Дисертації з теми "Security interdependence"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-46 дисертацій для дослідження на тему "Security interdependence".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Robledo, Marcos P. "Democratization, economic interdependence, and security cooperation between Argentina, Brazil, and Chile." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA393092.
Повний текст джерелаThesis advisors, Michael Barletta, Jeanne K. Giraldo. Includes bibliographical references (p. 165-191). Also available online.
Finocchio, Chris James. "Latin American regional cooperative security : civil-military relations and economic interdependence." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FFinocchio.pdf.
Повний текст джерелаThesis advisor(s): Jeanne K. Giraldo, Harold A. Trinkunas. Includes bibliographical references (p. 67-71). Also available online.
Gerasimenko, Olga. "Security Rivalry between the US and China under Conditions of Economic Interdependence." Ohio University / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=ohiou1366373816.
Повний текст джерелаBenovič, Jozef. "Politické aspekty nemecko ruských vzťahov v ére Putina a ich hlavné problémy." Master's thesis, Vysoká škola ekonomická v Praze, 2013. http://www.nusl.cz/ntk/nusl-192493.
Повний текст джерелаSung, Ki-Young. "Security crisis and economic interdependence : a case study of inter-Korean trade (2002-2006)." Thesis, University of Warwick, 2010. http://wrap.warwick.ac.uk/55779/.
Повний текст джерелаMarwaha, Vivan. "Interdependence Amid Conflict: The Role of Domestic Actors in Solving the India-Pakistan Trade-Security Puzzle." Scholarship @ Claremont, 2017. http://scholarship.claremont.edu/cmc_theses/1593.
Повний текст джерелаCallen, David J. "The Diversification of (In)Security in 21st Century UAE and Qatar: Cultivating Capital, Interdependence and Uncertainty." Diss., The University of Arizona, 2015. http://hdl.handle.net/10150/347189.
Повний текст джерелаSafdar, Naveed. "Internal security threats to Pakistan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FSafdar.pdf.
Повний текст джерелаThesis advisor(s): Robert E. Looney, Feroz Hassan Khan. Includes bibliographical references. Also available online.
Fritz, Alarik M. "How superpowers go to war and why other states help them the impact of asymmetric security interdependence on war coalition formation /." Connect to Electronic Thesis (ProQuest) Connect to Electronic Thesis (CONTENTdm), 2008. http://worldcat.org/oclc/453941583/viewonline.
Повний текст джерелаBell, Patrick M. "Development of Local Homeland Security Networks in the State of Florida: A Social Network Analysis Approach." FIU Digital Commons, 2012. http://digitalcommons.fiu.edu/etd/574.
Повний текст джерелаIzosimova, Svetlana. "Understanding the Energy Interdependence Between the EU and Russia: Case of the Baltic Sea Region." Thesis, Linköpings universitet, Institutionen för ekonomisk och industriell utveckling, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-124283.
Повний текст джерелаFIGUEIREDO, MARCOS VINICIUS MESQUITA ANTUNES DE. "HUMAN RIGHTS, MORAL INTERDEPENDENCE AND THE REDEFINITION OF THE USE OF FORCE BY UNITED NATIONS SECURITY COUNCIL: THE CASE OF UNPROFOR." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2006. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=9876@1.
Повний текст джерелаEste trabalho analisa as transformações normativas quanto à utilização da força pelo Conselho de Segurança (CS) das Nações Unidas e a maneira como United Nations Protection Force expressa essas mudanças. A expansão do regime de direitos humanos da ONU, combinada com o aumento da interdependência moral entre os Estados-membros dessa organização são a tônica das mudanças que desafiam os conceitos clássicos de segurança coletiva e soberania nacional. O primeiro, em razão da criação de instituições permanentes onde se debate o cumprimento desse regime, transformando, por isso, as expectativas dos Estados quanto ao comportamento dos demais. O segundo, por viabilizar o acesso às informações sobre possíveis violações aos direitos humanos. A forma como a ONU atuou no processo de desintegração da antiga Iugoslávia indica a ocorrência dessas transformações. A operação nesse país foi articulada de modo a garantir a integridade dos habitantes dessa região. As principais resoluções do CS relativas a esse conflito sinalizaram para um vínculo entre direitos humanos e o conceito de ameaça à paz previsto no art. 39 da Carta da ONU. Entretanto, os Estados membros não se demonstraram dispostos a arcar com os custos de uma operação de segurança que assegurasse o respeito a esses direitos. Isso indica que as normas favoráveis à intervenção humanitária coexistem com limitações baseadas nas políticas nacionais dos Estados. Porém, ao autorizar o uso da força para proteger grupos de seres humanos o CS adotou uma interpretação pós-westfaliana do sistema de segurança internacional da ONU, redefinindo o conceito clássico de soberania nacional.
The paper analyzes normative transformations in the use of force by the Security Council of the United Nations and the way in which the UNPROFOR (United Nations Protection Force) expresses these changes. The growing widespread of the UN human rights regime combined with the increase on levels of moral interdependence among UN member states are at the center of transformations that challenge classical concepts of collective security and sovereignty. First, because of the creation of permanent institutions in which the fulfillment of this regime is debated, since they change State expectations regarding the behavior of other States. Second, for making the access of information concerning human rights violations possible. The way in which the UN acted in the process of disintegration of the former Yugoslavia indicates the occurrence of such transformations. The operation was planned to guarantee the integrity of the people in the region. The main resolutions of the SC regarding the conflict signaled a connection between human rights and the concept of threat to peace in accordance to the art. 39 of the UN Charter. Nevertheless, the member states did not seem inclined to undertake the costs of security operations that would guarantee the respect for such rights. That indicates that the rules favoring humanitarian intervention coexist with limitations derived from the domestic realm of politics. Nonetheless by authorizing the use of force for the protection of human beings, the SC adopted a post- Westphalian interpretation of the UN international security system, redefining the classical concept of national sovereignty.
Tanrikulu, Faik [Verfasser]. "The European Union’s Energy Security and Turkey’s Role in the Southern Gas Corridor : Interdependence on the Natural Gas Pipeline between Turkey and EU / Faik Tanrikulu." Frankfurt a.M. : Peter Lang GmbH, Internationaler Verlag der Wissenschaften, 2018. http://d-nb.info/1173660909/34.
Повний текст джерелаKalkan, Övgu. "Reading the Common Foreign and Security Policy of the European Union in terms of the issue of Terrorism : An analysis on the evolution of the CFSP of the EU under the issue of Terrorism." Thesis, Linköping University, Department of Management and Economics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2707.
Повний текст джерелаIn the post Cold-War era, world politics was transforming itself through its emerging complex issues such as terrorism and influential and interdependent actors such as the European Union. In this new era, the European Union was developing its Common Foreign and Security Policy pillar both to present a coherent and unified EU policy and to prove its political potent in order to become an influential actor on world politics. On the other side, security environment was also transforming its content through emerging actors and issues. As one of the most prominent actors of the world politics, the EU was influenced by the transformation of security environment, whose economic ‘soft power’ proved necessary but insufficient for being a global power in this emerging security environment. Insufficiency of economic power in solving security problems became more visible with the terrorist attacks of September 11 and March 11 which proved the seriousness of a globalized security threat posed by terrorism. After the events took place, the EU’s security approach and threat assessment have been transformed in which the issue of terrorism occupied more profound place by ‘securitization’ of its context. The Common Foreign and Security Policy of the EU began to play more prominent role on EU policies together with incorporating the efforts on the issue of fight against terrorism both to EU’s external relations and to its security dimension. Therefore, in this study, the author analyzes the research question of the development of the CFSP of the EU together with the impact of the issue of terrorism in this transforming security environment. Since examination of such a complex security issue necessitates multidimensional approach, then liberal and realist theories are used as complementary analytical instruments guiding the theoretical framework of the study.
Fráně, Luděk. "Potenciál Evropské politiky sousedství pro energetickou bezpečnost EU." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-76475.
Повний текст джерелаSofic, Elvira. "The Role of the EU in the Israeli-Palestinian Conflict : A Qualitative Case Study on the Role of the EU in the Israeli-Palestinian Conflict approached through realism, liberalism and constructivism." Thesis, Linnéuniversitetet, Institutionen för statsvetenskap (ST), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-90944.
Повний текст джерелаPillai, Anil Ph D. "Retreating from the Nuclear Path Testing the theory of Prudential Realism to explain Nuclear Forbearance." University of Cincinnati / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1342103267.
Повний текст джерелаKarataş, Harun Fatih [Verfasser], Dogan [Akademischer Betreuer] Kesdogan, and Bernd [Akademischer Betreuer] Heinrich. "Interdependent Security and Compliance in Service Selection / Harun Fatih Karataş ; Dogan Kesdogan, Bernd Heinrich." Regensburg : Universitätsbibliothek Regensburg, 2016. http://d-nb.info/1118846338/34.
Повний текст джерелаKarataş, Harun Fatih Verfasser], Dogan [Akademischer Betreuer] Kesdogan, and Bernd [Akademischer Betreuer] [Heinrich. "Interdependent Security and Compliance in Service Selection / Harun Fatih Karataş ; Dogan Kesdogan, Bernd Heinrich." Regensburg : Universitätsbibliothek Regensburg, 2016. http://d-nb.info/1118846338/34.
Повний текст джерелаLi, Xin. "Enhancing network robustness using software-defined networking." Diss., Kansas State University, 2017. http://hdl.handle.net/2097/38236.
Повний текст джерелаDepartment of Electrical and Computer Engineering
Don M. Gruenbacher
Caterina M. Scoglio
As today's networks are no longer individual networks, networks are less robust towards failures and attacks. For example, computer networks and power networks are interdependent. Computer networks provide smart control for power networks, while power networks provide power supply. Localized network failures and attacks are amplified and exacerbated back and forth between two networks due to their interdependencies. This dissertation focuses on finding solutions to enhance network robustness. Software-defined networking provides a programmable architecture, which can dynamically adapt to any changes and can reduce the complexities of network traffic management. This architecture brings opportunities to enhance network robustness, for example, adapting to network changes, routing traffic bypassing malfunction devices, dropping malicious flows, etc. However, as SDN is rapidly proceeding from vision to reality, the SDN architecture itself might be exposed to some robustness threats. Especially, the SDN control plane is tremendously attractive to attackers, since it is the "brain" of entire networks. Thus, researching on network robustness helps protect network from a destructive disaster. In this dissertation, we first build a novel, realistic interdependent network framework to model cyber-physical networks. We allocate dependency links under a limited budget and evaluate network robustness. We further revise a network flow algorithm and find solutions to obtain a basic robust network structure. Extensive simulations on random networks and real networks show that our deployment method produces topologies that are more robust than the ones obtained by other deployment techniques. Second, we tackle middlebox chain problems using SDN. In computer networks, applications require traffic to sequence through multiple types of middleboxes to accomplish network functionality. Middlebox policies, numerous applications' requirements, and resource allocations complicate network management. Furthermore, middlebox failures can affect network robustness. We formulate a mixed-integer linear programming problem to achieve a network load-balancing objective in the context of middlebox policy chain routing. Our global routing approach manages network resources efficiently by simplifying candidate-path selections, balancing the entire network and using the simulated annealing algorithm. Moreover, in case of middlebox failures, we design a fast rerouting mechanism by exploiting the remaining link and middlebox resources locally. We implement proposed routing approaches on a Mininet testbed and evaluate experiments' scalability, assessing the effectiveness of the approaches. Third, we build an adversary model to describe in detail how to launch distributed denial of service (DDoS) attacks to overwhelm the SDN controller. Then we discuss possible defense mechanisms to protect the controller from DDoS attacks. We implement a successful DDoS attack and our defense mechanism on the Mininet testbed to demonstrate its feasibility in the real world. In summary, we vertically dive into enhancing network robustness by constructing a topological framework, making routing decisions, and protecting the SDN controller.
Duenas-Osorio, Leonardo Augusto. "Interdependent Response of Networked Systems to Natural Hazards and Intentional Disruptions." Diss., Georgia Institute of Technology, 2005. http://hdl.handle.net/1853/7546.
Повний текст джерелаKedidir, Mansour. "Le gaz naturel algérien dans la sécurité énergétique de l'Union Européenne : un enjeu géopolitique." Thesis, Lyon 2, 2015. http://www.theses.fr/2015LYO20033.
Повний текст джерелаAfter the National Independence (1962), Algeria was dealing with the difficulties of developing its gas potential. In order to escape the French hegemony of its hydrocarbons resources, Algeria decided to place and invest its gas resources in the US market. This economic option was motivated by the urgent need to develop the LNG industry and to maximize incomes in order to improve the national economic development. After the failure of this economic option, Algeria got back to the European market. Since then, EU – Algeria economic relations have been intensified. Nowadays, Algeria is considered as a strategic EU partner, in the field of energy resources. Does this situation enable Algeria to supply the European economy with gas for a long time? Given the international constraints related to the management of the energy sector, competition from both Russia and Qatar and the new discovered gas reserves in Eastern Mediterranean basin, does the Algerian gas and its importance in EU energy security represent a geopolitical issue?This thesis aims to examin the pertinence of this issue. It seeks to respond to questions related to the various policies initiated by Algeria for more than half a century, to Algeria’s strategy to maintain its position as the third strategic gas supplier of Europe, and to the European energy dependence and its geopolitical perceptions towards its suppliers (especially Russia and the South side of Mediterranean basin producers)
Teixeira, Anderson Matos. "Cooperação no desenvolvimento de aeronaves militares a partir das estruturas regionais : lições do F-104 e Tornado para a Unasul." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2016. http://hdl.handle.net/10183/149522.
Повний текст джерелаNo cenário internacional do pós Segunda Guerra Mundial, surgiram vários esforços de cooperação e integração regional em todo o mundo. Alguns tiveram maior avanço na integração, como a União Europeia. Mas o ponto é que, os esforços que mais avançaram possuíam uma agenda de segurança e cooperação em defesa, além do econômico. Esta pesquisa tem como objetivo, compreender como os arranjos cooperativos em material aeronáutico de defesa podem influenciar na integração regional e extrair inferências aplicáveis à Unasul. Logo, partimos da pergunta de, como diferentes modelos de cooperação no desenvolvimento de aeronaves militares impactam no processo de integração regional? Pensamos que a cooperação no desenvolvimento de material aeronáutico militar, a partir da criação de uma cadeia produtiva regionalizada tem a capacidade de contribuir para uma melhor relação entre os membros da UNASUL, superando os entraves e visões distorcidas que dificultam o processo de integração regional. Para isso, a pesquisa se estruturará entorno da Política Comparada, apoiado por outras correntes teóricas das Relações Internacionais. No caso, iremos analisar as lições que podem ser aprendidas com o desenvolvimento dos programas europeus, com os caças F-104 e Panavia Tornado. Está tese se estruturará em quatro capítulos: inicialmente sobre a questão da cooperação em defesa, tanto pelo aspecto conceitual e teórico, como pelo viés pratico, com o debate sobre regionalismo. Seguindo, na parte dois, com uma analise da indústria aeronáutica e do seu reflexo como poder no sistema internacional. Na parte três, analiso os programas F-104 e Tornado e como contribuíram no processo de integração na Europa. Finalizando, na parte quatro, debato como as lições dos programas analisados no capitulo 3, podem ser aplicados no caso da Unasul, ressaltando a interferência de potencias externas e as visões sobre cooperação entre os membros do bloco.
Post international scenario Second World War, there were several efforts of regional cooperation and integration in the world. Some had major advance in integration, such as the European Union. But the point is that it advanced more efforts had a security agenda and cooperation in defense, and economic. This research aims to understand how cooperative arrangements in defense aircraft equipment can influence regional integration and draw inferences applicable to Unasur. So we start with the question of how different models of cooperation in the development of military aircraft impact on the regional integration process? We believe that cooperation in the development of military aircraft equipment, from the creation of a regionalized supply chain has the ability to contribute to a better relationship between the members of UNASUR, overcoming barriers and distorted views that hinder the process of regional integration. For this, the research will be structured around the Comparative Politics, supported by other current theories of International Relations. In this case, we will examine the lessons that can be learned from the development of European programs, with the F-104 and Panavia Tornado fighters. You thesis will be structured in four chapters: first on the issue of defense cooperation, both the conceptual and theoretical aspect, as the practical bias, with the debate on regionalism. Following, in part two, with an analysis of the aviation industry and its reflection as power in the international system. In part three, we analyze the F-104 programs and Tornado and contributed to the process of integration in Europe. Finally, in part four, I discuss how the lessons of the programs analyzed in Chapter 3, can be applied in the case of UNASUR, emphasizing the interference of external powers and views on cooperation between members of the bloc.
Isiugo, Uche C. "Feats and Failures of Corporate Credit Risk, Stock Returns, and the Interdependencies of Sovereign Credit Risk." ScholarWorks@UNO, 2016. http://scholarworks.uno.edu/td/2221.
Повний текст джерелаDepigny, Marine. "Terrorisme international et mesures de sûreté : analyse économique du comportement du voyageur sur le réseau de transport aérien mondial." Thesis, Lyon 2, 2011. http://www.theses.fr/2011LYO22020/document.
Повний текст джерелаIn our dissertation, we question the impact of both international terrorism and security measures on the behavior of the users of the global air transportation network. Using an econometric model, we analyze a new database, AirNetTerror, which contains data on all international passenger flows toward the U.S. from 1990 to 2006 as well as the events of international terrorism by country for the same period. The relevance of our research is twofold. On the one hand, our investigation regarding air travelers’ behavior and their possibilities of modifying their itinerary in light of international terrorism has – so far as we know – never been studied. On the other hand, as we analyze passenger flows from the perspective of the network, we propose a dynamic representation of the impact of travelers’ behavior changes related to terrorist threats and security measures. In particular, taking into account the interdependent security that rules the global air transport network, allows us to question the existence of failures in security measures. Our results underline a significant impact of both international terrorist events and security measures. Furthermore, we locally observe itinerary modifications of travelers that are linked to the previous phenomena. Thus, the combined effect of terrorist threats and security measures seems to lead to equilibrium breaks – that are limited but real – in passenger flows of the global air network. Our thesis offers a different representation of the impact of international terrorism on air transport by placing the traveler’s behavior at the center of the strategic interactions between security actors and terrorists
Hammer, Sara Jeanne. "The rise of liberal independence and the decline of the welfare state." Thesis, Queensland University of Technology, 2002.
Знайти повний текст джерелаClarke, Paul. "Interdependence theory, China and American security interests." 2006. http://repo.lib.auburn.edu/Send%205-11-07/CLARKE_PAUL_28.pdf.
Повний текст джерелаAn, Chong-Bum. "Interdependence of retirement and labor supply under the social security program." 1991. http://catalog.hathitrust.org/api/volumes/oclc/24512792.html.
Повний текст джерелаTypescript. Vita. eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 240-247).
Zhang, Ming. "Economic interdependence and the formation of a security community in the Asia-Pacific region." 1994. http://catalog.hathitrust.org/api/volumes/oclc/32968202.html.
Повний текст джерелаBoeckner, Amy Nicole. "An analysis of contemporary approaches to planning for food security in Canada : essential interdependence." Thesis, 2003. http://hdl.handle.net/2429/15311.
Повний текст джерелаDomingues, Andrea Marques. "Interdependence as a risk factor for security: the energy relationship between Russia and the European Union." Master's thesis, 2021. http://hdl.handle.net/1822/74739.
Повний текст джерелаDespite expectations that interdependence between states guarantees a reduction in tensions between them, this theory has not been applied to energy relations between Russia and the European Union, where tensions have increased between the two sides. Both are caught up in the classic phenomenon of the security dilemma. As a result, both embarked on competitive foreign policies in their close neighbourhood, mainly in Ukraine, which has been the scene of competition between the two actors mostly since March 2014 with the annexation of Crimea by Russia. When considering the phenomenon of the security dilemma together with the concept of Realpolitik, this dissertation analyses the most prevalent aspect of the European Union-Russia relationship, being energy. In this way, we intend to analyse the consequences of interdependence on the security of the actors involved. Russia's action on Crimea was condemned by the EU through the application of sanctions and the suspension of political dialogue. Thus, it is assessed that interdependence prevents conflicts from becoming large-scale conflicts due to the economic costs that can result. However, the improbability of tensions to escalate into wars allows states to act in their interests and engage in acts of intimidation against each other to achieve their political goals. Russia's growing assertiveness in the countries of the former Soviet Union raises doubts about Russia's intentions in the European Union with the Nord Stream pipeline to deepen the European Union's dependence on Gazprom's natural gas supply. Nevertheless, the different bilateral relations that each member state of the European Union with Russia shows the lack of unity within the EU that is unable to reach a common position regarding the assertiveness of the Russian Federation, besides the approval and renewal of sanctions and the suspension of the political dialogue. Despite calls from several members of the European Union on the implications of the Nord Stream project, it appears that the principle of solidarity defended by the European Union is minimized when economic interests are at stake.
Apesar das expectativas de que a interdependência entre os estados garante uma redução das tensões entre eles, esta teoria não tem sido aplicada na relação energética entre a Rússia e a União Europeia, onde as tensões aumentaram entre as duas partes. Ambos estão presos no fenómeno clássico do dilema da segurança. Como resultado, ambos embarcaram em políticas externas competitivas em sua vizinhança próxima, principalmente na Ucrânia, que tem sido palco de competição entre os dois atores principalmente desde março de 2014 com a anexação da Crimeia pela Rússia. Ao considerar o fenómeno do dilema da segurança em conjunto com o conceito de Realpolitik, esta dissertação analisa o aspeto mais prevalente da relação União Europeia-Rússia que é a energia. Desta forma, pretendemos analisar as consequências da interdependência sobre a segurança dos atores envolvidos. A ação da Rússia na Crimeia foi condenada pela UE através da aplicação de sanções e da suspensão do diálogo político. Assim, avalia-se que a interdependência evita que os conflitos se transformem em conflitos de grande escala devido aos custos econômicos que podem acarretar. No entanto, a improbabilidade de as tensões se transformarem em guerras permite que os estados ajam em seus interesses e se envolvam em atos de intimidação uns contra os outros para atingir seus objetivos políticos. A crescente assertividade da Rússia nos países da ex-União Soviética levanta dúvidas sobre as intenções da Rússia na União Europeia com o gasoduto Nord Stream a aprofundar a dependência da União Europeia do fornecimento de gás natural da Gazprom. No entanto, as diferentes relações bilaterais que cada Estado membro da União Europeia com a Rússia mostra a falta de unidade dentro da UE que não consegue chegar a uma posição comum quanto à assertividade da Federação Russa, além da aprovação e renovação de sanções e da suspensão do diálogo político. Apesar dos apelos de vários membros da União Europeia sobre as implicações do projecto Nord Stream, parece que o princípio da solidariedade defendido pela União Europeia é minimizado quando os interesses económicos estão em jogo.
Khoo, How San. "Approaches to the Regional Security Analysis of Southeast Asia." Phd thesis, 1999. http://hdl.handle.net/1885/47471.
Повний текст джерелаLee, Chi-Ai, and 李奇愛. "The Dynamic Interdependence of the Social Security and the Government Finance in Taiwan-Application of the VAR Model." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/86767962892836289769.
Повний текст джерела東吳大學
經濟學系
98
This paper investigates the dynamic interdependence of the social security and the government finance in Taiwan during 1999 to 2009 with vector autoregressive (VAR) model. We control for the seasonal factor and the price index in empirical VAR model. The VAR model shows that the social security expenditure is the positive relationship with the government finance, but the crowding-out effect to the economic development budget. Moreover, the social security is also affected by the national defense budget. According to the Granger causality test, we find that the interaction effect and the causality relationship between the social security expenditure and the government finance. The social security disbursement also has the“lead-lag”relationship with other budgets. By the impact-response analysis, the responses of the government finance as well as other budgets to the social security spending innovation are obviously except the national defense government affairs budget, because of the national security question. The variance decomposition analysis of the government finance is explained mostly by itself and the social security, expressed that increasing rapidly social security benefits has impacted to the government finance. The positive relationship between the social security and the government finance is caused by part of the social security expenditure inflow to government tax revenue. Another empirical result shows that the population aging has remarkable influence to the social security expenditure and such influence will strengthen with the time span. So, in the long run, we had to worry about the population aging problem generating financing imbalance.
"How superpowers go to war and why other states help them: The impact of asymmetric security interdependence on war coalition formation." GEORGETOWN UNIVERSITY, 2009. http://pqdtopen.proquest.com/#viewpdf?dispub=3339336.
Повний текст джерелаAvdan, Nazli. "States' Pursuit of Sovereignty in a Globalized Security Context: Controlling International Human Mobility." Diss., 2010. http://hdl.handle.net/10161/3049.
Повний текст джерелаThe goal of this dissertation is to inquire into how states balance economic motivations and security concerns when pursuing sovereignty at borders. More precisely, the dissertation examines tradeoffs between interdependence sovereignty -control over transborder flows--and Westphalian sovereignty defined as exclusion of external actors from states' authoritative space. Focusing on control over cross-border human mobility as the issue area, I put forward the
The central claim of the dissertation is that human mobility is conditionally securitized and that security logics are modulated by material/economic incentives. Facing informational asymmetries vis-à-vis transnational terrorists, states rely on migration and border control strategies to screen and deter non-state threats to security. However, economic interdependence--trade and capital ties--mitigates fears over transnational terrorism by reconfiguring state preferences, bolstering the relative salience of material concerns in policy-making, tempering perceptions of threat, and creating vested interests at the domestic level.
To test the theory I have collected and compiled data on i)visa restrictions for pairs of 207 X 207 directed dyads ii)visa rejection rates for European Union and/or Schengen member countries for the period 2003-2007, and iii)asylum recognition rates for 20 select OECD recipient states for the period 1980-2007. I then use this data to test the implications of the theory by distinguishing between economic/voluntary and political/involuntary migration. Additionally, I tease out the distinct effects of two different types of security concerns over transnational terrorism: a reputational effect that considers origin country citizens' involvement in terrorism incidents worldwide and a targeted/directed impact through which states take into account past experience as targets of terrorism. To illustrate the effect of economic interdependence, I analyze trade and capital flows separately and illustrate that both types of commercial ties facilitate liberalization of controls over human mobility through direct and indirect mechanisms.
I employ a variety of statistical techniques to study the effect of economic and security concerns including several cross-sectional time series techniques, structural break and recursive residual tests for temporal change, and maximum likelihood. Furthermore, I complement my quantitative empirical analysis with an in-depth process tracing approach that traces the evolution of Turkey's migration policies in the context of Turkey's post-1980 economic liberalization. The qualitative analysis makes use of primary and secondary resources obtained from archival field work in Ankara and Istanbul, Turkey.
The dissertation demonstrates that the impact of security concerns over transnational terrorism is contingent on the type of migration policy under consideration. In particular, policies of control over involuntary/political migration are guided by humanitarian and normative motives, limiting the effect of security concerns. Furthermore, the securitization of visa policies is strongest if recipient states are directly targeted by incidents of transnational terrorism perpetrated by origin country nationals. While states take into account incidents of global terrorism ---attacks against other country nationals or territories by origin country citizens-- this channel of impact is more modest. Additionally, empirical results show that economic interdependence effectively undercuts the effect of global terrorism, driving migration control policies towards liberalization. In sum, the dissertation demonstrates that ways in which states assert interdependence sovereignty exhibit temporal and cross-sectional variation as well as functional differentiation across types of border and migration control policies.
Dissertation
Doan, Phu Nguyen. "Nové vyvážení v asijsko-pacifické oblasti: nové skutečnosti v tradičních aliancích USA v regionu." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-357318.
Повний текст джерелаLan, Bish Ling, and 藍碧玲. "Examining the Intelligence Sharing Mechanism between the R.O.C. and U.S.A. towards National Security via the Viewpoint of Interdependence Theory :The case of Black Bats Squadron and The Black Cats Squadron(1945-1978)." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/m656nh.
Повний текст джерела國防大學
戰略研究所
103
Abstract Since the Cold War, national security has become a vital issue in the process of developing the global system in 21st century. As the international environment has changed from one generation to another, the concept of security becomes various. The phenomenon of the integration and interdependence between nations is becoming more and more obvious. Since globalization brings new threats and challenges about security issues, the relation between intelligence and national security is getting closer. For every nation in the world, it is crucial to protect national security through the exchange of intelligence under mutual trust and the means of interdependence and cooperation. This thesis aims to analyze the intelligence sharing mechanism on the aerial reconnaissance between the R.O.C. and the U.S.A. and what implications it has for us from 1945 to 1978, reflecting on its influence on national security during the period between World War II and the termination of U.S.-R.O.C. official diplomatic relation. Through the literature reviews and the examination of Interdependence Theory, this thesis generated four analytical assumptions in the chapter 4. Through the case studies, textual analysis, and interviews, the thesis ultimately suggests the possibility and the development tendency of intelligence exchange between the U.S.A. and the R.O.C. under the interdependence mechanism.
Odintsov, Nikita. "Geopolitika ropy." Master's thesis, 2015. http://www.nusl.cz/ntk/nusl-331678.
Повний текст джерелаChen, Wan-Jia, and 陳婉佳. "Information Security Risk Assessment Considering Interdependences between Controls." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/68550641633469867854.
Повний текст джерела國立交通大學
資訊管理研究所
100
Risk assessment is an important key step of the core process for information security risk management. Organizations use risk assessment to determine the risks within information systems and provide sufficient means to reduce the identified risks. In practical application, security controls applied to the information system areas are not completely independent, therefore during the process of risk assessment it is crucial to consider the interdependences among control families. In this thesis, a hybrid procedure for evaluating and identifying risk levels of information system security while considering interdependences amongst control families is proposed. First, this procedure applies the Decision Making Trial and Evaluation Laboratory (DEMATEL) method to construct interrelations amongst security control areas. Secondly, using the results from DEMATEL, the Analytic Network Process (ANP) method is used to obtain the likelihood ratings of risks; as a result, the proposed procedure can detect interdependences and feedback between security control families as well as identify priorities of areas requiring security measures in real world situations. Lastly, the Fuzzy Linguistic Quantifiers-guided Maximum Entropy Order-Weighted averaging (FLQ-MEOWA) operator is used to aggregate impact values assessed by experts, applied to diminish the influence of extreme evaluations such as personal views and drastic opinions. An application in company X was examined to verify the proposed procedure. After analyzing the acquired data, we confirm the proposed procedure certainly detects the influential factors among security control areas as well as identifies information systems with higher risk levels where prioritized safeguard tactics should be considered.
"Security Analysis of Interdependent Critical Infrastructures: Power, Cyber and Gas." Doctoral diss., 2018. http://hdl.handle.net/2286/R.I.51602.
Повний текст джерелаDissertation/Thesis
Doctoral Dissertation Electrical Engineering 2018
Martinez, Espinosa Cesar Alfredo. "Mexico’s national security framework in the context of an interdependent world : a comparative architecture approach." 2013. http://hdl.handle.net/2152/23031.
Повний текст джерелаtext
Záhradníková, Lea. "Aktuální diverzifikační scénáře Ruské federace na jedné straně a zemí V4 na straně druhé v oblasti dodávek zemního plynu na pozadí teorie vzájemné asymetrické závislosti." Master's thesis, 2017. http://www.nusl.cz/ntk/nusl-365129.
Повний текст джерелаKoens, Kumiko. "The autonomy principle and interdependent aspects of independent undertakings." Master's thesis, 2001. http://hdl.handle.net/1885/147879.
Повний текст джерелаBristow, Elizabeth Catherine. "Interdependent infrastructures and multi-mode attacks and failures: improving the security of urban water systems and fire response." 2006. http://hdl.handle.net/1969.1/ETD-TAMU-1082.
Повний текст джерелаAlaboodi, Saad Saleh. "Model-based Evaluation: from Dependability Theory to Security." Thesis, 2013. http://hdl.handle.net/10012/7649.
Повний текст джерелаSousa, José Luís da Rocha. "Modelo de planeamento de sistemas de informação para a era da colaboração, a era WEB 2.0." Master's thesis, 2008. http://hdl.handle.net/1822/9490.
Повний текст джерелаSuportado pela WEB 2.0, o paradigma actual dos sistemas de informação é a colaboração em rede com a criação do conhecimento em rede. Confrontada com este conhecimento as organizações estão a convergir para a sua adopção, estamos na era da WEB 2.0 . Esta WEB não é apenas tecnologia mas uma nova forma de utilização dessa tecnologia para produção de conhecimento. As organizações enfrentam novos desafios na adopção e integração de soluções e metodologias, colocando na linha da frente sistemas actualmente protegidos pelos limites físicos das organizações. A arquitectura destes sistemas não foi desenvolvida com a colaboração ou mesma a partilha em mente, sendo usados no seu planeamento modelos tradicionais, incapazes de gerir os novos limites das organizações. Esta evolução está a criar a uma economia em rede e a alterar o forma como as organizações interagem com os seus recursos. Estando a evoluir do computador em rede para o utilizador em rede. Os modelos tradicionais definem a forma como os sistemas de informação devem suportar as actividades das organizações. Este é um aspecto chave, mas o novo paradigma coloca um novo desafio, saber como os sistemas de informação devem ser desenvolvidos de forma a serem capazes de garantir o efeito da informação. Nesta dissertação é apresentado um modelo de planeamento, cujo objectivo é garantir que a organização irá alcançar os efeitos pretendidos quando os mesmos forem suportados pelo ecossistema correcto. O modelo identifica as vulnerabilidades criticas, as capacidades criticas e as necessidades criticas que suportam determinado efeito no ecossistema. De forma a serem obtidos os efeitos correctos é usada a prioritização e a interdependência, dois elementos da engenharia de software, permitindo assim a correcta caracterização dos mesmos no ecossistema. Apenas um modelo baseado em efeitos, em que a segurança da informação é uma parte integrante do objecto informação torna possível o planeamento de sistemas na era das organizações colaborativas. O planeamento baseado na procura dos efeitos da informação, enquanto característica da mesma, é uma forma de obter uma visão clara desde as primeiras fazes de criação do ecossistema colaborativo, suportado pela WEB 2.0.
Supported by WEB 2.0 today information systems paradigm is networked collaboration with networked knowledge creation. Confronted with the network knowledge, organizations are trying to converge to the adoption of that knowledge, we are in the web 2.0 era. Web 2.0 is not only technology but about the way that technology is used for knowledge production. This enrollment of organizations in the new WEB puts new challenges in the adoption and integration of solutions and methodologies putting in the front line systems that are today protected behind the organizations structures. These systems architectures weren’t developed with collaboration or even sharing in mind, they use the traditional information systems planning models that are incapable of managing the new organizations boundaries. This new way of organizations interacting with resources is defined as the networked economy. In this economy we have a networked user, not only a networked computer. The traditional models define the way information systems should support organizations activities, this is a key aspect, but the new collaboration paradigm creates a new challenge that is to know how information systems should be develop in order to guarantee the organization information effect. In this paper is presented a model to give information systems planning a way to guarantee that organization will achieve the effects they want when supported with the correct information system ecosystem. The model identifies the critical vulnerabilities, critical capacities, critical needs that support the critical center of the ecosystem. In order to get the correct effects is used prioritization and interdependency two well know words of software engineering, in order to define effects relation in the ecosystem. Only a model based on information effects and with the integration of security as part of the information object makes information systems planning possible in this organization collaboration era. The collaboration supported by WEB 2.0 is a challenge for organizations and the planning of information, as ecosystem, using effects based planning, is a way to give a clear view of the development since the early stage of the ecosystem creation.