Dissertations / Theses on the topic 'Warfare'

To see the other types of publications on this topic, follow the link: Warfare.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Warfare.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Schaad, Michael A. "More Effective Warfare: Warfare Waged Psychologically." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/7411.

Full text
Abstract:
The Powell Doctrine for waging war was generally focused on the use of overwhelming physical force to defeat the enemy. Destroying enemy combatants and capabilities faster and more severely than the rate at which they can inflict losses has traditionally resulted in victory. Consequently, kinetic operations have always been at the forefront. Despite this predominance of kinetic operations, history has shown that technologically superior, militarily advanced, and numerically overwhelming forces are sometimes defeated by ragtag groups of a few hundred guerrillas with inferior combat capabilities. Rather than attempting to convince our enemies through the use of violent action which targets their physical well-being rather than their mental decision makingthere is a more effective way to wage war psychologically. By exploring case studies of Hezbollah, Hamas, and the neo-Taliban, this thesis examines whether resequencing psychological and kinetic operations, at various times throughout a conflict, will create stronger, more synchronized and believable messages, thus producing warfare waged in a more effective and efficient manner.
APA, Harvard, Vancouver, ISO, and other styles
2

Eidman, Christopher R., and Gregory Scott Green. "Unconventional cyber warfare: cyber opportunities in unconventional warfare." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42615.

Full text
Abstract:
Approved for public release; distribution is unlimited
Given the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S. will need to examine new and innovative ways to modernize its irregular warfare fighting capabilities. Within its irregular warfare capabilities, the U.S. will need to identify effective doctrine and strategies to leverage its tactical and technical advantages in the conduct of unconventional warfare. Rather than take a traditional approach to achieve unconventional warfare objectives via conventional means, this thesis proposes that unconventional warfare can evolve to achieve greater successes using the process of unconventional cyber warfare.
APA, Harvard, Vancouver, ISO, and other styles
3

Lesyk, N. I. "Information warfare." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40628.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Saleem, Y. "Environmental warfare." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/36287.

Full text
Abstract:
It is the middle of day, and the sky is plain black. Smoke is everywhere—black, smothering smoke. The earth is spewing burning fire that bathes the darkness with bright orange-red. Drops are falling from the sky, but not rain drops. A scene from a science fiction movie? Or maybe an artistic take on what hell might look like? No, these are the Kuwaiti oil fields burning after being set on fire by the retreating Iraqi forces following the end of the Persian Gulf War. It was an act of sabotage that was aimed to impair the Kuwaiti oil production and subsequently their economy, but it ended up causing an environmental disaster of devastating consequences. One billion barrels of oil burned to flames over the course of around 10 months. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/36287
APA, Harvard, Vancouver, ISO, and other styles
5

Kuzmenko, Victoria Vladimirovna, and Вікторія Володимирівна Кузьменко. "Information warfare a new face of warfare in international relations." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51632.

Full text
Abstract:
1. International communication [Electronic resource].- Access mode: http:// academy.gov.ua/infpol/pages/dop/2/files/53dfa6b2-8428-4688-9bba- 7c38b11fa419.pdf; 2. Information warfare[Electronic resource].- Access mode: https://www. wikiwand.com/uk/%D0%86%D0%BD%D1%84%D0%BE%D1%80%D0%BC%D0 %B0%D1%86%D1%96%D0%B9%D0%BD%D0%B0_%D0%B2%D1%96%D0% B9%D0%BD%D0%B0 3. Information warfare: a new form of people’s war [Electronic resource].- Access mode: https://fas.org/irp/world/china/docs/iw_wei.htm 4. Information warfare - the essence, methods and means of warfare[Electronic resource].- Access mode: https://www.bezpeka.com/uk/informacijna-vijnasutnistmetodi-ta-zasobi-vedennja/ .
Information is one of the most important components in the life of modern society. The status of a person, state, or organization in the real world is largely determined by its ability to communicate with people and its position in the information space. International relations have always been based on the principles of communication. International communication- is the exchange of information between participants on the world stage, which has an international character . Information has a global impact, that is, with the successful management of people’s minds, it is possible to destroy the opponent or even to start a war. And international communication is a guide to the beginning of information conflicts between the subjects, which can later escalate into information warfare. Today, the causes of information warfare in international relations may be simple communication between participants, but most often it is terrorism and cybercrime. A computer as a tool can be used to commit a crime and can be the object of a specific crime. These actions are used to disrupt and disable various government databases and management systems.
Інформація - одна з найважливіших складових у житті сучасного суспільства. Статус людини, держави чи організації в реальному світі значною мірою визначається її здатністю спілкуватися з людьми та її становищем в інформаційному просторі. Міжнародні відносини завжди базувались на принципах спілкування. Міжнародне спілкування - це обмін інформацією між учасниками на світовій арені, що має міжнародний характер . Інформація має глобальний вплив, тобто завдяки успішному управлінню свідомістю людей можна знищити супротивника або навіть розпочати війну. А міжнародне спілкування є орієнтиром для початку інформаційних конфліктів між суб’єктами, які згодом можуть перерости в інформаційну війну. Сьогодні причинами інформаційної війни у ​​міжнародних відносинах може бути просте спілкування між учасниками, але найчастіше це тероризм та кіберзлочинність. Комп’ютер як інструмент може бути використаний для вчинення злочину і може бути об’єктом конкретного злочину. Ці дії використовуються для порушення та відключення різних державних баз даних та систем управління.
APA, Harvard, Vancouver, ISO, and other styles
6

Emmersen, Tracy, Ng Kiang Chuan, David Chiam, Ong Zi Xuan, Perh Hong Yih Daniel, Koh Wee Yung, Wes Wessner, et al. "Advanced Undersea Warfare Systems." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/6959.

Full text
Abstract:
Includes supplemental materials
Approved for public release; distribution is unlimited.
Over the next twenty years, the proliferation of threats in the undersea environment will likely challenge the platform-centric model that the United States Navy uses to maintain dominance in Undersea Warfare (USW). Meanwhile, rapidly maturing technologies offer greater capabilities to potential adversaries around the world. Such a paradigm creates an imperative for the Navy to harness emerging technologies to maintain USW dominance amid a dynamic threat environment, while balancing cost, risk, and required performance. This systems engineering analysis develops Advanced Undersea Warfare Systems (AUWS) that provide a technological and tactical advantage based on the needs of the war-fighter. Following critical analysis of the numerous possible alternatives for performing the necessary Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) and prosecution and an objective screening process, four system architectures, and associated operational concepts, are selected for detailed analysis. From cost, risk, and performance analyses, superior AUWS concepts are shown to be flexible, scalable, and tailorable systems that balance critical need areas. This analysis highlights the need for new warfare systems that can meet future challenges to the traditional platform-centric model for USW dominance. Using the results and recommendations in this analysis will allow the Navy to deploy capabilities that effectively and efficiently meet future operational needs.
APA, Harvard, Vancouver, ISO, and other styles
7

Higgins, Eric John, Ronald Leroy Higgs, Gregory Rodger Parkins, Vincent S. Tionquiao, and Christopher Kevin Wells. "Expeditionary warfare : force protection." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/6917.

Full text
Abstract:
Includes supplementary material.
In 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study. The Systems Engineering and Analysis Team used the Systems Engineering and Management process as the primary methodology to complete this multidisciplinary task. Survivability was identified as the most critical factor for evaluating the protection of the Sea Base and its transport assets. Threats to the Sea Base were reviewed, analyzed, and prioritized. System design and analysis focused on preliminary analyses of various sensors, search concepts, and weapons. These preliminary analyses identified capability gaps that were translated into functional concepts and proposed architectures for detailed modeling and analysis. These proposed architectures were identified as either Point or Distributed. In order to adequately determine the relative performance of the proposed architectures generated by the team, a thorough and systematic design of experiments was developed and applied in the Naval Simulation System and EXTEND. Based on the results obtained, the Systems Engineering and Analysis Team determined that a Distributed Sensor and Weapons architecture would significantly increase the survivability of future Expeditionary Warfare forces.
APA, Harvard, Vancouver, ISO, and other styles
8

Torres, Santino M. "Countermobilization: unconventional social warfare." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42741.

Full text
Abstract:
Approved for public release; distribution is unlimited
The purpose of this thesis is to identify and understand the factors associated with effective social countermobilization against violent extremism. Understanding such factors can help a state develop a sponsored countermovement to protect its national interests against violent extremist movements. This thesis attempts to provide a strategy and framework by which to defeat violent extremist movements through the use of unconventional warfare techniques.
APA, Harvard, Vancouver, ISO, and other styles
9

White, Scott C. "Reorganizing for Irregular Warfare." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4353.

Full text
Abstract:
Approved for public release, distribution unlimited
A thorough understanding of Irregular Warfare (IW) and the principles of organizational theory and design will enable the Department of Defense (DoD) to organize efficiently and effectively for operations within the Irregular Warfare Environment, while maintaining its conventional capabilities. We develop our argument for this thesis in several stages. First, we define irregular warfare and differentiate it from conventional warfare through the development of our critical success factors. We introduce organizational theory and design in order to incorporate the critical success factors. We conclude that the DoD should reorganize certain elements of the U.S. Special Operations Command by incorporating existing capabilities, focusing on conducting operations within the Irregular Warfare Environment, and implementing our critical success factors.
APA, Harvard, Vancouver, ISO, and other styles
10

Ford, Alexander S. "Dehumanization and irregular warfare." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34664.

Full text
Abstract:
Approved for public release; distribution is unlimited
In the current global environment the practice of dehumanizationthe stripping away of common attributes among people that call for respect and constrain violenceand the misperception it creates have resulted in misguided attempts by militaries to influence the center of gravity in irregular warfare, the civilian population. Traditional thought in this matter implies that cultural training is the most important factor in creating more effective influence when dealing in irregular warfare scenarios. By examining dehumanization and the factors that cause it in irregular warfare environments, this thesis will provide a framework for how dehumanization impacts influence operations. My analysis seeks to explain how dehumanization occurs and how it can be prevented, thereby setting necessary conditions for effective population influence.
APA, Harvard, Vancouver, ISO, and other styles
11

McWhorter, Tanner Maxwell. "Cognitive Electronic Warfare System." Miami University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=miami1595708553000249.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Al-Mubarak, Malik Abdulazeez. "Warfare in early Islam." Thesis, Connect to e-thesis, 1997. http://theses.gla.ac.uk/794/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Painter, David J. Weaver Mark C. White Scott C. "Reorganizing for Irregular Warfare." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FPainter_Weaver_White.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2009.
Thesis Advisor: Rothstein, Hy. Second Reader: Jansen, Erik. "December 2009." Description based on title screen as viewed on January 28, 2010. Author(s) subject terms: Irregular Warfare, Population-centric Warfare, organizational theory and design, U.S. Special Operations Command. Includes bibliographical references (p. 71-76). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
14

Bergström, Alfred. "Littoral Warfare: Two Perspectives." Thesis, Försvarshögskolan, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8669.

Full text
Abstract:
Littoral warfare implies a disproportionate advantage to the coastal navy or “defending” side. Small navies sometimes lean on larger navies in doctrinal production. A coastal navy’s goals, methods and capabilities can be considered thought to be different from that of a larger navy’s regarding in regards to littoral warfare. This paper answers the question “What does littoral warfare mean for different types of states?”. An ideal type analysis was used to answer the question, and the doctrines of Sweden (type A state), USA (type B), and the UK (type B) were analysed in regards to the research question. This paper found inds that each type of state viewed littoral warfare in regards to themselves, from their own perspective; a type A state can be seen as a defender and a type B state as an aggressor. In the context of littoral warfare context, each the types of states employed different goals, methods and means as pertaining to littoral warfare.
APA, Harvard, Vancouver, ISO, and other styles
15

Cox, Nechama Janet Cohen. "The Ministry of Economic Warfare and Britain's conduct of economic warfare, 1939-1945." Thesis, King's College London (University of London), 2001. https://kclpure.kcl.ac.uk/portal/en/theses/the-ministry-of-economic-warfare-and-britains-conduct-of-economic-warfare-19391945(d51b0c17-882c-420c-97b1-3ffead720c43).html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Makarenko, Meagan B. "Does the economy or surface warfare officer career pay affect surface warfare officer retention?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44610.

Full text
Abstract:
Approved for public release; distribution is unlimited
Using cohort-based surface warfare officer (SWO) inventory data from Bureau of Naval Personnel, this thesis examines possible correlation between SWO retention and the economy, as well as the effect of SWO career pay (SWOCP) on SWO retention. Multivariate regression is used as the main tool of analysis. I find that the unemployment rate shows a positive correlation with SWO retention. There was insufficient evidence to support the relationship between SWOCP and retention. The female population does yield some significant results independent of the mixed and male population. The findings indicate more research on non-monetary determinants of the SWO retention is necessary, a policy re-assessment of SWOCP may be warranted, and female retention differs from male retention and should be assessed further.
APA, Harvard, Vancouver, ISO, and other styles
17

Ellington, Sidney T. "Special Operations in littoral warfare." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA306116.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Cares, Jeffrey R. "The fundamentals of salvo warfare." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA227003.

Full text
Abstract:
Thesis (M.S. in Operations Research)--Naval Postgraduate School, March 1990.
Thesis Advisor(s): Hughes, Wayne P. Second Reader: Parry, Samuel H. "March 1990." Description based on signature page on August 25, 2009. DTIC Descriptor(s): Salvos, tactical analysis, warfare, quantitative analysis, models, computers, theses, naval operations, vehicles, military tactics, surface to surface missiles, naval equipment, entropy, simulation, data bases, guided missiles. Author(s) subject terms: Naval combat theory, Naval tactics, Naval combat modeling. Includes bibliographical references (p. 62). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
19

Bracco, Jeffrey A. "Fire support for irregular warfare." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FBracco.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, March 2008.
Thesis Advisor(s): Arquilla, John. "March 2008." Description based on title screen as viewed on April 25, 2008. Includes bibliographical references (p. 85-90). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
20

Morillo, Stephen R. "English royal warfare : 1066-1154." Thesis, University of Oxford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385567.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Cisneros, Maribel. "Cyber-warfare: jus post bellum." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45169.

Full text
Abstract:
Approved for public release; distribution is unlimited
There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea. Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.
APA, Harvard, Vancouver, ISO, and other styles
22

Du, Mont Robert B. "Junior Surface Warfare Officer retention." Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/8598.

Full text
Abstract:
Approved for public release; distribution is unlimited
The purpose of this thesis is to identify factors that lead to resignation of Junior Surface Warfare Officers (SWO) and to develop an hedonic model of junior SWO turnover. The first source of data was a survey of active- duty, junior SWOs currently serving aboard ships. The second source of data was a survey of 0-3 SWOs who are currently drilling in the Naval Reserves. Results of the two surveys were compared to identify differing levels of satisfaction with the active-duty Navy. The reservists also compared their satisfaction between the active-duty Navy and their current civilian employment Civilian salary levels were obtained from the reservists and their spouses to determine the pay differential between the Navy and civilian jobs for former junior SWOs. A regression model found three factors to have significant power in explaining civilian pay: years since leaving active duty, employment status, and comparative work stress between civilian employment and the active-duty Navy. SWOs with full-time employment who experienced the greatest reductions in pay also experienced the greatest reduction in work Stress. Junior SWOs experienced, on average, a 20 percent pay cut after leaving active duty. Pay returned to its pre-departure level in 2 to three years
APA, Harvard, Vancouver, ISO, and other styles
23

Hindert, Johann. "German views of irregular warfare." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45873.

Full text
Abstract:
Approved for public release; distribution is unlimited
Increasingly, so-called weak actors employ irregular warfare to successfully challenge the strong. The British, French, and Americans are recognized for their irregular warfare experience, but the comparatively rich German tradition remains overlooked. German contributions to irregular warfare, in fact, rival their reputed expertise in modern maneuver warfare. This thesis surveys German irregular warfare cases from the eighteenth century forward. Beginning in the American Revolution, Hessian officer Johann Ewald revealed important counter-insurgency principles. In the early nineteenth century, Carl von Clausewitz spoke to the larger idea of people’s war and noted its efficacy. In a peripheral theater of World War I, Paul von Lettow-Vorbeck mastered the art of irregular adaptation and survival. In the Second World War, Otto Skorzeny perfected the strategic commando raid. After serving in the same war, Friedrich A.F. von der Heydte published a theory of modern irregular warfare, unique for its views on terrorism and the combined employment of irregular and other forms of warfare. Otto Heilbrunn studied partisan warfare and endorsed pseudo operations to counter asymmetric threats such as those faced by the United States today. German irregular warfare offers strategic answers to contemporary security challenges.
APA, Harvard, Vancouver, ISO, and other styles
24

Steward, Aaron L. "Political warfare and contentious politics." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45947.

Full text
Abstract:
Approved for public release; distribution is unlimited
This thesis examines if increased Department of Defense (DOD) involvement in political warfare (PW) is justified through a qualitative, comparative analysis of U.S. PW actions conducted by the Department of State, Central Intelligence Agency, and DOD in two Cold War cases: Italy from 1943–1948 and Chile from 1961–1973. Concepts of strategy and social movement models of Doug McAdam, Charles Tilly, and Sidney Tarrow are applied to historical PW actions, both overt and covert. The case-study analysis clarifies each agency’s conduct of PW and develops analytical tools to classify PW actions by approach and impact within the political setting. Data was collected from archives, declassified government documents, and expert analyses. Results indicate that, compared to other U.S. agencies, the DOD had a limited direct role in PW in the cases studied, but was an important enabler. In applying models of social movement theory to historical analysis, this thesis identifies and develops the contentious politics mobilization model’s potential use in planning and evaluating PW strategies.
APA, Harvard, Vancouver, ISO, and other styles
25

Bindi, Michael, Michael Kaslik, Jeffrey Baker, Keith Manning, Ryan Billington, Peter Horton, Tawanna Gallassero, et al. "Littoral undersea warfare in 2025." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/6919.

Full text
Abstract:
Includes supplementary material.
The US Navy is unlikely to encounter a sea-borne peer competitor in the next twenty years. However, some regional powers will seek to develop submarine forces which could pose a significant threat in littoral waters. In this context, the Littoral Anti-Submarine Warfare (ASW) in 2025 Project applied Systems Engineering principles and processes to create a number of competing ASW force architectures capable of neutralizing the enemy submarine threat. Forces composed of distributed unmanned systems and projected conventional ASW force systems were modeled and analyzed. Results provided insight to ASW challenges and suggested continued efforts that are required to further define and integrate the contribution of evolving technologies into the complex undersea battlespace.
APA, Harvard, Vancouver, ISO, and other styles
26

Ayre, Steven J., and Jeremy F. Hough. "Air Power in irregular warfare." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27788.

Full text
Abstract:
History is full of with examples of innovations that have proved essential to victory in war. Few innovations have provided the consistent and often decisive impact that air power has delivered in conflict. Across its relatively short history, the concept of air power has maintained a resiliency of innovation across the doctrinal, strategic, organizational, and technological levels. However, warfare itself has witnessed significant changes over the course of the last century. No longer is the classical, conventional state-on-state conflict the principal method of combating ones enemies. In its place, irregular warfare (IW) has arguably become the norm in conflict today. However, we have yet to see air power applied to modern-era irregular conflicts with the same level of success achieved in past conflicts. This thesis examines the use of air power in IW in order to answer the following questions What organizational forms are associated with the successful use of air power in irregular warfare What technologies What concepts of operations What level of coherence between strategic and operational/tactical execution is associated with the successful use of air power in IW And finally, what should the future role of air power in IW be
APA, Harvard, Vancouver, ISO, and other styles
27

Blandin, Mathiew, Jeramy Brux, Christopher Caraway, Jamie Cook, Samuel Fromille, David Haertel, Steven Hall, John Paul Kish, and Stephen Szachta. "2024 Unmanned undersea warfare concept." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34733.

Full text
Abstract:
Approved for public release; distribution is unlimited
Potential adversaries throughout the world continue to acquire and develop sophisticated multi-layered, anti-access, area-denial (A2AD) systems. To maintain its maritime superiority, the United States must continue to innovate systems that are capable of operating in and defeating these A2AD environments. In particular, command of the undersea domain remains vital and will increasingly be critical in facing this future battle space. The challenges our nation faces, however, are not limited only to the technological capabilities of the warfighters, but also include a myriad of confounding constraints. In addition to the expected shortfalls of mission-ready assets, the Submarine Forces also must address significant pressures in defense spending. Nevertheless, unmanned undersea vehicles (UUVs) remain one of the top priorities of the Chief of Naval Operations, as UUVs serve as effective force multipliers, while greatly reducing risk, in critical missions in A2AD environments. This report presents the findings of analysis and assessment conducted by an integrated systems engineering and analysis team of military officer students at the Naval Postgraduate School. Their operationally driven tasking seeks to design a system-of-systems of unmanned and manned undersea vehicles to ensure undersea dominance both in the near term and into the next decade. The importance of the systems perspective to this study is reflected by the extensive engagement with many operational stakeholders, academic researchers, industry partners, and acquisitions programs across the Naval enterprise. The capability-based approach highlights the mission suitability of both currently fielded UUVs and also technologies realizable within the next decade. The capstone final report summarizes these critical insights and provides detailed recommendations to inform decision makers of the present to prepare for the undersea forces of the future.
APA, Harvard, Vancouver, ISO, and other styles
28

Murgatroyd, Philip Scott. "Medieval warfare on the grid." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3797/.

Full text
Abstract:
Although historical studies are frequently perceived as clear narratives defined by a series of fixed events; in reality, even where critical historical events may be identified, historic documentation frequently lacks corroborative detail to support verifiable interpretation. Consequently, interpretation rarely rises above the level of unproven assertion and is rarely tested against a range of evidence. Agent-based simulation can provide an opportunity to break these cycles of academic claim and counter-claim. This thesis discusses the development of an agent-based simulation designed to investigate medieval military logistics so that new evidence may be generated to supplement existing historical analysis. It uses as a case-study the Byzantine army’s march to the battle of Manzikert (AD 1071), a key event in medieval history. It describes the design and implementation of a series of agent-based models and presents the results of these models. The analysis of these results shows that agent-based modelling is a powerful tool in investigating the practical limitations faced by medieval armies on campaign.
APA, Harvard, Vancouver, ISO, and other styles
29

Ahlberg, Jonatan. "The Islamic state’s ambiguous warfare." Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9263.

Full text
Abstract:
Since 2010 IS has transformed itself from a terroristgroup to an insurgency organisation that held territory from Mosul in Iraq to Aleppo in Syria. Through this conquest of territory it has proven it’s capabilities in launching conventional style offenses but also it use of irregular tactics and the use of different terrorist acts using suicide bombers and vehicle-borne improvised explosions. This study examines IS warfare between 2010 and 2015 and examens if David Galulas theory ’Insurgency doctrin’ and Frank Hoffmans theory ’Hybrid warfare’ can describe IS warfare through this period. This analysis shows that IS partially can be described through the insurgency doctrin theory as an insurgency following the steps that it descibes. It also shows that while IS follows the steps it also continued to use blind terrorism and selektive terrorism through the whole campaigns. Further more the analysis also shows that IS can be described through Frank Hoffmans ’Hybrid warfare’ theory. IS used conventional means such as military weapons and equipment along with artillery, tanks, anti-tank weapons in both conventional and irregular ways. It’s extensive use of IED, VBIED IS used technology in an ortodox way by rebuildning vehicles and drones into mobile IED’s but also vehicles into light fighting vehicles by mounting heavy machineguns on pickups. This study also concludes that IS can not be described as an hybrid actor becuse it strives at building a regulare army. The conclusion of this study is that IS warfare can be described as an insurgent uprising with hybrid elements. Since 2010 IS has transformed itself from a terroristgroup to an insurgency organisation that held territory from Mosul in Iraq to Aleppo in Syria. Through this conquest of territory it has proven it’s capabilities in launching conventional style offenses but also it use of irregular tactics and the use of different terrorist acts using suicide bombers and vehicle-borne improvised explosions. This study examines IS warfare between 2010 and 2015 and examens if David Galulas theory ’Insurgency doctrin’ and Frank Hoffmans theory ’Hybrid warfare’ can describe IS warfare through this period. This analysis shows that IS partially can be described through the insurgency doctrin theory as an insurgency following the steps that it descibes. It also shows that while IS follows the steps it also continued to use blind terrorism and selektive terrorism through the whole campaigns. Further more the analysis also shows that IS can be described through Frank Hoffmans ’Hybrid warfare’ theory. IS used conventional means such as military weapons and equipment along with artillery, tanks, anti-tank weapons in both conventional and irregular ways. It’s extensive use of IED, VBIED IS used technology in an ortodox way by rebuildning vehicles and drones into mobile IED’s but also vehicles into light fighting vehicles by mounting heavy machineguns on pickups. This study also concludes that IS can not be described as an hybrid actor becuse it strives at building a regulare army The conclusion of this study is that IS warfare can be described as an insurgent uprising with hybrid elements
APA, Harvard, Vancouver, ISO, and other styles
30

Bailey, J. P. A. "Artillery and Warfare 1945-2025." Thesis, Department of Defence Management and Security Analysis, 2009. http://hdl.handle.net/1826/4008.

Full text
Abstract:
For millennia battles were essentially affairs of linear encounter. From the 10th Century to the 20th Century, artillery generally fired directly in the two dimensional plane,limiting potential effects. The development of indirect fire changed this , two-dimensional model. Warfare became not so much a matter of linear encounter as one of engagement as cross and throughout an area; and artillery dominated land operations in both the First and Second World Wars as a result. Firepower was subsequently often applied in even greater weights, but its effects were frequently excessive and high-value targets proved elusive. During the Cold War in Europe,the importance of field artillery wanded relative to other arms. Artillery could only regain its utility by acquiring the highest-value targets and engaging them effectively with the appropriate degree of force in time and space true precision, as opposed to mere accuracy at a point. Improvements in target acquisition and accuracy will enable land systems once more to engage targets effectively throughout the battlespace with implications for warfare analogous to those precipitated by the introduction of indirect fire a century ago. Land operations will become increasingly three-dimensional and Joint. The effects of fire will increasingly be applied in, not merely via, the third dimensions, since targets themselves will increasingly be located, not just on the area of a battlefield, but in the volume of three-dimensional battlespace with values of indetermined by considerations of the fourth dimension, time. Fire, lethal and non-lethal, will also be targeted in other less tangible dimensions such as cyber-space and new types of 'virtual counterfire' will also emerge in the forms of legal and moral restraint. All will be viewed through the lens of perceptions. The burgeoning of firepower from all sources now becomes the spur for changes in the relationship between the land and air components, mindful of those novel factors that will increasingly inhibit the application of that firepower.
APA, Harvard, Vancouver, ISO, and other styles
31

Hedman, Daniel K. "Reorganizing SOF for irregular warfare." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FHedman.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2008.
Thesis Advisor(s): Tucker, David. "December 2008." Description based on title screen as viewed on January 30, 2009. Includes bibliographical references (p. 35-37). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
32

Brennen, Lisa M. "Hezbollah psychological warfare against Israel." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FBrennen.pdf.

Full text
Abstract:
Thesis (M.S. in Security Studies (Middle East, South Asia, Sub-Saharan Africa))--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Kadhim, Abbas ; Baylouny, Anne Marie. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Hezbollah, Israel, psychological warfare, information operations, strategic communications, guerrilla warfare, fourth generation warfare, terrorism, Islamic. Includes bibliographical references (p. 81-84). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
33

Bell, Stephen William. "British political warfare, 1939-45." Thesis, University of Leeds, 1998. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.495003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Cooper, Jerry. "A study guide for spiritual warfare." Theological Research Exchange Network (TREN), 1995. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Zarougui, Mohamed. "Propaganda and psychological warfare in guerrilla and counter-guerrilla warfare : the Malayan Emergency 1948-1960." Thesis, University of Reading, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.315537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

DI, BELLA PAOLO. "MODELLING & SIMULATION HYBRID WARFARE Researches, Models and Tools for Hybrid Warfare and Population Simulation." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1008565.

Full text
Abstract:
The Hybrid Warfare phenomena, which is the subject of the current research, has been framed by the work of Professor Agostino Bruzzone (University of Genoa) and Professor Erdal Cayirci (University of Stavanger), that in June 2016 created in order to inquiry the subject a dedicated Exploratory Team, which was endorsed by NATO Modelling & Simulation Group (a panel of the NATO Science & Technology organization) and established with the participation as well of the author. The author brought his personal contribution within the ET43 by introducing meaningful insights coming from the lecture of “Fight by the minutes: Time and the Art of War (1994)”, written by Lieutenant Colonel US Army (Rtd.) Robert Leonhard; in such work, Leonhard extensively developed the concept that “Time”, rather than geometry of the battlefield and/or firepower, is the critical factor to tackle in military operations and by extension in Hybrid Warfare. The critical reflection about the time - both in its quantitative and qualitative dimension - in a hybrid confrontation it is addressed and studied inside SIMCJOH, a software built around challenges that imposes literally to “Fight by the minutes”, echoing the core concept expressed in the eponymous work. Hybrid Warfare – which, by definition and purpose, aims to keep the military commitment of both aggressor and defender at the lowest - can gain enormous profit by employing a wide variety of non-military tools, turning them into a weapon, as in the case of the phenomena of “weaponization of mass migrations”, as it is examined in the “Dies Irae” simulation architecture. Currently, since migration it is a very sensitive and divisive issue among the public opinions of many European countries, cynically leveraging on a humanitarian emergency caused by an exogenous, inducted migration, could result in a high level of political and social destabilization, which indeed favours the concurrent actions carried on by other hybrid tools. Other kind of disruption however, are already available in the arsenal of Hybrid Warfare, such cyber threats, information campaigns lead by troll factories for the diffusion of fake/altered news, etc. From this perspective the author examines how the TREX (Threat network simulation for REactive eXperience) simulator is able to offer insights about a hybrid scenario characterized by an intense level of social disruption, brought by cyber-attacks and systemic faking of news. Furthermore, the rising discipline of “Strategic Engineering”, as envisaged by Professor Agostino Bruzzone, when matched with the operational requirements to fulfil in order to counter Hybrid Threats, it brings another innovative, as much as powerful tool, into the professional luggage of the military and the civilian employed in Defence and Homeland security sectors. Hybrid is not the New War. What is new is brought by globalization paired with the transition to the information age and rising geopolitical tensions, which have put new emphasis on hybrid hostilities that manifest themselves in a contemporary way. Hybrid Warfare is a deliberate choice of an aggressor. While militarily weak nations can resort to it in order to re-balance the odds, instead military strong nations appreciate its inherent effectiveness coupled with the denial of direct responsibility, thus circumventing the rules of the International Community (IC). In order to be successful, Hybrid Warfare should consist of a highly coordinated, sapient mix of diverse and dynamic combination of regular forces, irregular forces (even criminal elements), cyber disruption etc. all in order to achieve effects across the entire DIMEFIL/PMESII_PT spectrum. However, the owner of the strategy, i.e. the aggressor, by keeping the threshold of impunity as high as possible and decreasing the willingness of the defender, can maintain his Hybrid Warfare at a diplomatically feasible level; so the model of the capacity, willingness and threshold, as proposed by Cayirci, Bruzzone and Gunneriusson (2016), remains critical to comprehend Hybrid Warfare. Its dynamicity is able to capture the evanescent, blurring line between Hybrid Warfare and Conventional Warfare. In such contest time is the critical factor: this because it is hard to foreseen for the aggressor how long he can keep up with such strategy without risking either the retaliation from the International Community or the depletion of resources across its own DIMEFIL/PMESII_PT spectrum. Similar discourse affects the defender: if he isn’t able to cope with Hybrid Threats (i.e. taking no action), time works against him; if he is, he can start to develop counter narrative and address physical countermeasures. However, this can lead, in the medium long period, to an unforeseen (both for the attacker and the defender) escalation into a large, conventional, armed conflict. The performance of operations that required more than kinetic effects drove the development of DIMEFIL/PMESII_PT models and in turn this drive the development of Human Social Culture Behavior Modelling (HCSB), which should stand at the core of the Hybrid Warfare modelling and simulation efforts. Multi Layers models are fundamental to evaluate Strategies and Support Decisions: currently there are favourable conditions to implement models of Hybrid Warfare, such as Dies Irae, SIMCJOH and TREX, in order to further develop tools and war-games for studying new tactics, execute collective training and to support decisions making and analysis planning. The proposed approach is based on the idea to create a mosaic made by HLA interoperable simulators able to be combined as tiles to cover an extensive part of the Hybrid Warfare, giving the users an interactive and intuitive environment based on the “Modelling interoperable Simulation and Serious Game” (MS2G) approach. From this point of view, the impressive capabilities achieved by IA-CGF in human behavior modeling to support population simulation as well as their native HLA structure, suggests to adopt them as core engine in this application field. However, it necessary to highlight that, when modelling DIMEFIL/PMESII_PT domains, the researcher has to be aware of the bias introduced by the fact that especially Political and Social “science” are accompanied and built around value judgement. From this perspective, the models proposed by Cayirci, Bruzzone, Guinnarson (2016) and by Balaban & Mileniczek (2018) are indeed a courageous tentative to import, into the domain of particularly poorly understood phenomena (social, politics, and to a lesser degree economics - Hartley, 2016), the mathematical and statistical instruments and the methodologies employed by the pure, hard sciences. Nevertheless, just using the instruments and the methodology of the hard sciences it is not enough to obtain the objectivity, and is such aspect the representations of Hybrid Warfare mechanics could meet their limit: this is posed by the fact that they use, as input for the equations that represents Hybrid Warfare, not physical data observed during a scientific experiment, but rather observation of the reality that assumes implicitly and explicitly a value judgment, which could lead to a biased output. Such value judgement it is subjective, and not objective like the mathematical and physical sciences; when this is not well understood and managed by the academic and the researcher, it can introduce distortions - which are unacceptable for the purpose of the Science - which could be used as well to enforce a narrative mainstream that contains a so called “truth”, which lies inside the boundary of politics rather than Science. Those observations around subjectivity of social sciences vs objectivity of pure sciences, being nothing new, suggest however the need to examine the problem under a new perspective, less philosophical and more leaned toward the practical application. The suggestion that the author want make here is that the Verification and Validation process, in particular the methodology used by Professor Bruzzone in doing V&V for SIMCJOH (2016) and the one described in the Modelling & Simulation User Risk Methodology (MURM) developed by Pandolfini, Youngblood et all (2018), could be applied to evaluate if there is a bias and the extent of the it, or at least making clear the value judgment adopted in developing the DIMEFIL/PMESII_PT models. Such V&V research is however outside the scope of the present work, even though it is an offspring of it, and for such reason the author would like to make further inquiries on this particular subject in the future. Then, the theoretical discourse around Hybrid Warfare has been completed addressing the need to establish a new discipline, Strategic Engineering, very much necessary because of the current a political and economic environment which allocates diminishing resources to Defense and Homeland Security (at least in Europe). However, Strategic Engineering can successfully address its challenges when coupled with the understanding and the management of the fourth dimension of military and hybrid operations, Time. For the reasons above, and as elaborated by Leonhard and extensively discussed in the present work, addressing the concern posed by Time dimension is necessary for the success of any military or Hybrid confrontation. The SIMCJOH project, examined under the above perspective, proved that the simulator has the ability to address the fourth dimension of military and non-military confrontation. In operations, Time is the most critical factor during execution, and this was successfully transferred inside the simulator; as such, SIMCJOH can be viewed as a training tool and as well a dynamic generator of events for the MEL/MIL execution during any exercise. In conclusion, SIMCJOH Project successfully faces new challenging aspects, allowed to study and develop new simulation models in order to support decision makers, Commanders and their Staff. Finally, the question posed by Leonhard in terms of recognition of the importance of time management of military operations - nowadays Hybrid Conflict - has not been answered yet; however, the author believes that Modelling and Simulation tools and techniques can represent the safe “tank” where innovative and advanced scientific solutions can be tested, exploiting the advantage of doing it in a synthetic environment.
APA, Harvard, Vancouver, ISO, and other styles
37

Smith, Conrad E. "Spiritual warfare an analysis of modern trends based on historical research and biblical exegesis /." Theological Research Exchange Network (TREN), 1994. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Newson, Robert A. "Naval Special Warfare - leading organizational change." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386703.

Full text
Abstract:
Thesis (M.S. in Defense Analysis and M.A. in National Security Affairs) Naval Postgraduate School, Dec. 2000.
Thesis advisors, Yost, David S. ; Minott, Rodney K. "December 2000." Includes bibliographical references (p. 179-183). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
39

Aslan, Mehmet Kadir. "Emitter Identification Techniques In Electronic Warfare." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607675/index.pdf.

Full text
Abstract:
In this study, emitter identification techniques have been investigated and a schema has been proposed to solve the emitter identification problem in Electronic Warfare systems. Clustering technique, histogram based deinterleaving techniques and a continuous wavelet transform based deinterleaving technique have been reviewed. A receiver simulator software has been developed to test the performance of these techniques and to compare them against each other. To compensate the disadvantages of these techniques, a schema utilizing the beneficial points of them has been developed. With the modifications proposed a resultant schema has been obtained. Proposed schema uses clustering and deinterleaving together with other proposed modifications. Tests made through out this study have shown that this usage improves performance of emitter identification system. Hence, proposed schema can be used to identify the emitters in real EW systems.
APA, Harvard, Vancouver, ISO, and other styles
40

Holman, Charles E. "Predicting biological warfare agent detector performance." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3091.

Full text
Abstract:
Thesis (Ph.D.)--George Mason University, 2008.
Vita: p. 232. Thesis director: Andrew Loerch. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Biodefense. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 226-231). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
41

Lu, Han-Chung. "Using expert systems in mine warfare." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/30957.

Full text
Abstract:
Historically, sea mines warfare have played an important role in warfare, which a naval officer cannot afford to neglect. During the recent mine campaign in the Middle East involving Iran an Iraq, commanders delayed decisions on whether or not to deploy mine countermeasure (MCM) forces. As a result, damage occurred to ships in a minefield that could have been prevented by the speedy application of MCM. Before the operational mission commenced, there are several uncertain questions in the mind of the commander: Do the mine-fields exist? Which country laid the mines? What type of delivery platform laid the mines? Where are the mines? What kind of mines are they? Do we need to deploy the MCM forces? Previously, these kinds of fuzzy questions were very difficult to answer by a tactical principle. In this thesis, the probabilistic inference network in the expert system environment is used to answer the above questions. The probabilistic inference network method is supported by the certainty factors. Calculations involving quantitative probabilities for answers to the above questions could enable the MCM experts to offer suggestions to the commander for reducing the ship's vulnerability at sea during wartime. Expert Systems, Mine Warfare.
APA, Harvard, Vancouver, ISO, and other styles
42

Erhardt, Bill. "2002 NPS Integrated Project - Expeditionary Warfare." Thesis, Monterey California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/41965.

Full text
Abstract:
This site archives the final report, presentation, and supporting materials for the 2002 project. It will be fully active by January 2003.
The Expeditionary Warfare Integrated Project represents the combined effort of more than 70 students and 18 faculty members from seven different Naval Postgraduate School curricula representing all five US uniformed services and allies from Singapore, Turkey, Greece, Tunisia, and Sweden. This project was the result of OPNAV N7 tasking directing NPS’ Wayne Meyer Institute of Systems Engineering to use a top down, system of systems approach to examine future Expeditionary Warfare operations in terms of current and emerging operational concepts.
APA, Harvard, Vancouver, ISO, and other styles
43

O'Donnell, Michael W. "Irregular warfare centric foreign internal defense." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34714.

Full text
Abstract:
Approved for public release; distribution is unlimited
Conflict over the past few decades has changed drastically. Warfare changed with the conflict. Large-scale conventional wars are not todays norm. Small non-state actors and terrorist organizations cause havoc on a global scale using unconventional methods and weapons. The United States and its allies need to combat these threats using indirect strategies while maintaining international legitimacy Hizbullah is a terrorist organization operating within Lebanon and the Levant. Hizbullah employs violence, in addition to political means, to achieve its goals. Lebanon and its allies could identify a strategic internal defense and development strategy and implement a comprehensive foreign internal defense training regimen to combat Hizbullah and ultimately disarm the militant wing. Using an indirect method, focusing on a political agreement, increasing social services and providing additional security and stability to southern Lebanon are some of the critical elements the Lebanese government needs to implement to tame Hizbullah and disarm the terrorists. This approach worked for Britain with the Irish Republican Army and it can work for Lebanon with Hizbullah if properly implemented.
APA, Harvard, Vancouver, ISO, and other styles
44

Wang, Ken NMN. "Information warfare targeting: people and processes." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/6120.

Full text
Abstract:
Approved for public release, distribution is unlimited
Information Warfare targeting has long been a crucial, but unrecognized, part of military operations. From Sun Tzu's targeting of the enemy's will to fight, to today's information-centric warfare, it is those who have understood the techniques and applications of Information Warfare targeting who have most often prevailed. As critical as it is to our success, it is a topic that is controversial, often misunderstood, and subject to various interpretations. This thesis examines the IW targeting process, consisting of people, information, systems, and the interaction between the function of targeting and IW. In the Information Age, IW has been recognized as viable warfare area. However, IW Targeting cannot be treated as traditional targeting utilized by other warfare areas. This thesis is intended to serve as a guide for the study of this topic and provides an instructional program designed to satisfy the requirement for a coherent instructional program on IW Targeting. IW targeting affects every facet of warfare and in turn is affected by these facets. In preparing for a future that calls for maximizing the effects while minimizing the effort, it is critical that we understand the process in order to remain effective.
APA, Harvard, Vancouver, ISO, and other styles
45

Young, Robert John. "Playing politics : warfare in virtual worlds." Thesis, University of Leeds, 2018. http://etheses.whiterose.ac.uk/22035/.

Full text
Abstract:
Recent academic scholarship has resulted in the production of a broad body of interdisciplinary research that explores the representation of different political and spatial phenomena within popular culture, often focussed upon the analysis of film and television. Whilst video games now rival the popularity of these more established media forms, the different spaces that are represented within this medium have remained comparatively under-explored. This thesis addresses this lacuna and will show that military-themed video games are constitutive of particular spatial and political imaginaries, and that analyses of the medium can be used to illuminate broader critical debates. Such an engagement makes three specific contributions to knowledge. Firstly, a theoretical contribution is made through the increasing imbrication of approaches originating within International Relations and critical geopolitics. Whilst the former field addresses the relationship between political theory and popular culture, critical geopolitical analyses examine the process through which the surrounding world is spatialized. In offering an interdisciplinary perspective, therefore, this analysis highlights not only the production of a form of political power, but also the everyday mechanisms through which the associated assumptions, biases and cultural tropes are reproduced as commonsense spatial “knowledge”. Secondly, a methodological contribution is achieved through the provision of a framework for an object-focussed analysis of the video game medium. This approach, which encompasses both structural and thematic aspects, addresses the limitations that are associated with exclusively ludological or narratological approaches and provides an important middle ground. Finally, an empirical contribution is achieved through the detailed examination of the urban, rural and temporally-inflected forms of spatiality that are represented within military-themed video games. Here, a focus on twelve high-profile video game titles is used to highlight the ways in which the medium can work to produce or preclude different geopolitical imaginaries. The video game world is shown to be a source of political meaning – one which is used to naturalise different claims about the “reality” of our contemporary geopolitical experience, including what the world looks like and what our place within it might be. These analyses are also shown to provide a means by which it is made possible to illuminate – and even destabilise – the foundations of prevailing critical frameworks, offering the potential for introspection and future growth.
APA, Harvard, Vancouver, ISO, and other styles
46

Kuntsevych, M., А. Vasylenko, Владислава Миколаївна Завгородня, Владислава Николаевна Завгородняя, and Vladyslava Mykolaivna Zavhorodnia. "International Legal Measures Against Information Warfare." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/55762.

Full text
Abstract:
The paper explores possible international legal measures against information warfare and ways of international law application to interstate informational conflicts. The authors attempt to formulate legal definition of informational warfare and identify its essential features. Two types of hostile actions on the criterion of targeting are distinguished as humanitarian and cyber forms of information warfare. The conclusion that the article’s authors draw is that the contemporary international law does not establish an appropriate legal regime to information interstate conflicts. A universal international treaty is needed in order to prevent states from information aggression. The concept of its aims and main provision is also suggested.
APA, Harvard, Vancouver, ISO, and other styles
47

Turek, Allon G. "Smart climatology applications for undersea warfare." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FTurek.pdf.

Full text
Abstract:
Thesis (M.S. in Meteorology and Physical Oceanography)--Naval Postgraduate School, September 2008.
Thesis Advisor(s): Murphree, Tom. "September 2008." Description based on title screen as viewed on November 5, 2008. Includes bibliographical references (p. 91-93). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
48

Arango, Juan C. "Modern warfare from the Colombian perspective." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491149.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Coke, Hartwell F. "Route survey periodicity for mine warfare." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep_Coke.pdf.

Full text
Abstract:
Thesis (M.S. in Meteorology and Physical Oceanography)--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Chu, Peter. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Mine Warfare, periodicity, route survey, oceanographic, key parameters, resurvey integration model, survey model. Includes bibliographical references (p. 55-56). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
50

Wang, Kenny NMN. "Information warfare targeting : people and processes /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FWang.pdf.

Full text
Abstract:
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, December 2003.
Thesis advisor(s): Dan C. Boger, Raymond Buettner. Includes bibliographical references (p. 49-52). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography