Dissertations / Theses on the topic 'Security, International'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security, International.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gruici, Simona. "International Security : Crossing Borders: International Migration and National Security." Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15242.
Full textBragatti, Milton Carlos <1969>. "Theorizing South American International Security." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amsdottorato.unibo.it/9505/1/BRAGATTI%20THESIS%20UNIBO%20UNL%202020.pdf.
Full textKlykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.
Full textFekete, Florian. "Civil-military relations : enhancing international security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.
Full textThesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
Astrada, Marvin. "Conceptualizing American power and security in a post-9/11 security context : conflict, resistance, and global security, 2001-present." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/1355.
Full textMaltman, Stuart. "Academic knowledge and political practice : security studies and Israeli security." Thesis, University of Aberdeen, 2016. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=230603.
Full textDi, Fresco Giovanni <1991>. "Cyber-Security: an international and comparative perspective." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14704.
Full textAbass, Ademola. "Regional organisations and the development of collective security : beyond Chapter VIII of the UN Charter /." Oxford : Hart Pub, 2004. http://www.myilibrary.com/.
Full textCarr, Roberta B. "The greening of global security : the U.S. military and international environmental security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA277754.
Full textAl, Darmaki Mohamed Juma. "A reflective study of how security conceptualises the international standardisation of security." Thesis, University of Portsmouth, 2015. https://researchportal.port.ac.uk/portal/en/theses/a-reflective-study-of-how-security-conceptualises-the-international-standardisation-of-security(7175f940-dede-4dda-8514-aa5248ebfb5e).html.
Full textCullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance." Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.
Full textSage, Irene Elizabeth. "World food security and international organisations : the case of international grain reserves." Thesis, University of Kent, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320540.
Full textCurley, Melissa Gail. "Participation, empowerment and micro security : implications for the security debate in international relations." Thesis, Nottingham Trent University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.302518.
Full textDal, Grande Giulia <1991>. "Narrative of a Puzzling Security: Discussing the Meaning of Security Under International Law." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8695.
Full textAshby, Paul. "NAFTA-land security : the Mérida Initiative, transnational threats, and U.S. security projection in Mexico." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48367/.
Full textGillespie, Piers. "Security in a post-hegemonic international political economy /." Title page and contents only, 1992. http://web4.library.adelaide.edu.au/theses/09AR/09arg478.pdf.
Full textVon, Tigerstrom Barbara. "Human security and international law prospects and problems /." Oxford ; Portland, OR : Hart Pub, 2007. http://www.netlibrary.com/urlapi.asp?action=summary&v=1&bookid=227756.
Full textDescription based on print version record. Includes bibliographical references (p. [215]-247) and index.
Sibanda, Allan K. M. "International law legitimacy and the UN Security Council." Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/53188.
Full textMini Dissertation (LLM)--University of Pretoria, 2015.
Jurisprudence
LLM
Unrestricted
Alexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.
Full textHengel, Gabriel Josiah. "21st century energy security tensions within the transatlantic security community." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=235817.
Full textRicci, James Benjamin. "The State, International Society, and Infectious Diseases : Emerging security threats and international cooperation." Thesis, University of Kent, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504663.
Full textPolydorou, Stavros. "The role of international juridical process in international security and civil-military relations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FPolydorou.pdf.
Full textThesis advisor(s): James Holmes Armstead, Thomas Bruneau. Includes bibliographical references (p. 129-134). Also available online.
Kersten, Larissa C. S. K. "Food security and Preferential Trade Agreements." Thesis, University of Essex, 2018. http://repository.essex.ac.uk/22837/.
Full textRafferty, Kirsten. "Alliances as institutions : persistence and disintegration in security cooperation." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=37818.
Full textWhen multidimensional threats exist, states facing a common threat ally, but they formalize and institutionalize the alliance so it can better manage multiple threats. Institutionalization encourages conditions conducive to persistence and evolution in two ways. First, by facilitating consultation and cooperation, it increases transparency, improves the performance of the alliance, and makes it costly for allies to renounce commitments or otherwise abandon one another. Second, institutions foster norms that in turn induce a form of attachment, or "loyalty" to the institution.
The strength of the norms embodied in the alliance and the allies' assessment of performance determine the behavior of institutionalized alliances. The alliance persists unaltered when performance is satisfactory, but norms are weak. It evolves, or expands its purpose and activities, when satisfactory performance combines with strong constitutive norms. Erosion occurs when strong norms encourage allies to salvage a poorly functioning alliance by curtailing its scope. Dissolution takes place when unsatisfactory performance and weak norms fail to prevent exit.
The most significant findings of this dissertation are that given institutionalization and norms, states do not exit an alliance immediately following a significant alteration in the strategic context or a decline in performance, but they try to preserve it. Only when these efforts fail will they curtail or dissolve the relationship. The dissertation tests the model by engaging in a comparative analysis of Cold War institutionalized alliances: the North Atlantic Treaty Organization, the Warsaw Pact, the Southeast Asia Treaty Organization, and the Australia, New Zealand, and U.S. alliance. Therefore, policy makers should not assume that evolving institutionalized alliances are adversarial or rush to respond with destabilizing counter alliances and, to minimize the possibility of conflict, allies engaging in evolution must clearly communicate their objectives to non-participants.
Royds, Mollie. "Human security and Canadian foreign policy, Canada's international security dilemma in the new millenium." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ64926.pdf.
Full textLusk, Adam. "Arguing Security: Rhetoric, Media Environment, and Threat Legitimation." Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/65998.
Full textPh.D.
In this dissertation, I study the process of gaining public consent about a security threat, or threat legitimation. Threats require legitimation because they are social facts and not objective truths or subjective perceptions. I argue rhetorical resources and strategies affect threat legitimation. Political actors deploy rhetorical resources and strategies in order to generate consent. The rhetorical resources connect together the rhetorical resources to construct a threat narrative used in the public debates. Moreover, I argue that the media environment influences how rhetorical strategies affect threat legitimation, acting as a conditional variable. Therefore I trace the threat narratives in six episodes in the history of United States foreign policy. Through process tracing, I highlight how rhetorical resources and strategies changed the public debates and level of consent about a threat, and how the media environment influenced these rhetorical strategies.
Temple University--Theses
Dhirathiti, Nopraenue Sajjarax. "Identity transformation and Japan's UN security policy : from the Gulf Crisis to human security." Thesis, University of Warwick, 2007. http://wrap.warwick.ac.uk/1141/.
Full textRandretsa, Thierry. "Bombardement aérien et norme d’immunité des non-combattants." Thesis, Lyon 3, 2013. http://www.theses.fr/2013LYO30071/document.
Full textImmunity of non-combatants is a secular and universal norm which has been severely affected by the advent of air power. The introduction of the third dimension in the war led to attack targets behind the front lines. In the context of total war, strategic bombing has elevated population and civilian objects as military targets in order to undermine the morale of the first and hasten the end of the conflict. The result was the massacre of millions of civilians for a military rather mixed record. These bombings contrast with the current practice whereby staffs strive to maximize the prevention of collateral damage. How to explain such a gap in the approach of aerial bombardment?The population has become the center of gravity of contemporary conflicts. Whether in humanitarian interventions or in counter-insurgency, it should be preserved and conquered in order to avoid mission failure. This approach is exacerbated by modern geography of the war taking place within the population. It is complicated by the moral asymetry of the non-state belligerents, who are not very distinguished from civilians. Furthermore, they operates near or within populated areas. Therefore, a paradigm of moderation applies to aerial bombing, sometimes pushing the command to go beyond the international humanitarian law. For much of the twentieth century, they were still subject to the paradigm of the strength of the traditional war
Nelson, Francesca Linnea. "International agricultural trade liberalization and food security in Jamaica." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320863.
Full textFrettingham, Edmund. "Security and the construction of 'religion' in international politics." Thesis, Aberystwyth University, 2009. http://hdl.handle.net/2160/bb4064ba-409d-4027-af17-7af296b909f4.
Full textGopalakrishnan, Shweta. "Mapping the elements of governance in international health security." Thesis, Kansas State University, 2011. http://hdl.handle.net/2097/9963.
Full textDepartment of Diagnostic Medicine/Pathobiology
Justin J. Kastner
Globalization has resulted in closer integration of economies and societies. It has contributed to the emergence of a new world order which involves a vast nexus of global and regional institutions, surrounded by transnational corporations, and non-governmental agencies seeking to influence the agenda and direction of international public policy. Health is a center point of geopolitics, security, trade, and foreign policy. Expansion in the territory of health and an increase in the number of health actors have profound implications for global health governance. Accordingly, the focus of the thesis is on endorsing the three core elements of governance proposed by Ackleson and Lapid, which comprises a system of (formal and informal) political coordination—across multiple levels from the local to the global—among public agencies and private corporations seeking to accomplish common goals and resolve problems through collective action. This shift in global governance has been prominent in the health sector with the formation of numerous public-private partnerships, coalitions, networks, and informal collaborations. In an effort to cope with the proliferation of players in the health sector, the World Health Organization has undergone gradual transformation in its governance framework. It is important to examine the evolution of the governance architecture of the WHO, as well as its effective application in the current global environment maintaining the organization’s legitimacy. This study tries to offer a comprehensive account of the WHO’s history, its successes and failures, as well as challenges and opportunities confronting the organization. Embracing public-private partnerships and formal-informal interactions does not simply fill governance gaps opened by globalization, but helps cluster in narrower areas of cooperation, where the strategic interests of multilateral organizations (e.g., the WHO), states, and transnational actors intersect. Global health problems require global solutions, and neither public nor private organizations can solve these issues on their own. The forms of governance based on the Acklesonian-Lapidian definition assist in accomplishing public health goals through shared decision-making and risk taking.
Smith, Roger. "Japan's international fisheries policy : the pursuit of food security." Thesis, University of Oxford, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.670139.
Full textMagsig, Bjørn-Oliver. "International water law and the quest for common security." Thesis, University of Dundee, 2013. https://discovery.dundee.ac.uk/en/studentTheses/c08da455-ef7b-4879-95f7-9674df88c3ca.
Full textTakaya, Yuri. "Space security and international law : verification and monitoring mechanisms." Paris 11, 2009. http://www.theses.fr/2009PA111020.
Full textNazarenko, Dmytro, and Danylo Vynohradov. "International cooperation in the cyber security field in Ukraine." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51000.
Full textCybersecurity is a priority topic for all states and Ukraine is no exception. With the development of technology, the number of cybercrimes has increased, according to experts, over the past few years, the total losses from cyberattacks were $ 4 trillion. The priority issue is the creation of a solid security system for the transfer, processing and storage of data between countries of the world.
Кібербезпека є пріоритетною темою для всіх держав, і Україна не є винятком. З розвитком технологій кількість кіберзлочинів зросла, за оцінками експертів, за останні кілька років загальні збитки від кібератак склали 4 трлн дол. Пріоритетним питанням є створення надійної системи безпеки для передачі, обробки та зберігання даних між країнами світу.
Ito, Takako Carleton University Dissertation International Affairs. "International regime theory and security cooperation in East Asia." Ottawa, 1988.
Find full textStieber, Sabine. "Non-traditional security in contemporary Chinese international relations thought." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/42987/.
Full textBydoon, Maysa S. "The international responsibility of the UN for the internationally wrongful acts of the Security Council." Thesis, University of Leicester, 2005. http://hdl.handle.net/2381/31086.
Full textFebrica, Senia. "Explaining Indonesia's participation in maritime security cooperation." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5429/.
Full textMahdi, Samiullah. "Security and foreign policy of landlocked states." Thesis, University of Massachusetts Boston, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10160222.
Full textWealth and stability of the region have a direct influence on the foreign policy and security of landlocked states. Landlocked states residing in poor and unstable neighborhoods, consequently, experience instability and have more limited foreign policy options compared to those landlocked states which are located in the rich and stable regions of the world. Besides those, two other factors, nationalism and the nature of the export product, extensively influence foreign policy and security of some landlocked countries. However, they are exceptions to the rule. Wealth and stability of the neighborhood determine the direction and fate of landlocked countries foreign policies and security measures.
Turksen, Umut. "Protection seekers, states and the new security agenda." Thesis, University of the West of England, Bristol, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490448.
Full textAllen, Keith W. "Future of the U.S.-Japan security alliance : foundation for a multilateral security regime in Asia? /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FAllen.pdf.
Full textThesis advisor(s): Edward A. Olsen, Gaye Christoffersen. Includes bibliographical references (p. 109-119). Also available online.
Mukhamedov, Igor. "The domestic, regional and global security stakes in Kazakhstan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FMukhamedov.pdf.
Full textThesis advisor(s): Donald Abenheim, Roger McDermott. Includes bibliographical references (p. 67-60). Also available online.
Trif, Dana Silvina [Verfasser]. "A New Hegemony: International Criminal Justice and the Politics of International Security / Dana Silvina Trif." Berlin : Freie Universität Berlin, 2017. http://d-nb.info/1131629345/34.
Full textTlhacoane, Tshepo. "Cyberattacks: The latest threat to international peace and security, and how international law can respond." Master's thesis, Faculty of Law, 2020. http://hdl.handle.net/11427/33053.
Full textTlhacoane, Tshiamo. "Cyberattacks: The latest threat to international peace and security, and how international law can respond." Master's thesis, Faculty of Law, 2021. http://hdl.handle.net/11427/33053.
Full textDukat, Robert J. "Japanese technology and U.S. national security." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA246575.
Full textThesis Advisor(s): Olsen, Edward. Second Reader: Looney, Robert. "December 1990." Description based on title screen as viewed on March 30, 2010. DTIC Identifier(s): International Trade, Western Security (International), United States, Critical Technology, Asia-Pacific Region, Theses. Author(s) subject terms: Japanese Technologly, U.S. National Security, U.S.-Japan Relations, U.S. Foreign Policy, U.S. Economic Policy, U.S. Technological Policy, Japanese Economic Policy, Japanese Foreign Policy, Japanese Governmental Policy, U.S.-Japan Trade, U.S. Trade Problems, U.S. Defense Policy, U.S. Industrial Policy. Includes bibliographical references (p. 143-156). Also available in print.
Forteau, Mathias. "Droit de la securité collective et droit de la responsabilité internationale de l'état /." Paris : Pedone, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/523146124.pdf.
Full textRecca, Stephen P. "Nordic nonalignment/neutrality policies in the 1990s implications for U.S. security /." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA242410.
Full textThesis Advisor: Kennedy-Minott, R. Second Reader: Breemer, Jan S. "December 1990." Description based on title screen as viewed on April 1, 2010. DTIC Identifier(s): Foreign policy, national security, Finland, Sweden, USSR, European community, conference on security and cooperation in Europe, Nordic Nonalignment, international law, neutrality, United States, post Cold War era, theses. Author(s) subject terms: Sweden, Finland, neutrality, nonalignment, EC, CSCE, security politics, economics, Nordic, Scandinavia, Soviet Union, United States, regional, foreign policy. Includes bibliographical references (p. 75-78). Also available in print.
Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.
Full text