Dissertations / Theses on the topic 'Warfare'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Warfare.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Schaad, Michael A. "More Effective Warfare: Warfare Waged Psychologically." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/7411.
Full textEidman, Christopher R., and Gregory Scott Green. "Unconventional cyber warfare: cyber opportunities in unconventional warfare." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42615.
Full textGiven the current evolution of warfare, the rise of non-state actors and rogue states, in conjunction with the wide availability and relative parity of information technology, the U.S. will need to examine new and innovative ways to modernize its irregular warfare fighting capabilities. Within its irregular warfare capabilities, the U.S. will need to identify effective doctrine and strategies to leverage its tactical and technical advantages in the conduct of unconventional warfare. Rather than take a traditional approach to achieve unconventional warfare objectives via conventional means, this thesis proposes that unconventional warfare can evolve to achieve greater successes using the process of unconventional cyber warfare.
Lesyk, N. I. "Information warfare." Thesis, Sumy State University, 2015. http://essuir.sumdu.edu.ua/handle/123456789/40628.
Full textSaleem, Y. "Environmental warfare." Thesis, Sumy State University, 2014. http://essuir.sumdu.edu.ua/handle/123456789/36287.
Full textKuzmenko, Victoria Vladimirovna, and Вікторія Володимирівна Кузьменко. "Information warfare a new face of warfare in international relations." Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51632.
Full textInformation is one of the most important components in the life of modern society. The status of a person, state, or organization in the real world is largely determined by its ability to communicate with people and its position in the information space. International relations have always been based on the principles of communication. International communication- is the exchange of information between participants on the world stage, which has an international character . Information has a global impact, that is, with the successful management of people’s minds, it is possible to destroy the opponent or even to start a war. And international communication is a guide to the beginning of information conflicts between the subjects, which can later escalate into information warfare. Today, the causes of information warfare in international relations may be simple communication between participants, but most often it is terrorism and cybercrime. A computer as a tool can be used to commit a crime and can be the object of a specific crime. These actions are used to disrupt and disable various government databases and management systems.
Інформація - одна з найважливіших складових у житті сучасного суспільства. Статус людини, держави чи організації в реальному світі значною мірою визначається її здатністю спілкуватися з людьми та її становищем в інформаційному просторі. Міжнародні відносини завжди базувались на принципах спілкування. Міжнародне спілкування - це обмін інформацією між учасниками на світовій арені, що має міжнародний характер . Інформація має глобальний вплив, тобто завдяки успішному управлінню свідомістю людей можна знищити супротивника або навіть розпочати війну. А міжнародне спілкування є орієнтиром для початку інформаційних конфліктів між суб’єктами, які згодом можуть перерости в інформаційну війну. Сьогодні причинами інформаційної війни у міжнародних відносинах може бути просте спілкування між учасниками, але найчастіше це тероризм та кіберзлочинність. Комп’ютер як інструмент може бути використаний для вчинення злочину і може бути об’єктом конкретного злочину. Ці дії використовуються для порушення та відключення різних державних баз даних та систем управління.
Emmersen, Tracy, Ng Kiang Chuan, David Chiam, Ong Zi Xuan, Perh Hong Yih Daniel, Koh Wee Yung, Wes Wessner, et al. "Advanced Undersea Warfare Systems." Thesis, Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/6959.
Full textApproved for public release; distribution is unlimited.
Over the next twenty years, the proliferation of threats in the undersea environment will likely challenge the platform-centric model that the United States Navy uses to maintain dominance in Undersea Warfare (USW). Meanwhile, rapidly maturing technologies offer greater capabilities to potential adversaries around the world. Such a paradigm creates an imperative for the Navy to harness emerging technologies to maintain USW dominance amid a dynamic threat environment, while balancing cost, risk, and required performance. This systems engineering analysis develops Advanced Undersea Warfare Systems (AUWS) that provide a technological and tactical advantage based on the needs of the war-fighter. Following critical analysis of the numerous possible alternatives for performing the necessary Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) and prosecution and an objective screening process, four system architectures, and associated operational concepts, are selected for detailed analysis. From cost, risk, and performance analyses, superior AUWS concepts are shown to be flexible, scalable, and tailorable systems that balance critical need areas. This analysis highlights the need for new warfare systems that can meet future challenges to the traditional platform-centric model for USW dominance. Using the results and recommendations in this analysis will allow the Navy to deploy capabilities that effectively and efficiently meet future operational needs.
Higgins, Eric John, Ronald Leroy Higgs, Gregory Rodger Parkins, Vincent S. Tionquiao, and Christopher Kevin Wells. "Expeditionary warfare : force protection." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/6917.
Full textIn 2003, the Systems Engineering and Analysis students were tasked to develop a system of systems conceptual solution to provide force protection for the Sea Base conceptualized in the 2002 Expeditionary Warfare study. The Systems Engineering and Analysis Team used the Systems Engineering and Management process as the primary methodology to complete this multidisciplinary task. Survivability was identified as the most critical factor for evaluating the protection of the Sea Base and its transport assets. Threats to the Sea Base were reviewed, analyzed, and prioritized. System design and analysis focused on preliminary analyses of various sensors, search concepts, and weapons. These preliminary analyses identified capability gaps that were translated into functional concepts and proposed architectures for detailed modeling and analysis. These proposed architectures were identified as either Point or Distributed. In order to adequately determine the relative performance of the proposed architectures generated by the team, a thorough and systematic design of experiments was developed and applied in the Naval Simulation System and EXTEND. Based on the results obtained, the Systems Engineering and Analysis Team determined that a Distributed Sensor and Weapons architecture would significantly increase the survivability of future Expeditionary Warfare forces.
Torres, Santino M. "Countermobilization: unconventional social warfare." Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/42741.
Full textThe purpose of this thesis is to identify and understand the factors associated with effective social countermobilization against violent extremism. Understanding such factors can help a state develop a sponsored countermovement to protect its national interests against violent extremist movements. This thesis attempts to provide a strategy and framework by which to defeat violent extremist movements through the use of unconventional warfare techniques.
White, Scott C. "Reorganizing for Irregular Warfare." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4353.
Full textA thorough understanding of Irregular Warfare (IW) and the principles of organizational theory and design will enable the Department of Defense (DoD) to organize efficiently and effectively for operations within the Irregular Warfare Environment, while maintaining its conventional capabilities. We develop our argument for this thesis in several stages. First, we define irregular warfare and differentiate it from conventional warfare through the development of our critical success factors. We introduce organizational theory and design in order to incorporate the critical success factors. We conclude that the DoD should reorganize certain elements of the U.S. Special Operations Command by incorporating existing capabilities, focusing on conducting operations within the Irregular Warfare Environment, and implementing our critical success factors.
Ford, Alexander S. "Dehumanization and irregular warfare." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34664.
Full textIn the current global environment the practice of dehumanizationthe stripping away of common attributes among people that call for respect and constrain violenceand the misperception it creates have resulted in misguided attempts by militaries to influence the center of gravity in irregular warfare, the civilian population. Traditional thought in this matter implies that cultural training is the most important factor in creating more effective influence when dealing in irregular warfare scenarios. By examining dehumanization and the factors that cause it in irregular warfare environments, this thesis will provide a framework for how dehumanization impacts influence operations. My analysis seeks to explain how dehumanization occurs and how it can be prevented, thereby setting necessary conditions for effective population influence.
McWhorter, Tanner Maxwell. "Cognitive Electronic Warfare System." Miami University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=miami1595708553000249.
Full textAl-Mubarak, Malik Abdulazeez. "Warfare in early Islam." Thesis, Connect to e-thesis, 1997. http://theses.gla.ac.uk/794/.
Full textPainter, David J. Weaver Mark C. White Scott C. "Reorganizing for Irregular Warfare." Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FPainter_Weaver_White.pdf.
Full textThesis Advisor: Rothstein, Hy. Second Reader: Jansen, Erik. "December 2009." Description based on title screen as viewed on January 28, 2010. Author(s) subject terms: Irregular Warfare, Population-centric Warfare, organizational theory and design, U.S. Special Operations Command. Includes bibliographical references (p. 71-76). Also available in print.
Bergström, Alfred. "Littoral Warfare: Two Perspectives." Thesis, Försvarshögskolan, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-8669.
Full textCox, Nechama Janet Cohen. "The Ministry of Economic Warfare and Britain's conduct of economic warfare, 1939-1945." Thesis, King's College London (University of London), 2001. https://kclpure.kcl.ac.uk/portal/en/theses/the-ministry-of-economic-warfare-and-britains-conduct-of-economic-warfare-19391945(d51b0c17-882c-420c-97b1-3ffead720c43).html.
Full textMakarenko, Meagan B. "Does the economy or surface warfare officer career pay affect surface warfare officer retention?" Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44610.
Full textUsing cohort-based surface warfare officer (SWO) inventory data from Bureau of Naval Personnel, this thesis examines possible correlation between SWO retention and the economy, as well as the effect of SWO career pay (SWOCP) on SWO retention. Multivariate regression is used as the main tool of analysis. I find that the unemployment rate shows a positive correlation with SWO retention. There was insufficient evidence to support the relationship between SWOCP and retention. The female population does yield some significant results independent of the mixed and male population. The findings indicate more research on non-monetary determinants of the SWO retention is necessary, a policy re-assessment of SWOCP may be warranted, and female retention differs from male retention and should be assessed further.
Ellington, Sidney T. "Special Operations in littoral warfare." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA306116.
Full textCares, Jeffrey R. "The fundamentals of salvo warfare." Thesis, Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA227003.
Full textThesis Advisor(s): Hughes, Wayne P. Second Reader: Parry, Samuel H. "March 1990." Description based on signature page on August 25, 2009. DTIC Descriptor(s): Salvos, tactical analysis, warfare, quantitative analysis, models, computers, theses, naval operations, vehicles, military tactics, surface to surface missiles, naval equipment, entropy, simulation, data bases, guided missiles. Author(s) subject terms: Naval combat theory, Naval tactics, Naval combat modeling. Includes bibliographical references (p. 62). Also available online.
Bracco, Jeffrey A. "Fire support for irregular warfare." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://bosun.nps.edu/uhtbin/hyperion-image.exe/08Mar%5FBracco.pdf.
Full textThesis Advisor(s): Arquilla, John. "March 2008." Description based on title screen as viewed on April 25, 2008. Includes bibliographical references (p. 85-90). Also available in print.
Morillo, Stephen R. "English royal warfare : 1066-1154." Thesis, University of Oxford, 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.385567.
Full textCisneros, Maribel. "Cyber-warfare: jus post bellum." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45169.
Full textThere is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea. Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.
Du, Mont Robert B. "Junior Surface Warfare Officer retention." Monterey, California. Naval Postgraduate School, 1997. http://hdl.handle.net/10945/8598.
Full textThe purpose of this thesis is to identify factors that lead to resignation of Junior Surface Warfare Officers (SWO) and to develop an hedonic model of junior SWO turnover. The first source of data was a survey of active- duty, junior SWOs currently serving aboard ships. The second source of data was a survey of 0-3 SWOs who are currently drilling in the Naval Reserves. Results of the two surveys were compared to identify differing levels of satisfaction with the active-duty Navy. The reservists also compared their satisfaction between the active-duty Navy and their current civilian employment Civilian salary levels were obtained from the reservists and their spouses to determine the pay differential between the Navy and civilian jobs for former junior SWOs. A regression model found three factors to have significant power in explaining civilian pay: years since leaving active duty, employment status, and comparative work stress between civilian employment and the active-duty Navy. SWOs with full-time employment who experienced the greatest reductions in pay also experienced the greatest reduction in work Stress. Junior SWOs experienced, on average, a 20 percent pay cut after leaving active duty. Pay returned to its pre-departure level in 2 to three years
Hindert, Johann. "German views of irregular warfare." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45873.
Full textIncreasingly, so-called weak actors employ irregular warfare to successfully challenge the strong. The British, French, and Americans are recognized for their irregular warfare experience, but the comparatively rich German tradition remains overlooked. German contributions to irregular warfare, in fact, rival their reputed expertise in modern maneuver warfare. This thesis surveys German irregular warfare cases from the eighteenth century forward. Beginning in the American Revolution, Hessian officer Johann Ewald revealed important counter-insurgency principles. In the early nineteenth century, Carl von Clausewitz spoke to the larger idea of people’s war and noted its efficacy. In a peripheral theater of World War I, Paul von Lettow-Vorbeck mastered the art of irregular adaptation and survival. In the Second World War, Otto Skorzeny perfected the strategic commando raid. After serving in the same war, Friedrich A.F. von der Heydte published a theory of modern irregular warfare, unique for its views on terrorism and the combined employment of irregular and other forms of warfare. Otto Heilbrunn studied partisan warfare and endorsed pseudo operations to counter asymmetric threats such as those faced by the United States today. German irregular warfare offers strategic answers to contemporary security challenges.
Steward, Aaron L. "Political warfare and contentious politics." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45947.
Full textThis thesis examines if increased Department of Defense (DOD) involvement in political warfare (PW) is justified through a qualitative, comparative analysis of U.S. PW actions conducted by the Department of State, Central Intelligence Agency, and DOD in two Cold War cases: Italy from 1943–1948 and Chile from 1961–1973. Concepts of strategy and social movement models of Doug McAdam, Charles Tilly, and Sidney Tarrow are applied to historical PW actions, both overt and covert. The case-study analysis clarifies each agency’s conduct of PW and develops analytical tools to classify PW actions by approach and impact within the political setting. Data was collected from archives, declassified government documents, and expert analyses. Results indicate that, compared to other U.S. agencies, the DOD had a limited direct role in PW in the cases studied, but was an important enabler. In applying models of social movement theory to historical analysis, this thesis identifies and develops the contentious politics mobilization model’s potential use in planning and evaluating PW strategies.
Bindi, Michael, Michael Kaslik, Jeffrey Baker, Keith Manning, Ryan Billington, Peter Horton, Tawanna Gallassero, et al. "Littoral undersea warfare in 2025." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/6919.
Full textThe US Navy is unlikely to encounter a sea-borne peer competitor in the next twenty years. However, some regional powers will seek to develop submarine forces which could pose a significant threat in littoral waters. In this context, the Littoral Anti-Submarine Warfare (ASW) in 2025 Project applied Systems Engineering principles and processes to create a number of competing ASW force architectures capable of neutralizing the enemy submarine threat. Forces composed of distributed unmanned systems and projected conventional ASW force systems were modeled and analyzed. Results provided insight to ASW challenges and suggested continued efforts that are required to further define and integrate the contribution of evolving technologies into the complex undersea battlespace.
Ayre, Steven J., and Jeremy F. Hough. "Air Power in irregular warfare." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/27788.
Full textBlandin, Mathiew, Jeramy Brux, Christopher Caraway, Jamie Cook, Samuel Fromille, David Haertel, Steven Hall, John Paul Kish, and Stephen Szachta. "2024 Unmanned undersea warfare concept." Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34733.
Full textPotential adversaries throughout the world continue to acquire and develop sophisticated multi-layered, anti-access, area-denial (A2AD) systems. To maintain its maritime superiority, the United States must continue to innovate systems that are capable of operating in and defeating these A2AD environments. In particular, command of the undersea domain remains vital and will increasingly be critical in facing this future battle space. The challenges our nation faces, however, are not limited only to the technological capabilities of the warfighters, but also include a myriad of confounding constraints. In addition to the expected shortfalls of mission-ready assets, the Submarine Forces also must address significant pressures in defense spending. Nevertheless, unmanned undersea vehicles (UUVs) remain one of the top priorities of the Chief of Naval Operations, as UUVs serve as effective force multipliers, while greatly reducing risk, in critical missions in A2AD environments. This report presents the findings of analysis and assessment conducted by an integrated systems engineering and analysis team of military officer students at the Naval Postgraduate School. Their operationally driven tasking seeks to design a system-of-systems of unmanned and manned undersea vehicles to ensure undersea dominance both in the near term and into the next decade. The importance of the systems perspective to this study is reflected by the extensive engagement with many operational stakeholders, academic researchers, industry partners, and acquisitions programs across the Naval enterprise. The capability-based approach highlights the mission suitability of both currently fielded UUVs and also technologies realizable within the next decade. The capstone final report summarizes these critical insights and provides detailed recommendations to inform decision makers of the present to prepare for the undersea forces of the future.
Murgatroyd, Philip Scott. "Medieval warfare on the grid." Thesis, University of Birmingham, 2012. http://etheses.bham.ac.uk//id/eprint/3797/.
Full textAhlberg, Jonatan. "The Islamic state’s ambiguous warfare." Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9263.
Full textBailey, J. P. A. "Artillery and Warfare 1945-2025." Thesis, Department of Defence Management and Security Analysis, 2009. http://hdl.handle.net/1826/4008.
Full textHedman, Daniel K. "Reorganizing SOF for irregular warfare." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FHedman.pdf.
Full textThesis Advisor(s): Tucker, David. "December 2008." Description based on title screen as viewed on January 30, 2009. Includes bibliographical references (p. 35-37). Also available in print.
Brennen, Lisa M. "Hezbollah psychological warfare against Israel." Thesis, Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/March/09Mar%5FBrennen.pdf.
Full textThesis Advisor(s): Kadhim, Abbas ; Baylouny, Anne Marie. "March 2009." Description based on title screen as viewed on April 23, 2009. Author(s) subject terms: Hezbollah, Israel, psychological warfare, information operations, strategic communications, guerrilla warfare, fourth generation warfare, terrorism, Islamic. Includes bibliographical references (p. 81-84). Also available in print.
Bell, Stephen William. "British political warfare, 1939-45." Thesis, University of Leeds, 1998. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.495003.
Full textCooper, Jerry. "A study guide for spiritual warfare." Theological Research Exchange Network (TREN), 1995. http://www.tren.com.
Full textZarougui, Mohamed. "Propaganda and psychological warfare in guerrilla and counter-guerrilla warfare : the Malayan Emergency 1948-1960." Thesis, University of Reading, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.315537.
Full textDI, BELLA PAOLO. "MODELLING & SIMULATION HYBRID WARFARE Researches, Models and Tools for Hybrid Warfare and Population Simulation." Doctoral thesis, Università degli studi di Genova, 2020. http://hdl.handle.net/11567/1008565.
Full textSmith, Conrad E. "Spiritual warfare an analysis of modern trends based on historical research and biblical exegesis /." Theological Research Exchange Network (TREN), 1994. http://www.tren.com.
Full textNewson, Robert A. "Naval Special Warfare - leading organizational change." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA386703.
Full textThesis advisors, Yost, David S. ; Minott, Rodney K. "December 2000." Includes bibliographical references (p. 179-183). Also available online.
Aslan, Mehmet Kadir. "Emitter Identification Techniques In Electronic Warfare." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607675/index.pdf.
Full textHolman, Charles E. "Predicting biological warfare agent detector performance." Fairfax, VA : George Mason University, 2008. http://hdl.handle.net/1920/3091.
Full textVita: p. 232. Thesis director: Andrew Loerch. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Biodefense. Title from PDF t.p. (viewed July 7, 2008). Includes bibliographical references (p. 226-231). Also issued in print.
Lu, Han-Chung. "Using expert systems in mine warfare." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/30957.
Full textErhardt, Bill. "2002 NPS Integrated Project - Expeditionary Warfare." Thesis, Monterey California. Naval Postgraduate School, 2002. http://hdl.handle.net/10945/41965.
Full textThe Expeditionary Warfare Integrated Project represents the combined effort of more than 70 students and 18 faculty members from seven different Naval Postgraduate School curricula representing all five US uniformed services and allies from Singapore, Turkey, Greece, Tunisia, and Sweden. This project was the result of OPNAV N7 tasking directing NPS’ Wayne Meyer Institute of Systems Engineering to use a top down, system of systems approach to examine future Expeditionary Warfare operations in terms of current and emerging operational concepts.
O'Donnell, Michael W. "Irregular warfare centric foreign internal defense." Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/34714.
Full textConflict over the past few decades has changed drastically. Warfare changed with the conflict. Large-scale conventional wars are not todays norm. Small non-state actors and terrorist organizations cause havoc on a global scale using unconventional methods and weapons. The United States and its allies need to combat these threats using indirect strategies while maintaining international legitimacy Hizbullah is a terrorist organization operating within Lebanon and the Levant. Hizbullah employs violence, in addition to political means, to achieve its goals. Lebanon and its allies could identify a strategic internal defense and development strategy and implement a comprehensive foreign internal defense training regimen to combat Hizbullah and ultimately disarm the militant wing. Using an indirect method, focusing on a political agreement, increasing social services and providing additional security and stability to southern Lebanon are some of the critical elements the Lebanese government needs to implement to tame Hizbullah and disarm the terrorists. This approach worked for Britain with the Irish Republican Army and it can work for Lebanon with Hizbullah if properly implemented.
Wang, Ken NMN. "Information warfare targeting: people and processes." Thesis, Monterey, California. Naval Postgraduate School, 2003. http://hdl.handle.net/10945/6120.
Full textInformation Warfare targeting has long been a crucial, but unrecognized, part of military operations. From Sun Tzu's targeting of the enemy's will to fight, to today's information-centric warfare, it is those who have understood the techniques and applications of Information Warfare targeting who have most often prevailed. As critical as it is to our success, it is a topic that is controversial, often misunderstood, and subject to various interpretations. This thesis examines the IW targeting process, consisting of people, information, systems, and the interaction between the function of targeting and IW. In the Information Age, IW has been recognized as viable warfare area. However, IW Targeting cannot be treated as traditional targeting utilized by other warfare areas. This thesis is intended to serve as a guide for the study of this topic and provides an instructional program designed to satisfy the requirement for a coherent instructional program on IW Targeting. IW targeting affects every facet of warfare and in turn is affected by these facets. In preparing for a future that calls for maximizing the effects while minimizing the effort, it is critical that we understand the process in order to remain effective.
Young, Robert John. "Playing politics : warfare in virtual worlds." Thesis, University of Leeds, 2018. http://etheses.whiterose.ac.uk/22035/.
Full textKuntsevych, M., А. Vasylenko, Владислава Миколаївна Завгородня, Владислава Николаевна Завгородняя, and Vladyslava Mykolaivna Zavhorodnia. "International Legal Measures Against Information Warfare." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/55762.
Full textTurek, Allon G. "Smart climatology applications for undersea warfare." Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Sept/08Sep%5FTurek.pdf.
Full textThesis Advisor(s): Murphree, Tom. "September 2008." Description based on title screen as viewed on November 5, 2008. Includes bibliographical references (p. 91-93). Also available in print.
Arango, Juan C. "Modern warfare from the Colombian perspective." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491149.
Full textCoke, Hartwell F. "Route survey periodicity for mine warfare." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep_Coke.pdf.
Full textThesis Advisor(s): Chu, Peter. "September 2009." Description based on title screen as viewed on November 5, 2009. Author(s) subject terms: Mine Warfare, periodicity, route survey, oceanographic, key parameters, resurvey integration model, survey model. Includes bibliographical references (p. 55-56). Also available in print.
Wang, Kenny NMN. "Information warfare targeting : people and processes /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Dec%5FWang.pdf.
Full textThesis advisor(s): Dan C. Boger, Raymond Buettner. Includes bibliographical references (p. 49-52). Also available online.