Tesi sul tema "Defence and security contracts"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Defence and security contracts".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Latta, Jason E. "Analysis of the distribution of vaccine using Department of Defense assets versus contracts with private-sector delivery companies". Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FLatta.pdf.
Testo completoThesis Advisor(s): Apte, Aruna. Second Reader: Ferrer, Geraldo. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Pandemic Influenza, Vaccine Distribution, Vaccine Distribution with DoD Assets, DoD Pandemic Influenza Response Plan. Includes bibliographical references (p. 63-64). Also available in print.
Froment-Maire, Anne. "L'organisation administrative française à l'épreuve de l'évolution des notions de sécurité et de défense". Thesis, Université de Lorraine, 2016. http://www.theses.fr/2016LORR0236.
Testo completoRethinking administrative action within the new security/defense continuum has become imperative since the institutional set-up constitutes the basis for security action. It was of paramount importance to assess the impact that the evolution of the notions of security and defense - now become the two faces of the same coin - bears on the functioning of the administration. This is all the more essential since the substance of security keeps expanding. The tools available to meet these objectives have been adapted to re-organize the partners’ roles with a view to overhauling the semantic framework of security within a territorial reorganization, allowing redefining the relationships between the State and the local authorities. Complexity has however impeded the relationships between the various administrations, involving institutional partners with those of defense. Solutions have been sought through the development of partnerships between public entities, opting for supranational options and particularly European trans-border cooperations
Marie, Quentin. "Marchés de défense ou de sécurité ˸ entre marchés publics et politiques publiques". Electronic Thesis or Diss., université Paris-Saclay, 2024. http://www.theses.fr/2024UPASH016.
Testo completoAre defence or security contracts (DSC) like public procurement? What is the impact of their strong regalian dimension and the public policies they can help to achieve? Are their nature (Part 1) and their regime (Part 2) above all those of public procurement, or does their ‘public policies' dimension take precedence? To answer these questions, it must be said that for a long time, defence procurement was awarded according to national procedures, most often without any logic of transparency. Since the adoption of Directive 2009/81/EC, defence and security purchases have in principle been subject to EU-wide advertising and competitive tendering requirements. Despite their specific characteristics, these purchases constitute the archetypal public procurement contract. Defence is a sovereign function par excellence, so procurement in this area is particularly ‘public', with very high stakes for sovereignty. In France, defence is a major economic market, particularly in terms of employment, with a clearly positive trade balance. Defence and security procurement also serves national and European defence policy, particularly regarding the objective of developing the European Defence Technological and Industrial Base (EDTIB). They are also affected by all the public policies incorporated into public procurement law, such as sustainable development, innovation and support for SMEs. From this point of view, defence and security purchases are also ‘public policies'. As a result, they are bound to benefit from political developments in public procurement law, developments which constitute one of the most significant changes in this law. DSC are therefore an ideal way of studying the possibilities and limits of using defence procurement in particular, and public procurement in general, to achieve public policy objectives. In so doing, they provide an opportunity to assess the flexibility of public procurement law and, at the same time, the flexibility of the competitive rationale it promotes. Public procurement law has had to take account of the specific political, economic and technical features of defence and security purchases, and to introduce a tailor-made concept of ‘defence or security contract', which, while strengthening the EDTIB, makes it possible to implement a competitive approach tailored to defence, and therefore more effective. This specific concept of ‘defence or security contract' then triggers the application of a regime that gives concrete form to the instrumentalization of these contracts, both at the stage of their award and during their performance. The advertising and competitive tendering requirements are largely dedicated to considering the specific features of the purchases they govern, and in particular the imperatives of security of supply and security of information. The ‘public policies' dimension of DSC is to be found not only in the fundamental principles and concepts, but also in the more detailed rules governing the award and performance of these contracts. In this way, the use of DSC is based on the flexibility of public procurement law, which makes the interaction between ‘public procurement' and ‘public policies' effective. While respecting the free play of competition, this instrumentalization allows public procurement to fully assume its political dimension. By their very nature and the way they are governed, DSC are an effective combination of public procurement and public policy
Gjoka, Algert <1990>. "Smart Contracts security in Government Institutions". Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14525.
Testo completoYoung, Christopher J. "The European security and defence identity debate". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ56151.pdf.
Testo completoFrey, Stefanie. "Swiss defence and security policy 1945-73". Thesis, King's College London (University of London), 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.268809.
Testo completoBellavista, Daniele. "Ict security: Defence strategies against targeted attacks". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6960/.
Testo completoWing, Ian Politics Australian Defence Force Academy UNSW. "Australian Defence in transition: responding to new security challenges". Awarded by:University of New South Wales - Australian Defence Force Academy. School of Politics, 2002. http://handle.unsw.edu.au/1959.4/38662.
Testo completoMüller-Wille, Björn Wilhelm. "Thinking security in europe? is there a European security and defence identity? /". [S.l. : s.n.], 2003. http://deposit.ddb.de/cgi-bin/dokserv?idn=970705735.
Testo completoKeogh, Darrin M. "European security and defence policy reform : a theoretical challenge". Thesis, London Metropolitan University, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.507077.
Testo completoHussain, S. Y. "Application of quantum magnetometers to security and defence screening". Thesis, University College London (University of London), 2018. http://discovery.ucl.ac.uk/10047132/.
Testo completoMuniz, Manuel. "Explaining security and defence integration : the case of Europe". Thesis, University of Oxford, 2016. https://ora.ox.ac.uk/objects/uuid:ae151580-c6d1-43ae-857d-9a3c2ab1b597.
Testo completoMella, Luca. "Ict security: Testing methodology for targeted attack defence tools". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/6963/.
Testo completoIvanovski, Hristijan. "A common defence for Europe". Israel Defence, 2015. http://hdl.handle.net/1993/31255.
Testo completoMay 2016
Bankole, Oyetola Opeyemi. "Development of an affordability assessment framework for defence contracts at the bidding stage". Thesis, Cranfield University, 2011. http://dspace.lib.cranfield.ac.uk/handle/1826/7231.
Testo completoDyson, Philip Thomas Adrian. "The politics of German defence policy : policy leadership, Bundeswehr reform and European defence and security policy". Thesis, London School of Economics and Political Science (University of London), 2005. http://etheses.lse.ac.uk/1778/.
Testo completoPenttila, Risto E. J. "Finland's search for security through defence : defence policy in the stabilisation of Finland's international position 1944-1967". Thesis, University of Oxford, 1988. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.293486.
Testo completoStamate, Gheorghe. "European Security and Defence Policy, or Back to Political Realism?" Thesis, Linköping University, Department of Management and Economics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2514.
Testo completoIn the course of this master thesis I will argue the following:
a) ESDP project is an interesting initiative and concern issues that stand at the core of the EU integration processes. It relates to the most significant and updated development of the EU institutional, conceptual and strategic design, but is yet relatively unexplored and underdeveloped.
b) The aim of this study is to evaluate the efforts to enhance cooperation among European countries in the provision and use of military force. To set the scene and illustrate constrains and complications that bear upon activities in this field. Indeed, the author intends to recommend a theoretical framework, as a fundamental prerequisite for the proper study of EU Defense and Security Policy.
c) Constructivism and neo- Realism and their theoretical tenets offer an unexplored avenue to investigate and account for the development of the European Security and Defense Policy.
d) The efficiency of such an account depends on a meticulous evaluation of proposed theoretical approaches versus the emerging security complex. This theoretical choice allows for a construction beyond that of the unit or system levels of analysis and may therefore grant a causal role to perceived interests in terms of non- traditional approach to research in social science. Also it may thereby provoke an interest in terms of security and threat.
e) The originality and validity of a combination between Realism and Constructivism as a starting point for inquiries in IR may not only be relevant to an understanding of how such a development can unfold, but mostly how a real social phenomena can be unfolded by such a non-traditional theoretical approach.
Shetler-Jones, Philip. "The Globalisation of Japan's Defence and Security Policies 1989-2009". Thesis, University of Sheffield, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527056.
Testo completoGlass, Stephen Mark. "Wireless Networks: Attack and Defence Security in Emergency Communications Netwoks". Thesis, Griffith University, 2011. http://hdl.handle.net/10072/365797.
Testo completoThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Information and Communication Technology
Science, Environment, Engineering and Technology
Full Text
Ceccorulli, Michela. "Cooperation in European defence procurement : OCCAR and the security regime". Thesis, IMT Alti Studi Lucca, 2008. http://e-theses.imtlucca.it/75/1/Ceccorulli_phdtesis.pdf.
Testo completoMaughelli, Francesco. "Security-related experiences with Smart Contracts over the Ethereum Blockchain". Master's thesis, Alma Mater Studiorum - Università di Bologna, 2017. http://amslaurea.unibo.it/13991/.
Testo completoEldosouky, Mahmoud Salama Abdelrahman A. "Security of Critical Cyber-Physical Systems: Fundamentals and Optimization". Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/90281.
Testo completoDoctor of Philosophy
Cyber-physical systems (CPSs) have recently been used in many application domains because of their ability to integrate physical elements with a cyber layer allowing for sensing, monitoring, and remote controlling. This pervasive use of CPSs in different applications has brought forward new security challenges and threats. Malicious attacks can now leverage the connectivity of the cyber layer to launch remote attacks and cause damage to the physical components. Taking these threats into consideration, it became imperative to ensure the security of CPSs. Given that many CPSs provide critical services, for instance many critical infrastructure (CI) are CPSs such as smart girds and nuclear reactors; it is then inevitable to ensure that these critical CPSs can maintain proper operation. One key measure of the CPS’s functionality, is resilience which evaluates the ability of a CPS to deliver its designated service under potentially disruptive situations. In general, resilience measures a CPS’s ability to adapt or rapidly recover from disruptive events. Therefore, it is crucial for CPSs to be resilient in face of potential failures. To this end, the central goal of this dissertation is to develop novel analytical frameworks that can evaluate and improve security and resilience of CPSs. In these frameworks, cross-disciplinary tools are used from game theory, contract theory, and optimization to develop robust analytical solutions for security and resilience problems. In particular, these frameworks led to the following key contributions in cyber security: developing an analytical framework to mitigate the effects of GPS spoofing attacks against UAVs, introducing a game-theoretic moving target defense (MTD) framework to improve the cyber security, and securing data privacy in m-health Internet of Things (IoT) networks using a MTD cryptographic framework. In addition, the dissertation led to the following contributions in CI resilience: developing a general framework using Bayesian Networks to evaluate and improve the resilience of CIs against their components failure, introducing a contracttheoretic model to allocate resources to multiple connected CIs under complete and asymmetric information scenarios, providing a proactive plan to improve the resilience of transportation networks against flooding, and, finally, developing an environment-aware framework to deploy UAVs in disaster-areas
Scannell, David Luke. "Legal aspects of the European Union's European Security and Defence Policy". Thesis, University of Cambridge, 2005. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.614899.
Testo completoBorysenkov, Dmytro, e Serhii Rozhok. "Features of national cyber defence". Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/50755.
Testo completoBecause of Russia’s actions in April 2014, the Ukraine decided to make a step from historic alignment with Russia to find itself in NATO membership. On September 20, 2018 Ukraine’s president Petro Poroshenko said “We need to amend our constitution to make NATO membership a long-term goal” [1]. These words played an irreversible role of transformation our country toward European and Euro-Atlantic course integration. And one of the main goals was to transform consciousness of Ukrainian people to convince them that Ukraine is not a part of Russian Federation. The importance of this message made by Ukrainian law was directly counter to Putin’s influence operations attempting to convince the entire world that Ukrainians were ethnically Russians.
Через дії Росії у квітні 2014 року Україна вирішила зробити крок від історичного приєднання до Росії, щоб опинитися в членстві в НАТО. 20 вересня 2018 р. Президент України Петро Порошенко заявив: "Нам потрібно внести зміни в нашу Конституцію, щоб зробити членство в НАТО довгостроковою метою" [1]. Ці слова зіграли незворотну роль в трансформації нашої країни в бік європейської та євроатлантичної інтеграції курсів. І однією з головних цілей було перетворення свідомості українського народу, щоб переконати його в тому, що Україна не є частиною Російської Федерації. Важливість цього повідомлення, поданого українським законодавством, прямо суперечила операціям впливу Путіна, які намагалися переконати весь світ у тому, що українці є етнічно росіянами.
Collison, Kurt Ryan. "The South African military aerospace industry: An overview of the special defence account more commmonly known as 'The South African Arms Deal'". Thesis, University of the Western Cape, 2007. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_5741_1256300601.
Testo completoThe paper focuses specifically on the South African Military Aerospace Industry as most of the weapons procured under the arms deal were military aircraft. Taking into account the numerous social needs of South Africa, the purpose of this paper is to inter alia try to establish the rationale behind the South African government's decision to to purchase an array of military weapons from foreign suppliers at an initial cost of almost thirty billion rand. In order to gain a better undrstanding of the topic, the author gives a brief overview and history of the South African Aerospace industry.Furthermore, an examination of the politics of the transition from apartheid to democracy and how this affected the aeropace industry is given.
Doherty, Roisin. "Passivity v engagement? : the impact of an emerging European security architecture on Irish neutrality". Thesis, University of Ulster, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.314032.
Testo completoHuff, Ariella Rachel. "Parliamentary discourses on the European security and defence policy in Britain, Ireland and Poland, 1998-2008". Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610552.
Testo completoGray, Gavan Patrick. "Japanese defence production, national security and alliance relations in the 21st century". Thesis, University of Leicester, 2014. http://hdl.handle.net/2381/29244.
Testo completoEmerson, Kaye M. "Defence procurement in the United Kingdom which way will it go? /". Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA243126.
Testo completoThesis Advisor(s): Laurance, E. J. Second Reader: Breemer, J. S. "December 1990." Description based on title screen as viewed on March 30, 2010. DTIC Identifier(s): Westland Case Study, NATO Frigate Replacement-90 Case Study, European Fighter Aircraft Case Study. Author(s) subject terms: Defense Procurement, Westland Helicopter, NATO Frigate, European Fighter Aircraft. Includes bibliographical references. Also available in print.
Moholt, van Reeuwijk Yvonne. "Enhancing the European security and defence policy : European integration and the changing of the Norwegian and the Swedish security identities". Thesis, Uppsala universitet, Teologiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-359694.
Testo completoNoetzel, Timo. "Making strategy : German defence and security policy in the post-Cold War period". Thesis, University of Oxford, 2006. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.433281.
Testo completoTorun, Zerrin. "Constructivist approach to Europeanization under the European foreign, security and defence policy framework". Thesis, University of Sussex, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.499564.
Testo completoLadzik, Jeannette. "Britain, Germany and the European Security and Defence Policy : constructivist socialisation at work?" Thesis, London Metropolitan University, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.590147.
Testo completoAktipis, Michael Spiros. "The United Kingdom and ESDP : The Europeanization of British Security and Defence Policy". Thesis, London School of Economics and Political Science (University of London), 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.498085.
Testo completoWright, Kevin P. "European conventional arms control and epistemic communities". Thesis, University of Essex, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.265196.
Testo completoVieira, Telmo J. "Euro-Mediterranean securitization and EU foreign and defence policy : challenges for Mediterranean regional security". Thesis, University of Exeter, 2009. http://hdl.handle.net/10036/67300.
Testo completoKettil, Daniel. "From National Defence to International Operations? : A study on the transformation of Sweden's armed forces between 1989-2009". Thesis, Linnéuniversitetet, Institutionen för samhällsvetenskaper, SV, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-21908.
Testo completoSmith, Andrew Humanities & Social Sciences Australian Defence Force Academy UNSW. "The factors influencing the employment of the Australian Defence Organisation in homeland security roles since 11 September 2001". Awarded by:University of New South Wales - Australian Defence Force Academy. School of Humanities and Social Sciences, 2007. http://handle.unsw.edu.au/1959.4/38735.
Testo completoHunter, Sri Mulyati. "The "changing dimensions" of the Australia-Indonesia bilateral relationship from 1996 to October 2002 in the defence and security context /". Diss., Title page, contents and introduction only, 2002. http://web4.library.adelaide.edu.au/theses/09AR/09arh947.pdf.
Testo completoOpasinov, Aleksandar, e Sina Eftekhari. "Improving the Cyber defence of an organisation based on IP Geolocation and security appliances". Thesis, Högskolan Väst, Avdelningen för Matematik, Data- och Lantmäteriteknik, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hv:diva-16149.
Testo completoDå stora framsteg och användning av datakommunikation har ökat exponentiellt på en global skala, med en förödande exponering av attacker och säkerhetshot mot hemanvändare såväl som stora företag, finns detalltid ett behov av förbättrad nätverksskydd. IT-avdelningen hos företaget OneDefence, valdes för att utföra examensprojektet och baserade sig på organisationens angivna information för att förbättra deras nätverksförsvar. Syftet med denna rapport är att sammanställa en lista på tio länder som utgör de allvarligaste IT-hoten i världen, samt begränsa attackytan för organisationens nätverk så mycket som möjligt medan man behåller alla nödvändiga tjänster till användare utomlands. Efter att ha undersökt länderna, anordnades en prototyp för att efterlikna delar av OneDefences topologi av intresse och testattacker utfördes enligt metodologikapitlet. Resultaten av utredningarna visade att från de länder som utfört de allra allvarliga cyberhoten inkluderade bland annat Kina, Ryssland och Nordkorea, som har beräknats statistiskt baserat på antalet igenkända cyberwarfare attacker. Resultaten från de olika DoS-attackerna visade att en IPS bör vara kärnan i en organisations nätverksförsvar för att kunna bekämpa dessa intrång, samt potentiellt andra typer. Med hjälp av den prototyp som byggdes baserad på organisationens topologi, blockerades flera attacker rätt framgångsrikt, med en låg procentandel av paketen som gick genom säkerhetsenheten. Slutligen utforskades ytterligare förbättringar av försvarsförmågan hos organisationen genom att jämföra olika produkter och enheter. Detta resulterade i produkter från Fortinet-varumärket såsom FortiGate NGFW med UTM förmåga, då de erbjuder flera fördelar jämfört med konkurrenter.
Likoti, Fako Johnson. "The role of the Southern African Development Community Organ on Politics, Defence and Security". Master's thesis, University of Cape Town, 2003. http://hdl.handle.net/11427/6897.
Testo completoThe Southern African countries colonial struggles and South African apartheid destabilization policies in the mid-1960s to 1980s compelled Southern African states to establish a Security Organ. This was to assist them to formulate the common defence policy. This Organ became known as the Front Line States (FLS). However, as more countries attained independence and joined FLS, the grouping established the Southern African Coordination Conference (SADCC) that was later renamed the Southern African Development Community (SADC). It was SADC, which decided to establish another arm, which deals with Politics Defence and Security known as the Organ on Politics Defence and Security. The OPDS has experienced major problems in achieving its goals since its inception in June 1996. Member states had become suspicious of this body and as a result some members decided to operate outside the confines of this body. The main aim of this dissertation has been to trace the circumstances and the origin of this Security Organ and to evaluate its achievements. However, in august 2001, OPOS was renamed Organ of Politics, Defence and Security Co-operation (OPDSC). This Organ became accountable to the Summit not to the chair country, as was the case before. The protocol of this Organ is analysed in order to evaluate the roles of this Organ in relations to SADC member states. The dissertation also indicated the success and limitations of this Organ; the political trends of the region are also discussed. Finally, the dissertation deals with the unfinished question, which focuses on the future prospects and challenges of the OPDS as a policy implementation institution of SAOC.
Faleg, Giovanni. "When knowledge meets practice : learning communities and the EU's Common Security and Defence Policy". Thesis, London School of Economics and Political Science (University of London), 2014. http://etheses.lse.ac.uk/906/.
Testo completoMiah, Abdul. "Product-based environmental metrics for use within aerospace, defence, space and security industries (ADS)". Thesis, University of Surrey, 2018. http://epubs.surrey.ac.uk/845983/.
Testo completoKmec, Vladimir. "The EU's approach to peacebuilding in common security and defence policy missions and operations". Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/273869.
Testo completoCatalano, Claudio. "The Role of Italy in the development of a European security and defence policy". Thesis, IMT Alti Studi Lucca, 2009. http://e-theses.imtlucca.it/62/1/Catalano_phdthesis.pdf.
Testo completoViolakis, Petros. "Europeanisation of the EU defence and security policy after the end of the Cold-War". Thesis, University of Exeter, 2016. http://hdl.handle.net/10871/22165.
Testo completoWiseman, Geoffrey. "On the defensive : a critical examination of concepts of #non-provocative defence', 1980-1992". Thesis, University of Oxford, 1997. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360035.
Testo completoTimonen, Virpi. "In defence of the welfare state? : social policy restructuring in Finland and Sweden in the 1990s". Thesis, University of Oxford, 2001. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.368128.
Testo completoBohnen, Johannes. "The transformation of German defence policy (1989-1997) : the struggle to achieve a new consensus". Thesis, University of Oxford, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.365763.
Testo completo