma agenda de segurança e cooperação em defesa, além do econômico. Esta pesquisa tem como objetivo, compreender como os arranjos cooperativos em material aeronáutico de defesa podem influenciar na integração regional e extrair inferências aplicáveis à Unasul. Logo, partimos da pergunta de, como diferentes modelos de cooperação no desenvolvimento de aeronaves militares impactam no processo de integração regional? Pensamos que a cooperação no desenvolvimento de material aeronáutico militar, a partir da criação de uma cadeia produtiva regionalizada tem a capacidade de contribuir para uma melhor relação entre os membros da UNASUL, superando os entraves e visões distorcidas que dificultam o processo de integração regional. Para isso, a pesquisa se estruturará entorno da Política Comparada, apoiado por outras correntes teóricas das Relações Internacionais. No caso, iremos analisar as lições que podem ser aprendidas com o desenvolvimento dos programas europeus, com os caças F-104 e Panavia Tornado. Está tese se estruturará em quatro capítulos: inicialmente sobre a questão da cooperação em defesa, tanto pelo aspecto conceitual e teórico, como pelo viés pratico, com o debate sobre regionalismo. Seguindo, na parte dois, com uma analise da indústria aeronáutica e do seu reflexo como poder no sistema internacional. Na parte três, analiso os programas F-104 e Tornado e como contribuíram no processo de integração na Europa. Finalizando, na parte quatro, debato como as lições dos programas analisados no capitulo 3, podem ser aplicados no caso da Unasul, ressaltando a interferência de potencias externas e as visões sobre cooperação entre os membros do bloco.
Post international scenario Second World War, there were several efforts of regional cooperation and integration in the world. Some had major advance in integration, such as the European Union. But the point is that it advanced more efforts had a security agenda and cooperation in defense, and economic. This research aims to understand how cooperative arrangements in defense aircraft equipment can influence regional integration and draw inferences applicable to Unasur. So we start with the question of how different models of cooperation in the development of military aircraft impact on the regional integration process? We believe that cooperation in the development of military aircraft equipment, from the creation of a regionalized supply chain has the ability to contribute to a better relationship between the members of UNASUR, overcoming barriers and distorted views that hinder the process of regional integration. For this, the research will be structured around the Comparative Politics, supported by other current theories of International Relations. In this case, we will examine the lessons that can be learned from the development of European programs, with the F-104 and Panavia Tornado fighters. You thesis will be structured in four chapters: first on the issue of defense cooperation, both the conceptual and theoretical aspect, as the practical bias, with the debate on regionalism. Following, in part two, with an analysis of the aviation industry and its reflection as power in the international system. In part three, we analyze the F-104 programs and Tornado and contributed to the process of integration in Europe. Finally, in part four, I discuss how the lessons of the programs analyzed in Chapter 3, can be applied in the case of UNASUR, emphasizing the interference of external powers and views on cooperation between members of the bloc.
APA, Harvard, Vancouver, ISO, and other styles
24

Isiugo, Uche C. "Feats and Failures of Corporate Credit Risk, Stock Returns, and the Interdependencies of Sovereign Credit Risk." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2221.

Full text
Abstract:
This dissertation comprises two essays; the first of which investigates sovereign credit risk interdependencies, while the second examines the reaction of corporate credit risk to sovereign credit risk events. The first essay titled, Characterizing Sovereign Credit Risk Interdependencies: Evidence from the Credit Default Swap Market, investigates the relationships that exist among disparate sovereign credit default swaps (CDS) and the implications on sovereign creditworthiness. We exploit emerging market sovereign CDS spreads to examine the reaction of sovereign credit risk to changes in country-specific and global financial factors. Utilizing aVAR model fitted with DCC GARCH, we find that comovements of spreads generally exhibit significant time-varying correlations, suggesting that spreads are commonly affected by global financial factors. We construct 19 country-specific commodity price indexes to instrument for country terms of trade, obtaining significant results. Our commodity price indexes account for significant variation in CDS spreads, controlling for global financial factors. In addition, sovereign spreads are found to be related to U.S. stock market returns and the VIX volatility risk premium global factors. Notwithstanding, our results suggest that terms of trade and commodity prices have a statistically and economically significant effect on the sovereign credit risk of emerging economies. Our results apply broadly to investors, financial institutions and policy makers motivated to utilize profitable factors in global portfolios. The second essay is titled, Differential Stock Market Returns and Corporate Credit Risk of Listed Firms. This essay explores the information transfer effect of shocks to sovereign credit risk as captured in the CDS and stock market returns of cross-listed and local stock exchange listed firms. Based on changes in sovereign credit ratings and outlooks, we find that widening CDS spreads of firms imply that negative credit events dominate, whereas tightening spreads indicate positive events. Grouping firms into companies with cross-listings and those without, we compare the spillover effects and find strong evidence of contagion across equity and CDS markets in both company groupings. Our findings suggest that the sensitivity of corporate CDS prices to sovereign credit events is significantly larger for non-cross-listed firms. Possible reasons for this finding could in fact be due to cross-listed firms’ better access to external capital and less degree of asymmetric information, relative to non-cross-listed peers with lower level of investor recognition. Our results provide new evidence relevant to investors and financial institutions in determining sovereign credit risk germane to corporate financial risk, for the construction of debt and equity portfolios, and hedging considerations in today’s dynamic environment.
APA, Harvard, Vancouver, ISO, and other styles
25

Depigny, Marine. "Terrorisme international et mesures de sûreté : analyse économique du comportement du voyageur sur le réseau de transport aérien mondial." Thesis, Lyon 2, 2011. http://www.theses.fr/2011LYO22020/document.

Full text
Abstract:
Dans cette thèse, nous questionnons l’impact du terrorisme international et des mesures de sûreté sur le comportement des usagers du réseau de transport aérien mondial. A l’aide d’un modèle économétrique, nous analysons une base de données inédite, AirNetTerror, composée de l’ensemble des vols internationaux à destination des Etats-Unis de 1990 à 2006, et des données du terrorisme international par pays sur cette période. La pertinence de notre travail est double. D’une part, nos interrogations sur les comportements des voyageurs et leurs éventuelles substitutions d’itinéraires en lien avec le terrorisme international n’ont, à notre connaissance, jamais été traitées. D’autre part, en abordant le transport aérien sous l’angle du réseau, nous proposons une vision dynamique des répercussions des comportements des usagers en lien avec la menace terroriste et les mesures de sûreté. En particulier, la prise en compte de la situation de sûreté interdépendante régissant le réseau aérien mondial nous permet de questionner l’existence de failles dans les mesures de sûreté. Nos résultats soulignent l’impact avéré et significatif des événements du terrorisme international, mais aussi des mesures de sûreté sur le réseau de transport aérien mondial. De plus, nous observons localement des substitutions d’itinéraires des voyageurs aériens en lien avec ces phénomènes. Ainsi, l’effet combiné de la menace terroriste internationale et des mesures de sûreté semble être à l’origine de ruptures d’équilibre, certes limitées mais réelles, des flux de passagers du réseau de transport aérien mondial. Notre thèse, parce qu’elle place le comportement du voyageur au centre des interactions stratégiques entre les acteurs de la sûreté et les terroristes, permet d’apporter une vision inédite de l’impact du terrorisme international sur le transport aérien
In our dissertation, we question the impact of both international terrorism and security measures on the behavior of the users of the global air transportation network. Using an econometric model, we analyze a new database, AirNetTerror, which contains data on all international passenger flows toward the U.S. from 1990 to 2006 as well as the events of international terrorism by country for the same period. The relevance of our research is twofold. On the one hand, our investigation regarding air travelers’ behavior and their possibilities of modifying their itinerary in light of international terrorism has – so far as we know – never been studied. On the other hand, as we analyze passenger flows from the perspective of the network, we propose a dynamic representation of the impact of travelers’ behavior changes related to terrorist threats and security measures. In particular, taking into account the interdependent security that rules the global air transport network, allows us to question the existence of failures in security measures. Our results underline a significant impact of both international terrorist events and security measures. Furthermore, we locally observe itinerary modifications of travelers that are linked to the previous phenomena. Thus, the combined effect of terrorist threats and security measures seems to lead to equilibrium breaks – that are limited but real – in passenger flows of the global air network. Our thesis offers a different representation of the impact of international terrorism on air transport by placing the traveler’s behavior at the center of the strategic interactions between security actors and terrorists
APA, Harvard, Vancouver, ISO, and other styles
26

Hammer, Sara Jeanne. "The rise of liberal independence and the decline of the welfare state." Thesis, Queensland University of Technology, 2002.

Find full text
Abstract:
Given the increased interdependency caused by ongoing task differentiation and precarious formal employment, this thesis asks why the stigmatisation of unemployed citizens and the retraction of unemployment benefits have received such widespread support in Australia. I contend that the concepts of dependency and independence, as reflexive but mutually exclusive dual values, are increasingly used as a framework for welfare discourse. I argue that this framework has ethical ramifications for collective well-being in Australia since it discourages citizens from acknowledging their own social and economic vulnerability. Using a combination of critical theory and discursive analysis, this thesis analyses discourses relating to poverty, unemployment and social welfare. It tracks the contradictions of this value dualism through selected forms of policy and media discourse literature and will challenge the negative moral valence associated with dependency, offering possible alternatives in the areas of moral anthropology, welfare discourse and social provision in order to reverse the stigmatisation of unemployed citizens.
APA, Harvard, Vancouver, ISO, and other styles
27

Clarke, Paul. "Interdependence theory, China and American security interests." 2006. http://repo.lib.auburn.edu/Send%205-11-07/CLARKE_PAUL_28.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

An, Chong-Bum. "Interdependence of retirement and labor supply under the social security program." 1991. http://catalog.hathitrust.org/api/volumes/oclc/24512792.html.

Full text
Abstract:
Thesis (Ph. D.)--University of Wisconsin--Madison, 1991.
Typescript. Vita. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 240-247).
APA, Harvard, Vancouver, ISO, and other styles
29

Zhang, Ming. "Economic interdependence and the formation of a security community in the Asia-Pacific region." 1994. http://catalog.hathitrust.org/api/volumes/oclc/32968202.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Boeckner, Amy Nicole. "An analysis of contemporary approaches to planning for food security in Canada : essential interdependence." Thesis, 2003. http://hdl.handle.net/2429/15311.

Full text
Abstract:
In Canada, in the late 1990s, food security was officially recognized as a national and international problem by the federal government with the formulation of Canada's Action Plan for Food Security. It was a notable admission; however, the difficulty is that despite voiced commitment, official approaches to and understandings of food security are inconsistent at best. In this context the purpose of the research is to evaluate contemporary approaches to domestic planning for food security in Canada at the federal level. I specifically analyze Canada's Action Plan for Food Security. The data derived and information collected are based on a review of relevant literature, qualitative content analysis of key government documents and the proceedings of a national conference, and semi-structured interviews with knowledgeable experts, within and outside of government, across Canada. I compared the case study to a set of substantive and procedural criteria constructed from a review of the literature on food security and planning. I found that while on the surface there is genuine merit in Canada's Action Plan for Food Security, the state's approach to planning for food security as formulated, structured and executed is severely deficient in its excessive reliance on market forces. The notion that food security can be achieved at the 'flick of a button' (Pottier 1999) persists and there is little to no indication that food security is a priority for government. I conclude that so long as the dominant hierarchy of values persists much of what matters to life is vulnerable to erasure because prevailing market-based thinking cannot adequately value or protect life, human or ecological. Indeed, food security is as much about values and choices as it is about factors of production. The fact that food security remains a problem is significant evidence that collectively we have not dealt well with being human.
APA, Harvard, Vancouver, ISO, and other styles
31

Domingues, Andrea Marques. "Interdependence as a risk factor for security: the energy relationship between Russia and the European Union." Master's thesis, 2021. http://hdl.handle.net/1822/74739.

Full text
Abstract:
Dissertação de mestrado em Relações Internacionais
Despite expectations that interdependence between states guarantees a reduction in tensions between them, this theory has not been applied to energy relations between Russia and the European Union, where tensions have increased between the two sides. Both are caught up in the classic phenomenon of the security dilemma. As a result, both embarked on competitive foreign policies in their close neighbourhood, mainly in Ukraine, which has been the scene of competition between the two actors mostly since March 2014 with the annexation of Crimea by Russia. When considering the phenomenon of the security dilemma together with the concept of Realpolitik, this dissertation analyses the most prevalent aspect of the European Union-Russia relationship, being energy. In this way, we intend to analyse the consequences of interdependence on the security of the actors involved. Russia's action on Crimea was condemned by the EU through the application of sanctions and the suspension of political dialogue. Thus, it is assessed that interdependence prevents conflicts from becoming large-scale conflicts due to the economic costs that can result. However, the improbability of tensions to escalate into wars allows states to act in their interests and engage in acts of intimidation against each other to achieve their political goals. Russia's growing assertiveness in the countries of the former Soviet Union raises doubts about Russia's intentions in the European Union with the Nord Stream pipeline to deepen the European Union's dependence on Gazprom's natural gas supply. Nevertheless, the different bilateral relations that each member state of the European Union with Russia shows the lack of unity within the EU that is unable to reach a common position regarding the assertiveness of the Russian Federation, besides the approval and renewal of sanctions and the suspension of the political dialogue. Despite calls from several members of the European Union on the implications of the Nord Stream project, it appears that the principle of solidarity defended by the European Union is minimized when economic interests are at stake.
Apesar das expectativas de que a interdependência entre os estados garante uma redução das tensões entre eles, esta teoria não tem sido aplicada na relação energética entre a Rússia e a União Europeia, onde as tensões aumentaram entre as duas partes. Ambos estão presos no fenómeno clássico do dilema da segurança. Como resultado, ambos embarcaram em políticas externas competitivas em sua vizinhança próxima, principalmente na Ucrânia, que tem sido palco de competição entre os dois atores principalmente desde março de 2014 com a anexação da Crimeia pela Rússia. Ao considerar o fenómeno do dilema da segurança em conjunto com o conceito de Realpolitik, esta dissertação analisa o aspeto mais prevalente da relação União Europeia-Rússia que é a energia. Desta forma, pretendemos analisar as consequências da interdependência sobre a segurança dos atores envolvidos. A ação da Rússia na Crimeia foi condenada pela UE através da aplicação de sanções e da suspensão do diálogo político. Assim, avalia-se que a interdependência evita que os conflitos se transformem em conflitos de grande escala devido aos custos econômicos que podem acarretar. No entanto, a improbabilidade de as tensões se transformarem em guerras permite que os estados ajam em seus interesses e se envolvam em atos de intimidação uns contra os outros para atingir seus objetivos políticos. A crescente assertividade da Rússia nos países da ex-União Soviética levanta dúvidas sobre as intenções da Rússia na União Europeia com o gasoduto Nord Stream a aprofundar a dependência da União Europeia do fornecimento de gás natural da Gazprom. No entanto, as diferentes relações bilaterais que cada Estado membro da União Europeia com a Rússia mostra a falta de unidade dentro da UE que não consegue chegar a uma posição comum quanto à assertividade da Federação Russa, além da aprovação e renovação de sanções e da suspensão do diálogo político. Apesar dos apelos de vários membros da União Europeia sobre as implicações do projecto Nord Stream, parece que o princípio da solidariedade defendido pela União Europeia é minimizado quando os interesses económicos estão em jogo.
APA, Harvard, Vancouver, ISO, and other styles
32

Khoo, How San. "Approaches to the Regional Security Analysis of Southeast Asia." Phd thesis, 1999. http://hdl.handle.net/1885/47471.

Full text
Abstract:
The purpose of this study is to critically evaluate three scholarly perspectives -- balance of power, institutional, and security complex -- to examine the evolving dynamics of security interdependence and inter-state relations among Southeast Asian states and external powers since 1945. This study is thus a comparative evaluation of the strengths and weaknesses of the three methods in their empirical analysis of the regional security dynamics of Southeast Asia. ¶ ...
APA, Harvard, Vancouver, ISO, and other styles
33

Lee, Chi-Ai, and 李奇愛. "The Dynamic Interdependence of the Social Security and the Government Finance in Taiwan-Application of the VAR Model." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/86767962892836289769.

Full text
Abstract:
碩士
東吳大學
經濟學系
98
This paper investigates the dynamic interdependence of the social security and the government finance in Taiwan during 1999 to 2009 with vector autoregressive (VAR) model. We control for the seasonal factor and the price index in empirical VAR model. The VAR model shows that the social security expenditure is the positive relationship with the government finance, but the crowding-out effect to the economic development budget. Moreover, the social security is also affected by the national defense budget. According to the Granger causality test, we find that the interaction effect and the causality relationship between the social security expenditure and the government finance. The social security disbursement also has the“lead-lag”relationship with other budgets. By the impact-response analysis, the responses of the government finance as well as other budgets to the social security spending innovation are obviously except the national defense government affairs budget, because of the national security question. The variance decomposition analysis of the government finance is explained mostly by itself and the social security, expressed that increasing rapidly social security benefits has impacted to the government finance. The positive relationship between the social security and the government finance is caused by part of the social security expenditure inflow to government tax revenue. Another empirical result shows that the population aging has remarkable influence to the social security expenditure and such influence will strengthen with the time span. So, in the long run, we had to worry about the population aging problem generating financing imbalance.
APA, Harvard, Vancouver, ISO, and other styles
34

"How superpowers go to war and why other states help them: The impact of asymmetric security interdependence on war coalition formation." GEORGETOWN UNIVERSITY, 2009. http://pqdtopen.proquest.com/#viewpdf?dispub=3339336.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Avdan, Nazli. "States' Pursuit of Sovereignty in a Globalized Security Context: Controlling International Human Mobility." Diss., 2010. http://hdl.handle.net/10161/3049.

Full text
Abstract:

The goal of this dissertation is to inquire into how states balance economic motivations and security concerns when pursuing sovereignty at borders. More precisely, the dissertation examines tradeoffs between interdependence sovereignty -control over transborder flows--and Westphalian sovereignty defined as exclusion of external actors from states' authoritative space. Focusing on control over cross-border human mobility as the issue area, I put forward the securitized interdependence framework as a theory that encompasses economic and security logics of policy-making. Because migration control rests at the nexus of economic/material and geopolitical/military dimensions of state security, it provides an ideal testing ground for observing the interaction of economic and security motives. The theoretical framework draws on the literature on complex interdependence and the logic of the trading state to postulate empirically verifiable propositions on migration control policies.

The central claim of the dissertation is that human mobility is conditionally securitized and that security logics are modulated by material/economic incentives. Facing informational asymmetries vis-à-vis transnational terrorists, states rely on migration and border control strategies to screen and deter non-state threats to security. However, economic interdependence--trade and capital ties--mitigates fears over transnational terrorism by reconfiguring state preferences, bolstering the relative salience of material concerns in policy-making, tempering perceptions of threat, and creating vested interests at the domestic level.

To test the theory I have collected and compiled data on i)visa restrictions for pairs of 207 X 207 directed dyads ii)visa rejection rates for European Union and/or Schengen member countries for the period 2003-2007, and iii)asylum recognition rates for 20 select OECD recipient states for the period 1980-2007. I then use this data to test the implications of the theory by distinguishing between economic/voluntary and political/involuntary migration. Additionally, I tease out the distinct effects of two different types of security concerns over transnational terrorism: a reputational effect that considers origin country citizens' involvement in terrorism incidents worldwide and a targeted/directed impact through which states take into account past experience as targets of terrorism. To illustrate the effect of economic interdependence, I analyze trade and capital flows separately and illustrate that both types of commercial ties facilitate liberalization of controls over human mobility through direct and indirect mechanisms.

I employ a variety of statistical techniques to study the effect of economic and security concerns including several cross-sectional time series techniques, structural break and recursive residual tests for temporal change, and maximum likelihood. Furthermore, I complement my quantitative empirical analysis with an in-depth process tracing approach that traces the evolution of Turkey's migration policies in the context of Turkey's post-1980 economic liberalization. The qualitative analysis makes use of primary and secondary resources obtained from archival field work in Ankara and Istanbul, Turkey.

The dissertation demonstrates that the impact of security concerns over transnational terrorism is contingent on the type of migration policy under consideration. In particular, policies of control over involuntary/political migration are guided by humanitarian and normative motives, limiting the effect of security concerns. Furthermore, the securitization of visa policies is strongest if recipient states are directly targeted by incidents of transnational terrorism perpetrated by origin country nationals. While states take into account incidents of global terrorism ---attacks against other country nationals or territories by origin country citizens-- this channel of impact is more modest. Additionally, empirical results show that economic interdependence effectively undercuts the effect of global terrorism, driving migration control policies towards liberalization. In sum, the dissertation demonstrates that ways in which states assert interdependence sovereignty exhibit temporal and cross-sectional variation as well as functional differentiation across types of border and migration control policies.


Dissertation
APA, Harvard, Vancouver, ISO, and other styles
36

Doan, Phu Nguyen. "Nové vyvážení v asijsko-pacifické oblasti: nové skutečnosti v tradičních aliancích USA v regionu." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-357318.

Full text
Abstract:
The thesis seeks to examine the development of the US-Japan, US-South Korea, and US- Australia alliances, during the implementation of the rebalance to Asia policy under the Obama administration. It discusses the application of three major international relations theories, realism, liberalism, and constructivism, in studying the causes and effects that resulted in different outcomes across the three dyads, from security, economic, and cultural perspectives. To establish a causal relationship, the thesis employs a qualitative case study method, controlled comparison, to test the theories and identify the factors that play a decisive role in determining the differences. It then concludes that between the three alliances, it was the rational choice of policymakers, focused on state survival and economic interests, that influenced state behaviour in cross-border relationships. The US alliances in Asia-Pacific have been operating mainly on pragmatic foundations and principles, to serve strategic purposes, and have little to do with normative, ideational factors. Keywords Asia-Pacific, alliance, economic interdependence, foreign policy, hegemony, national identity, rebalance, security threat
APA, Harvard, Vancouver, ISO, and other styles
37

Lan, Bish Ling, and 藍碧玲. "Examining the Intelligence Sharing Mechanism between the R.O.C. and U.S.A. towards National Security via the Viewpoint of Interdependence Theory :The case of Black Bats Squadron and The Black Cats Squadron(1945-1978)." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/m656nh.

Full text
Abstract:
碩士
國防大學
戰略研究所
103
Abstract Since the Cold War, national security has become a vital issue in the process of developing the global system in 21st century. As the international environment has changed from one generation to another, the concept of security becomes various. The phenomenon of the integration and interdependence between nations is becoming more and more obvious. Since globalization brings new threats and challenges about security issues, the relation between intelligence and national security is getting closer. For every nation in the world, it is crucial to protect national security through the exchange of intelligence under mutual trust and the means of interdependence and cooperation. This thesis aims to analyze the intelligence sharing mechanism on the aerial reconnaissance between the R.O.C. and the U.S.A. and what implications it has for us from 1945 to 1978, reflecting on its influence on national security during the period between World War II and the termination of U.S.-R.O.C. official diplomatic relation. Through the literature reviews and the examination of Interdependence Theory, this thesis generated four analytical assumptions in the chapter 4. Through the case studies, textual analysis, and interviews, the thesis ultimately suggests the possibility and the development tendency of intelligence exchange between the U.S.A. and the R.O.C. under the interdependence mechanism.
APA, Harvard, Vancouver, ISO, and other styles
38

Odintsov, Nikita. "Geopolitika ropy." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-331678.

Full text
Abstract:
The aim of the Geopolitics of Oil is to find a theoretical conceptualization of oil trade regime evolution and its changes during the period between the end of the World War II and 2011. This thesis builds on the two major theories of international relations: neorealism and interdependence theory. The theoretical part of the paper analyzes their main contributions and weaknesses. This enables to formulate the new approach to political economy of oil with a special emphasis on geo-economics. This thesis seeks to answer two main research questions: 1) "Under which conditions do oil exporters consolidate their energy sector?" and 1) "What is the reason for engagement of foreign powers in the oil regions?" This thesis examines relations between exporters from the Persian Gulf and the United States. Interdependence theory is tested by a calculation of symmetry or asymmetry in interdependent relationship between importers and exporters, which is done by a comparison of the market shares between the two during the period of changes in the oil trade regimes. Neorealist theory and political economy of oil approach are examined through detailed case studies that inquire how oil importers and exporters have tried to use oil to pursue their own power interests. This thesis concludes that the geopolitics of oil...
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Wan-Jia, and 陳婉佳. "Information Security Risk Assessment Considering Interdependences between Controls." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/68550641633469867854.

Full text
Abstract:
博士
國立交通大學
資訊管理研究所
100
Risk assessment is an important key step of the core process for information security risk management. Organizations use risk assessment to determine the risks within information systems and provide sufficient means to reduce the identified risks. In practical application, security controls applied to the information system areas are not completely independent, therefore during the process of risk assessment it is crucial to consider the interdependences among control families. In this thesis, a hybrid procedure for evaluating and identifying risk levels of information system security while considering interdependences amongst control families is proposed. First, this procedure applies the Decision Making Trial and Evaluation Laboratory (DEMATEL) method to construct interrelations amongst security control areas. Secondly, using the results from DEMATEL, the Analytic Network Process (ANP) method is used to obtain the likelihood ratings of risks; as a result, the proposed procedure can detect interdependences and feedback between security control families as well as identify priorities of areas requiring security measures in real world situations. Lastly, the Fuzzy Linguistic Quantifiers-guided Maximum Entropy Order-Weighted averaging (FLQ-MEOWA) operator is used to aggregate impact values assessed by experts, applied to diminish the influence of extreme evaluations such as personal views and drastic opinions. An application in company X was examined to verify the proposed procedure. After analyzing the acquired data, we confirm the proposed procedure certainly detects the influential factors among security control areas as well as identifies information systems with higher risk levels where prioritized safeguard tactics should be considered.
APA, Harvard, Vancouver, ISO, and other styles
40

"Security Analysis of Interdependent Critical Infrastructures: Power, Cyber and Gas." Doctoral diss., 2018. http://hdl.handle.net/2286/R.I.51602.

Full text
Abstract:
abstract: Our daily life is becoming more and more reliant on services provided by the infrastructures power, gas , communication networks. Ensuring the security of these infrastructures is of utmost importance. This task becomes ever more challenging as the inter-dependence among these infrastructures grows and a security breach in one infrastructure can spill over to the others. The implication is that the security practices/ analysis recommended for these infrastructures should be done in coordination. This thesis, focusing on the power grid, explores strategies to secure the system that look into the coupling of the power grid to the cyber infrastructure, used to manage and control it, and to the gas grid, that supplies an increasing amount of reserves to overcome contingencies. The first part (Part I) of the thesis, including chapters 2 through 4, focuses on the coupling of the power and the cyber infrastructure that is used for its control and operations. The goal is to detect malicious attacks gaining information about the operation of the power grid to later attack the system. In chapter 2, we propose a hierarchical architecture that correlates the analysis of high resolution Micro-Phasor Measurement Unit (microPMU) data and traffic analysis on the Supervisory Control and Data Acquisition (SCADA) packets, to infer the security status of the grid and detect the presence of possible intruders. An essential part of this architecture is tied to the analysis on the microPMU data. In chapter 3 we establish a set of anomaly detection rules on microPMU data that flag "abnormal behavior". A placement strategy of microPMU sensors is also proposed to maximize the sensitivity in detecting anomalies. In chapter 4, we focus on developing rules that can localize the source of an events using microPMU to further check whether a cyber attack is causing the anomaly, by correlating SCADA traffic with the microPMU data analysis results. The thread that unies the data analysis in this chapter is the fact that decision are made without fully estimating the state of the system; on the contrary, decisions are made using a set of physical measurements that falls short by orders of magnitude to meet the needs for observability. More specifically, in the first part of this chapter (sections 4.1- 4.2), using microPMU data in the substation, methodologies for online identification of the source Thevenin parameters are presented. This methodology is used to identify reconnaissance activity on the normally-open switches in the substation, initiated by attackers to gauge its controllability over the cyber network. The applications of this methodology in monitoring the voltage stability of the grid is also discussed. In the second part of this chapter (sections 4.3-4.5), we investigate the localization of faults. Since the number of PMU sensors available to carry out the inference is insufficient to ensure observability, the problem can be viewed as that of under-sampling a "graph signal"; the analysis leads to a PMU placement strategy that can achieve the highest resolution in localizing the fault, for a given number of sensors. In both cases, the results of the analysis are leveraged in the detection of cyber-physical attacks, where microPMU data and relevant SCADA network traffic information are compared to determine if a network breach has affected the integrity of the system information and/or operations. In second part of this thesis (Part II), the security analysis considers the adequacy and reliability of schedules for the gas and power network. The motivation for scheduling jointly supply in gas and power networks is motivated by the increasing reliance of power grids on natural gas generators (and, indirectly, on gas pipelines) as providing critical reserves. Chapter 5 focuses on unveiling the challenges and providing solution to this problem.
Dissertation/Thesis
Doctoral Dissertation Electrical Engineering 2018
APA, Harvard, Vancouver, ISO, and other styles
41

Martinez, Espinosa Cesar Alfredo. "Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach." 2013. http://hdl.handle.net/2152/23031.

Full text
Abstract:
In a more complex and interdependent world, nations face new challenges that threaten their national security. National security should not be understood exclusively in the way of military threats by adversarial states but in a broader way: how old and new sectoral threats affect not only a state and its institutions but a nation as a whole, physically and economically. This dissertation looks into how the nature of security threats and risks has evolved in recent years. This dissertation then explores how different nations have decided to publish national security strategy documents and analyzes the way in which they include this broadened understanding of security: it finds that there is evidence of international policy diffusion related to the publication of such security strategies and that nations are evolving towards a broader understanding of security that includes models like whole-of-government, and whole-of-society. In the second half, this dissertation analyzes the route through which Mexico has reformed its national security framework since the year 2000 through a policy streams approach. After looking at the path that led to the creation of Mexico’s modern national security institutions, it analyzes the way in which Mexico national interests can be determined and how these interests inform the way in which Mexico understands national security threats and risks in the 21st Century.
text
APA, Harvard, Vancouver, ISO, and other styles
42

Záhradníková, Lea. "Aktuální diverzifikační scénáře Ruské federace na jedné straně a zemí V4 na straně druhé v oblasti dodávek zemního plynu na pozadí teorie vzájemné asymetrické závislosti." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-365129.

Full text
Abstract:
The thesis focuses on current diversification scenarios in the field of gas supply the Visegrad Group (V4) and the Russian Federation relying on the model of asymmetrical interdependence. Russian Federation, the main supplier of natural gas to this region, has lost its status of a reliable partner due to the gas wars with Ukraine in 2006 and 2009, which have negatively affected the supply of natural gas to the EU countries. The research focuses on the current diversification options of V4 countries related to their suppliers and supply routes with respect to their relationship with the Russian Federation; the diversification options for the purchasing markets of the Russian Federation are also analyzed. The author validates the hypothesis that energy relations among the Visegrad countries and the Russian Federation in the field of gas supply are largely controlled by the asymmetric interdependence that is currently exacerbating tensions among the set actors. Current diversification scenarios are presented and evaluated, with the aim of assessing the importance of the projects with regard to actors' energy security. Keywords: interdependence, energy security, diversification, gas supply, gas interconnector, V4, Energy Union, Russian Federation, Nord Stream II, LNG
APA, Harvard, Vancouver, ISO, and other styles
43

Koens, Kumiko. "The autonomy principle and interdependent aspects of independent undertakings." Master's thesis, 2001. http://hdl.handle.net/1885/147879.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Bristow, Elizabeth Catherine. "Interdependent infrastructures and multi-mode attacks and failures: improving the security of urban water systems and fire response." 2006. http://hdl.handle.net/1969.1/ETD-TAMU-1082.

Full text
Abstract:
This dissertation examines the interdependence between urban water distribution systems and urban fire response. The focus on interdependent critical infrastructures is driven by concern for security of water systems and the effects on related infrastructures if water distribution systems are damaged by terrorist attack or natural disaster. A model of interdependent infrastructures (principally water distribution systems and fire response) is developed called the Model of Urban Fire Spread (MUFS). The model includes the capacity to simulate firefighting water demands in a community water system hydraulic model, building-to-building urban fire spread, and suppression activities. MUFS is an improvement over previous similar models because it allows simulation of urban fires at the level of individual buildings and it permits simulation of interdependent infrastructures working in concert. MUFS is used to simulate a series of multi-mode attacks and failures (MMAFs) – events which disable the water distribution system and simultaneously ignite an urban fire. The consequences of MMAF scenarios are analyzed to determine the most serious modes of infrastructure failure and urban fire ignition. Various methods to determine worst-case configurations of urban fire ignition points are also examined. These MMAF scenarios are used to inform the design of potential mitigation measures to decrease the consequences of the urban fire. The effectiveness of mitigation methods is determined using the MUFS simulation tool. Novel metrics are developed to quantify the effectiveness of the mitigation methods from the time-series development of their consequences. A cost-benefit analysis of the various mitigation measures is conducted to provide additional insight into the methods’ effectiveness and better inform the decision-making process of selecting mitigation methods. Planned future work includes further refinement of the representation of fire propagation and suppression in MUFS and investigation of historical MMAF events to validate simulation predictions. Future efforts will continue development of appropriate optimization methods for determining worst-case MMAF scenarios. This work should be of interest to water utility managers and emergency planners, who can adapt the methodology to analyze their communities’ vulnerability to MMAFs and design mitigation techniques to meet their unique needs, as well as to researchers interested in infrastructure modeling and disaster simulation.
APA, Harvard, Vancouver, ISO, and other styles
45

Alaboodi, Saad Saleh. "Model-based Evaluation: from Dependability Theory to Security." Thesis, 2013. http://hdl.handle.net/10012/7649.

Full text
Abstract:
How to quantify security is a classic question in the security community that until today has had no plausible answer. Unfortunately, current security evaluation models are often either quantitative but too specific (i.e., applicability is limited), or comprehensive (i.e., system-level) but qualitative. The importance of quantifying security cannot be overstated, but doing so is difficult and complex, for many reason: the “physics” of the amount of security is ambiguous; the operational state is defined by two confronting parties; protecting and breaking systems is a cross-disciplinary mechanism; security is achieved by comparable security strength and breakable by the weakest link; and the human factor is unavoidable, among others. Thus, security engineers face great challenges in defending the principles of information security and privacy. This thesis addresses model-based system-level security quantification and argues that properly addressing the quantification problem of security first requires a paradigm shift in security modeling, addressing the problem at the abstraction level of what defines a computing system and failure model, before any system-level analysis can be established. Consequently, we present a candidate computing systems abstraction and failure model, then propose two failure-centric model-based quantification approaches, each including a bounding system model, performance measures, and evaluation techniques. The first approach addresses the problem considering the set of controls. To bound and build the logical network of a security system, we extend our original work on the Information Security Maturity Model (ISMM) with Reliability Block Diagrams (RBDs), state vectors, and structure functions from reliability engineering. We then present two different groups of evaluation methods. The first mainly addresses binary systems, by extending minimal path sets, minimal cut sets, and reliability analysis based on both random events and random variables. The second group addresses multi-state security systems with multiple performance measures, by extending Multi-state Systems (MSSs) representation and the Universal Generating Function (UGF) method. The second approach addresses the quantification problem when the two sets of a computing system, i.e., assets and controls, are considered. We adopt a graph-theoretic approach using Bayesian Networks (BNs) to build an asset-control graph as the candidate bounding system model, then demonstrate its application in a novel risk assessment method with various diagnosis and prediction inferences. This work, however, is multidisciplinary, involving foundations from many fields, including security engineering; maturity models; dependability theory, particularly reliability engineering; graph theory, particularly BNs; and probability and stochastic models.
APA, Harvard, Vancouver, ISO, and other styles
46

Sousa, José Luís da Rocha. "Modelo de planeamento de sistemas de informação para a era da colaboração, a era WEB 2.0." Master's thesis, 2008. http://hdl.handle.net/1822/9490.

Full text
Abstract:
Dissertação de mestrado em Sistemas de Informação
Suportado pela WEB 2.0, o paradigma actual dos sistemas de informação é a colaboração em rede com a criação do conhecimento em rede. Confrontada com este conhecimento as organizações estão a convergir para a sua adopção, estamos na era da WEB 2.0 . Esta WEB não é apenas tecnologia mas uma nova forma de utilização dessa tecnologia para produção de conhecimento. As organizações enfrentam novos desafios na adopção e integração de soluções e metodologias, colocando na linha da frente sistemas actualmente protegidos pelos limites físicos das organizações. A arquitectura destes sistemas não foi desenvolvida com a colaboração ou mesma a partilha em mente, sendo usados no seu planeamento modelos tradicionais, incapazes de gerir os novos limites das organizações. Esta evolução está a criar a uma economia em rede e a alterar o forma como as organizações interagem com os seus recursos. Estando a evoluir do computador em rede para o utilizador em rede. Os modelos tradicionais definem a forma como os sistemas de informação devem suportar as actividades das organizações. Este é um aspecto chave, mas o novo paradigma coloca um novo desafio, saber como os sistemas de informação devem ser desenvolvidos de forma a serem capazes de garantir o efeito da informação. Nesta dissertação é apresentado um modelo de planeamento, cujo objectivo é garantir que a organização irá alcançar os efeitos pretendidos quando os mesmos forem suportados pelo ecossistema correcto. O modelo identifica as vulnerabilidades criticas, as capacidades criticas e as necessidades criticas que suportam determinado efeito no ecossistema. De forma a serem obtidos os efeitos correctos é usada a prioritização e a interdependência, dois elementos da engenharia de software, permitindo assim a correcta caracterização dos mesmos no ecossistema. Apenas um modelo baseado em efeitos, em que a segurança da informação é uma parte integrante do objecto informação torna possível o planeamento de sistemas na era das organizações colaborativas. O planeamento baseado na procura dos efeitos da informação, enquanto característica da mesma, é uma forma de obter uma visão clara desde as primeiras fazes de criação do ecossistema colaborativo, suportado pela WEB 2.0.
Supported by WEB 2.0 today information systems paradigm is networked collaboration with networked knowledge creation. Confronted with the network knowledge, organizations are trying to converge to the adoption of that knowledge, we are in the web 2.0 era. Web 2.0 is not only technology but about the way that technology is used for knowledge production. This enrollment of organizations in the new WEB puts new challenges in the adoption and integration of solutions and methodologies putting in the front line systems that are today protected behind the organizations structures. These systems architectures weren’t developed with collaboration or even sharing in mind, they use the traditional information systems planning models that are incapable of managing the new organizations boundaries. This new way of organizations interacting with resources is defined as the networked economy. In this economy we have a networked user, not only a networked computer. The traditional models define the way information systems should support organizations activities, this is a key aspect, but the new collaboration paradigm creates a new challenge that is to know how information systems should be develop in order to guarantee the organization information effect. In this paper is presented a model to give information systems planning a way to guarantee that organization will achieve the effects they want when supported with the correct information system ecosystem. The model identifies the critical vulnerabilities, critical capacities, critical needs that support the critical center of the ecosystem. In order to get the correct effects is used prioritization and interdependency two well know words of software engineering, in order to define effects relation in the ecosystem. Only a model based on information effects and with the integration of security as part of the information object makes information systems planning possible in this organization collaboration era. The collaboration supported by WEB 2.0 is a challenge for organizations and the planning of information, as ecosystem, using effects based planning, is a way to give a clear view of the development since the early stage of the ecosystem creation.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography