Dissertations / Theses on the topic 'Security, International'

To see the other types of publications on this topic, follow the link: Security, International.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security, International.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gruici, Simona. "International Security : Crossing Borders: International Migration and National Security." Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15242.

Full text
Abstract:
One of the most dynamic events of our time is the large extent of population movements within and across national boundaries. The causes of this movement of people include economic hardship due to various natural calamities such as earthquakes, droughts, famine and floods, as well as economic hardship due to lack of income. Political instabilities represent a central factor that is forcing the population movements at both national and international level. In most of the cases, reality is beeing perceived as follows: if international security is enhanced, so is national security. However, the phenomenon of migration is perceived as being a greater challenge in the field of security towards failure states, rather than it might affect any welfare postindustrial states. Nowadays we are facing a more globalized security environment, fact that is actually providing other states with the possibility to create a better security for their own nations. In order to gain this security immunity, the states should be able to enforce and protect the migration policies within international security. The relationship between migration and security became increasingly complex in the new millennium. As it follows, the focus of this theme is the correlation between migration´s consequences, both positive and negative, towards national security of host states. Furthermore, the topic of this paper is extending over ´what terrorism implies´. In order to reach a clear understanding, it has been analyzed the phenomenon of globalization and its forthcoming implications within both terrorism and migration. As a result of this transformation, terrorism has the power now to threat much more countries in the global area. Nevertheless, the purpose of this thesis is to examine which factors have an impact on international security, within a continental similarity. The central focus reflects over the Euro-Mediterranean area and to certain extends over the United States. The considered factors are: migration, loss/gain of governmental control, the political reaction after the attack of 9/11, spread of democracy (e.g. globalization), and creating citizenship.
APA, Harvard, Vancouver, ISO, and other styles
2

Bragatti, Milton Carlos <1969&gt. "Theorizing South American International Security." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amsdottorato.unibo.it/9505/1/BRAGATTI%20THESIS%20UNIBO%20UNL%202020.pdf.

Full text
Abstract:
What accounts for the paradoxical militarization, which occurs simultaneously to processes of cooperation in Defence in the South American region? With an analysis informed by a theoretical framework which combines the Regional Security Complex Theory (RSCT) with the English School of International Relations approach and based on systematic review methodology, this research seeks to contribute to answering this question in order to understand International Security in South America. Evidence suggests the centrality of the regional primary institutions, which both stimulate and restrain conflicts, but also effective cooperation and integration in the region, remaining a security regime.
APA, Harvard, Vancouver, ISO, and other styles
3

Klykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats." Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.

Full text
Abstract:
Thesis is focusing on the analysis of the situation in Syria in the period since 2011 till present times. First part will present main theoretical thoughts on the international security such as Realist school, Liberalist school, Human and Collective security concepts and the most modern theoretical school of security- Copenhagen school. That was done in case to have a clear notion of the international security development and to chose the one theory which will reflect the best the situation in Syria. In the practical part I analyzing the actions and inter actions of the main international security actors, such as United Nations plus important actors in the region of the Middle East -- Arab League, and of course Syrian government and opposition. Also I will try to apply Copenhagen school of Security on the Syrian situation and to find out if that theory is good or not for that kind of analysis. After browsing actions taken by actors and opposition in the conclusion I found out that nowadays international security system cannot be called very successful and that Copenhagen school of Security its good explanatory theory but it pretty useless in case of conflict resolution.
APA, Harvard, Vancouver, ISO, and other styles
4

Fekete, Florian. "Civil-military relations : enhancing international security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, March 2003.
Thesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
5

Astrada, Marvin. "Conceptualizing American power and security in a post-9/11 security context : conflict, resistance, and global security, 2001-present." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/1355.

Full text
Abstract:
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: 1., official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; 2., militarization rationales, budgets, and expenditures; and 3., case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-a-vis the relationship between US security and global security.
APA, Harvard, Vancouver, ISO, and other styles
6

Maltman, Stuart. "Academic knowledge and political practice : security studies and Israeli security." Thesis, University of Aberdeen, 2016. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=230603.

Full text
Abstract:
This thesis examines the production and function of knowledge concerning security and Israeli security. A critical, post-positivist approach to analysing the constitution and practices connected to security knowledge is justified. From a broadly Foucaultian point of view, the thesis looks at the 'regime of truth' within which ideas of Israeli security concerning Palestinians are formulated. The connections between the Security Studies discipline, academic studies focusing on Israel's security, and the formulation of Israel's policy positions towards the Palestinians are examined. Overall, it is shown how the practices of a 'social scientific' Security Studies discipline engaged in producing 'useful' knowledge for state practitioners reinforces and legitimates official Israeli security discourse and practice based around a conception of a singular state-based identity seeking security, primarily through military-diplomatic means, against a recalcitrant and hostile enemy 'Other' in the Palestinians. This basic framework of security knowledge is traced through official Israeli security discourse and practice (the security dispositif) from 1988 to 2009, offering an in-depth analysis of the development and evolution of official security processes concerning the Palestinians. Adopting an explicitly critical ethos for reflexive research, the thesis disrupts and challenges official Israeli security dynamics, finding them to be repeatedly exacerbating conflictual relations. Through the deployment of the regime of truth, the repeated instantiation of the official Israeli security dispositif is shown to re-incite and re-confirm existing parameters of knowledge and knowledge production. The thesis therefore also provides a detailed and critical examination of the notion of a repetitive 'cycle of violence' at the heart of Israeli-Palestinian relations.
APA, Harvard, Vancouver, ISO, and other styles
7

Di, Fresco Giovanni <1991&gt. "Cyber-Security: an international and comparative perspective." Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14704.

Full text
Abstract:
Questo lavoro tratta dell’applicazione del diritto internazionale alle attività cibernetiche ed è diviso in tre capitoli, il primo introduce alle problematiche della cybersecurity; l’evoluzione da ARPANET, gli incidenti e sabotaggi più famosi e significativi, gli attori statali, incaricati da un governo e non- statali, come Anonymous o Wikileaks. Ho poi elencato le armi più utilizzate nelle operazioni cibernetiche: dai primi virus ai moderni dinieghi di servizio, seguito da un approccio geopolitico nel trattare concetti come la sovranità territoriale, politica di potenza e politica morbida nell’era di internet, l’importanza strategica di centri dati per i cosiddetti Big Data e delle infrastrutture critiche, fondamentali per il regolare funzionamento della società. Nel secondo capitolo, il focus è sullo stato delle cose a livello di attribuzione dei cyber attacchi attraverso gli strumenti esistenti del diritto internazionale consuetudinario, dunque responsabilità per atti arrecanti danno, il vuoto legale tra attacchi ad alta e bassa intensità, le complicazioni che possono sopraggiungere nel processo di attribuzione e il risarcimento dopo eventuale danno comprovato. Le fonti prese in esame sono la Corte Internazionale di Giustizia , Corte Penale Internazionale per la Yugoslavia e Ruanda, i cui pareri sono applicati agli incidenti già menzionati. Nel terzo ed ultimo capitolo offro una panoramica degli sforzi nazionali e multilaterali nell’affrontare il problema cibernetico; i paesi analizzati sono Italia, Francia,Germania, Regno Unito, Israele e Stati Uniti , mentre le organizzazioni internazionali prese in esame sono L’UE, L’OSCE, NATO, Europol ed Interpol.
APA, Harvard, Vancouver, ISO, and other styles
8

Abass, Ademola. "Regional organisations and the development of collective security : beyond Chapter VIII of the UN Charter /." Oxford : Hart Pub, 2004. http://www.myilibrary.com/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Carr, Roberta B. "The greening of global security : the U.S. military and international environmental security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA277754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Al, Darmaki Mohamed Juma. "A reflective study of how security conceptualises the international standardisation of security." Thesis, University of Portsmouth, 2015. https://researchportal.port.ac.uk/portal/en/theses/a-reflective-study-of-how-security-conceptualises-the-international-standardisation-of-security(7175f940-dede-4dda-8514-aa5248ebfb5e).html.

Full text
Abstract:
The benefits of international cooperation in security are well understood. However, they have proven difficult to achieve as has any unanimously agreed standard or protocol. The purpose of this research is to establish how standardisation in security could be implemented internationally. Special attention has been paid to the operational level of the security apparatus and staff to conceptualise the challenges of implementation in multi-disciplined policing and security. This thesis also takes a wide-ranging view of the social interaction and interrelationship between the security apparatus and society; how the changes in the security environment have focused attention on the need for international standardisation and the challenges which led to the establishment of some international cooperation and systems, none of which has received universal acceptance. The important contribution of this research is in identifying and explaining the challenges involved in the establishment of an international security standard, and in providing some solutions and insights based upon the objective experiential reflection of people and organisations facing the challenges posed by a variety of security risks. The aim of this work is achieved by addressing two overarching concepts; the first of which addresses the difficulties involved in establishing an international standard for security acceptable to the international community such that they would cooperate given their many sovereign interests. The second of which defines the possibility of such a proposition involving the practicalities of implementing such a system at an operational level given the inevitable differences between countries. This study is based upon a complex body of data and information the gathering of which has been complicated by the inherent confidentiality in the sector. Infrastructural Information gathered by desk research and a wide literature review have been enriched by Operational Information from which three key hypotheses going to the root of the problem statement have been developed. 30 key issues/areas of focus were derived from these hypotheses and expanded into a questionnaire of 49 questions. The questionnaire targets objective information by the reflection of the participants on a wide range of issues, which also provides the basis of the interview regime. The data and information are analysed within a by-question discussion protocol and used to test the three key hypotheses from which conclusions are defined and recommendations identified. It was found that limited access to information within the culture of secrecy in the security sector hinders progress towards standardisation. Whilst there was a low level of resistance from the police and the security establishment to cooperation, many countries would need legislation to enable participation, which many would be provisionally willing to enact to enable cooperation. This in turn would require the sharing and exchange of information which would be a benefit of coordination and cooperation. The majority of countries would support working to a standard and would value cooperation. A need for support is indicated in the areas of management, benchmarking, commonality and improvement of processes. This is because few countries manage their security to a standard; and the majority want improvements and common standards to work to. It is clear that success depends upon commonality and coordination and there is a willingness to coordinate and cooperate by the majority of countries. It is recommended that standardisation come under the auspices of a supranational body like the United Nations because of the development work required in bringing countries together. A coordinated cooperation within a structured standardised organisation sensitive to various country needs would appeal to the majority and would most likely succeed.
APA, Harvard, Vancouver, ISO, and other styles
11

Cullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance." Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.

Full text
Abstract:
This thesis examines the theoretical implications of private security for International Relations (IR) theory and global politics from the perspective of a security governance model. It draws upon multi-disciplinary theoretical research on private security to both map the way security governance has been de-linked from the state, as well as to map the public-private hybrids and security networks that constitute private security's continued connection to the state. On one level, this thesis engages in a direct theoretical critique of Realist theory and its Weberian inspired understanding of the state's monopoly of security governance. Thus, the security governance framework used within this thesis is understood in terms of a theoretical response to the inability of Realist theory to conceptualize the political content of private security. Against this backdrop of a critique of Realist theory-and its idea of the state's monopoly relationship to authority, territory and coercion-this thesis re-articulates each of these concepts with reference to a security governance approach to the study of private security. This thesis then provides a positive application of this security governance theoretical framework to a series of original case studies of hybrid public-private and private- private security networks.
APA, Harvard, Vancouver, ISO, and other styles
12

Sage, Irene Elizabeth. "World food security and international organisations : the case of international grain reserves." Thesis, University of Kent, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320540.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Curley, Melissa Gail. "Participation, empowerment and micro security : implications for the security debate in international relations." Thesis, Nottingham Trent University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.302518.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Dal, Grande Giulia <1991&gt. "Narrative of a Puzzling Security: Discussing the Meaning of Security Under International Law." Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8695.

Full text
Abstract:
Il concetto di sicurezza è sempre stato tra i più controversi nelle relazioni internazionali. A partire dai trattati di Westphalia e Osnabruck, infatti, la questione della sicurezza ha iniziato ad essere collegata alla protezione delle infrastrutture statali e dei governi, e il concetto di sicurezza nazionale è così diventato quello tradizionale, cui gli stati aspiravano maggiormente e cercavano di seguire nel costruire le loro politiche di azione. Tale visione della sicurezza è ancora oggi rilevante, sia in ambiti nazionali che internazionali. Negli anni ’80, dopo la fine della guerra fredda e l’ondata di attivismo umanitario che ne seguì, iniziarono ad emergere nuovi concetti di sicurezza miranti a scalzare la supremazia del pensiero tradizionale. Uno di questi è quello di human security. Le recenti e crescenti innovazioni tecnologiche hanno tuttavia favorito la comparsa o il rafforzamento di una serie di nuove minacce alla sicurezza. Il presente lavoro esamina dunque l’evoluzione del concetto di sicurezza a partire dalle origini fino al presente dibattito sulla human security, prendendo in considerazione questioni quali le migrazioni, i droni e il mondo cibernetico. Lo scopo finale sarà quello di offrire dei possibili spunti – sia teorici che pratici – per affrontare al meglio, e in modo efficace, queste nuove sfide che minacciano oggi non solo la sicurezza degli stati, ma anche la tutela dei diritti umani degli individui.
APA, Harvard, Vancouver, ISO, and other styles
15

Ashby, Paul. "NAFTA-land security : the Mérida Initiative, transnational threats, and U.S. security projection in Mexico." Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48367/.

Full text
Abstract:
This thesis explores recent U.S. bilateral aid to Mexico through the Mérida Initiative (MI), a $2.3 billion assistance commitment on the part of the United States (U.S.) officially justified as helping Mexico build its capacity to take on violent drug cartels and thereby improve security in both countries. There has been a good amount of engaging work on the MI. However this extant literature has not undertaken detailed policy analysis of the aid programme, leading to conclusions that it is a fresh approach to the Mexican counternarcotics (CN) challenge, or that CN is a ‘fig leaf’ for the U.S. to pursue other ‘real’ goals. This is a core gap in the literature this project seeks to fill. Through policy analysis, I make an empirically supported argument that Mérida is a component of a far more ambitious policy agenda to regionalise security with Mexico more generally. This involves stabilising Mexico itself, not least in response to serious drug-related violence. However the U.S. also aims to improve its own security by giving greater ‘depth’ to its borders, and seeks protect the political economy of the North American Free Trade Agreement (NAFTA) from variegated security threats. In this way, recent U.S. policy in Mexico is both derivative of its wider grand strategic traditions in stabilising key political economies in line with its interests, and representative of some distinct developments stemming from the deeply integrated U.S.-Mexican economy as part of NAFTA. To assure U.S. interests accrued to it through the increasingly holistic North American economy, the U.S. has used the MI as the main vehicle in the construction of a nascent ‘NAFTA-land Security’ framework.
APA, Harvard, Vancouver, ISO, and other styles
16

Gillespie, Piers. "Security in a post-hegemonic international political economy /." Title page and contents only, 1992. http://web4.library.adelaide.edu.au/theses/09AR/09arg478.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Von, Tigerstrom Barbara. "Human security and international law prospects and problems /." Oxford ; Portland, OR : Hart Pub, 2007. http://www.netlibrary.com/urlapi.asp?action=summary&v=1&bookid=227756.

Full text
Abstract:
Originally presented as the author's Thesis (Ph. D.)--University of Cambridge Faculty of Law.
Description based on print version record. Includes bibliographical references (p. [215]-247) and index.
APA, Harvard, Vancouver, ISO, and other styles
18

Sibanda, Allan K. M. "International law legitimacy and the UN Security Council." Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/53188.

Full text
Abstract:
The salient issues concerning the powers of the United Nations Security Council culminate in questions of legitimacy. In terms of the United Nations Charter, the Council has a wide margin of discretion, and while its powers of appreciation are generally accepted as non-justiciable, its members are not independent. The Council has often been criticised for its selective performance, its composition and privileges of tenure, and the lack of transparency in its procedures. The objective of this study is to establish an analytical framework of legitimacy for the Council. As a point of departure, the study examines the limitations to the powers of the Council under the auspices of international law. These are expressed in two categories: the UN Charter, and jus cogens. Thereafter, the study develops a model of the content of legitimacy for the Council, based on a notion of legitimacy which encompasses legal, moral and sociological aspects. Three traditions are at the heart of this model. These are the instrumentalist, procedural and constitutional traditions respectively. The established framework proposes a minimal threshold for the Council to legitimately exercise its discretion, as an extension of the Charter based legal threshold, from which the Council derives its authority. The study is inspired by efforts in literature, to develop the new value-based approach to international law, whilst maintaining the coherence of the international legal order. The established framework provides a feasible means to assess the legitimacy of the Security Council, and in tandem provides space for further research.
Mini Dissertation (LLM)--University of Pretoria, 2015.
Jurisprudence
LLM
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
19

Alexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions." Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.

Full text
Abstract:
This thesis is centred on the question of the effect security technologies, and the imaginaries associated with them, have on the formation of the present security doxa. With a more nuanced understanding of technology as process, and the role of imagination reintroduced into the nexus, this thesis aims to enable an understanding of how technological security solutions are deployed in everyday life and how this contributes to a reformulating of politics in a world gripped by anxiety about an uncertain future. Of primary interest is the way in which seemingly mundane technologies can enter the dominant security narrative and achieve deployment in everyday life, not only as the prime solution to concerns of risk, but as something to actively be desired in themselves. A vital and understudied arena for the dissemination of specific imaginaries of mundane security tools as the ultimate solution to a risky future – as an end in and of themselves – are the spaces of promotion for such technologies. The centrepiece of promotion is found at the trade fairs and exhibitions where one can witness the marketing and sale of the ‘latest and greatest’ tech fixes from an ever increasing range of private sector security entrepreneurs whose living is made from promoting security. By offering both a mapping of the wider expansion and logic of the security fair world, and an ethnographic study of interactions within the exhibition walls of the International Fire and Security Exhibition and Conference (IFSEC) over the course of three years, this thesis makes it possible to develop a better understanding of both the makeup and relations between these elements, and expose these gatherings as more than just sites of commerce and consumption, and much more than simply a metaphor for the wider security world. Instead, they can be thought of as hotspots of intensive exchange of knowledge, new ideas and network building. Thus, this thesis aims to demonstrate how international trade fairs and exhibitions are more than just an ever more important means of distributing security technologies. It is not a question of the relationship between visitors and exhibitors, or the particular effectiveness of marketing strategies deployed by individual firms. It is about the underpinning logic of a particular mind-set regarding what it means to consume security as a commodity, and a specific imagining of a secured future with such solutions as the ultimate end-in-themselves and how these spaces are pivotal in the dissemination, propagation and reformulation of changing attitudes towards security.
APA, Harvard, Vancouver, ISO, and other styles
20

Hengel, Gabriel Josiah. "21st century energy security tensions within the transatlantic security community." Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=235817.

Full text
Abstract:
Much has been written during this century's energy security debate about the external threats the West faces to oil and natural gas supplies. This literature is often prescriptive, offering solutions to address these assumed threats. This research takes a much-needed look inward at the pressures placed on the multi-dimensional relationships within the transatlantic security community. An original contribution to knowledge is made through the exploration of these energy security tensions within the community and how they impact the two energy security prerequisites, availability and affordability. An examination of key oil and natural gas issues in the United States, Europe and the main transatlantic institutions demonstrates that the transatlantic community is very secure and often acts inadvertently to undermine its own energy security condition. Thus, the conventional wisdom that the supply of fossil fuel energy is a leading and high-priority security issue is challenged. Contrary to most literature, the conclusion is reached that energy security is actually not a high-level concern to the transatlantic security community, and that on occasions leading members of the community, who are high energy consumers, choose to put fossil fuel energy supply at risk to pursue political and strategic policies assigned a higher priority. In practice, producer states are found to be much more dependent on uninterrupted energy trade than consumer states, positively contributing to the reliability of oil and natural gas supply. In fact, through highly competitive political engagement with Russia and the Middle East North Africa region, the transatlantic states risk undermining the energy security of the community. Nevertheless, transatlantic energy security tensions have not risen to an actionable level. When placed in the overall context of transatlantic security issues, these energy security tensions do not threaten to divide the transatlantic community in any meaningful way.
APA, Harvard, Vancouver, ISO, and other styles
21

Ricci, James Benjamin. "The State, International Society, and Infectious Diseases : Emerging security threats and international cooperation." Thesis, University of Kent, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504663.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Polydorou, Stavros. "The role of international juridical process in international security and civil-military relations." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FPolydorou.pdf.

Full text
Abstract:
Thesis (M.A. in International Security and Civil-Military Relations)--Naval Postgraduate School, December 2002.
Thesis advisor(s): James Holmes Armstead, Thomas Bruneau. Includes bibliographical references (p. 129-134). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
23

Kersten, Larissa C. S. K. "Food security and Preferential Trade Agreements." Thesis, University of Essex, 2018. http://repository.essex.ac.uk/22837/.

Full text
Abstract:
Different disciplinary lenses condition the views on whether trade is generally seen as an opportunity for or threat to food security. Until now there is no consensus on the (empirical) impact in the literature. First, I analyse the impact of PTAs on food security across 93 low and middle income countries for 1990-2014. To take into account some of the multifaceted heterogeneity across PTAs, a distinction is made between Regional and Bilateral Trade Agreements (RTAs and BTAs, respectively) as these are designed differently in the light of food policy. Findings indicate that having a PTA in force, in contrast to having none, is associated with better food security outcomes. However, an increase in the number of BTAs, which are more competitive, is negatively, and an increase in the number of RTAs, which are more cooperative, is positively associated with food security outcomes in low and middle income countries. Second, I look into how RTAs and food security are associated across the three sub-regions of Sub-Saharan Africa, Latin America and South East Asia. To take into account heterogeneity across the RTAs I operationalise provisions on food security and related provisions in the agreement texts. I first test the impact of the aggregate provisions on food security for 67 low and middle income countries which are member of at least one of the RTAs in the three sub-regions, 1990-2014. Results indicate that the more food security related provisions a country has across its RTAs, the better it is a for food security outcomes. Then I test whether the state of food security affects the design of a RTA. Estimates indicate that the more severe the state of food insecurity within a country, the more food security related provisions the country has across its RTAs. In conclusion, RTAs are potentially an opportunity for food security - and the more food security and related concepts are addressed in the agreement text, the greater the opportunity. In contrast, BTAs are potentially a threat to food security.
APA, Harvard, Vancouver, ISO, and other styles
24

Rafferty, Kirsten. "Alliances as institutions : persistence and disintegration in security cooperation." Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=37818.

Full text
Abstract:
Since the end of the Cold War, the central puzzle of alliance theory is no longer why or how do alliances form, but (1) why do some alliances persist beyond the conditions in which they were created and (2) of these, why do some evolve in new directions ? Traditional realist scholarship cannot account for the persistence or evolution of military alliances when threats recede. This dissertation devises a model of alliance institutionalization and norm formation to explain and predict these processes.
When multidimensional threats exist, states facing a common threat ally, but they formalize and institutionalize the alliance so it can better manage multiple threats. Institutionalization encourages conditions conducive to persistence and evolution in two ways. First, by facilitating consultation and cooperation, it increases transparency, improves the performance of the alliance, and makes it costly for allies to renounce commitments or otherwise abandon one another. Second, institutions foster norms that in turn induce a form of attachment, or "loyalty" to the institution.
The strength of the norms embodied in the alliance and the allies' assessment of performance determine the behavior of institutionalized alliances. The alliance persists unaltered when performance is satisfactory, but norms are weak. It evolves, or expands its purpose and activities, when satisfactory performance combines with strong constitutive norms. Erosion occurs when strong norms encourage allies to salvage a poorly functioning alliance by curtailing its scope. Dissolution takes place when unsatisfactory performance and weak norms fail to prevent exit.
The most significant findings of this dissertation are that given institutionalization and norms, states do not exit an alliance immediately following a significant alteration in the strategic context or a decline in performance, but they try to preserve it. Only when these efforts fail will they curtail or dissolve the relationship. The dissertation tests the model by engaging in a comparative analysis of Cold War institutionalized alliances: the North Atlantic Treaty Organization, the Warsaw Pact, the Southeast Asia Treaty Organization, and the Australia, New Zealand, and U.S. alliance. Therefore, policy makers should not assume that evolving institutionalized alliances are adversarial or rush to respond with destabilizing counter alliances and, to minimize the possibility of conflict, allies engaging in evolution must clearly communicate their objectives to non-participants.
APA, Harvard, Vancouver, ISO, and other styles
25

Royds, Mollie. "Human security and Canadian foreign policy, Canada's international security dilemma in the new millenium." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ64926.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Lusk, Adam. "Arguing Security: Rhetoric, Media Environment, and Threat Legitimation." Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/65998.

Full text
Abstract:
Political Science
Ph.D.
In this dissertation, I study the process of gaining public consent about a security threat, or threat legitimation. Threats require legitimation because they are social facts and not objective truths or subjective perceptions. I argue rhetorical resources and strategies affect threat legitimation. Political actors deploy rhetorical resources and strategies in order to generate consent. The rhetorical resources connect together the rhetorical resources to construct a threat narrative used in the public debates. Moreover, I argue that the media environment influences how rhetorical strategies affect threat legitimation, acting as a conditional variable. Therefore I trace the threat narratives in six episodes in the history of United States foreign policy. Through process tracing, I highlight how rhetorical resources and strategies changed the public debates and level of consent about a threat, and how the media environment influenced these rhetorical strategies.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
27

Dhirathiti, Nopraenue Sajjarax. "Identity transformation and Japan's UN security policy : from the Gulf Crisis to human security." Thesis, University of Warwick, 2007. http://wrap.warwick.ac.uk/1141/.

Full text
Abstract:
This research uses discourse analysis to examine Japan's UN security policy after the Cold War period using three cases: the Gulf Crisis, the Cambodian peace process and the promotion of the human security policy. The key argument is that there is a need for a new IR theory-based approach that could explain foreign or security policy decision-making process and could also provide the analysis at both the domestic and the international level simultaneously. This research therefore adopts Wendt's Constructivism, along with the use of 'identity' as the key analytical platform, from which the 'recursive Constructivist model' is developed. Unlike popular literature, this research suggests that 'identity transformation' and the level of conformity between the identities projected internationally (international -role identities) and those embraced domestically (domestic-type identities) are the key factors determining Japan's foreign and security policy preferences. On the interpretation of Japan's post-Cold War security development, this research argues that it could be understood via the UN framework, and not only from the traditional perspective of the Japan-US alliance. Apart from the fact that it could be understood via the process of 'identity transformation', this research provides strong evidence and suggestions that Japan's assertive foreign and security pursuits in the post-Cold War era are the result of the nation's changing sets of ideas and beliefs on the link between 'national' and 'international' security. The original contributions of this research are two-fold. The theoretical contribution is a modification of Wendt's original framework of identity transformation into the so-called 'recursive process of identity transformation. ' The application of 'identity' and the 'recursive Constructivist model' to Japan's UN security policy in this research is significant because it is the first example among research in the field of Japanese studies to use a different analytical framework and tool in examining Japan's foreign and security policy. The model's ability to capture the intertwined process of social interactions at both the domestic and the international level is also important as it contributes to further IR theoretical development and a better understanding on Japan's foreign policy decision-making process. Also, the value-added benefit of the examination of human security policy is another vital substantive contribution, as this is the first exploration of this issue within the context of Japan's UN security policy.
APA, Harvard, Vancouver, ISO, and other styles
28

Randretsa, Thierry. "Bombardement aérien et norme d’immunité des non-combattants." Thesis, Lyon 3, 2013. http://www.theses.fr/2013LYO30071/document.

Full text
Abstract:
Norme séculaire et universelle, l’immunité des non-combattants a été gravement affectée par l’avènement de l’arme aérienne. L’introduction de la troisième dimension dans la guerre a permis d’attaquer des objectifs à l’arrière des lignes de front. Dans le contexte de la guerre totale, le bombardement stratégique a érigé la population et les biens civils en objectifs militaires afin de porter atteinte au moral de la première et de hâter la fin du conflit. Le résultat a été le massacre de millions de civils pour un bilan militaire plutôt mitigé. Ces bombardements tranchent avec la pratique actuelle par laquelle les États-majors s’efforcent de prévenir au maximum les dommages collatéraux. Comment expliquer un tel gouffre dans la manière d’envisager le bombardement aérien ?La population est devenue le centre de gravité des conflits contemporains. Que ce soit dans les interventions humanitaires ou dans la stratégie de la contre-insurrection, il convient de la préserver et de la conquérir sous peine de voir la mission échouer. Cette approche est exacerbée par la géographie moderne de la guerre se déroulant au sein de la population. Elle est compliquée par l’asymétrie morale opposée par les belligérants non-étatiques, se distinguant peu des civils et opérant à proximité ou à l’intérieur de zones peuplées. Dès lors, un paradigme de la modération s’applique aux bombardements aériens poussant parfois le commandement à aller au-delà du droit international humanitaire, là où, pendant une bonne partie du XXème siècle, ils étaient encore soumis au paradigme de la force de la guerre traditionnelle
Immunity of non-combatants is a secular and universal norm which has been severely affected by the advent of air power. The introduction of the third dimension in the war led to attack targets behind the front lines. In the context of total war, strategic bombing has elevated population and civilian objects as military targets in order to undermine the morale of the first and hasten the end of the conflict. The result was the massacre of millions of civilians for a military rather mixed record. These bombings contrast with the current practice whereby staffs strive to maximize the prevention of collateral damage. How to explain such a gap in the approach of aerial bombardment?The population has become the center of gravity of contemporary conflicts. Whether in humanitarian interventions or in counter-insurgency, it should be preserved and conquered in order to avoid mission failure. This approach is exacerbated by modern geography of the war taking place within the population. It is complicated by the moral asymetry of the non-state belligerents, who are not very distinguished from civilians. Furthermore, they operates near or within populated areas. Therefore, a paradigm of moderation applies to aerial bombing, sometimes pushing the command to go beyond the international humanitarian law. For much of the twentieth century, they were still subject to the paradigm of the strength of the traditional war
APA, Harvard, Vancouver, ISO, and other styles
29

Nelson, Francesca Linnea. "International agricultural trade liberalization and food security in Jamaica." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320863.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Frettingham, Edmund. "Security and the construction of 'religion' in international politics." Thesis, Aberystwyth University, 2009. http://hdl.handle.net/2160/bb4064ba-409d-4027-af17-7af296b909f4.

Full text
Abstract:
The thesis begins from the observation that religion has become an object of considerable public and IR-disciplinary debate, centred on the increasing political assertiveness of many religious groups and movements and the apparent complicity of religion in violent conflict around the world. It is proposed that this ‘politics about religion’ should be understood as fought out within and through discourses that construct the meaning of religion, that shape ideas about its proper character and purpose, and that influence the form it can take in society. Within this general objective, the thesis has three interrelated aims. It seeks to denaturalise the concept of religion as it is conventionally used in international politics, politicise its construction, and examine the contribution of thinking about security in the liberal tradition to the production of specific contemporary discourses of religion. The thesis identifies and denaturalises two prominent assumptions about religion, namely, that it is a separate domain of human activity and a genus. The partial and contested character of these ways of imagining religion often goes unrecognised, but they derive from particular liberal security strategies for ending the Wars of Religion. That such traditions of thought underpin much scholarship on religion in international politics and continue to inform security responses to religious violence is argued to be problematic; this is because they rely on empirically questionable assumptions, are contested politically, displace conflict rather than resolving it, and are bound up with the legitimation of a liberal political order, its imagination of security, and the forms of religion compatible with it. The argument that these particular discourses of religion are being articulated as part of contemporary liberal responses to religious violence is illustrated by Tony Blair’s representation of Islam when he was Prime Minister of the UK. The thesis concludes that because the meaning of religion is likely to remain a divisive question at the centre of international politics in the coming decades, those who study and practice it must be cognisant of the politics involved in all statements about religion – including their own.
APA, Harvard, Vancouver, ISO, and other styles
31

Gopalakrishnan, Shweta. "Mapping the elements of governance in international health security." Thesis, Kansas State University, 2011. http://hdl.handle.net/2097/9963.

Full text
Abstract:
Master of Public Health
Department of Diagnostic Medicine/Pathobiology
Justin J. Kastner
Globalization has resulted in closer integration of economies and societies. It has contributed to the emergence of a new world order which involves a vast nexus of global and regional institutions, surrounded by transnational corporations, and non-governmental agencies seeking to influence the agenda and direction of international public policy. Health is a center point of geopolitics, security, trade, and foreign policy. Expansion in the territory of health and an increase in the number of health actors have profound implications for global health governance. Accordingly, the focus of the thesis is on endorsing the three core elements of governance proposed by Ackleson and Lapid, which comprises a system of (formal and informal) political coordination—across multiple levels from the local to the global—among public agencies and private corporations seeking to accomplish common goals and resolve problems through collective action. This shift in global governance has been prominent in the health sector with the formation of numerous public-private partnerships, coalitions, networks, and informal collaborations. In an effort to cope with the proliferation of players in the health sector, the World Health Organization has undergone gradual transformation in its governance framework. It is important to examine the evolution of the governance architecture of the WHO, as well as its effective application in the current global environment maintaining the organization’s legitimacy. This study tries to offer a comprehensive account of the WHO’s history, its successes and failures, as well as challenges and opportunities confronting the organization. Embracing public-private partnerships and formal-informal interactions does not simply fill governance gaps opened by globalization, but helps cluster in narrower areas of cooperation, where the strategic interests of multilateral organizations (e.g., the WHO), states, and transnational actors intersect. Global health problems require global solutions, and neither public nor private organizations can solve these issues on their own. The forms of governance based on the Acklesonian-Lapidian definition assist in accomplishing public health goals through shared decision-making and risk taking.
APA, Harvard, Vancouver, ISO, and other styles
32

Smith, Roger. "Japan's international fisheries policy : the pursuit of food security." Thesis, University of Oxford, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.670139.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Magsig, Bjørn-Oliver. "International water law and the quest for common security." Thesis, University of Dundee, 2013. https://discovery.dundee.ac.uk/en/studentTheses/c08da455-ef7b-4879-95f7-9674df88c3ca.

Full text
Abstract:
The world’s freshwater supplies are squeezed by rapidly increasing demand, the impacts of global climate change and unsustainable management. Given the fact that water is the gossamer linking various other security issues – e.g., energy, food and environment – it seems obvious that ‘business as usual’ in transboundary water management will threaten future global stability and endanger the very foundation of international security. Yet, the much needed radical new approach is missing. This is mainly due to the fact that addressing water insecurity is a highly complex task where multilevel and polycentric forces must be balanced and coordinated. The absence of law in much of this emerging debate highlights the necessity for further understanding and elucidation, especially from the legal perspective. This PhD thesis aims to add to the discourse by providing a fresh conceptualisation of water security and developing an operational methodology for identifying the four core elements of water security – availability, access, adaptability and ambit – which must be addressed by international law. The analysis of the legal framework of transboundary freshwater management based on this contemporary understanding of water security reveals the challenges and shortcomings of the current legal regime. In order to address these shortcomings, the present mindset of prevailing rigidity and state-centrism is challenged by examining how international legal instruments could be crafted to advance a more flexible and common approach towards transboundary water interaction. Here, the concept of considering water security as a matter of ‘regional common concern’ is introduced to help international law play a more prominent role in addressing the challenges of global water insecurity. Ways for implementing such an approach are proposed and analysed by looking at international hydropolitics in Himalayan Asia. At a time when international environmental law is said to be losing relevance, the growing complexity and interdependence between states demands a break with the prevalence of thinking in silos and within national borders. This PhD thesis analyses transboundary water interaction – the fault line of international conflict in the 21st century – as a ‘case study’ for advancing public international law in order to fulfil its responsibility of promoting international peace and security.
APA, Harvard, Vancouver, ISO, and other styles
34

Takaya, Yuri. "Space security and international law : verification and monitoring mechanisms." Paris 11, 2009. http://www.theses.fr/2009PA111020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Nazarenko, Dmytro, and Danylo Vynohradov. "International cooperation in the cyber security field in Ukraine." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51000.

Full text
Abstract:
1. Convention on Cybercrime [Electronic resource]. – Access mode: https://en.wikipedia.org/wiki/Convention_on_Cybercrime 2. Cybersecurity indicators [Electronic resource]. – Access mode: https://ncsi.ega.ee/country/ua/495/#details
Cybersecurity is a priority topic for all states and Ukraine is no exception. With the development of technology, the number of cybercrimes has increased, according to experts, over the past few years, the total losses from cyberattacks were $ 4 trillion. The priority issue is the creation of a solid security system for the transfer, processing and storage of data between countries of the world.
Кібербезпека є пріоритетною темою для всіх держав, і Україна не є винятком. З розвитком технологій кількість кіберзлочинів зросла, за оцінками експертів, за останні кілька років загальні збитки від кібератак склали 4 трлн дол. Пріоритетним питанням є створення надійної системи безпеки для передачі, обробки та зберігання даних між країнами світу.
APA, Harvard, Vancouver, ISO, and other styles
36

Ito, Takako Carleton University Dissertation International Affairs. "International regime theory and security cooperation in East Asia." Ottawa, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Stieber, Sabine. "Non-traditional security in contemporary Chinese international relations thought." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/42987/.

Full text
Abstract:
‘Security’ has been undergoing a process of re-conceptualisation since the Cold War. Realism’s dominance meant that security concerned the survival of the nation-state in the face of military aggression. This clear-cut ‘traditional security’ has been contested since the 1970s, when ‘non-traditional security’ (NTS) covering non-military threats began to be discussed. Security Studies now encompasses varying approaches and interpretations. The concept of security is evolving substantially, but the debate is mostly limited to Western voices. Yet NTS has sparked a lively discourse in the PRC. The thesis establishes Chinese International Relations (IR) scholars’ understanding of NTS, based on the close textual analysis of academic publications and on interviews conducted with authors and other IR-specialists in China. It enquires into what these scholars mean when discussing NTS, and whether their conceptions differ from the mainstream, mainly Western, IR discourse. It then investigates the ten issues generally deemed NTS in the Chinese debate: culture and information security; terrorism and transnational crime; economic security and migration; energy and environmental security; and health and food security, analysing their conceptualisations, assigned importance, causes for variance within the debate, emerging political meanings and implications, and possible normative implications. The study shows that the scholarly NTS debate in China is diverse, ranging from a more statist expansion of national security to non-military threats to a theoretically deeper discourse which embraces individual security. Although the debate encompasses political purposes of vindicating state securitisation and advocating state management, some scholars’ arguments have normative implications of moving towards a people-centric view of security encouraging a change in global politics. The debate in China is still in flux, without universally accepted definitions, but a normative turn is evident which means that Chinese IR theory overall moves beyond descriptive theory. The study contributes to the wider research by adding to our understanding of how China ‘sees’ the world, and to the debate on NTS by critically examining the Chinese thought vis-à-vis the mainstream literature.
APA, Harvard, Vancouver, ISO, and other styles
38

Bydoon, Maysa S. "The international responsibility of the UN for the internationally wrongful acts of the Security Council." Thesis, University of Leicester, 2005. http://hdl.handle.net/2381/31086.

Full text
Abstract:
This thesis is a study of the possibility of invoking the international responsibility of the Security Council for its actions. The presumption of my thesis is that the UN with separate personality is responsible for the internationally wrongful acts of the Security Council, however, in certain circumstances the member states of the Security Council particularly, the decision makers could be held responsible. As many entities are dealing with Security Council, the determination of the responsible entity becomes very difficult. This thesis has identified three important areas of tension in such responsibility. First, the legal status of the Security Council, relating to whether it is considered "above the law"; secondly, the more persistent tension concerning the relationship between member states of an International Organisation and the International Organisation itself in considering the responsibility of member states. Last but not the least, the tension related to the scarcity, if not the lack, of recent practice concerning the international responsibility of the Security Council as well as the absence of rules that govern such a responsibility, will be discussed. This thesis is premised on the assumption that the Security Council has recently extended powers and is getting involved in virtually every single matter at both international level and at the non-international level. This inevitably raises issues of the international responsibility of the Security Council which have remained undeveloped, and which, accordingly, urges the necessity of establishing principles govern such international responsibility. Most notably, the subject of the international responsibility of the Security Council has not been addressed in the Articles on Responsibility of States for international wrongful acts. Thus in the light of the uncertainty and the rapid development of the powers of the Security Council, this thesis aims to fill the gaps as to the international responsibility of the Security Council.
APA, Harvard, Vancouver, ISO, and other styles
39

Febrica, Senia. "Explaining Indonesia's participation in maritime security cooperation." Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5429/.

Full text
Abstract:
Indonesia’s cooperation in maritime security initiatives is vitally important because half of the world’s trading goods and oil pass through Indonesian waters including the Straits of Malacca, the Strait of Sunda and the Strait of Lombok. Consequently, Indonesia’s active engagement in maritime cooperation is a matter of some import for the international community. However, Indonesia’s varying participation across maritime cooperation arrangements is puzzling. Indonesia has joined some of these cooperation initiatives and opted out of others despite the presence of United States leadership. This thesis addresses this puzzle by carrying out a comparative analysis of 26 cooperation arrangements using government documents and elite interviews in Indonesia, Malaysia, Singapore and New York. In addition to addressing an empirical puzzle, this thesis also contributes to the theoretical debate on international cooperation. The International Relations literature on cooperation tends to focus on great power bargaining. Whether, why and how middle powers decide to join international initiatives over which they have little influence has been overlooked. The implication of this study suggests that neither the calculation of relative gains as argued by neorealists, the constructivist expectation regarding the importance of shared identity, the neorealist or the neoliberal argument on the role of hegemonic leadership nor the bureaucratic politics approach emphasis on competing government actors’ preferences can explain the variation in Indonesia’s engagement with cooperation initiatives. I argue that Indonesia’s decision to cooperate is formed by the calculation of absolute gains. Indonesia cooperated as long as the benefits of cooperation exceeded the costs.
APA, Harvard, Vancouver, ISO, and other styles
40

Mahdi, Samiullah. "Security and foreign policy of landlocked states." Thesis, University of Massachusetts Boston, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10160222.

Full text
Abstract:

Wealth and stability of the region have a direct influence on the foreign policy and security of landlocked states. Landlocked states residing in poor and unstable neighborhoods, consequently, experience instability and have more limited foreign policy options compared to those landlocked states which are located in the rich and stable regions of the world. Besides those, two other factors, nationalism and the nature of the export product, extensively influence foreign policy and security of some landlocked countries. However, they are exceptions to the rule. Wealth and stability of the neighborhood determine the direction and fate of landlocked countries foreign policies and security measures.

APA, Harvard, Vancouver, ISO, and other styles
41

Turksen, Umut. "Protection seekers, states and the new security agenda." Thesis, University of the West of England, Bristol, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490448.

Full text
Abstract:
This thesis is concerned with the subject of anti-terrorism laws and their impact on the ghts of refugees and asylum seekers. In particular, it looks at the compatibility of anti terrorism laws with international human rights law instruments.
APA, Harvard, Vancouver, ISO, and other styles
42

Allen, Keith W. "Future of the U.S.-Japan security alliance : foundation for a multilateral security regime in Asia? /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FAllen.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Edward A. Olsen, Gaye Christoffersen. Includes bibliographical references (p. 109-119). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
43

Mukhamedov, Igor. "The domestic, regional and global security stakes in Kazakhstan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FMukhamedov.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2004.
Thesis advisor(s): Donald Abenheim, Roger McDermott. Includes bibliographical references (p. 67-60). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
44

Trif, Dana Silvina [Verfasser]. "A New Hegemony: International Criminal Justice and the Politics of International Security / Dana Silvina Trif." Berlin : Freie Universität Berlin, 2017. http://d-nb.info/1131629345/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Tlhacoane, Tshepo. "Cyberattacks: The latest threat to international peace and security, and how international law can respond." Master's thesis, Faculty of Law, 2020. http://hdl.handle.net/11427/33053.

Full text
Abstract:
Today it is accepted that states may not unilaterally attack each other using rifles, missiles, nuclear, or chemical weapons. But what about computer software such as worms and trojans which are capable of causing similar or greater damage? Are states permitted to attack each other using these so-called cyberweapons? Are they even considered weapons due to their differing form? This is the crux of what this dissertation is about. It aims to show that if states are prohibited from attacking each other with certain categories of weapons, they should not be permitted to attack each other with a different weapon which causes similar damage. I make three overarching arguments in this dissertation. The first is that cyberweapons should be considered ‘weapons' even though they differ in form and sophistication. Secondly, that the use of cyberattacks is a use of force and contravenes article 2(4) of the UN Charter. Finally, I will argue that extant international law is not able to maintain international peace and security and that a multilateral treaty is required.
APA, Harvard, Vancouver, ISO, and other styles
46

Tlhacoane, Tshiamo. "Cyberattacks: The latest threat to international peace and security, and how international law can respond." Master's thesis, Faculty of Law, 2021. http://hdl.handle.net/11427/33053.

Full text
Abstract:
Today it is accepted that states may not unilaterally attack each other using rifles, missiles, nuclear, or chemical weapons. But what about computer software such as worms and trojans which are capable of causing similar or greater damage? Are states permitted to attack each other using these so-called cyberweapons? Are they even considered weapons due to their differing form? This is the crux of what this dissertation is about. It aims to show that if states are prohibited from attacking each other with certain categories of weapons, they should not be permitted to attack each other with a different weapon which causes similar damage. I make three overarching arguments in this dissertation. The first is that cyberweapons should be considered ‘weapons' even though they differ in form and sophistication. Secondly, that the use of cyberattacks is a use of force and contravenes article 2(4) of the UN Charter. Finally, I will argue that extant international law is not able to maintain international peace and security and that a multilateral treaty is required.
APA, Harvard, Vancouver, ISO, and other styles
47

Dukat, Robert J. "Japanese technology and U.S. national security." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA246575.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 1990.
Thesis Advisor(s): Olsen, Edward. Second Reader: Looney, Robert. "December 1990." Description based on title screen as viewed on March 30, 2010. DTIC Identifier(s): International Trade, Western Security (International), United States, Critical Technology, Asia-Pacific Region, Theses. Author(s) subject terms: Japanese Technologly, U.S. National Security, U.S.-Japan Relations, U.S. Foreign Policy, U.S. Economic Policy, U.S. Technological Policy, Japanese Economic Policy, Japanese Foreign Policy, Japanese Governmental Policy, U.S.-Japan Trade, U.S. Trade Problems, U.S. Defense Policy, U.S. Industrial Policy. Includes bibliographical references (p. 143-156). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
48

Forteau, Mathias. "Droit de la securité collective et droit de la responsabilité internationale de l'état /." Paris : Pedone, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/523146124.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Recca, Stephen P. "Nordic nonalignment/neutrality policies in the 1990s implications for U.S. security /." Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA242410.

Full text
Abstract:
Thesis (Master of Arts in National Security Affairs)--Naval Postgraduate School, December 1990.
Thesis Advisor: Kennedy-Minott, R. Second Reader: Breemer, Jan S. "December 1990." Description based on title screen as viewed on April 1, 2010. DTIC Identifier(s): Foreign policy, national security, Finland, Sweden, USSR, European community, conference on security and cooperation in Europe, Nordic Nonalignment, international law, neutrality, United States, post Cold War era, theses. Author(s) subject terms: Sweden, Finland, neutrality, nonalignment, EC, CSCE, security politics, economics, Nordic, Scandinavia, Soviet Union, United States, regional, foreign policy. Includes bibliographical references (p. 75-78). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
50

Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace." Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.

Full text
Abstract:
While not uncontested, the finding that liberal democracies rarely, if ever, fight wars against each other represents one of the seminal discoveries of international relations (IR) scholarship. Nevertheless, 'democratic peace theory' (DPT) – the body of scholarship that seeks to explain the democratic peace finding – still lacks a satisfactory explanation for this phenomenon. In this thesis, I argue that a primary source of this failure has been DPT's failure to recognize the importance of collective identification and trust for the eventuation of the 'liberal peace'. Building on existing DPT scholarship, most of it Realist or Rationalist in its inspiration, but also employing insights from Constructivist and Cognitivist scholarship, I develop a new model of how specific forms of collective identification can produce specific forms of trust. On this basis, I elaborate a new explanation of the liberal peace which sees it as arising out of a network of trusting liberal security communities. I then elaborate a new research design that enables a more rigorous and replicable empirical investigation of these ideas through the analysis of three historical cases studies, namely the Canada-USA, India-Pakistan, and France-Germany relationships. The results of this analysis support the plausibility of my theoretical framework, and also illuminate four additional findings. Specifically, I find that (1) IR scholarship needs a more nuanced understanding of the interaction between agents and structures; (2) 'institutionalized collaboration' is especially important for promoting collective identification; (3) DPT scholarship needs to focus more attention on the content of the narratives around which collective identification takes place; and (4) dramatic events play an important role in collective identification by triggering what I term catharses and epiphanies. I close the thesis by reviewing the implications of my findings for IR and for policymakers and by suggesting some areas worthy of additional research.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography