Tesi sul tema "Deterrence"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 saggi (tesi di laurea o di dottorato) per l'attività di ricerca sul tema "Deterrence".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi le tesi di molte aree scientifiche e compila una bibliografia corretta.
Baade, Hans Petter. "Acquiring Deterrence : Defence Procurements’ Role in Deterrence". Thesis, Försvarshögskolan, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7457.
Testo completoRekasius, Mindaugas. "Unconventional deterrence strategy". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FRekasius.pdf.
Testo completoKolliniatis, Vasilios A. "On entry deterrence". Thesis, University of Essex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.302813.
Testo completoHemmer, Patrick T. "DETERRENCE AND CYBER-WEAPONS". Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32836.
Testo completoRapid technological advancements and societal inclusion of these technologies have expanded civil and defense capabilities but have also created significant vulnerabilities. Cyber-weapons have the potential to affect interaction between states by exploiting this vulnerability. To better understand the mechanics of how cyber-weapons affect state relations this research applies a common framework to explore the attributes of traditional weaponsconventional, nuclear, and RMAand how they typically influence this behavior. After proposing selected factors that influence the effectiveness of a cyber-attack, the research examines the cyber-attacks in 2007 on Estonia and 2008 on Georgia in order to refine and provide nuanced analysis on the role of the proposed causal factors. The proposed factors are government involvement, level of attack sophistication, and the degree to which the state is dependent upon digitally connected technology. The research indicates that the role of the state is one of the most significant factors in influencing the effectiveness of a cyber-attack and highlights the role that plausible deniability plays in this relationship. Some initial policy recommendations are made based on the finding that the use of cyber-weapons as a deterrent is still ill-defined and that the focus should be on decreasing state vulnerability to these attacks.
Park, Jusik. "Rationality in nuclear deterrence /". The Ohio State University, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=osu148775905515793.
Testo completoMoore, Ryan J. "Prospects for cyber deterrence". Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMoore.pdf.
Testo completoThesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
Rasmussen, David C. "Credible nuclear deterrence for Japan". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378257.
Testo completoThesis advisor(s): Wirtz, James J. ; Olsen, Edward A. "March 2000." Includes bibliographical references (p. 73-80). Also available in print.
KODERA, Toshiki. "Software Compatibility Alters Entry Deterrence". 名古屋大学大学院経済学研究科, 2007. http://hdl.handle.net/2237/8596.
Testo completoStephenson, John D. "Countering terrorism engagement, development, deterrence". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5019.
Testo completoThe war on terrorism has not reduced the threat from terrorism. Terrorism as a tactic cannot be defeated. States policies cannot rely on force alone in an attempt to defeat the use of a tactic. States need to use more effective counterterrorism policy options than coercion and force to deter groups from using terrorism. Groups choose to use terrorism as a tactic as a means to bring attention to be engaged and their grievances addressed. Engaging groups that use terrorism to address and resolve their grievances can prevent the cycle of violence of a terrorism campaign and delegitimize their use of force to resolve grievances. Economic development of developing nations can produce strong institutions necessary for minority groups to resolve grievances and build internally balanced market economies in developing nations that allow them to fully participate in economic globalization and reap the security benefits of globalization.
Kolbas, Patrick Joseph. "Beyond Armageddon : deterrence with less". Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28016.
Testo completoJasper, Scott. "U.S. strategic cyber deterrence options". Thesis, University of Reading, 2018. http://centaur.reading.ac.uk/79976/.
Testo completoOdhner, Caroline. "Cyber Deterrence Based Upon Conventional Premises : A Discourse Analysis of the US Cyber Deterrence Policy". Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10143.
Testo completoMcCutcheon, Michael. "Testing Specific Deterrence In The National Basketball Association: An Application Of Beccaria's Theory Of Deterrence". Digital Commons @ East Tennessee State University, 2016. https://dc.etsu.edu/etd/3165.
Testo completoBriscoe, Suzanne Marie Social Science & Policy UNSW. "Deterrence, punishment severity and drink-driving". Awarded by:University of New South Wales. Social Science and Policy, 2005. http://handle.unsw.edu.au/1959.4/23442.
Testo completoStephan, Andreas. "Enhancing deterrence in European cartel enforcement". Thesis, University of East Anglia, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.446165.
Testo completoBaik, Kyung Hwan. "Capacity, entry deterrence, and horizontal merger". Diss., Virginia Polytechnic Institute and State University, 1989. http://hdl.handle.net/10919/54483.
Testo completoPh. D.
Leppmann, Kevin P. (Kevin Paul) Carleton University Dissertation International Affairs. "The social psychology of deterrence theory". Ottawa, 1988.
Cerca il testo completoFrederick, Lorinda A. "Deterrence and space-based missile defense /". Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=2c4a986d-2074-4005-b963-1b697e841d8c&rs=PublishedSearch.
Testo completoMcMaster, Don. "Detention, deterrence, discrimination : Australian refugee policy /". Title page, abstract and contents only, 1999. http://web4.library.adelaide.edu.au/theses/09PH/09phm167.pdf.
Testo completoGraham, Cheryl M. "Deterrence revalidated : an investigation of the practice and application of deterrence in the post-Cold War world". Thesis, University of Aberdeen, 2010. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=202573.
Testo completoSörenson, Karl. "In Search of Lost Deterrence – Two essays on deterrence and the models employed to study the phenomenon". Licentiate thesis, KTH, Filosofi och historia, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240090.
Testo completoQC 20190201
Beattie, Troy J. "Conventional deterrence and the Falkland Islands conflict". Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Mar/10Mar%5FBeattie.pdf.
Testo completoThesis Advisor(s): Russell, James. ; Moran, Daniel. "March 2010." Description based on title screen as viewed on April 30, 2010. Author(s) subject terms: Deterrence (Strategy); Conventional Deterrence (Strategy); Deterrence-Psychology; Falkland Islands War, 1982; Great Britain; Argentina; Defense Policy Includes bibliographical references (p. 109-112). Also available in print.
Jafarian, Jafar Haadi. "Cyber Agility for Attack Deterrence and Deception". Thesis, The University of North Carolina at Charlotte, 2017. http://pqdtopen.proquest.com/#viewpdf?dispub=10686943.
Testo completoIn recent years, we have witnessed a rise in quantity and sophistication of cyber attacks. Meanwhile, traditional defense techniques have not been adequate in addressing this status quo. This is because the focus has remained mostly on either identifying and patching exploits, or detecting and filtering them. These techniques are only effective when intrusions are known or detectable. However, unknown (zero-day) vulnerabilities are constantly being discovered, and known vulnerabilities are not often patched promptly. Even worse, while defenders need to patch all vulnerabilities and intrusions paths against unknown malicious entities, the attackers only need to discover only one successful intrusion path in a system that is known and static. These asymmetric advantages have constantly kept attackers one step ahead of defenders.
To reverse this asymmetry in cyber warfare, we aim to propose new proactive defense paradigms that can deter or deceive cyber attackers without relying on intrusion detection and prevention and by offering cyber agility as a system property. Cyber agility allows for system configuration to be changed dynamically without jeopardizing operational and mission requirements of the system. In this thesis, we introduce two novel cyber agility techniques based on two paradigms of cyber deterrence and cyber deception. Cyber deterrence techniques aim to deter cyber threats by changing system configurations randomly and frequently. In contrast, cyber deception techniques aim to deflect attacks to fake targets by misrepresenting system configurations strategically and adaptively.
In the first part of this dissertation, we propose a multi-strategy, multi-parameter and multi-dimensional host identity mutation technique for deterring reconnaissance attacks. This deterrence is achieved by mutating IP addresses and anonymizing fingerprints of network hosts both proactively and adaptively. Through simulation and analytical investigation, we show that our approach significantly increases the attack cost for coordinated scanning worms, advanced network reconnaissance techniques, and multi-stage APT attacks.
In the second part, we propose a formal framework to construct active cyber deception plans that are goal-oriented and dynamic. Our framework introduces a deception logic that models consistencies and conflicts among various deception strategies (e.g., lies) and quantifies the benefit and cost of potential deception plans.
In the third part, we demonstrate and evaluate our deception planning framework by constructing an effective deception plan against multi-stage attacks. Through our experimentation, we show that the generated deception plans are effective and economical, and outperform existing or random deception plans.
Wesley, Kevin R. "Triangular deterrence : a formidable rogue state strategy". Thesis, Monterey, California ; Naval Postgraduate School, 1999. http://hdl.handle.net/10945/13486.
Testo completoKiskis, Rolandas. "Deterrence and reassurance in Lithuanian-Russian relations". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FKiskis.pdf.
Testo completoThesis advisor(s): David S. Yost, Anne Clunan. Includes bibliographical references (p. 71-74). Also available online.
Lee, Quan Eugene. "Effective Cost Allocation for Deterrence of Terrorists". Scholarship @ Claremont, 2007. https://scholarship.claremont.edu/hmc_theses/201.
Testo completoPjetraj, Walter M. "Conflict containment in the Balkans : testing extended deterrence /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1995. http://handle.dtic.mil/100.2/ADA297658.
Testo completoPalmer, Jess D. Stebbins Mark L. Zacherl Andrew M. "The gunfighter's dilemma : multiple adversary deterrence and coercion /". Monterey, Calif. : Naval Postgraduate School, 2000. http://handle.dtic.mil/100.2/ADA387319.
Testo completoCook, Amanda Paige. "CAPITAL AND PUNISHMENT: SUPPORTING THE DEATH OF DETERRENCE". MSSTATE, 2007. http://sun.library.msstate.edu/ETD-db/theses/available/etd-04262007-171049/.
Testo completoWieninger, William A. "Nuclear deterrence : neither necessary nor sufficient for peace". Thesis, McGill University, 2004. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=85030.
Testo completoThird, this work is unique among studies of nuclear deterrence in its combined use of qualitative and quantitative methodology. The quantitative analysis uses ordered logit with the ICB data set on a variety of variables, discussed below, that do not lend themselves to standard regression techniques. The qualitative analysis examines whether or not nuclear weapons caused decision-makers on both sides of each crises to refrain from escalation due to fear of nuclear catastrophe. Finally, this study compares the effect of mutual nuclear weapons capability with the effects of democracy and interdependence on the level of violence in crises.
Ultimately, this thesis finds that nuclear proliferation is far less successful at preventing war among states in dyadic nuclear crises than is commonly believed. In only one of 17 crises (the Cuban Missile Crisis) is it clear that mutual possession of nuclear weapons caused leaders on both sides to eschew war. Relative to nuclear weapons possession, democracy and trade were found to be significantly more effective at limiting violence in crises and preventing war. Moreover, regimes suffering a lack of legitimacy in either the international community or among their neighbors had a significantly higher level of violence in crises.
Taken together, these findings have significant implications for public policy regarding nuclear proliferation, suggesting that the international community should work even more diligently to prevent nuclear proliferation, while working to strengthen democratic regimes, increase interstate trade, and reduce the international isolation of states such as North Korea and Iran.
Dawson, Ashley. "Addressing cyber warfare : bolstering deterrence through developing norms". Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45001.
Testo completoPalmer, Jess D., Mark L. Stebbins e Andrew M. Zacherl. "The gunfighter's dilemma: multiple adversary deterrence and coercion". Thesis, Monterey, California. Naval Postgraduate School, 2000, 2000. http://hdl.handle.net/10945/9213.
Testo completoWard, Christopher. "Applying deterrence strategy to agents of asymmetrical threats". Thesis, Monterey, California: Naval Postgraduate School, 2014. http://hdl.handle.net/10945/44028.
Testo completoCHDS State/Local
Deterrence was quickly dismissed as a possible counterterrorism (CT) strategy after 9/11. With temporal distance from the impact, however, the concept has been given a fresh, in-depth look. The encouraging results brought the policy back to national security strategy, but today deterrence of asymmetrical threats remains largely intractable. Use of deterrence strategy, beyond the common notion of Cold War deterrence, holds promise for sustainable U.S. CT policy. The implications for U.S. foreign policy of such strategic enactments are likely more satisfactory than those employed in the first decade of the war on terror. This thesis seeks to explore the possibility of tailored deterrence toward the threat from radical Islamic terrorists, by gauging what is known about the strategy against what is known of the adversary, and determining the most effective path forward.
Corbett, Andrew Scott. "The British Government, the public, and nuclear deterrence". Thesis, King's College London (University of London), 2017. https://kclpure.kcl.ac.uk/portal/en/theses/the-british-government-the-public-and-nuclear-deterrence(165940d4-2781-4df2-acf9-eac2e939495c).html.
Testo completoAboutajdine, Reda. "Deterrence and learning effects in insurance fraud audits". Thesis, Institut polytechnique de Paris, 2019. http://www.theses.fr/2019IPPAX016.
Testo completoInsurance fraud is a serious threat to insurance markets and is tackled through the design of credible and targeted auditing policies. This thesis studies the deterrence and learning mechanisms of insurance fraud audits, especially when service providers (car repairers, opticians, etc.) act as intermediaries between the insurer and the policyholders. The first chapter is an empirical assessment of the deterrence effects of auditing. It was conducted in collaboration with IBM France and PRO BTP, in the context of the deployment of the Solon counter-fraud solution. This assessment shows that incurred audits decrease an optician’s subsequent fraud. More specifically, the more credible the audit threat, the stronger this deterrence effect, emphasizing the importance of commitment in counter-fraud efforts. The second and third chapters examine a dynamic auditing problem where information plays a central role. The auditor interacts repeatedly with non-strategic service providers and can learn about their propensity to defraud from the auditing outcomes. The second chapter relies on a two-period model to show the existence of this learning effect, whose consequence is that it is optimal to audit more at the beginning of the relationship. The third chapter extends this model to an arbitrary or infinite number of periods, and shows that the further away the time horizon, the larger the optimal auditing efforts. Intuition stems from the fact that more auditing in the present, though costly, has a positive informational impact on all future periods. Finally, the fourth chapter combines the deterrence and learning mechanisms in the same dynamic reputation model, with strategic service providers. It reveals a reputation-based deterrence effect, where learning turns deterrence into an intertemporal threat. In other words, a service provider will be deterred more strongly in the present because of the risk of seeing his future reputation deteriorate if he gets caught defrauding
Arbuckle, Larry J. "The deterrence of nuclear terrorism through an attribution capability". Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://handle.dtic.mil/100.2/ADA483633.
Testo completoThesis Advisor(s): O'Connell, Robert. "June 2008." Description based on title screen as viewed on August 26, 2008. Includes bibliographical references (p. 45-47). Also available in print.
Tan, Li Huang Joyce. "An analysis of internal controls and procurement fraud deterrence". Thesis, Monterey, California: Naval Postgraduate School, 2013. http://hdl.handle.net/10945/39022.
Testo completoThe rise in globalization, coupled with the use of technology to accelerate approval, and payable cycles, the increase of outsourcing of goods and services, and the pressure to cut costs, have resulted in government organizations being more exposed to the risk of fraud in their procurement process. Hence, appropriate internal controls and fraud prevention strategies are necessary for deterring, detecting, and managing procurement fraud. The purpose of this research was to develop a guideline to help government organizations design an effective system of internal controls to deter fraud in public procurement processes and practices. This was done through a review, analysis, and discussion of 20 case studies of actual fraud incidents. In each case study, internal control weaknesses were identified and analyzed in terms of the fundamental principles that are associated with the five internal control components. The analysis revealed that the majority of the organizations in the case studies lacked three internal control components, namely control environment, control activities, and monitoring activities. Recommendations for improvements for each case study were presented by applying relevant internal controls into its procurement process to deter procurement fraud. The areas for further research were also provided.
Shames, Shauna Lani. "The Rational Non-Candidate: A Theory of Candidate Deterrence". Thesis, Harvard University, 2014. http://dissertations.umi.com/gsas.harvard:11438.
Testo completoGovernment
Estoch, Christopher. "Nuclear deterrence : insecurity and the proliferation of nuclear weapons". Honors in the Major Thesis, University of Central Florida, 2009. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1258.
Testo completoBachelors
Sciences
Political Science
Gunning, Edward G. "Germany and the future of nuclear deterrence in Europe". Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23687.
Testo completoGray, Jacqueline. "Psychological predictors of deterrence from travel due to terrorist action". Thesis, University of Kent, 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.411558.
Testo completoBonanno, Giacomo. "Topics in oligopoly : local equilibria, choice of product, entry deterrence". Thesis, London School of Economics and Political Science (University of London), 1985. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.267267.
Testo completoValenzuela, Joseph John. "Non-nuclear deterrence in U.S. strategic policy incentives and limitations /". Thesis, Monterey, Calif. : Naval Postgraduate School, 1992. http://handle.dtic.mil/100.2/ADA256700.
Testo completoHassan, Eslam. "Reducing Road Offending Behaviour Using an Integrated Deterrence-based Model". Thesis, Griffith University, 2022. http://hdl.handle.net/10072/418639.
Testo completoThesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Crim & Crim Justice
Arts, Education and Law
Full Text
Maume, Michael Owen. "Drug Use and Deterrence: A Test of Silberman's General Theory". W&M ScholarWorks, 1994. https://scholarworks.wm.edu/etd/1539625938.
Testo completoRasouli, Alireza. "Calibrating the Distance-Deterrence Function for the Perth Metropolitan Area". Thesis, Curtin University, 2018. http://hdl.handle.net/20.500.11937/59663.
Testo completoNavias, Martin Stephen. "The Sandys White Paper of 1957 and the move to the British new look : an analysis of nuclear weapons, conventional forces and strategic planning 1955-57". Thesis, King's College London (University of London), 1989. https://kclpure.kcl.ac.uk/portal/en/theses/the-sandys-white-paper-of-1957-and-the-move-to-the-british-new-look--an-analysis-of-nuclear-weapons-conventional-forces-and-strategic-planning-195557(bd864f27-997b-427d-8f3c-9f75e7934bbd).html.
Testo completoGrant, Rebecca. "Eisenhower and the evolution of strategic thinking 1953-58". Thesis, London School of Economics and Political Science (University of London), 1989. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.273966.
Testo completoSteele, Alaina Dawn. "A THEORETICAL INTEGRATION OF PROCEDURAL JUSTICE AND DETERRENCE: A TALE OF TWO THEORIES". OpenSIUC, 2020. https://opensiuc.lib.siu.edu/dissertations/1854.
Testo completoTuchman, Paula Schrier. "Weak but not meek an international society explanation of asymmetric deterrence /". access full-text, 1995. http://libweb.cityu.edu.hk/cgi-bin/ezdb/umi-r.pl?9601994.pdf.
Testo completo