Rozprawy doktorskie na temat „Security, International”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych rozpraw doktorskich naukowych na temat „Security, International”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Gruici, Simona. "International Security : Crossing Borders: International Migration and National Security". Thesis, Högskolan i Jönköping, Internationella Handelshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-15242.
Pełny tekst źródłaBragatti, Milton Carlos <1969>. "Theorizing South American International Security". Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2020. http://amsdottorato.unibo.it/9505/1/BRAGATTI%20THESIS%20UNIBO%20UNL%202020.pdf.
Pełny tekst źródłaKlykova, Ekaterina. "Security in International Relations: International cooperation to prevent non-states threats". Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-197216.
Pełny tekst źródłaFekete, Florian. "Civil-military relations : enhancing international security". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FFekete.pdf.
Pełny tekst źródłaThesis advisor(s): Donald Abenheim, Karen Guttieri. Includes bibliographical references (p. 65-70). Also available online.
Astrada, Marvin. "Conceptualizing American power and security in a post-9/11 security context : conflict, resistance, and global security, 2001-present". FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/1355.
Pełny tekst źródłaMaltman, Stuart. "Academic knowledge and political practice : security studies and Israeli security". Thesis, University of Aberdeen, 2016. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=230603.
Pełny tekst źródłaDi, Fresco Giovanni <1991>. "Cyber-Security: an international and comparative perspective". Master's Degree Thesis, Università Ca' Foscari Venezia, 2019. http://hdl.handle.net/10579/14704.
Pełny tekst źródłaAbass, Ademola. "Regional organisations and the development of collective security : beyond Chapter VIII of the UN Charter /". Oxford : Hart Pub, 2004. http://www.myilibrary.com/.
Pełny tekst źródłaCarr, Roberta B. "The greening of global security : the U.S. military and international environmental security /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA277754.
Pełny tekst źródłaAl, Darmaki Mohamed Juma. "A reflective study of how security conceptualises the international standardisation of security". Thesis, University of Portsmouth, 2015. https://researchportal.port.ac.uk/portal/en/theses/a-reflective-study-of-how-security-conceptualises-the-international-standardisation-of-security(7175f940-dede-4dda-8514-aa5248ebfb5e).html.
Pełny tekst źródłaCullen, Patrick Jerome. "Private security in international politics : deconstructing the state's monopoly of security governance". Thesis, London School of Economics and Political Science (University of London), 2009. http://etheses.lse.ac.uk/2744/.
Pełny tekst źródłaSage, Irene Elizabeth. "World food security and international organisations : the case of international grain reserves". Thesis, University of Kent, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320540.
Pełny tekst źródłaCurley, Melissa Gail. "Participation, empowerment and micro security : implications for the security debate in international relations". Thesis, Nottingham Trent University, 1999. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.302518.
Pełny tekst źródłaDal, Grande Giulia <1991>. "Narrative of a Puzzling Security: Discussing the Meaning of Security Under International Law". Master's Degree Thesis, Università Ca' Foscari Venezia, 2016. http://hdl.handle.net/10579/8695.
Pełny tekst źródłaAshby, Paul. "NAFTA-land security : the Mérida Initiative, transnational threats, and U.S. security projection in Mexico". Thesis, University of Kent, 2015. https://kar.kent.ac.uk/48367/.
Pełny tekst źródłaGillespie, Piers. "Security in a post-hegemonic international political economy /". Title page and contents only, 1992. http://web4.library.adelaide.edu.au/theses/09AR/09arg478.pdf.
Pełny tekst źródłaVon, Tigerstrom Barbara. "Human security and international law prospects and problems /". Oxford ; Portland, OR : Hart Pub, 2007. http://www.netlibrary.com/urlapi.asp?action=summary&v=1&bookid=227756.
Pełny tekst źródłaDescription based on print version record. Includes bibliographical references (p. [215]-247) and index.
Sibanda, Allan K. M. "International law legitimacy and the UN Security Council". Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/53188.
Pełny tekst źródłaMini Dissertation (LLM)--University of Pretoria, 2015.
Jurisprudence
LLM
Unrestricted
Alexander, James. "Promoting security imaginaries : an analysis of the market for everyday security solutions". Thesis, University of Manchester, 2014. https://www.research.manchester.ac.uk/portal/en/theses/promoting-security-imaginaries-an-analysis-of-the-market-for-everyday-security-solutions(1dc57433-40f6-40c1-bd13-56ab2347c35a).html.
Pełny tekst źródłaHengel, Gabriel Josiah. "21st century energy security tensions within the transatlantic security community". Thesis, University of Aberdeen, 2017. http://digitool.abdn.ac.uk:80/webclient/DeliveryManager?pid=235817.
Pełny tekst źródłaRicci, James Benjamin. "The State, International Society, and Infectious Diseases : Emerging security threats and international cooperation". Thesis, University of Kent, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.504663.
Pełny tekst źródłaPolydorou, Stavros. "The role of international juridical process in international security and civil-military relations". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Dec%5FPolydorou.pdf.
Pełny tekst źródłaThesis advisor(s): James Holmes Armstead, Thomas Bruneau. Includes bibliographical references (p. 129-134). Also available online.
Kersten, Larissa C. S. K. "Food security and Preferential Trade Agreements". Thesis, University of Essex, 2018. http://repository.essex.ac.uk/22837/.
Pełny tekst źródłaRafferty, Kirsten. "Alliances as institutions : persistence and disintegration in security cooperation". Thesis, McGill University, 2000. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=37818.
Pełny tekst źródłaWhen multidimensional threats exist, states facing a common threat ally, but they formalize and institutionalize the alliance so it can better manage multiple threats. Institutionalization encourages conditions conducive to persistence and evolution in two ways. First, by facilitating consultation and cooperation, it increases transparency, improves the performance of the alliance, and makes it costly for allies to renounce commitments or otherwise abandon one another. Second, institutions foster norms that in turn induce a form of attachment, or "loyalty" to the institution.
The strength of the norms embodied in the alliance and the allies' assessment of performance determine the behavior of institutionalized alliances. The alliance persists unaltered when performance is satisfactory, but norms are weak. It evolves, or expands its purpose and activities, when satisfactory performance combines with strong constitutive norms. Erosion occurs when strong norms encourage allies to salvage a poorly functioning alliance by curtailing its scope. Dissolution takes place when unsatisfactory performance and weak norms fail to prevent exit.
The most significant findings of this dissertation are that given institutionalization and norms, states do not exit an alliance immediately following a significant alteration in the strategic context or a decline in performance, but they try to preserve it. Only when these efforts fail will they curtail or dissolve the relationship. The dissertation tests the model by engaging in a comparative analysis of Cold War institutionalized alliances: the North Atlantic Treaty Organization, the Warsaw Pact, the Southeast Asia Treaty Organization, and the Australia, New Zealand, and U.S. alliance. Therefore, policy makers should not assume that evolving institutionalized alliances are adversarial or rush to respond with destabilizing counter alliances and, to minimize the possibility of conflict, allies engaging in evolution must clearly communicate their objectives to non-participants.
Royds, Mollie. "Human security and Canadian foreign policy, Canada's international security dilemma in the new millenium". Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp05/MQ64926.pdf.
Pełny tekst źródłaLusk, Adam. "Arguing Security: Rhetoric, Media Environment, and Threat Legitimation". Diss., Temple University Libraries, 2010. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/65998.
Pełny tekst źródłaPh.D.
In this dissertation, I study the process of gaining public consent about a security threat, or threat legitimation. Threats require legitimation because they are social facts and not objective truths or subjective perceptions. I argue rhetorical resources and strategies affect threat legitimation. Political actors deploy rhetorical resources and strategies in order to generate consent. The rhetorical resources connect together the rhetorical resources to construct a threat narrative used in the public debates. Moreover, I argue that the media environment influences how rhetorical strategies affect threat legitimation, acting as a conditional variable. Therefore I trace the threat narratives in six episodes in the history of United States foreign policy. Through process tracing, I highlight how rhetorical resources and strategies changed the public debates and level of consent about a threat, and how the media environment influenced these rhetorical strategies.
Temple University--Theses
Dhirathiti, Nopraenue Sajjarax. "Identity transformation and Japan's UN security policy : from the Gulf Crisis to human security". Thesis, University of Warwick, 2007. http://wrap.warwick.ac.uk/1141/.
Pełny tekst źródłaRandretsa, Thierry. "Bombardement aérien et norme d’immunité des non-combattants". Thesis, Lyon 3, 2013. http://www.theses.fr/2013LYO30071/document.
Pełny tekst źródłaImmunity of non-combatants is a secular and universal norm which has been severely affected by the advent of air power. The introduction of the third dimension in the war led to attack targets behind the front lines. In the context of total war, strategic bombing has elevated population and civilian objects as military targets in order to undermine the morale of the first and hasten the end of the conflict. The result was the massacre of millions of civilians for a military rather mixed record. These bombings contrast with the current practice whereby staffs strive to maximize the prevention of collateral damage. How to explain such a gap in the approach of aerial bombardment?The population has become the center of gravity of contemporary conflicts. Whether in humanitarian interventions or in counter-insurgency, it should be preserved and conquered in order to avoid mission failure. This approach is exacerbated by modern geography of the war taking place within the population. It is complicated by the moral asymetry of the non-state belligerents, who are not very distinguished from civilians. Furthermore, they operates near or within populated areas. Therefore, a paradigm of moderation applies to aerial bombing, sometimes pushing the command to go beyond the international humanitarian law. For much of the twentieth century, they were still subject to the paradigm of the strength of the traditional war
Nelson, Francesca Linnea. "International agricultural trade liberalization and food security in Jamaica". Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.320863.
Pełny tekst źródłaFrettingham, Edmund. "Security and the construction of 'religion' in international politics". Thesis, Aberystwyth University, 2009. http://hdl.handle.net/2160/bb4064ba-409d-4027-af17-7af296b909f4.
Pełny tekst źródłaGopalakrishnan, Shweta. "Mapping the elements of governance in international health security". Thesis, Kansas State University, 2011. http://hdl.handle.net/2097/9963.
Pełny tekst źródłaDepartment of Diagnostic Medicine/Pathobiology
Justin J. Kastner
Globalization has resulted in closer integration of economies and societies. It has contributed to the emergence of a new world order which involves a vast nexus of global and regional institutions, surrounded by transnational corporations, and non-governmental agencies seeking to influence the agenda and direction of international public policy. Health is a center point of geopolitics, security, trade, and foreign policy. Expansion in the territory of health and an increase in the number of health actors have profound implications for global health governance. Accordingly, the focus of the thesis is on endorsing the three core elements of governance proposed by Ackleson and Lapid, which comprises a system of (formal and informal) political coordination—across multiple levels from the local to the global—among public agencies and private corporations seeking to accomplish common goals and resolve problems through collective action. This shift in global governance has been prominent in the health sector with the formation of numerous public-private partnerships, coalitions, networks, and informal collaborations. In an effort to cope with the proliferation of players in the health sector, the World Health Organization has undergone gradual transformation in its governance framework. It is important to examine the evolution of the governance architecture of the WHO, as well as its effective application in the current global environment maintaining the organization’s legitimacy. This study tries to offer a comprehensive account of the WHO’s history, its successes and failures, as well as challenges and opportunities confronting the organization. Embracing public-private partnerships and formal-informal interactions does not simply fill governance gaps opened by globalization, but helps cluster in narrower areas of cooperation, where the strategic interests of multilateral organizations (e.g., the WHO), states, and transnational actors intersect. Global health problems require global solutions, and neither public nor private organizations can solve these issues on their own. The forms of governance based on the Acklesonian-Lapidian definition assist in accomplishing public health goals through shared decision-making and risk taking.
Smith, Roger. "Japan's international fisheries policy : the pursuit of food security". Thesis, University of Oxford, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.670139.
Pełny tekst źródłaMagsig, Bjørn-Oliver. "International water law and the quest for common security". Thesis, University of Dundee, 2013. https://discovery.dundee.ac.uk/en/studentTheses/c08da455-ef7b-4879-95f7-9674df88c3ca.
Pełny tekst źródłaTakaya, Yuri. "Space security and international law : verification and monitoring mechanisms". Paris 11, 2009. http://www.theses.fr/2009PA111020.
Pełny tekst źródłaNazarenko, Dmytro, i Danylo Vynohradov. "International cooperation in the cyber security field in Ukraine". Thesis, National Aviation University, 2021. https://er.nau.edu.ua/handle/NAU/51000.
Pełny tekst źródłaCybersecurity is a priority topic for all states and Ukraine is no exception. With the development of technology, the number of cybercrimes has increased, according to experts, over the past few years, the total losses from cyberattacks were $ 4 trillion. The priority issue is the creation of a solid security system for the transfer, processing and storage of data between countries of the world.
Кібербезпека є пріоритетною темою для всіх держав, і Україна не є винятком. З розвитком технологій кількість кіберзлочинів зросла, за оцінками експертів, за останні кілька років загальні збитки від кібератак склали 4 трлн дол. Пріоритетним питанням є створення надійної системи безпеки для передачі, обробки та зберігання даних між країнами світу.
Ito, Takako Carleton University Dissertation International Affairs. "International regime theory and security cooperation in East Asia". Ottawa, 1988.
Znajdź pełny tekst źródłaStieber, Sabine. "Non-traditional security in contemporary Chinese international relations thought". Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/42987/.
Pełny tekst źródłaBydoon, Maysa S. "The international responsibility of the UN for the internationally wrongful acts of the Security Council". Thesis, University of Leicester, 2005. http://hdl.handle.net/2381/31086.
Pełny tekst źródłaFebrica, Senia. "Explaining Indonesia's participation in maritime security cooperation". Thesis, University of Glasgow, 2014. http://theses.gla.ac.uk/5429/.
Pełny tekst źródłaMahdi, Samiullah. "Security and foreign policy of landlocked states". Thesis, University of Massachusetts Boston, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10160222.
Pełny tekst źródłaWealth and stability of the region have a direct influence on the foreign policy and security of landlocked states. Landlocked states residing in poor and unstable neighborhoods, consequently, experience instability and have more limited foreign policy options compared to those landlocked states which are located in the rich and stable regions of the world. Besides those, two other factors, nationalism and the nature of the export product, extensively influence foreign policy and security of some landlocked countries. However, they are exceptions to the rule. Wealth and stability of the neighborhood determine the direction and fate of landlocked countries foreign policies and security measures.
Turksen, Umut. "Protection seekers, states and the new security agenda". Thesis, University of the West of England, Bristol, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.490448.
Pełny tekst źródłaAllen, Keith W. "Future of the U.S.-Japan security alliance : foundation for a multilateral security regime in Asia? /". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FAllen.pdf.
Pełny tekst źródłaThesis advisor(s): Edward A. Olsen, Gaye Christoffersen. Includes bibliographical references (p. 109-119). Also available online.
Mukhamedov, Igor. "The domestic, regional and global security stakes in Kazakhstan". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FMukhamedov.pdf.
Pełny tekst źródłaThesis advisor(s): Donald Abenheim, Roger McDermott. Includes bibliographical references (p. 67-60). Also available online.
Trif, Dana Silvina [Verfasser]. "A New Hegemony: International Criminal Justice and the Politics of International Security / Dana Silvina Trif". Berlin : Freie Universität Berlin, 2017. http://d-nb.info/1131629345/34.
Pełny tekst źródłaTlhacoane, Tshepo. "Cyberattacks: The latest threat to international peace and security, and how international law can respond". Master's thesis, Faculty of Law, 2020. http://hdl.handle.net/11427/33053.
Pełny tekst źródłaTlhacoane, Tshiamo. "Cyberattacks: The latest threat to international peace and security, and how international law can respond". Master's thesis, Faculty of Law, 2021. http://hdl.handle.net/11427/33053.
Pełny tekst źródłaDukat, Robert J. "Japanese technology and U.S. national security". Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA246575.
Pełny tekst źródłaThesis Advisor(s): Olsen, Edward. Second Reader: Looney, Robert. "December 1990." Description based on title screen as viewed on March 30, 2010. DTIC Identifier(s): International Trade, Western Security (International), United States, Critical Technology, Asia-Pacific Region, Theses. Author(s) subject terms: Japanese Technologly, U.S. National Security, U.S.-Japan Relations, U.S. Foreign Policy, U.S. Economic Policy, U.S. Technological Policy, Japanese Economic Policy, Japanese Foreign Policy, Japanese Governmental Policy, U.S.-Japan Trade, U.S. Trade Problems, U.S. Defense Policy, U.S. Industrial Policy. Includes bibliographical references (p. 143-156). Also available in print.
Forteau, Mathias. "Droit de la securité collective et droit de la responsabilité internationale de l'état /". Paris : Pedone, 2006. http://www.gbv.de/dms/spk/sbb/recht/toc/523146124.pdf.
Pełny tekst źródłaRecca, Stephen P. "Nordic nonalignment/neutrality policies in the 1990s implications for U.S. security /". Monterey, California : Naval Postgraduate School, 1990. http://handle.dtic.mil/100.2/ADA242410.
Pełny tekst źródłaThesis Advisor: Kennedy-Minott, R. Second Reader: Breemer, Jan S. "December 1990." Description based on title screen as viewed on April 1, 2010. DTIC Identifier(s): Foreign policy, national security, Finland, Sweden, USSR, European community, conference on security and cooperation in Europe, Nordic Nonalignment, international law, neutrality, United States, post Cold War era, theses. Author(s) subject terms: Sweden, Finland, neutrality, nonalignment, EC, CSCE, security politics, economics, Nordic, Scandinavia, Soviet Union, United States, regional, foreign policy. Includes bibliographical references (p. 75-78). Also available in print.
Urban, Michael Crawford. "Imagined security : collective identification, trust, and the liberal peace". Thesis, University of Oxford, 2014. http://ora.ox.ac.uk/objects/uuid:92c67271-8953-46a8-b155-058fb5733881.
Pełny tekst źródła