Dissertations / Theses on the topic 'Security state'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Security state.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.
Full textHundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security.
This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chapter. These threats include worms, email worms, spyware and trojan horses. After this chapter some possible solutions for improving home computer security are presented. Finally this master thesis contains a short user survey to find out what the problems are in the real world and what can be doneto improve the current situation.
Majumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.
Full textRockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.
Full textFitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.
Full textSolid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state disk storage, access controls, and data elimination in relation to various telemetry scenarios. The reader will be introduced to the operational considerations of solid state disk data security and the underlying technical concepts of how these are implemented.
Gordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.
Full textApproved for public release, distribution is unlimited
To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Federal government to address these issues are limited and overextended. If states attempt to address this threat independently, important opportunities to reduce vulnerability and enhance capability will be lost. To achieve the capabilities needed for agro terrorism detection, mitigation, preparedness and response, states must collaborate to build the partnerships and programs their citizens require. This thesis argues multi-state partnerships are critical to defeating this threat as well as providing a robust response to an attack. Whether intentionally introduced or naturally occurring , infectious diseases can easily cross state borders before an outbreak is even detected. States must be prepared to act quickly to mitigate the effects of any crisis. There is a significant opportunity for states to strengthen their abilities to provide for a stronger agriculture counter terrorism preparedness system. The states can further their ability to combat attacks on agriculture actively by demonstrating leadership in implementing administrative agreements and ultimately adopting compact(s) between states as well as with the private sector.
Civilian, Homeland Security Advisor and Emergency Management Administrator, Iowa Homeland Security and Emergency Management Division
Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.
Full textThesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
Woodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.
Full textThesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
Shamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.
Full textBlackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.
Full textApproved for public release; distribution is unlimited
ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure as success factors in building successful homeland security programs. This research found that lack of information sharing, a disconnect between the federal and state government, and inadequate funding created barriers to the implementation of constructive homeland security programs. To better position the homeland security programs within state departments of agriculture, this research provides several recommendations. Given the diversity of the roles and responsibilities in agriculture agencies, it is not possible to develop a model program for every state. These recommendations identify components of a model program that agencies could selectively use to enhance the effectiveness of homeland security programs.
Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.
Full textL'existence d'une "menace islamique" à la sécurité nationale de l'Ouzbékistan est une idée répandue dans les médias et chez certains spécialistes. Le régime du Président ouzbek Islam Karimov a souligné cette menace à plusieurs reprises et a agi en conséquence. J'examine à la fois la capacité actuelle de différents groupes musulmans à défier les mécanismes de défense de l'état, ainsi que des éléments d'histoire récente de la stratégie de sécurité nationale ouzbèke liés à l'Islam. L'argument présenté est que la relation entre les musulmans et la sécurité nationale en Ouzbékistan est caractérisée par les deux observations suivantes: 1) il est peu probable que les musulmans soient capables de poser un risque à la sécurité nationale et 2) il existe des raisons de suspecter que les politiques de sécurité nationale du gouvernment s'attaquent à l'intégrisme musulman au moins en partie dans le but de légitimiser la répression continue de la majorité des forces d'opposition.
Fugère, Charles. "Muslims, national security and the state in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98922.
Full textAdelwerth, Shawn. "Security of a Small State: Case of Kuwait." Honors in the Major Thesis, University of Central Florida, 2004. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/694.
Full textBachelors
Arts and Sciences
Political Science
Kirisci, Mustafa. "State Capacity, Security Forces and Terrorist Group Termination." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609106/.
Full textFurst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.
Full textAgrawal, Richa. "FSM State Assignment for Security and Power Optimization." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535635496357999.
Full textDavis, Joe Benton Seroka Jim. "An examination of state level homeland security organizations." Auburn, Ala, 2008. http://hdl.handle.net/10415/1496.
Full textGiannini, Martina. "Improving Cyber-Security of Power System State Estimators." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.
Full textHong, Yong-Pyo. "State security and regime security : the security policy of South Korea under the Syngman Rhee government 1953-1960." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308856.
Full textSnetkov, Aglaya. "The evolution of Russia's security discourse 2000-2008 : state identity, security priorities and Chechnya." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/2887/.
Full textRalston, Robert James. "Ontological Security: State Identity and Self-Image in the Digital Age." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/76785.
Full textMaster of Arts
Rosell, Richard G. "What type of state homeland security strategy should the state of New Jersey develop?" Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FRosell.pdf.
Full textThesis Advisor(s): Bellavita, Christopher. "September 2007." Description based on title screen as viewed on October 23, 2007. Includes bibliographical references (p. 53-56). Also available in print.
Afful, Ebuley. "Violence and State Security in Africa: A Sociological Analysis." Bulletin of Ecumenical Theology, 1995. http://digital.library.duq.edu/u?/bet,1987.
Full textJastiuginas, Saulius. "Information Security Management: The Study of Lithuanian State Institutions." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121227_090041-07949.
Full textNuolat augantys informacijos saugumo incidentų atvejai ir mastai iliustruoja, kad informacijos saugumo problemų aktualumas tampa kritinis, o esamos informacijos saugumo valdymo priemonės nėra pakankamos informacijos saugumui valdyti. Siaurą informacijos saugumo, kaip technologinės problemos, supratimą plečia ekonominių, vadybinių, psichologinių, teisinių ir kitų susijusių aspektų įtaka informacijos saugumui. Disertacijoje teigiama, kad informacijos saugumo valdymo objektas yra informacija, todėl informacijos saugumui valdyti pasitelktini informacijos vadybos metodai ir būdai. Identifikavus ir kritiškai įvertinus informacijos vadybos bei informacijos saugumo valdymo diskursų sąsajas sukurtas teorinis pagrindas suformuoti integralų informacijos saugumo valdymo modelį. Teoriniame lygmenyje sukonstruotas integralus informacijos saugumo valdymo modelis atskleidžia kompleksinį požiūrį į informacijos saugumą, integruoja informacijos vadybą ir informacijos saugumo valdymą bei leidžia identifikuoti informacijos saugumo valdymo Lietuvos valstybės institucijose trūkumus, o šiuos trūkumus pašalinus, užtikrinti kompleksišką ir efektyvų informacijos saugumo valdymą. Empirinis tyrimas ir gauti rezultatai pagrindė teoriniame lygmenyje sukonstruoto modelio pritaikomumą tiek tolesniems teoriniams moksliniams tyrimams, tiek praktinėje Lietuvos valstybės institucijų veikloje.
Longwill, Edward. "The Irish Army and state security policy, 1956-74." Thesis, University of Ulster, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.554245.
Full textBlack, Christina Leanne. "State-building in Afghanistan : a gendered human security perspective." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45042.
Full textCampbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.
Full textHwang, In Soo. "The United States-Republic of Korea security relationship, 1953-1960 : great power and small state." Thesis, University College London (University of London), 1999. http://discovery.ucl.ac.uk/1318002/.
Full textMacCulloch, Robert. "The structure of the welfare state." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.339057.
Full textNash, Kathryn. "From state security to human security : the evolution of norms at the regional level in Africa." Thesis, SOAS, University of London, 2018. http://eprints.soas.ac.uk/26493/.
Full textMoeller, David K. "A model for future military operations : the effect of state security and human security on strategy /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=9c267789-85b9-4963-9298-936e82991d13&rs=PublishedSearch.
Full textThomas, Mark D. "Deployment of state traffic law enforcement officers for Homeland Security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FThomas.pdf.
Full textThesis Advisor(s): David Brannan. "March 2006." Includes bibliographical references (p. 55-58). Also available online.
Silver, Jade. "Food Security on Maui: Reinventing Agriculture in the Aloha State." Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/scripps_theses/143.
Full textPohnel, Jonathan R. "State Defense Forces and their role in American homeland security." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45242.
Full textState Defense Forces (SDFs), or organized state militias and naval militias, have a long and distinguished history of service in the United States. These state-sanctioned organizations are substantiated and legitimized through the U.S. justice system and constitutional law. Currently, 23 states and U.S. territories have SDFs; unlike National Guard units, they cannot be federalized, which means they remain a state-level asset during emergency management operations. SDFs were utilized successfully during Hurricane Katrina, proving their value in state and federal emergency response efforts. This thesis seeks to analyze the structure and usefulness of the SDF as a volunteer emergency response organization. Second, it seeks to understand the evolution of the SDF by examining U.S. militia history. Third, it examines the disaster-relief efforts of SDFs with regard to Hurricane Katrina. SDFs provide state governors with emergency response personnel who are locally available and ready to serve in multiple capacities. Presently, state officials can promote legislation and develop a mission-flexible State Defense Force that can act as a reserve force for local law enforcement and the National Guard during natural and man-made disasters. The SDF may be the next step in the evolution of state and local emergency response in the 21st century.
Criswell, Deanne B. "Homeland Security : Developing National Doctrine to Guide State Strategy Development." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6783.
Full textIf one subscribes to the belief that doctrine is a common understanding of what fundamental principles guide an organization, then this thesis demonstrates that there is currently no common understanding of homeland security. There is currently a lack of institutional doctrine that can be applied nationally for state level government to develop their homeland security strategies. The military has a long history of successfully using doctrine to develop war-fighting strategy. Comparisons can be made to the Air Forces use of doctrine to gain autonomy as well as the effect joint doctrine has on achieving unity of effort across disciplines. Additional lessons can be learned from past civil defense attempts at institutionalization and the evolution to emergency management and homeland security. By modeling of these existing, known and accepted doctrines or lack thereof, a national homeland security doctrine could emerge.
Grogan, Michael S. "National security imperatives and the neorealist state: Iran and realpolitik." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7744.
Full textThis thesis argues that pragmatic, neorealist interests-reducing Iran's international isolation, opening avenues for economic cooperation and commercial exchange, restoring religious and cultural links, and safeguarding the mutually advantageous relationships with influential powers in the region- are the true foundations of Iranian national security and foreign policy decisionmaking. Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for spreading its brand of Islamic revolution abroad. The causes of these Islamic revolutionary groups, no matter how noble in the Iranian leaderships' eye, do not outweigh the more classic nation-state decisionmaking process that the Iranian government undergoes when it determines the best course of action on an issue of foreign policy and/or national security) realpolitik. It is the neorealist approach which always wins out in national security matters of a state. Presented are four case studies of Iranian relations with Azerbaijan, Turkey, Israel, and four Persian Gulf States (the United Arab Emirates, Bahrain, Oman, and Saudi Arabia). What each reveals is an Islamic Iran's whose policy decisions and actions compelled by the rational, state model of neorealism and not ideology
Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.
Full textNuqui, Reynaldo Francisco. "State Estimation and Voltage Security Monitoring Using Synchronized Phasor Measurements." Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/28266.
Full textPh. D.
Kuznietsova, Tetiania, and Andrii Chyrkov. "State and perspectives of aircraft cybersecurity." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50678.
Full textKliushnyk, T., A. Drofa, Тетяна Володимирівна Щербина, Татьяна Владимировна Щербина, and Tetiana Volodymyrivna Shcherbyna. "The state financial security and sustainability of financial sector in Ukraine: their state and management peculiarities." Thesis, Sumy State University, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77597.
Full textAshe, James Patrick. "A vulnerability assessment of the East Tennessee State University administrative computer network." [Johnson City, Tenn. : East Tennessee State University], 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/unrestricted/AsheJ030204b.pdf.
Full textTitle from electronic submission form. ETSU ETD database URN: etd-0301104-151512. Includes bibliographical references. Also available via Internet at the UMI web site.
Shropshire, Jordan Douglas. "Predicting compliance with prescribed organizational information security protocols." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-10202008-120221.
Full textMacDonald, Robert L. "Rogue State? The United States, Unilateralism, and the United Nations." See Full Text at OhioLINK ETD Center (Requires Adobe Acrobat Reader for viewing), 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1154015815.
Full textHetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.
Full textThesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
Chen, Darren. "State and urban area homeland security strategy v3.0 evolving strategic planning /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FChen.pdf.
Full textThesis Advisor(s): Robert Bach. "March 2006." Includes bibliographical references (p. 45-46). Also available online.
Collins, Andrew Elliott Egerton. "Saving State-Building: EU Contributions to Security Sector Reform in Afghanistan." Thesis, University of Canterbury. National Centre for Research on Europe, 2011. http://hdl.handle.net/10092/6311.
Full textHoffman, Samantha R. "Programming China : the Communist Party's autonomic approach to managing state security." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/48547/.
Full textBusato, Marco <1995>. "The State of Strict Transport Security: Current Deployment and Correct Configuration." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19274.
Full textScollan, Thomas J. "An assessment of the New York State Enhanced Security Guard Training legislation and its efficacy on security officer preparedness." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10688.
Full textThis thesis analyzes the results of a survey instrument administered to a random sample of New York City security officers in order to understand the relationship between job training and turnover and, in turn, the effect of high turnover on the preparedness and effectiveness of that population in performing its duties. Replicating a 2004 survey sponsored by the New York City Public Advocate Office, which exposed poor training and rampant turnover among security guards and resulted in the August 2005 New York State Enhanced Security Guard Training legislation, this thesis seeks to determine changes in and correlations among those phenomena by employing bivariate analysis, independent t-test, and Cronbach's Alpha methods. The data analysis reveals correlations between employment conditions--including training and advancement opportunities--and retention, and thus contributes to the discourse surrounding the role of private-sector and nonsworn personnel in the Homeland Security Enterprise.
Scott, Katherine Anne. "Reining in the State: Civil Society, Congress, and the Movement to Democratize the National Security State, 1970-1978." Diss., Temple University Libraries, 2009. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/38730.
Full textPh.D.
This dissertation explores the battle to democratize the national security state, 1970-1978. It examines the neo-progressive movement to institutionalize a new domestic policy regime, in an attempt to force government transparency, protect individual privacy from state intrusion, and create new judicial and legislative checks on domestic security operations. It proceeds chronologically, first outlining the state's overwhelming response to the domestic unrest of the 1960s. During this period, the Department of Justice developed new capacities to better predict urban unrest, growing a computerized databank that contained millions of dossiers on dissenting Americans and the Department of Defense greatly expanded existing capacities, applying cold war counterinsurgency and counterintelligence techniques developed abroad to the problems of protests and riots at home. The remainder of the dissertation examines how the state's secret response to unrest and disorder became public in the early 1970s. It traces the development of a loose coalition of reformers who challenged domestic security policy and coordinated legislative and litigative strategies to check executive power.
Temple University--Theses
Williams, Zachary. "Supply chain security an institutional approach to strategies and outcomes /." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-03312008-163918.
Full text