Gotowa bibliografia na temat „Deterrence”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Spis treści
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Deterrence”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Deterrence"
Vuori, Juha A. "Deterring Things with Words: Deterrence as a Speech Act1". New Perspectives 24, nr 2 (wrzesień 2016): 23–50. http://dx.doi.org/10.1177/2336825x1602400203.
Pełny tekst źródłaElhag, E. A., A. H. El Nadi i A. A. Zaitoon. "Ovipositional Deterrence of Methanolic and Etherial Extracts of Five Plants to the Cowpea Bruchid, Callosobruchus maculatus (F.) (Coleoptera: Bruchidae)". Journal of Agricultural and Marine Sciences [JAMS] 4, nr 2 (1.06.1999): 27. http://dx.doi.org/10.24200/jams.vol4iss2pp27-33.
Pełny tekst źródłaKajla, Mayur K., Gregory A. Barrett-Wilt i Susan M. Paskewitz. "Bacteria: A novel source for potent mosquito feeding-deterrents". Science Advances 5, nr 1 (styczeń 2019): eaau6141. http://dx.doi.org/10.1126/sciadv.aau6141.
Pełny tekst źródłaTurunen, Maija, i Martti Kari. "Cumulative Cyber Deterrence". International Conference on Cyber Warfare and Security 17, nr 1 (2.03.2022): 433–39. http://dx.doi.org/10.34190/iccws.17.1.55.
Pełny tekst źródłaGuo, Zhenhua, i John C. Snyder. "MITE DETERRENCE OF TOMATO GENOTYPES IS CLOSELY RELATED TO LEAF SURFACE CHEMISTRY". HortScience 27, nr 6 (czerwiec 1992): 646a—646. http://dx.doi.org/10.21273/hortsci.27.6.646a.
Pełny tekst źródłaHirtenlehner, Helmut, i Per-Olof H. Wikström. "Experience or deterrence? Revisiting an old but neglected issue". European Journal of Criminology 14, nr 4 (12.10.2016): 485–502. http://dx.doi.org/10.1177/1477370816671750.
Pełny tekst źródłaPark, MiRang. "A preliminary Study on the 1:1 Electronic Supervision System and Crime Deterrence of Sex Offenders". Korean Association of Public Safety and Criminal Justice 31, nr 3 (30.09.2022): 147–92. http://dx.doi.org/10.21181/kjpc.2022.31.3.147.
Pełny tekst źródłaBanasik, Mirosław. "Znaczenie odstraszania strategicznego dla bezpieczeństwa międzynarodowego". Przegląd Wschodnioeuropejski 12, nr 1 (24.09.2021): 165–78. http://dx.doi.org/10.31648/pw.6467.
Pełny tekst źródłaDorrian, Jillian, i Kevin Purse. "Deterrence and Enforcement of Occupational Health and Safety Law". International Journal of Comparative Labour Law and Industrial Relations 27, Issue 1 (1.03.2011): 23–39. http://dx.doi.org/10.54648/ijcl2011003.
Pełny tekst źródłaTalbot, Brent. "Getting Deterrence Right: The Case for Stratified Deterrence". Journal of Strategic Security 13, nr 1 (kwiecień 2020): 26–40. http://dx.doi.org/10.5038/1944-0472.13.1.1748.
Pełny tekst źródłaRozprawy doktorskie na temat "Deterrence"
Baade, Hans Petter. "Acquiring Deterrence : Defence Procurements’ Role in Deterrence". Thesis, Försvarshögskolan, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7457.
Pełny tekst źródłaRekasius, Mindaugas. "Unconventional deterrence strategy". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FRekasius.pdf.
Pełny tekst źródłaKolliniatis, Vasilios A. "On entry deterrence". Thesis, University of Essex, 1992. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.302813.
Pełny tekst źródłaHemmer, Patrick T. "DETERRENCE AND CYBER-WEAPONS". Monterey, California. Naval Postgraduate School, 2013. http://hdl.handle.net/10945/32836.
Pełny tekst źródłaRapid technological advancements and societal inclusion of these technologies have expanded civil and defense capabilities but have also created significant vulnerabilities. Cyber-weapons have the potential to affect interaction between states by exploiting this vulnerability. To better understand the mechanics of how cyber-weapons affect state relations this research applies a common framework to explore the attributes of traditional weaponsconventional, nuclear, and RMAand how they typically influence this behavior. After proposing selected factors that influence the effectiveness of a cyber-attack, the research examines the cyber-attacks in 2007 on Estonia and 2008 on Georgia in order to refine and provide nuanced analysis on the role of the proposed causal factors. The proposed factors are government involvement, level of attack sophistication, and the degree to which the state is dependent upon digitally connected technology. The research indicates that the role of the state is one of the most significant factors in influencing the effectiveness of a cyber-attack and highlights the role that plausible deniability plays in this relationship. Some initial policy recommendations are made based on the finding that the use of cyber-weapons as a deterrent is still ill-defined and that the focus should be on decreasing state vulnerability to these attacks.
Park, Jusik. "Rationality in nuclear deterrence /". The Ohio State University, 1991. http://rave.ohiolink.edu/etdc/view?acc_num=osu148775905515793.
Pełny tekst źródłaMoore, Ryan J. "Prospects for cyber deterrence". Thesis, Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/theses/2008/Dec/08Dec%5FMoore.pdf.
Pełny tekst źródłaThesis Advisor(s): Arquilla, John J. ; Denning, Dorothy E. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 77-83). Also available in print.
Rasmussen, David C. "Credible nuclear deterrence for Japan". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA378257.
Pełny tekst źródłaThesis advisor(s): Wirtz, James J. ; Olsen, Edward A. "March 2000." Includes bibliographical references (p. 73-80). Also available in print.
KODERA, Toshiki. "Software Compatibility Alters Entry Deterrence". 名古屋大学大学院経済学研究科, 2007. http://hdl.handle.net/2237/8596.
Pełny tekst źródłaStephenson, John D. "Countering terrorism engagement, development, deterrence". Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5019.
Pełny tekst źródłaThe war on terrorism has not reduced the threat from terrorism. Terrorism as a tactic cannot be defeated. States policies cannot rely on force alone in an attempt to defeat the use of a tactic. States need to use more effective counterterrorism policy options than coercion and force to deter groups from using terrorism. Groups choose to use terrorism as a tactic as a means to bring attention to be engaged and their grievances addressed. Engaging groups that use terrorism to address and resolve their grievances can prevent the cycle of violence of a terrorism campaign and delegitimize their use of force to resolve grievances. Economic development of developing nations can produce strong institutions necessary for minority groups to resolve grievances and build internally balanced market economies in developing nations that allow them to fully participate in economic globalization and reap the security benefits of globalization.
Kolbas, Patrick Joseph. "Beyond Armageddon : deterrence with less". Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28016.
Pełny tekst źródłaKsiążki na temat "Deterrence"
Lowther, Adam B., red. Deterrence. New York: Palgrave Macmillan US, 2012. http://dx.doi.org/10.1057/9781137289810.
Pełny tekst źródłaFilippidou, Anastasia, red. Deterrence. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3.
Pełny tekst źródłaAdhikari, Shekhar. Deterrence. Allahabad: Dept. of Defence and Strategic Studies, University of Allahabad, 2002.
Znajdź pełny tekst źródłaRamsbotham, Oliver, i Hugh Miall. Beyond Deterrence. London: Palgrave Macmillan UK, 1991. http://dx.doi.org/10.1007/978-1-349-21720-5.
Pełny tekst źródłaWare, Roger. Entry deterrence. Kingston, Ont: Institute for Economic Research, Queen's University, 1991.
Znajdź pełny tekst źródłaGeorge, Levinger, red. Beyond deterrence. New York: Plenum, 1987.
Znajdź pełny tekst źródłaWare, Roger. Entry deterrence. Kingston, Ont: Institute for Economic Research, Queen's University, 1991.
Znajdź pełny tekst źródłaQuackenbush, Stephen L. Understanding General Deterrence. New York: Palgrave Macmillan US, 2011. http://dx.doi.org/10.1057/9780230370791.
Pełny tekst źródłaBobbitt, Philip. Democracy and Deterrence. London: Palgrave Macmillan UK, 1988. http://dx.doi.org/10.1007/978-1-349-18991-5.
Pełny tekst źródła1944-, Stern Paul C., National Research Council (U.S.). Committee on Contributions of Behavioral and Social Science to the Prevention of Nuclear War. i National Research Council (U.S.). Commission on Behavioral and Social Sciences and Education., red. Perspectives on deterrence. New York: Oxford University Press, 1989.
Znajdź pełny tekst źródłaCzęści książek na temat "Deterrence"
Loughran, Thomas A., Ray Paternoster i Douglas B. Weiss. "Deterrence". W The Handbook of Criminological Theory, 50–74. Hoboken, NJ: John Wiley & Sons, Inc, 2015. http://dx.doi.org/10.1002/9781118512449.ch4.
Pełny tekst źródłaRitchie, Nick. "Deterrence". W A Nuclear Weapons-Free World?, 51–73. London: Palgrave Macmillan UK, 2012. http://dx.doi.org/10.1057/9781137284099_5.
Pełny tekst źródłaCanton, Rob. "Deterrence". W Why Punish?, 83–101. London: Macmillan Education UK, 2017. http://dx.doi.org/10.1057/978-1-137-44904-7_5.
Pełny tekst źródłaApel, Robert, i Daniel S. Nagin. "Deterrence". W Encyclopedia of Criminology and Criminal Justice, 998–1005. New York, NY: Springer New York, 2014. http://dx.doi.org/10.1007/978-1-4614-5690-2_606.
Pełny tekst źródłaFilippidou, Anastasia. "Deterrence: Concepts and Approaches for Current and Emerging Threats". W Deterrence, 1–18. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_1.
Pełny tekst źródłaAnastasopoulos, Charis. "Linking the Deterrence Concept to Migration". W Deterrence, 157–76. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_10.
Pełny tekst źródłaKennedy, Greg. "Anglo-American Strategic Relations, Economic Warfare and the Deterrence of Japan, 1937–1942: Success or Failure?" W Deterrence, 177–91. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_11.
Pełny tekst źródłaWilkinson, Edith. "Resilience and Deterrence: Exploring Correspondence Between the Concepts". W Deterrence, 19–33. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_2.
Pełny tekst źródłaAshraf, Afzal. "Deterrence and Diplomacy". W Deterrence, 35–56. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_3.
Pełny tekst źródłaSteff, Reuben. "Nuclear Deterrence in a New Age of Disruptive Technologies and Great Power Competition". W Deterrence, 57–75. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-29367-3_4.
Pełny tekst źródłaStreszczenia konferencji na temat "Deterrence"
Libicki, Martin C. "Obnoxious Deterrence". W 2022 14th International Conference on Cyber Conflict: Keep Moving! (CyCon). IEEE, 2022. http://dx.doi.org/10.23919/cycon55549.2022.9811024.
Pełny tekst źródłaBrantly, Aaron F. "The cyber deterrence problem". W 2018 10th International Conference on Cyber Conflict (CyCon). IEEE, 2018. http://dx.doi.org/10.23919/cycon.2018.8405009.
Pełny tekst źródłaJaeki Lee. "Union competition and entry deterrence". W 2007 International Forum on Strategic Technology. IEEE, 2007. http://dx.doi.org/10.1109/ifost.2007.4798581.
Pełny tekst źródłaDobson, Andrew, EJ Milner-Gulland, Colin Beale, Harriet Ibbett i Aidan Keane. "Detecting deterrence from patrol data". W 5th European Congress of Conservation Biology. Jyväskylä: Jyvaskyla University Open Science Centre, 2018. http://dx.doi.org/10.17011/conference/eccb2018/107778.
Pełny tekst źródłaFuller, G. H. "Tactical Deterrence - "Why" - "How" - "What"". W Warship 90 - The Future for Surface Warships. RINA, 1990. http://dx.doi.org/10.3940/rina.warship.1990.22.
Pełny tekst źródłaAtkinson, Simon Reay, David Walker, Kevin Beaulne i Liaquat Hossain. "Cyber -- Transparencies, Assurance and Deterrence". W 2012 International Conference on Cyber Security (CyberSecurity). IEEE, 2012. http://dx.doi.org/10.1109/cybersecurity.2012.22.
Pełny tekst źródłaSoper, Braden C. "A Cyber-Nuclear Deterrence Game". W 2019 57th Annual Allerton Conference on Communication, Control, and Computing (Allerton). IEEE, 2019. http://dx.doi.org/10.1109/allerton.2019.8919910.
Pełny tekst źródłaReddie, Andrew. "Tracing House: Wargaming Cyber Deterrence." W Proposed for presentation at the 89th MORS Symposium held June 21-25, 2021. US DOE, 2021. http://dx.doi.org/10.2172/1871419.
Pełny tekst źródłaFeigenbaum, Joan, James A. Hendler, Aaron D. Jaggard, Daniel J. Weitzner i Rebecca N. Wright. "Accountability and deterrence in online life". W the 3rd International Web Science Conference. New York, New York, USA: ACM Press, 2011. http://dx.doi.org/10.1145/2527031.2527043.
Pełny tekst źródłaWanic, Elizabeth, i Neil Rowe. "Assessing Deterrence Optinos for Cyber Weapons". W 2018 International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, 2018. http://dx.doi.org/10.1109/csci46756.2018.00011.
Pełny tekst źródłaRaporty organizacyjne na temat "Deterrence"
Harbaugh, William, Naci Mocan i Michael Visser. Theft and Deterrence. Cambridge, MA: National Bureau of Economic Research, maj 2011. http://dx.doi.org/10.3386/w17059.
Pełny tekst źródłaMartz, Joseph. Capability Based Deterrence. Office of Scientific and Technical Information (OSTI), listopad 2020. http://dx.doi.org/10.2172/1716770.
Pełny tekst źródłaJacobson, E. Towards Integrated Strategic Deterrence - 3rd Annual Cross-Domain Deterrence Seminar, 2016. Office of Scientific and Technical Information (OSTI), kwiecień 2017. http://dx.doi.org/10.2172/1635782.
Pełny tekst źródłaGoychayev, Rustam, Geoffrey A. Carr, Rachel A. Weise, David A. Donnelly, Samuel L. Clements, Jacob M. Benz, Kabrena E. Rodda, Rachel A. Bartholomew, Archibald D. McKinnon i Richard B. Andres. Cyber Deterrence and Stability. Office of Scientific and Technical Information (OSTI), wrzesień 2017. http://dx.doi.org/10.2172/1405058.
Pełny tekst źródłaValle Jr, Vicente. Chaos, Complexity and Deterrence. Fort Belvoir, VA: Defense Technical Information Center, kwiecień 2000. http://dx.doi.org/10.21236/ada432927.
Pełny tekst źródłaSinnis, Constantine, Mark Benjamin Chadwick, Kimberly Carole New Scott i Stephen Val Milton. LANSCE 21st Century Deterrence. Office of Scientific and Technical Information (OSTI), kwiecień 2020. http://dx.doi.org/10.2172/1608676.
Pełny tekst źródłaOtterson, Kirk Grant. Nuclear Weapons Deterrence Concepts. Office of Scientific and Technical Information (OSTI), styczeń 2020. http://dx.doi.org/10.2172/1615645.
Pełny tekst źródłaScarlett, Harry Alan. Nuclear Weapon Deterrence Principles. Office of Scientific and Technical Information (OSTI), lipiec 2020. http://dx.doi.org/10.2172/1638615.
Pełny tekst źródłaHayes, Richard E., i Gary Wheatley. Information Warfare and Deterrence. Fort Belvoir, VA: Defense Technical Information Center, październik 1996. http://dx.doi.org/10.21236/ada385748.
Pełny tekst źródłaErickson, S. A. Jr. A theory of deterrence. Office of Scientific and Technical Information (OSTI), marzec 1991. http://dx.doi.org/10.2172/10127443.
Pełny tekst źródła