Dissertationen zum Thema „The Concept of Security“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "The Concept of Security" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Dolan, Mark E. „The seamless maritime concept“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDolan.pdf.
Thesis Advisor(s): S. Starr King. Includes bibliographical references (p. 67-69). Also available online.
Neville, Karen M. „IS security leveraging the concept of knowledge management“. Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527132.
Schmid, Markus Thomas. „The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /“. Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.
Thesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
Tigerstrom, Barbara J. von. „The concept of human security : some implications for international law“. Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423873.
May, Elizabeth. „Attachment security, self-concept clarity and beliefs in obsessive-compulsive disorder“. Thesis, University of Hertfordshire, 2007. http://hdl.handle.net/2299/853.
Lack, Lindsey A. „Using the bootstrap concept to build an adaptable and compact subversion artifice“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FLack.pdf.
Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 69-71). Also available online.
Morrissey, Joseph Patrick. „The extension and hardware implementation of the comprehensive integrated security system concept“. Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/336.
Schmalen, Daniel. „Security Concept for VPN IPsec Site-to-Site Connections to Third Parties“. Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688606.
VPN (Virtual Private Network) connections between two companies are a very common method to pair networks with each other to facilitate the access to specific resources for both sides of the connection. However, the security aspect for such a pairing has not been thoroughly researched either by academic or industrial organizations. Nevertheless, screening this topic from a security perspective is crucial to give companies a recommendation.
This thesis covers every key facet of such a VPN connection and therefore, all components are researched individually to discover the key findings for each part. Furthermore, the findings are applied to create a practical, enterprise-close security concept that is both complete and comprehensible.
The security concept may play a significant role in the overall understanding of the given use-case, a VPN IPsec (Internet Protocol Security) Site-to-Site connection to a third-party company, to avoid security leaks in the owner’s network. Furthermore, the VPN itself has to be secured against outsider adversaries such as eavesdroppers.
Zacarias, Agostinho M. „The security concept in Southern Africa : prospects for the post-apartheid era“. Thesis, London School of Economics and Political Science (University of London), 1996. http://etheses.lse.ac.uk/1426/.
Ransome, Paul Edward. „An analysis of recent changes in the concept and practice of work“. Thesis, University of Cambridge, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307014.
Larsson, Sebastian. „Guarding the gates : Reassessing the concept of borders in Tanzania“. Thesis, Södertörns högskola, Institutionen för livsvetenskaper, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-17178.
Holford, John William. „The concept of self-defending objects and the development of security aware applications“. Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.
Busmire, Terence Edward. „Concept definitions and security requirements of a cooperative execution environment for distributed computing“. Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA275515.
Johnson, Olga. „The concept of energy security : implications of EU-Russia energy relations, 2004-2012“. Thesis, University of Leeds, 2016. http://etheses.whiterose.ac.uk/14357/.
Hockmann, Volker. „Developing a concept for handling IT security with secured and trusted electronic connections“. Thesis, University of Wolverhampton, 2014. http://hdl.handle.net/2436/324189.
Andreasson, Emelie. „All in the name of security : A qualitative content analysis regarding the concept of security in the movie Zero Dark Thirty“. Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7100.
Cobb, Adam Campbell. „Changes in the concept of security since World War II among Western international theorists“. Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/252234.
Siko, Isaac Mohlolo. „A critical review of South Africa's approach to the concept of national security since 1994“. Diss., Pretoria : [s. n.], 2007. http://upetd.up.ac.za/thesis/available/etd-01242008-121403/.
Covic, Mirjana, und Thomas Kohler. „IT security for small and medium-sized enterprises : A didactical concept of a dynamical questionnaire“. Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6266.
This master thesis has been written at the School of Mathematics and System Engineering (MSI) at Växjö University in the field of computer science. IT security has become one of the main topics of every enterprise since they all use information technology in their business. Investments have to be done in order to achieve a high protection status of the IT environments. Specially small and medium-sized enterprises need more knowledge and advisory how to handle their IT security. This thesis analyses management tools that have the goal to improve the IT security. The second and main part of the thesis is the design of a tool that should helps to solve the described problems.
Austin, William H. „The United States Department of Homeland Security concept of regionalization - Will it survive the test?“ Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FAustin.pdf.
Thesis Advisor(s): Robert Bach. "September 2006." Includes bibliographical references (p. 75-80). Also available in print.
Bude, Cristian, und Bergstrand Andreas Kervefors. „Internet of Things : Exploring and Securing a Future Concept“. Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.
Internet of Things (IoT) är ett koncept som omfattar olika objekt och kommunikationsmetoder för utbyte av information. Idag är IoT mer en beskrivande term av den framtidsvision som finns att allting ska vara uppkopplat på internet. IoT kommer vara fundamentalt i framtiden eftersom konceptet öppnar upp möjligheter för nya tjänster samt nya innovationer. Då alla objekt ska vara uppkopplade och kunna kommunicera med varandra samtidigt som de skall kunna operera i oskyddade miljöer, bidrar detta till stora säkerhetsutmaningar. Dagens IoT är i stort behov av standardisering och klara strukturer för hur tekniken ska implementeras samt samverka med varandra på ett säkert sätt. Utmaningarna ligger i att säkra tekniken samt informationen som tekinken bidrar med. Denna rapport ger en introduktion till vad IoT är och hur det kan användas samt vilka hot som IoT kan möta i avseende till informationssäkerhet. Utöver detta så förser rapporten läsaren med förslag om hur man eventuellt kan lösa de fundamentala behoven av autentisering och säker kommunikation. Lösningarna som läggs fram är baserade på både nutida lösningar och teknik som är under utveckling inför framtiden. Nutida lösningar är baserade på säkerhetsprotokoll som IPsec och DTLS som används i en miljö som sträcker över internet och in i ett 6LoWPAN nätverk. Den autentiseringslösning som tagits fram grundar sig på PKI och förtroendemodeller för certifikathantering. För framtida arbete presenteras flertalet vidare fördjupningsområden där denna rapport kan användas som grund. Dessa fördjupningsområden inkluderar vidare analys av sårbarheter och implementation av de lösningar som tagits fram.
Shipman-Sercu, Chris. „A False Sense of Security: The Social Security Debate“. Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/65.
Le, Bras Jean-Baptiste. „The impact of the SSR (security sector reform) concept in shaping NATO and EU policy discourses“. St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/06607949001/$FILE/06607949001.pdf.
Hürsoy, Siret. „The new security concept and German-French approaches to the European "Pillar of Defence", 1990-2000 /“. Marburg : Tectum, 2002. http://catalogue.bnf.fr/ark:/12148/cb41448411t.
Holm, Linnea. „Nord Stream - Vägen till säkerhet?“ Thesis, Linnaeus University, LNU, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5745.
Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.
The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy security. It is a comparative study that has been done with help of a text analysis.
The analysis concludes that Sweden is the country of the four that finds the most threats with the pipeline. Sweden thinks Nord Stream is a threat within all of the three securities mentioned above even though Sweden also see a possibility within energy security. Denmark, on the other hand, does not see a threat at all and Germany and Finland see a threat within the environmental area but not within the two other areas. They also see a possibility within the energy security.
Pries, Kari Mariska. „Contested concepts and practices in security governance : evolving security approaches in El Salvador“. Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8070/.
Uzelman, Alexandra. „The transformation of the concept of the Westphalian sovereignty within the EU Common Foreign and Security Policy“. Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-164218.
Pretorius, William Richard. „The impact of the concept of decent work on the job security and the provisioning of educators“. Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1021218.
Unkenholz, Willard L. „Command and control security: concepts and practices“. Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25741.
Khodadadzadeh, Omid. „Strategiska försvarsaktörer : En studie av NATO och EU:s kompatibilitet i rollen som säkerhetspolitiska aktörer“. Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36305.
Syftet med denna uppsats är att studera huruvida NATO och ESFP är kompatibla med varandra eller inte när det kommer till rollen som säkerhetspolitiskt aktör. Detta eftersom jag vill undersöka vad det finns för eventuell potential till politiska spänningar och intressekonflikter emellan dessa aktörer då de har en stor världsomfattande påverkan när det kommer till den globala säkerhetspolitiken. Den övergripande forskningsfrågan lyder: Är den Europeiska säkerhets- och försvarspolitiken (ESFP) och NATO kompatibla med varandra när det kommer till rollen som internationell säkerhetspolitisk aktör? Mitt tillvägagångssätt för att svara på min övergripande forskningsfråga har varit att studera aktörernas säkerhetspolitiska policydokument. Detta har jag gjort genom att göra en idéanalys av aktörernas respektive försvarsdokument. I denna uppsats används idealtyper från de teoretiska perspektiven liberalism och realism för att på så sätt operationalisera och undersöka min övergripande forskningsfråga. Uppsatsens slutsats visar att NATO och ESFP är kompatibla med varandra där båda aktörernas säkerhetsstrategier är präglade av liberala värderingar. Mycket lutar åt att samarbetet mellan aktörerna kan ses ett ömsesidigt beroende där respektive aktör kompletterar den andra. Dock finns det ett fåtal drag av realism kring NATO:s metoder för bemötandet av internationella hot där dessa i viss mån kan ses som stående till ESFP:s metoder kring samma bemötande.
EULANO, ANTHONY CONNOR. „DYSPROSIUM: A UNITED STATES SECURITY CONCERN“. Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/612885.
Delo, Sarah. „The effects of the teacher-child relationship and caregiver attachment security on children's self-concept in middle childhood“. Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/401545/.
Meyer, Patrik Kristof. „Governing Muslim minorities as security treats : the case of the Uyghurs and the concept of a new Chinese nation“. Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610840.
Deshpande, Pranita. „Assessment Of Two Pedagogical Tools For Cybersecurity Education“. ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2557.
Hamark, Kindborg Johanna. „The patriarchy dressed in feminist clothes : A discourse analysis of the United Nations Security Council’s gendering of the concept Civilians“. Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6150.
Chung, Kang. „Prototyping and evaluation of TCAPsec“. Thesis, Karlstad University, Division for Information Technology, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-826.
Today, the most frequently used signaling system for telecommunication is called Signaling System No. 7 (SS7). The growing usage of mobile telephones and mobile data communica-tion, and the development of new services mean that the risk of intrusion and exploitation of the SS7 signaling networks increases. The increasing problem with unauthorized access to sensitive information and the operators’ growing demand for security is the origin of our work. This thesis presents a prototype design and implementation of a Security Gateway (SEG), which is a fundamental part of the TCAP user security (TCAPsec) concept. TCAPsec is a security concept for introducing security mechanisms to the signaling system. The proto-type includes three different protection modes that provide security services, ranging from almost no protection to full protection with the use of encryption algorithms. The thesis also contains an evaluation study of the delay penalties caused by the use of these security services. With regards to the restrictions on the prototype, the conclusion drawn from the evaluation results was that the protection mechanisms in the different protection modes did not inflict any significant time penalties. Instead, the results of the study indicate that the routing process of messages in the network is a more significant delaying part in the communication between different nodes. This result implies that the routing process takes longer time than the security services. The thesis also presents a number of discovered features that will require further investigation and development before the TCAPsec concept can be realized.
Dewar, Robert Scott. „Cyber security in the European Union : an historical institutionalist analysis of a 21st century security concern“. Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8188/.
Ziegler, Thomas. „The long war concept using the security cooperation Marine Air Ground Task Force to address irregular threats through shaping and deterrence /“. Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490846.
Gabbert, Silke, und Hans-Peter Weikard. „Food deficits, food security and food aid : concepts and measurement“. Universität Potsdam, 1998. http://opus.kobv.de/ubp/volltexte/2006/858/.
Axioms and indices for the assessment of nutrition of individuals and groups are suggested.
Furthermore a measure for food aid donor performance is developed and applied to a sample of bilateral and multilateral donors providing food aid for African countries.
Dötzer, Florian. „Security concepts for robust and highly mobile ad-hoc networks“. kostenfrei, 2008. http://mediatum2.ub.tum.de/doc/627707/627707.pdf.
Палагнюк, Д. М., Д. С. Тищук und О. В. Березюк. „Принципи забезпечення інформаційної безпеки“. Thesis, ВНТУ, 2018. http://ir.lib.vntu.edu.ua//handle/123456789/24491.
Представлено завдання забезпечення інформаційної безпеки, як одного із головних в сучасному інформаційному суспільстві. Розкрито сутність поняття інформаційної безпеки, основні принципи її забезпечення.
Tallgren, Eva. „The Concept of'European Citizenship': National Experiences and Post-National Expectations?“ Thesis, Linköping University, Department of Management and Economics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2004.
The aim of this thesis is to interpret and understand the concept of citizenship in general, and the European citizenship in particular, placed within a broad theoretical framework. Furthermore, the purpose is to examine whether the development of a European citizenship indicates an emergence of a new ‘post-national’ model of citizenship, based on residence rather than nationality or place of birth. In order to address this, the status of third- country nationals (TCN’s), who are legally long-term residents within the Union, in relation to EU citizens has been analysed from the theoretical perspectives.
Different models of citizenship provide the paper with a theoretical framework, through which the empirical data has been examined. The theoretical approaches dealt with in this paper are the liberal, the republican/communitarian and the ‘post-national’ models of citizenship respectively. Fundamental ‘key concepts’ have been derived from these different models of citizenship, which have facilitated the analysis by providing the interpretation of the EU citizenship with an analytical framework.
To find answers to the initial research questions and fulfil the aim of the paper, a qualitative and hermeneutic study has been carried out, aiming at interpreting and understanding the European citizenship placed within its socio-political context. Text and language constitute the units of analysis and, hence, a textual analysis has been conducted of official EU documents. Following a conceptual history approach, concepts are not just reflections of historical processes, but can themselves contribute to historical change by making new things imaginable. As emphasised throughout the paper, concepts embrace at the same time a ‘space of experience’ and a ‘horizon of expectation’.
The main conclusions drawn from the research can be summarised in a number of points. First, while the concept of European citizenship was originally connected to a formal and economic view upon citizenship, close to a liberal/neo-liberal notion of citizenship, the texts express an aim of a more active citizenship, emphasised in the republican/communitarian tradition. Secondly, despite a multicultural and post-national rhetoric concerning the status of long-term resident TCN’s, the gaining of ‘full’ EU citizenship can still only be attained through nationality in a Member State. Thirdly, the importance of interpreting a concept placed within its socio-political context has been clear from the study. The semantic analysis has showed a close link between the European citizenship andthe goal to create an ‘area of freedom, security and justice’ throughout the Union. This goal is interpreted as a response to recent occurrences in the world, but at the same time it expresses expectations about the EU citizenship, and it can thus itself affect future developments in this field.
To sum up, while the concept of European citizenship is post-national to the extent that it applies to all EU citizens irrespective of where in the Union they live, it is still not completely based on the principle of residence. Only nationals of an EU Member State can obtain citizenship of the Union. Thus, the concept of European citizenship, while establishing a citizenship across national borders, is still based on nationality.
Mun, Byeongcheol. „The North Korean nuclear crisis and the Six Party Talks : organising international security : hegemony, concert of powers, and collective security“. Thesis, University of Newcastle Upon Tyne, 2010. http://hdl.handle.net/10443/762.
McGovern, Mark, Jeffrey D. Mayor und Joseph Symmes. „An operational utility assessment [electronic resource]: measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)“. Monterey California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/10312.
Planning modern military operations requires an accurate intelligence assessment of potential threats, combined with a detailed assessment of the physical theater of operations. This information can then be combined with equipment and manpower resources to set up a logistically supportable operation that mitigates as much of the enemy threat as possible. Given such a daunting challenge, military planners often turn to intelligent software agents to support their efforts. The success of the mission often hinges on the accuracy of these plans and the integrity of the security umbrella provided. The purpose of this project is to provide a comprehensive assessment of the Joint Forces Protection Advanced Security System (JFPASS) Joint Concept Technology Demonstration (JCTD) to better meet forceprotection needs. It will also address the adaptability of this technology to an ever-changing enemy threat by the use of intelligent software. This project will collect and analyze data pertaining to the research, development, testing, and effectiveness of the JFPASS and develop an operational effectiveness model to quantify overall system performance.
McGovern, Mark Symmes Joseph Mayor Jeffrey. „An operational utility assessment [electronic resource] : measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS) /“. Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/MBAPR/2008/Dec/08Dec%5FMcGovern%5FMBA.pdf.
Advisor(s): Nussbaum, Daniel ; Franck, Raymond. "December 2008." "MBA professional report"--Cover. Description based on title screen as viewed on January 28, 2009. Includes bibliographical references (p. 81-86). Also available in print.
Lefeez, Sophie. „An examination of the validity of the concept of nuclear deterrence within the framework of post-cold war international relations : an analytical conflict resolution approach“. Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/827.
Blake, Gatto Sharon Elizabeth. „MAnanA: A Generalized Heuristic Scoring Approach for Concept Map Analysis as Applied to Cybersecurity Education“. ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2526.
Anderson, Jamie. „The Looming Threat of an Avian Flu Pandemic: Concepts of Human Security“. Thesis, Boston College, 2006. http://hdl.handle.net/2345/374.
As birds throughout Asia, Europe, and Africa have been infected with an avian influenza, public health experts everywhere are worried that if spread to humans, the world could face a pandemic with proportions similar to the 1918 Spanish influenza. In the past, the federal government has been more concerned with foreign militaries than foreign diseases. But today, the government has devoted over $7.1 billion to preventing a potential pandemic. While much of this goes to research and the production of vaccinations, money is also allocated to strengthen local infrastructures and control the disease in other countries. The fact that the federal government has put so much time and effort to prevent a disease that has affected few humans worldwide, let alone any Americans, points to a growing belief in human security rather than national security. This thesis will evaluate the concept of human security and argue that U.S. action and public opinion regarding the threat of an avian flu pandemic clearly shows decision-making based on human security
Thesis (BA) — Boston College, 2006
Submitted to: Boston College. College of Arts and Sciences
Discipline: International Studies
Discipline: College Honors Program
Vaughn, Reginald Wayne. „Computer security concepts and issues in the Information Technology Management (370) Curriculum“. Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23841.
DoD has become increasingly dependent upon storing its sensitive information in electronic form and has a deep concern for the integrity and privacy of this valuable information. In the recent aftermath of numerous electronic break-ins, the DoD continues to express anxiety over technically weak system administrators' inability to protect sensitive electronic information. The solution to minimizing these electronic intrusions and bolstering computer security in DoD is to educate military officers and federal civilians in the methods of computer security. This can be accomplished by integrating concepts and problem solving techniques related to computer security into the Information Technology Management (370) Curriculum at the Naval Postgraduate School.
Troják, Pavel. „Přístupové a zabezpečovací systémy v automatizaci budov“. Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2009. http://www.nusl.cz/ntk/nusl-228599.