To see the other types of publications on this topic, follow the link: Security state.

Dissertations / Theses on the topic 'Security state'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security state.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Full text
Abstract:

Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.

This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.

APA, Harvard, Vancouver, ISO, and other styles
2

Majumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.

Full text
Abstract:
With the power system evolving from passive to a more active system there is an incorporation of information and communication infrastructures in the system. The measurement data are more prone to tampering from attackers for mala fide intentions. Therefore, security and reliability of distribution have become major concerns. State estimation (SE), being the core function of the energy/distribution management system (EMS/DMS), has become necessary in order to operate the system efficiently and in a controlled manner. Although SE is a well-known task in transmission systems, it is usually not a common task in unbalanced distribution systems due to the difference in design and operation philosophy. This thesis addresses these issues and investigates the distribution system state estimation with unbalanced full three-phase modelling. The formulation, based on weighted least squares estimation, is extended to include the open/closed switches as equality constraints. This research then explores the vulnerabilities of the state estimation problem against attacks associated with leverage measurements. Detecting gross error particularly for leverage measurements have been found to be difficult due to low residuals. The thesis presents and discusses the suitability of externally studentized residuals compared to traditional residual techniques. Additionally, the masking/swamping phenomenon associated with multiple leverages makes the identification of gross error even more difficult. This thesis proposes a robust method of identifying the high leverages and then detecting gross error when the leverage measurements are compromised. All algorithms are validated in different IEEE test systems.
APA, Harvard, Vancouver, ISO, and other styles
3

Rockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.

Full text
Abstract:
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada
Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state disk storage, access controls, and data elimination in relation to various telemetry scenarios. The reader will be introduced to the operational considerations of solid state disk data security and the underlying technical concepts of how these are implemented.
APA, Harvard, Vancouver, ISO, and other styles
5

Gordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.

Full text
Abstract:
CHDS State/Local
Approved for public release, distribution is unlimited
To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Federal government to address these issues are limited and overextended. If states attempt to address this threat independently, important opportunities to reduce vulnerability and enhance capability will be lost. To achieve the capabilities needed for agro terrorism detection, mitigation, preparedness and response, states must collaborate to build the partnerships and programs their citizens require. This thesis argues multi-state partnerships are critical to defeating this threat as well as providing a robust response to an attack. Whether intentionally introduced or naturally occurring , infectious diseases can easily cross state borders before an outbreak is even detected. States must be prepared to act quickly to mitigate the effects of any crisis. There is a significant opportunity for states to strengthen their abilities to provide for a stronger agriculture counter terrorism preparedness system. The states can further their ability to combat attacks on agriculture actively by demonstrating leadership in implementing administrative agreements and ultimately adopting compact(s) between states as well as with the private sector.
Civilian, Homeland Security Advisor and Emergency Management Administrator, Iowa Homeland Security and Emergency Management Division
APA, Harvard, Vancouver, ISO, and other styles
6

Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Woodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Shamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.

Full text
Abstract:
The paper substantiates the theoretical and methodological foundations for ensuring the financial security of the state through the system of investment and stock markets. The role of the stock market and the peculiarity of stock exchange indices in ensuring the financial security of the state are investigated. A comparative analysis of the volatility of the Ukrainian stock market relative to the European and American ones, taking into account the time horizon of investment, is carried out, and a correlation is established between the indices under consideration. Based on the study, conclusions are drawn about the impact of trends in stock indices and international ratings of investment attractiveness on the financial security of Ukraine from the side of investor profitability.
APA, Harvard, Vancouver, ISO, and other styles
9

Blackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Full text
Abstract:
CHDS State/Local
Approved for public release; distribution is unlimited
ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure as success factors in building successful homeland security programs. This research found that lack of information sharing, a disconnect between the federal and state government, and inadequate funding created barriers to the implementation of constructive homeland security programs. To better position the homeland security programs within state departments of agriculture, this research provides several recommendations. Given the diversity of the roles and responsibilities in agriculture agencies, it is not possible to develop a model program for every state. These recommendations identify components of a model program that agencies could selectively use to enhance the effectiveness of homeland security programs.
APA, Harvard, Vancouver, ISO, and other styles
10

Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.

Full text
Abstract:
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, l examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. l argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations: 1) it is unlikely that Muslims are able to present a national security risk and 2) there are reasons to suspect that the national security policies of the Uzbek leadership target Islamic fundamentalism at least in part to legitimize the continued repression of most types of opposition.
L'existence d'une "menace islamique" à la sécurité nationale de l'Ouzbékistan est une idée répandue dans les médias et chez certains spécialistes. Le régime du Président ouzbek Islam Karimov a souligné cette menace à plusieurs reprises et a agi en conséquence. J'examine à la fois la capacité actuelle de différents groupes musulmans à défier les mécanismes de défense de l'état, ainsi que des éléments d'histoire récente de la stratégie de sécurité nationale ouzbèke liés à l'Islam. L'argument présenté est que la relation entre les musulmans et la sécurité nationale en Ouzbékistan est caractérisée par les deux observations suivantes: 1) il est peu probable que les musulmans soient capables de poser un risque à la sécurité nationale et 2) il existe des raisons de suspecter que les politiques de sécurité nationale du gouvernment s'attaquent à l'intégrisme musulman au moins en partie dans le but de légitimiser la répression continue de la majorité des forces d'opposition.
APA, Harvard, Vancouver, ISO, and other styles
11

Fugère, Charles. "Muslims, national security and the state in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98922.

Full text
Abstract:
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, I examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. I argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations: (1) it is unlikely that Muslims are able to present a national security risk and (2) there are reasons to suspect that the national security policies of the Uzbek leadership target Islamic fundamentalism at least in part to legitimize the continued repression of most types of opposition.
APA, Harvard, Vancouver, ISO, and other styles
12

Adelwerth, Shawn. "Security of a Small State: Case of Kuwait." Honors in the Major Thesis, University of Central Florida, 2004. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/694.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf
Bachelors
Arts and Sciences
Political Science
APA, Harvard, Vancouver, ISO, and other styles
13

Kirisci, Mustafa. "State Capacity, Security Forces and Terrorist Group Termination." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609106/.

Full text
Abstract:
This dissertation examines how different forms of state capacity affect the decision of terror groups to end their campaign. Building a theoretical framework about the relationship between state capacity and terrorist group termination, I address the following research questions: How do terror groups respond to the changes in non-repressive forms of state's capacity, such as bureaucratic capacity, extractive capacity, and how do those responses of terror groups affect the chance of their demise? How do the changes in non-repressive forms of state capacity affect the likelihood of termination of particular types of terror groups, specifically ethnic terror groups? And finally, how do security forces representing repressive capacity of states affect the probability of a terrorist group end? I argue that as the state fighting the terror group increases its capacity, that will generate an incentive for the terror group to respond to increasing state capacity to secure its survival and maintain its existence. As the terror group produces responses to increasing state capacity in terms of rebuilding its capacity to operate and keeping its popular support base intact, it will be less likely to end its terror campaign. This argument is particularly relevant for terror groups operating on behalf of a certain ethnic or religious group. I test this theory by doing a cross-national quantitative analysis as well as doing a qualitative analysis on the PKK's terror campaign in Turkey in the period of 1984-2013. I find that increasing extractive capacity and bureaucratic capacity of states encourages terror groups to engage in coercive and non-coercive actions to survive increasing state capacity, thereby reducing the chances of ending its terror campaign. I also argue that security forces, who represent repressive capacity of states, also play a role on the decision of terror groups to end their campaigns. By focusing exclusively on militarized law enforcement forces, I contend that the presence of these forces might either enhance the chances of survival of terror groups or increases the risk of the demise of these groups. Whether having these forces increases or decreases the likelihood of terror group end is a function of the capacity of the state to control the actions and behaviors of security forces. By constructing a time series cross-sectional data set on militarized law enforcement forces, I test these arguments and find that having militarized law enforcement forces decreases the risk of terror group end, but as the state's bureaucratic capacity increases, having these forces increases the likelihood that the terror group will decide to end its campaign. These empirical findings have several theoretical implications for the extant literature on state capacity and terrorism, and they also have implications for policymakers in terms of designing an effective counter-terrorism policy to deal with the threats from terrorist groups.
APA, Harvard, Vancouver, ISO, and other styles
14

Furst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Agrawal, Richa. "FSM State Assignment for Security and Power Optimization." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535635496357999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Davis, Joe Benton Seroka Jim. "An examination of state level homeland security organizations." Auburn, Ala, 2008. http://hdl.handle.net/10415/1496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Giannini, Martina. "Improving Cyber-Security of Power System State Estimators." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.

Full text
Abstract:
During the last century, technological advances have deeply renewed many critical infrastructures, such as transportation networks and power systems. In fact, the strong interconnection between physical process, communication channels, and control systems have led to the new concept of cyber-physical systems. Next to countless new advantages, these systems unfortunately have also new weaknesses. An example is cyber-attacks: malicious intrusions into the communication channel turned to manipulate data. In this thesis the considered cyber-physical system is a power network where hundreds of eld devices are connected to a control center, which collects data and controls the whole system. A cyber-attack where the adversary model is based on the attacker's knowledge of the network topology and line parameters is considered. This work is focused on one of the features of the control center: the state estimator. After a preliminary analysis of the conventional state estimators with respect to cyber attacks constructed according to this adversary model, new ideas for improving the security of the system are presented. The aim of this thesis is to propose novel state estimators that are both accurate under no cyber-attack, and at the same time able to detect attacks that are undetectable by the conventional state estimator. This mainly involves introducing additional information about the system as constraints in the state estimator, under the assumption that the new information is not available to the adversary. At the end of the analysis of the new mathematical model of the state estimators, a new denition of undetectable attack is proposed. The functionality of the novel state estimators is demonstrated in numerical experiments, which have been performed on dierent benchmark power networks.
APA, Harvard, Vancouver, ISO, and other styles
18

Hong, Yong-Pyo. "State security and regime security : the security policy of South Korea under the Syngman Rhee government 1953-1960." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Snetkov, Aglaya. "The evolution of Russia's security discourse 2000-2008 : state identity, security priorities and Chechnya." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/2887/.

Full text
Abstract:
This thesis examines the evolution of Russia’s internal and external security perceptions from 2000-2008. Drawing on social constructivist ontology, it argues that the Putin regime’s articulation of security priorities evolved in relation to its reconceptualisation of Russian state identity from a ‘weak’ to a ‘strong’ state. To trace this evolutionary relationship between state identity and security perceptions, official discourse on Chechnya is examined. In this way, Russian narrative constructions of the process of securitisation and desecuritisation of Chechnya, and the role that this discourse played within the articulation of state identity and security priorities are investigated. The thesis suggests that the initial securitisation and subsequent desecuritisation of Chechnya are best understood within the Putin regime’s discursive construction of state building and changing security priorities, rather than as a reflection of shifting material conditions. The thesis concludes that analysis of individual security policies should take into account that the narrative construction of these policies shape, and are shaped by, the multifaceted and evolutionary meta-narratives of Russian state and security identity. Moreover, it is argued that Russian security policy should be studied as a subject in its own right, investigating both internal and external security issues, rather than being subsumed within a broader foreign policy analysis.
APA, Harvard, Vancouver, ISO, and other styles
20

Ralston, Robert James. "Ontological Security: State Identity and Self-Image in the Digital Age." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/76785.

Full text
Abstract:
The driving argument of this thesis is that states, particularly the United States, are vulnerable in cyberspace for reasons that go beyond the material vulnerabilities that present studies on state insecurity in cyberspace focus on. This vulnerability in cyberspace is an ontological insecurity. Ontological insecurity reveals itself in the contradictions in official state discourse regarding cyberspace. State security of self—preserving and maintaining the seemingly concrete and consistent nature of what a state is about, how the state is understood in relation to other states, and how the state comes to understand itself through its own conceptions of self-identity—is challenged by cyberspace as a vehicle for massive amounts of information and challenges to state identity in relation to the state's behavior in cyberspace. Therefore, state identity and self-image are challenged in relation to cyberspace in two ways: first, through the vehicle that is cyberspace, and, second, through the practices that the state adopts to secure cyberspace and its broader security aims. The language that states, in this case the United States, use in order to justify surveillance practices and to impose meaning to cyberspace ultimately leads to projections of power that attempt to reinforce state strength and legitimacy vis-à-vis cyberspace, but these attempts fall short; contradictions arise in state discourse, and weaknesses are highlighted through these contradictions. Cyberspace, then, is an ontological as well as physical security threat to states.
Master of Arts
APA, Harvard, Vancouver, ISO, and other styles
21

Rosell, Richard G. "What type of state homeland security strategy should the state of New Jersey develop?" Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FRosell.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2007.
Thesis Advisor(s): Bellavita, Christopher. "September 2007." Description based on title screen as viewed on October 23, 2007. Includes bibliographical references (p. 53-56). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
22

Afful, Ebuley. "Violence and State Security in Africa: A Sociological Analysis." Bulletin of Ecumenical Theology, 1995. http://digital.library.duq.edu/u?/bet,1987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jastiuginas, Saulius. "Information Security Management: The Study of Lithuanian State Institutions." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121227_090041-07949.

Full text
Abstract:
Growing information security cases and scope illustrate that the relevance of information security issues becomes critical and present information security means are not sufficient enough to manage information security. Narrow comprehension of information security merely as technological problem is broadened by the research results of economic, managerial, psychological, legal and other related aspects’ influence to information security. Information is named as the object of information security management in this thesis, and new information security management solutions are searched in the information management sciences. Critical analysis of information management and information security management links, was established a theoretical basis to form an integral information security management model. Integral information security management model, constructed at a theoretical level, shows a complex approach towards information security, integrates information management and information security management. Integral information security management model allows indentifying information security management weaknesses in the Lithuanian State institutions, rectifying deficiencies, provide an integrated and efficient information security management. A practical research and obtained results grounded the constructed model’s applicability both for further theoretical academic research and for practical application in the Lithuanian State institutions.
Nuolat augantys informacijos saugumo incidentų atvejai ir mastai iliustruoja, kad informacijos saugumo problemų aktualumas tampa kritinis, o esamos informacijos saugumo valdymo priemonės nėra pakankamos informacijos saugumui valdyti. Siaurą informacijos saugumo, kaip technologinės problemos, supratimą plečia ekonominių, vadybinių, psichologinių, teisinių ir kitų susijusių aspektų įtaka informacijos saugumui. Disertacijoje teigiama, kad informacijos saugumo valdymo objektas yra informacija, todėl informacijos saugumui valdyti pasitelktini informacijos vadybos metodai ir būdai. Identifikavus ir kritiškai įvertinus informacijos vadybos bei informacijos saugumo valdymo diskursų sąsajas sukurtas teorinis pagrindas suformuoti integralų informacijos saugumo valdymo modelį. Teoriniame lygmenyje sukonstruotas integralus informacijos saugumo valdymo modelis atskleidžia kompleksinį požiūrį į informacijos saugumą, integruoja informacijos vadybą ir informacijos saugumo valdymą bei leidžia identifikuoti informacijos saugumo valdymo Lietuvos valstybės institucijose trūkumus, o šiuos trūkumus pašalinus, užtikrinti kompleksišką ir efektyvų informacijos saugumo valdymą. Empirinis tyrimas ir gauti rezultatai pagrindė teoriniame lygmenyje sukonstruoto modelio pritaikomumą tiek tolesniems teoriniams moksliniams tyrimams, tiek praktinėje Lietuvos valstybės institucijų veikloje.
APA, Harvard, Vancouver, ISO, and other styles
24

Longwill, Edward. "The Irish Army and state security policy, 1956-74." Thesis, University of Ulster, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.554245.

Full text
Abstract:
Security policy is an essential component of any state's governance. It consists of addressing present and predicted future threats to the state's external, border or internal security. In the past security policy analysts merely examined subjects with a myopic militarist or threat based analysis. However in recent years the field became more sophisticated and researchers must assess policy in relation to broader, interconnected considerations such as the state's economic capacity to support the military, domestic idiosyncrasies which may generate public opinion and influence the political elite, foreign policy and international relations. The Republic of Ireland in the period from 1956 until 1974 offers a case study to examine how a small, neutral, economically weak state, with a persistent internal security challenge and varying degrees of border instability, attempted to protect and advance its interests. After the Second World War the army struggled to justify its economic burden because it did not fulfil any realistic security role and the government's insistence that it remained in a secondary support role to the police further confined the military. However UN service completely regenerated the army, gave the state a means to elevate itself in international affairs and revealed the Irish military compared favourably to other militaries. The sudden outbreak of the Northern Ireland conflict in 1969 confirmed the long-held dictum that even if no security threats are foreseeable the military is nonetheless an essential arm of the state. The Irish state used the military to process and accommodate an influx of refugees, asked the army to draw up realistic intervention plans to cross the border, and faced the prospect of a north-south or Anglo-Irish war. Remarkably, despite the challenge, state security policy rapidly adapted and maintained relative stability. With the moderate use of the military for internal security, the use of the army along the border to placate British security concerns, and the gradual measured implementation of security legislation, the state succeeded in advancing its interests and assertively projected its influence in Anglo- Irish diplomacy.
APA, Harvard, Vancouver, ISO, and other styles
25

Black, Christina Leanne. "State-building in Afghanistan : a gendered human security perspective." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45042.

Full text
Abstract:
With the transition to Afghan national control underway in Afghanistan, questions of legitimacy and security continue to surround the last decade of international military involvement in the country. The initial bombing campaign and subsequent military operations following the terrorist attacks of 9/11 proclaimed the goal of providing humanitarian relief to Afghans as one of the primary motives behind military action. In order to achieve the stated objectives in Afghanistan, the cooperating states implemented a 'comprehensive approach' to state-building, whereby the military intervention was combined with diplomatic and development initiatives. This project critically examines the progressive Canadian involvement and international state-building techniques currently employed in Afghanistan. In conjunction with a historically contextualized consideration of the issues facing Afghans, the 'comprehensive approach' is critiqued through a feminist international relations (IR) lens regarding the humanitarian concerns and overarching legacy of the Afghan conflict.
APA, Harvard, Vancouver, ISO, and other styles
26

Campbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

Hwang, In Soo. "The United States-Republic of Korea security relationship, 1953-1960 : great power and small state." Thesis, University College London (University of London), 1999. http://discovery.ucl.ac.uk/1318002/.

Full text
Abstract:
This study investigates South Korea's security behaviour vis-a-vis the United States and that of the U.S. towards Korea. The significance of this study lies in its emphasis upon relations between South Korea and the United States during the 1953- 1960 period from the perspective of the patron-client state relationship. This study analyses the issues and historical events in order to trace the development of each nation's strategy, leverages, and tactics towards the other. Each chapter is related to the U.S. security commitment policy to South Korea, and South Korea's response in the frame work of the big power and small state relationship. The Introduction explains the purpose and importance of the research and the analytical framework. Chapter 1 analyses U.S. -South Korean diplomatic seesawing and Korean President Rhee's bargaining position during the Korean armistice negotiations. Chapter 2 traces the post-armistice period and the Korean Political Conference at Geneva during 1953-1954. As the Korean Armistice Agreement was a temporary measure to secure a complete cessation of hostilities, the Geneva Conference of 1954, intended to establish a political settlement, was a significant issue in the post-armistice period. Chapter 3 analyses U.S. security and military policy following the Korean War. The question of the proposed reduction of ROK forces and the redeployment of U.S. forces in Korea in connection with the 'New Look' policy were troublesome issues between Seoul and Washington, over which the two governments exerted their bargaining power. Chapter 4 deals with Rhee's conflicts with the U.S. concerning the normalisation of South Korea-Japan relations, U.S. economic policy towards Korea and its negative effects on Rhee's Government, and Rhee's undemocratic rule and dispute with the U.S. concerning Korean political affairs. Chapter 5, the conclusion of this study, summarises the research findings. As power and administration in South Korea were highly centralised under Rhee, it is important to ask to what extent did he, as the leader of the weaker state, manage and manipulate a bargaining position in Korea's relations with the United States.
APA, Harvard, Vancouver, ISO, and other styles
28

MacCulloch, Robert. "The structure of the welfare state." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.339057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Nash, Kathryn. "From state security to human security : the evolution of norms at the regional level in Africa." Thesis, SOAS, University of London, 2018. http://eprints.soas.ac.uk/26493/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Moeller, David K. "A model for future military operations : the effect of state security and human security on strategy /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=9c267789-85b9-4963-9298-936e82991d13&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Thomas, Mark D. "Deployment of state traffic law enforcement officers for Homeland Security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FThomas.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): David Brannan. "March 2006." Includes bibliographical references (p. 55-58). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
32

Silver, Jade. "Food Security on Maui: Reinventing Agriculture in the Aloha State." Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/scripps_theses/143.

Full text
Abstract:
This thesis focuses on the past, present, and future of food sustainability on Maui. It begins by explaining ancient Hawaiian agriculture and how this complex system of agriculture was deeply rooted in the customs and traditions of the Hawaiian people. The second section explores how this sustainable agricultural system changed after the arrival of Captain Cook in 1778. After western settlement, land that was once a communal resource became privatized. As land ownership shifted, the traditional subsistence agricultural system of Hawai’i began to change. Export crops such as sugar cane and pineapple became more widespread. As these crops shifted the way land was utilized in Hawai’i, the islands reduced the amount of crops grown for local consumption and became increasingly reliant on imported foods. The last section stresses the necessity of increasing the production of locally grown food on Maui. It discusses the locally grown food movement that has developed on Maui, and addresses the obstacles that prevent more food from being grown locally. Lastly, it suggests strategies to increase the amount of food produced for local consumption so that Maui can secure a more sustainable agricultural future.
APA, Harvard, Vancouver, ISO, and other styles
33

Pohnel, Jonathan R. "State Defense Forces and their role in American homeland security." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45242.

Full text
Abstract:
Approved for public release; distribution is unlimited
State Defense Forces (SDFs), or organized state militias and naval militias, have a long and distinguished history of service in the United States. These state-sanctioned organizations are substantiated and legitimized through the U.S. justice system and constitutional law. Currently, 23 states and U.S. territories have SDFs; unlike National Guard units, they cannot be federalized, which means they remain a state-level asset during emergency management operations. SDFs were utilized successfully during Hurricane Katrina, proving their value in state and federal emergency response efforts. This thesis seeks to analyze the structure and usefulness of the SDF as a volunteer emergency response organization. Second, it seeks to understand the evolution of the SDF by examining U.S. militia history. Third, it examines the disaster-relief efforts of SDFs with regard to Hurricane Katrina. SDFs provide state governors with emergency response personnel who are locally available and ready to serve in multiple capacities. Presently, state officials can promote legislation and develop a mission-flexible State Defense Force that can act as a reserve force for local law enforcement and the National Guard during natural and man-made disasters. The SDF may be the next step in the evolution of state and local emergency response in the 21st century.
APA, Harvard, Vancouver, ISO, and other styles
34

Criswell, Deanne B. "Homeland Security : Developing National Doctrine to Guide State Strategy Development." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6783.

Full text
Abstract:
Approved for public release; distribution is unlimited
If one subscribes to the belief that doctrine is a common understanding of what fundamental principles guide an organization, then this thesis demonstrates that there is currently no common understanding of homeland security. There is currently a lack of institutional doctrine that can be applied nationally for state level government to develop their homeland security strategies. The military has a long history of successfully using doctrine to develop war-fighting strategy. Comparisons can be made to the Air Forces use of doctrine to gain autonomy as well as the effect joint doctrine has on achieving unity of effort across disciplines. Additional lessons can be learned from past civil defense attempts at institutionalization and the evolution to emergency management and homeland security. By modeling of these existing, known and accepted doctrines or lack thereof, a national homeland security doctrine could emerge.
APA, Harvard, Vancouver, ISO, and other styles
35

Grogan, Michael S. "National security imperatives and the neorealist state: Iran and realpolitik." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7744.

Full text
Abstract:
Approved for public release; distribution is unlimited
This thesis argues that pragmatic, neorealist interests-reducing Iran's international isolation, opening avenues for economic cooperation and commercial exchange, restoring religious and cultural links, and safeguarding the mutually advantageous relationships with influential powers in the region- are the true foundations of Iranian national security and foreign policy decisionmaking. Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for spreading its brand of Islamic revolution abroad. The causes of these Islamic revolutionary groups, no matter how noble in the Iranian leaderships' eye, do not outweigh the more classic nation-state decisionmaking process that the Iranian government undergoes when it determines the best course of action on an issue of foreign policy and/or national security) realpolitik. It is the neorealist approach which always wins out in national security matters of a state. Presented are four case studies of Iranian relations with Azerbaijan, Turkey, Israel, and four Persian Gulf States (the United Arab Emirates, Bahrain, Oman, and Saudi Arabia). What each reveals is an Islamic Iran's whose policy decisions and actions compelled by the rational, state model of neorealism and not ideology
APA, Harvard, Vancouver, ISO, and other styles
36

Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.

Full text
Abstract:
This thesis is concerned with examining the intersection between the failed state and security governance literatures, through the case study of Jamaica. This thesis is primarily concerned with examining the under-researched link between concerns raised in failed state and security governance literatures. The thesis proposes that the presence of state failure and success in the same setting is a direct result of the execution of a problematic security governance framework that impedes the nation’s ability to establish a stable state infrastructure that is capable of fulfilling the welfare needs of the entire citizenry. By utilising Jamaica as a case study, and more specifically the Tivoli Gardens Incursion as a sub case study, the main contributions to research that this thesis makes is that state failure can co-exist alongside spaces of state success. State failure, as exemplified in Jamaica, can exist on a continuum and manifests itself geographically and within certain sectors of the state system, such as security.
APA, Harvard, Vancouver, ISO, and other styles
37

Nuqui, Reynaldo Francisco. "State Estimation and Voltage Security Monitoring Using Synchronized Phasor Measurements." Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/28266.

Full text
Abstract:
The phasor measurement unit (PMU) is considered to be one of the most important measuring devices in the future of power systems. The distinction comes from its unique ability to provide synchronized phasor measurements of voltages and currents from widely dispersed locations in an electric power grid. The commercialization of the global positioning satellite (GPS) with accuracy of timing pulses in the order of 1 microsecond made possible the commercial production of phasor measurement units. Simulations and field experiences suggest that PMUs can revolutionize the way power systems are monitored and controlled. However, it is perceived that costs and communication links will affect the number of PMUs to be installed in any power system. Furthermore, defining the appropriate PMU system application is a utility problem that must be resolved. This thesis will address two key issues in any PMU initiative: placement and system applications. A novel method of PMU placement based on incomplete observability using graph theoretic approach is proposed. The objective is to reduce the required number of PMUs by intentionally creating widely dispersed pockets of unobserved buses in the network. Observable buses enveloped such pockets of unobserved regions thus enabling the interpolation of the unknown voltages. The concept of depth of unobservability is introduced. It is a general measure of the physical distance of unobserved buses from those known. The effects of depth of unobservability on the number of PMU placements and the errors in the estimation of unobserved buses will be shown. The extent and location of communication facilities affects the required number and optimal placement of PMUs. The pragmatic problem of restricting PMU placement only on buses with communication facilities is solved using the simulated annealing (SA) algorithm. SA energy functions are developed so as to minimize the deviation of communication-constrained placement from the ideal strategy as determined by the graph theoretic algorithm. A technique for true real time monitoring of voltage security using synchronized phasor measurements and decision trees is presented as a promising system application. The relationship of widening bus voltage angle separation with network stress is exploited and its connection to voltage security and margin to voltage collapse established. Decision trees utilizing angle difference attributes are utilized to classify the network voltage security status. It will be shown that with judicious PMU placement, the PMU angle measurement is equally a reliable indicator of voltage security class as generator var production. A method of enhancing the weighted least square state estimator (WLS-SE) with PMU measurements using a non-invasive approach is presented. Here, PMU data is not directly inputted to the WLS estimator measurement set. A separate linear state estimator model utilizing the state estimate from WLS, as well as PMU voltage and current measurement is shown to enhance the state estimate. Finally, the mathematical model for a streaming state estimation will be presented. The model is especially designed for systems that are not completely observable by PMUs. Basically, it is proposed to estimate the voltages of unobservable buses from the voltages of those observable using interpolation. The interpolation coefficients (or the linear state estimators, LSE) will be calculated from a base case operating point. Then, these coefficients will be periodically updated using their sensitivities to the unobserved bus injections. It is proposed to utilize the state from the traditional WLS estimator to calculate the injections needed to update the coefficients. The resulting hybrid estimator is capable of producing a streaming state of the power system. Test results show that with the hybrid estimator, a significant improvement in the estimation of unobserved bus voltages as well as power flows on unobserved lines is achieved.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
38

Kuznietsova, Tetiania, and Andrii Chyrkov. "State and perspectives of aircraft cybersecurity." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50678.

Full text
Abstract:
During the latest events in the aviation world, where experts in the field of cybersecurity (example) opened the possibility of gaining access to the aircraft's on-board systems, industry experts (and not only) thought about it. And we are doing quite a lot. There are many existing guides that contain recommendations and practices, for example: «Software Considerations in Airborne Systems and Equipment Certification» contains recommendations for evaluating security and assuring software quality. There is a separation of access, because all systems are somehow connected to each other through the on-board network (take at least maintenance to determine failures): The FAA continues to consider the aircraft guidelines acceptable for software certification, although they acknowledge that the guidelines do not fully cover all areas of software development and life cycle processes, and can sometimes be misinterpreted.
APA, Harvard, Vancouver, ISO, and other styles
39

Kliushnyk, T., A. Drofa, Тетяна Володимирівна Щербина, Татьяна Владимировна Щербина, and Tetiana Volodymyrivna Shcherbyna. "The state financial security and sustainability of financial sector in Ukraine: their state and management peculiarities." Thesis, Sumy State University, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77597.

Full text
Abstract:
Constant increasing of financial system’s role and importance is becoming a salient characteristic of the modern development of the domestic economy. It provides uninterrupted process of national product formation and promotes economic growth in the country. Given the undeniable importance of finance in the processes of the state's economy functioning, the issues of financial security ensuring and effective financial security management become especially relevant.
APA, Harvard, Vancouver, ISO, and other styles
40

Ashe, James Patrick. "A vulnerability assessment of the East Tennessee State University administrative computer network." [Johnson City, Tenn. : East Tennessee State University], 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/unrestricted/AsheJ030204b.pdf.

Full text
Abstract:
Thesis (M.S.)--East Tennessee State University, 2004.
Title from electronic submission form. ETSU ETD database URN: etd-0301104-151512. Includes bibliographical references. Also available via Internet at the UMI web site.
APA, Harvard, Vancouver, ISO, and other styles
41

Shropshire, Jordan Douglas. "Predicting compliance with prescribed organizational information security protocols." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-10202008-120221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

MacDonald, Robert L. "Rogue State? The United States, Unilateralism, and the United Nations." See Full Text at OhioLINK ETD Center (Requires Adobe Acrobat Reader for viewing), 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1154015815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.
Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Darren. "State and urban area homeland security strategy v3.0 evolving strategic planning /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FChen.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Robert Bach. "March 2006." Includes bibliographical references (p. 45-46). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
45

Collins, Andrew Elliott Egerton. "Saving State-Building: EU Contributions to Security Sector Reform in Afghanistan." Thesis, University of Canterbury. National Centre for Research on Europe, 2011. http://hdl.handle.net/10092/6311.

Full text
Abstract:
State failure represents one of the most pressing concerns for international security in the 21st century, and Afghanistan represents one of the most concerted efforts ever witnessed to address this phenomenon in a lasting and sustainable way. This thesis takes the position that part of the difficulty in finding a remedy for state failure relates to the contradictions and dilemmas inherent within the state-building enterprise itself. The trade-offs required by certain fundamental aspects of state-building must be better understood if they are to be effectively managed, and these trade-offs cannot be understood without critically analysing the basic assumptions of state-building. To come to grips with these assumptions in concrete terms, this paper examines the European Union’s involvement in Afghanistan as a case study to apply and develop the analytical framework of “dilemma analysis.” The first major goal of this research will be to outline the tensions within state-building, and to assess their usefulness for explaining some of the difficulties facing state-builders in general terms. The second goal will be to analyse the significance of the specific combination of dilemmas relevant to the case of Afghanistan, in order to show how those dilemmas interact with each other to constrain the EU’s options for effective state-building. The third goal is to identify ways in which the EU and the international community in general can benefit from dilemma analysis when conducting state-building interventions in the future.
APA, Harvard, Vancouver, ISO, and other styles
46

Hoffman, Samantha R. "Programming China : the Communist Party's autonomic approach to managing state security." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/48547/.

Full text
Abstract:
Programming China: The Communist Party’s Autonomic Approach to Managing State Security, introduces the new analytical framework called China's “Autonomic Nervous System” (ANS). The ANS framework applies complex systems management theory to explain the process the Chinese Communist Party calls “social management”. Through the social management process, the Party-state leadership interacts with both the Party masses and non-Party masses. The process involves shaping, managing and responding and is aimed at ensuring the People’s Republic of China’s systemic stability and legitimacy—i.e. (Party-) state security. Using the ANS framework, this thesis brings cohesion to a complex set of concepts such as “holistic” state security, grid management, social credit and national defence mobilisation. Research carried out for the thesis included integrated archival research and the author’s database of nearly 10,000 social unrest events. Through ANS, the author demonstrates that in the case of the People’s Republic of China we may be witnessing a sideways development, where authoritarianism is stabilised, largely through a way of thinking that both embodies and applies complex systems management and attempts to “automate” that process through technology designed based on the same concepts. The party's rule of China, thus, evolves away from traditional political scales like reform versus retrenchment or hard versus soft authoritarianism. The ANS framework should be seen not as an incremental improvement to current research of China’s political system but as a fundamentally different approach to researching and analysing the nature of Chinese politics.
APA, Harvard, Vancouver, ISO, and other styles
47

Busato, Marco <1995&gt. "The State of Strict Transport Security: Current Deployment and Correct Configuration." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19274.

Full text
Abstract:
Nowadays, the topic of security has become a popular issue due to the contemporary digital society in constant development. Thus, HTTPS only is not enough in order to ensure a high security level (e.g. feeling protected while surfing the net). Therefore, a new mechanism has increased its employment: the Strict Transport Security, which enhances the security between a user agent and a server. In this thesis, it will be defined the best application of this system by observing the common settings over the internet and the reason why it is preferable declaring some directives and carry out its current deployment among the sites. Furthermore, the sites considered were tested in various scenarios and their security level was assessed in a report that was drawn up. This study, using some tools such as Puppeteer, wants to inform users about the correct configuration and gives an overview about the current deployment of this essential security mechanism.
APA, Harvard, Vancouver, ISO, and other styles
48

Scollan, Thomas J. "An assessment of the New York State Enhanced Security Guard Training legislation and its efficacy on security officer preparedness." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10688.

Full text
Abstract:
CHDS State/Local
This thesis analyzes the results of a survey instrument administered to a random sample of New York City security officers in order to understand the relationship between job training and turnover and, in turn, the effect of high turnover on the preparedness and effectiveness of that population in performing its duties. Replicating a 2004 survey sponsored by the New York City Public Advocate Office, which exposed poor training and rampant turnover among security guards and resulted in the August 2005 New York State Enhanced Security Guard Training legislation, this thesis seeks to determine changes in and correlations among those phenomena by employing bivariate analysis, independent t-test, and Cronbach's Alpha methods. The data analysis reveals correlations between employment conditions--including training and advancement opportunities--and retention, and thus contributes to the discourse surrounding the role of private-sector and nonsworn personnel in the Homeland Security Enterprise.
APA, Harvard, Vancouver, ISO, and other styles
49

Scott, Katherine Anne. "Reining in the State: Civil Society, Congress, and the Movement to Democratize the National Security State, 1970-1978." Diss., Temple University Libraries, 2009. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/38730.

Full text
Abstract:
History
Ph.D.
This dissertation explores the battle to democratize the national security state, 1970-1978. It examines the neo-progressive movement to institutionalize a new domestic policy regime, in an attempt to force government transparency, protect individual privacy from state intrusion, and create new judicial and legislative checks on domestic security operations. It proceeds chronologically, first outlining the state's overwhelming response to the domestic unrest of the 1960s. During this period, the Department of Justice developed new capacities to better predict urban unrest, growing a computerized databank that contained millions of dossiers on dissenting Americans and the Department of Defense greatly expanded existing capacities, applying cold war counterinsurgency and counterintelligence techniques developed abroad to the problems of protests and riots at home. The remainder of the dissertation examines how the state's secret response to unrest and disorder became public in the early 1970s. It traces the development of a loose coalition of reformers who challenged domestic security policy and coordinated legislative and litigative strategies to check executive power.
Temple University--Theses
APA, Harvard, Vancouver, ISO, and other styles
50

Williams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography