Dissertations / Theses on the topic 'Asymmetrical Warfare'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Asymmetrical Warfare.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Abel, Heiko. "Frigate defense effectiveness in asymmetrical green water engagements." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://handle.dtic.mil/100.2/ADA508855.
Full textThesis Advisor(s): Sanchez, Paul J. ; Second Reader: Kline, Jeffrey E. "September 2009." Author(s) subject terms: Agent Based Simulation, Asymmetric Warfare, Data Farming, Design of Experiments, Evolving Design, MANA, Modeling and Simulation, Naval Swarm Defense, Robust Design, Regression Analysis, Simulation Experiments and Efficient Design Center, Taguchi Method Description based on title screen as viewed on November 03, 2009. DTIC Descriptor (s): Frigates, Theater Level Operations, Defense Systems, Experimental Design, Confined Environments, Asymmetry, Statistical Analysis, Sea Water, Small Ships, Threats, Survivability, Weapons, Theses DTIC Identifier (s): SSTR (Stability Security Transition and Reconstruction), Asymmetric Warfare, Mana Includes bibliographical references (p. 125-132). Also available in print.
Willey, Paul F. "The art of riverine warfare from an asymmetrical approach." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Mar%5FWilley.pdf.
Full textChilders, Rex A. "The Rationality of Nonconformity: the United States decision to refuse ratification of Protocol I Additional to the Geneva Conventions of 1949." Bowling Green, Ohio : Bowling Green State University, 2008. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=bgsu1214247432.
Full textKelly, Rodney D. "Center of gravity in the asymmetric environment : applicable or not? /." Thesis, Monterey, CA : Naval Postgraduate School, 2006. http://handle.dtic.mil/100.2/ADA457503.
Full textThesis advisor : Richard Grahlman. "June 2006." Includes bibliographical references (p. 61-63). Full text available on Public Stinet.
Herrera, Cary A. Quinn Matthew D. "Asymmetric warfare and the will to win." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA401469.
Full textQuinn, Matthew D. "Asymmetric warfare and the will to win." Thesis, Monterey, California. Naval Postgraduate School, 2001. http://hdl.handle.net/10945/5998.
Full textNguyen, Triet M. ""Little Consideration... to Preparing Vietnamese Forces for Counterinsurgency Warfare"? History, Organization, Training, and Combat Capability of the RVNAF, 1955-1963." Thèse, Université d'Ottawa / University of Ottawa, 2012. http://hdl.handle.net/10393/23126.
Full textCarlson, Ted W. "The Philippine Insurrection the U.S. Navy in a military operation other than war, 1899-1902." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1288.
Full textU.S. naval doctrine has been dominated by the Mahanian concept of massing large capital ships for over one hundred years. Yet, it was a Cyclone-class patrol craft, a USCG cutter, and an Australian frigate that pushed up the Khor-Abd-Allah waterway and opened up the port of Umm Qasr, Iraq, during the Second Gulf War. They continue to protect it and the surrounding oil infrastructure from attack from insurgents and terrorists today. With the navy's current interest in transformation, the question arises, is the navy as presently configured well suited for today's threats? This thesis explores the question of how should the navy meet threats to national interests. This is accomplished through historical analysis of an event that is similar to the situation today: The Philippine Insurrection (1899-1902). This episode showcases the shortcomings of the navy's conventional approach to military operations other than war, and the need for change. In today's asymmetric environment, the past provides insight into effective means for handling these types of threats. This thesis concludes that the navy needs to diversify itself to incorporate different ship platforms, platforms that incorporate the utility of old with the technology of new.
Lieutenant, United States Navy
Gourley, Bernard. "Playing a poor hand well : weak actors face the Russian war machine." Thesis, Georgia Institute of Technology, 2003. http://hdl.handle.net/1853/30659.
Full textTsai, Wen-Hsiang. "An analysis of China's information technology strategies and their implications for US national security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FTsai.pdf.
Full textThesis Advisor(s): Karl D. Pfeiffer. "June 2006." Includes bibliographical references (p. 83-89). Also available in print.
Jinn, Guo-Woei. "China's development of asymmetric warfare and the security of Taiwan, Republic of China." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FJinn.pdf.
Full textDiamond, Scott M. "Aerially deployed real-time targeting sensor net." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FDiamond.pdf.
Full textCarlson, Ted W. "The Philippine Insurrection : the U.S. Navy in a military operations other than war, 1899-1902 /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FCarlson.pdf.
Full textHochstedler, Robert A. "Implementation of a modular Fly away Kits (FLAK) for C4ISR in order to counter asymmetric threats in the coalition riverine and maritime theatres." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FHochstedler.pdf.
Full textThesis Advisor(s): James F. Ehlert. "June 2006" Includes bibliographical references (p. 119-121). Also available in print.
Hartigan, Jake. "Why the weak win wars a study of the factors that drive strategy in asymmetric conflict." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FHartican.pdf.
Full textThesis Advisor(s): Rothstein, Hy. Second Reader: Blanken, Leo. "December 2009." Description based on title screen as viewed on January 26, 2010. Author(s) subject terms: Strategy, asymmetric warfare, unconventional warfare, Arreguin-Toft, probability of victory, institutional predisposition, Afghanistan. Includes bibliographical references (p. 77-82). Also available in print.
Bowling, Joshua D. "Future Naval Conflict: Asymmetric Threats and Commerce Raiding." Scholarship @ Claremont, 2012. http://scholarship.claremont.edu/cmc_theses/478.
Full textHarris, Kathryn Elizabeth. "Asymmetric Strategies and Asymmetric Threats: A Structural-realist Critique of Drone Strikes in Pakistan, 2004-2014." Thesis, Virginia Tech, 2016. http://hdl.handle.net/10919/64516.
Full textMaster of Arts
Arango, Juan C. "Modern warfare from the Colombian perspective." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491149.
Full textKatoch, Ghanshyam Singh. "Fourth generation war : paradigm for change /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FKatoch.pdf.
Full textWahlert, Matthew H. "NON-STATE ACTORS AND ASYMMETRIC WARFARE: A NEW PARADIGM FOR INTERNATIONAL RELATIONS." Wright State University / OhioLINK, 2007. http://rave.ohiolink.edu/etdc/view?acc_num=wright1176567617.
Full textLastimado, Antonio R. "The Armed Forces of the Philippines and Special Operations." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1227.
Full textSince World War II, the Philippines has confronted threats from communist insurgents, Muslim secessionists, and a few other agitators. Recently, however, a new threat has emerged-- this time coming from a terrorist organization known as the Abu Sayyaf Group (ASG). Although the ASG is a relatively small group, it has wrought great injury to the Philippine image as of late. Common among the groups presenting a threat to internal security are that their strategies and tactics tend to be unconventional and asymmetric. This thesis seeks to determine how special operations can improve the AFP's capability to address internal security threats. The study begins by examining the security environments in which the AFP currently operates, and then proceeds to study emerging security environments in which it will likely operate. The current special operations capability of the AFP is explored and assessed, while inquiring whether it needs enhancing. Case studies of past AFP special operations against groups which posed major internal threats are analyzed to determine whether or not the doctrine and strategy of the AFP was correct, especially regarding its use of Special Operations Forces (SOF). Furthermore, this study considers the United States (U.S.) model for special operations, namely the U.S. Special Operations Forces, in proposing a special operations strategy for the AFP that is feasible, suitable, and sustainable. It is suggested that such an examination will produce a strategy that is relevant, adaptable, and responsive to dealing with the internal security environments likely to be encountered by the Philippine government.
Major, Philippine Army
Tay, Chee Bin Mui Whye Kee. "An architecture for network centric operations in unconventional crisis : lessons learnt from Singapore's SARS experience /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FTay.pdf.
Full textConnor, Robert J. "Defeating the modern asymmetric threat." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FConnor.pdf.
Full textGomez, Jaime. "The race against nuclear terror." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FGomez.pdf.
Full textRuettershoff, Tobias. "Counterinsurgency as ideology : the evolution of expert knowledge production in U.S. asymmetric warfare (1898-2011) : the cases of the Philippines, Vietnam and Iraq." Thesis, University of Exeter, 2015. http://hdl.handle.net/10871/20887.
Full textMogensen, Erik. "Det asymmetriska sjökriget - behov av nya teorier eller nyansering av befintliga?" Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6812.
Full textAkkoca, Hasan Ufuk. "Synthesis Of Bifunctional 2-aminodmap/prolinamide Organocatalysts And Their Use In Asymmetric Michael Reaction To Afford Warfarin." Master's thesis, METU, 2010. http://etd.lib.metu.edu.tr/upload/12613984/index.pdf.
Full textnsted acid catalaphoric sites. The Lewis base site is synthesized via selective mono-N-pyridilization of trans-(1R,2R)-cyclohexane-1,2-diamine by Cu catalysis and Brø
nsted acid site is subsequently introduced by anchoring L-proline unit. In the second part, catalytic activities of organocatalysts are tested in asymmetric Michael addition reaction between a cyclic 1,3-dicarbonyl compound 4-hydroxycoumarin and various &alpha
,&beta
-unsaturated ketones to afford optically active warfarin as anticoagulants, in one step. Reaction parameters such as solvent, temperature, equivalency, and cocatalyst were screened. Enantiomeric excess value (ee) up to 72% is attained.
Wrang, Andreas. "Ubåtar på piratjakt : Är ubåt typ Gotland en potent plattform i en internationell kontext med asymmetriska hot?" Thesis, Swedish National Defence College, Swedish National Defence College, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-828.
Full textVärlden är i ständig förändring, så även de krig och konflikter som utkämpas. Aktörerna utgörs inte längre enbart av nationer utan innefattas även ickestatliga aktörer. År 2000 utsattes amerikanska fartyget USS Cole för en asymmetrisk attack, där en ickestatlig aktör, genom asymmetrisk krigföring, åsamkade stor skada med relativt ringa medel. Denna typ av krigföring och hot är någonting relativt nytt inom den marina arenan. Uppsatsen syftar till att undersöka om ubåt typ Gotland är en potent plattform att nyttja vid en internationell insats med asymmetrisk hotbild. Uppsatsen bygger på att ubåt typ Gotlands förmågor jämförs med krav på förmågor, för att möta asymmetriska hot i en marin miljö. Krav på förmågor och Gotlands förmågor kategoriseras enligt variabler som utgörs av de sex grundläggande förmågorna. Genom analys och diskussion erhålls ett resultat för vardera variabel. Materialet som används är, för Gotlands del, officiell information om teknisk utrustning och prestanda, utgivet av tillverkandeföretag. Resultatet pekar på att ubåt typ Gotland som autonom enhet ej möter de krav som ställs, avseende verkan. Bestyckningen är inte lämplig att nyttja mot asymmetriska hot, med hänsyn till aspekter om insatsregler och proportionalitetsprincipen. Förutsatt att Gotland opererar i undervattensläge är dess förmåga till skydd och rörlighet god. Ubåt typ Gotland genom dess, för ubåtar, unika förmåga till dold spaning är det en värdefull resurs som kan nyttjas vid internationella insatser med asymmetriska hot.
The world is in constant transformation, so even wars and conflicts being waged. Actors of war, nowadays, not only consist of nations, but also involve non-governmental actors. In the year 2000, the American warship USS Cole was exposed to an asymmetric attack, whereby a non-governmental actor caused large damage using relatively modest resources. This type of warfare and threats are, so far, relatively new and uncommon within the marine environment. The aim of this essay is to investigate whether the Gotland class submarine is a potent platform to be used within an international operation consisting of asymmetric threats. The essay is based upon a comparison between the abilities of the Gotland class submarine and abilities required to deal with asymmetric threats in a marine environment. The abilities required and the abilities inherent of the Gotland class submarine are categorized according to a set of variables, based upon the six fundamental abilities. Through analysis and discussion, results will be obtained for each variable. The material, used for description of the Gotland class submarine, is public information of technical equipment and its performance, published by the manufacturing companies. The results indicate that the Gotland class submarine, seen as an autonomous entity, do not meet the requirements, regarding the ability of effect. The armament is not suitable for use against asymmetric threats, taking rules of engagement and the principle of proportionality into consideration. Predicting that the Gotland class submarine operates submerged, their ability of protection and movement is satisfying. The Gotland class submarine, because of its unique ability to accomplish reconnaissance operations submerged, is a valuable resource to use in international operations consisting of asymmetric threats.
Lastimado, Antonio R. "The Armed Force of the Philippines and Special Operations /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FLastimado.pdf.
Full textZiegler, Thomas. "The long war concept using the security cooperation Marine Air Ground Task Force to address irregular threats through shaping and deterrence /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490846.
Full textPoole, Benjamin Hancock. "A methodology for the robustness-based evaluation of systems-of-systems alternatives using regret analysis." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/24648.
Full textCommittee Chair: Mavris, Dimitri; Committee Member: Bishop, Carlee; Committee Member: McMichael, James; Committee Member: Nixon, Janel; Committee Member: Schrage, Daniel
Tay, Chee Bin, and Whye Kee Mui. "An architecture for network centric operations in unconventional crisis: lessons learnt from Singapore's SARS experience." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1303.
Full textSingapore and many parts of Asia were hit with Severe Acute Respiratory Syndrome (SARS) in March 2003. The spread of SARS lead to a rapidly deteriorating and chaotic situation. Because SARS was a new infection, there was no prior knowledge that could be referenced to tackle such a complex, unknown and rapidly changing problem. Fortunately, through sound measures coupled with good leadership, quick action and inter-agency cooperation, the situation was quickly brought under control. This thesis uses the SARS incident as a case study to identify a set of network centric warfare methodologies and technologies that can be leveraged to facilitate the understanding and management of complex and rapidly changing situations. The same set of methodologies and technologies can also be selectively reused and extended to handle other situations in asymmetric and unconventional warfare.
Office of Force Transformation, DoD US Future Systems Directorate, MINDEF Singapore.
Lieutenant, Republic of Singapore Army
Civilian, Defence Science and Technology Agency, Singapore
Maduka, Victor I. "Considerations for employment of Marine helicopters in future conflicts how much risk is acceptable? /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490607.
Full textPugh, Randolph G. "Refocusing intelligence support to counterinsurgency operations." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA491196.
Full textPiletti, Felipe José. "Segurança e defesa da Amazônia: o exército brasileiro e as ameaças não-tradicionais." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2008. http://hdl.handle.net/10183/14386.
Full textMost of the important wars of the Modern Age were fought by enemies organized under the state-nation form. After the end of the Cold War, however, a multiple and spread complex of phenomena and actors, mostly transnational and non-state, has become an important target of the international security policies, especially in the Western states. This new phenomena and actors with non-traditional characteristics are defined in the United States’ defense policy – as in the policies of those states and international organisms influenced by it – as the “new threats”, a concept that entails very diversified activities such as the terrorism and the organized crime (drugs, weapons and people traffic, for example). At the same time, we are supposedly experiencing a process of “securitization” of new issues through the stretching of the concept of “security” to fields like the economy, the environment, the society and the politics, allegedly overcoming the state-military-strategic understanding of security. The purpose of the present dissertation is to analyze the position of the Brazilian Army about four non-traditional security issues present in the Amazon, which are: the environmental issues, the problems related to the indigenous peoples, the transnational crimes and the Colombian guerrilla. Our hypothesis is that the activity of the Brazilian Armed Forces in the Amazon continues to predict fundamentally the defense of the national sovereignty against traditional state enemies; in this sense, the non-traditional security issues present in the Amazon are treated by the Brazilian Army as threats to the national security considering a traditional perspective – which predicts that those issues could be used as excuses to justify external interferences or even a foreign intervention by some of the “great powers” over the Amazon, under the allegation that Brazil would not be able to solve those problems by itself.
Rueschhoff, Jan L. "Old book, new lessons Mao, Osama, and the global Qutbist insurgency /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490870.
Full textChristensson, Claes. "Prickskytt i en lågintensiv konflikt : En undersökning av skillnaderna mellan den svenska prickskyttefunktionen i Sverige och Afghanistan." Thesis, Försvarshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-1408.
Full textThe essay was written by Claes Christensson, during his sixth and final semester atKarlbergMilitaryAcademy. The essay is an exam in the final course at theNationalDefenceCollege basic officers program. Before entering the program, Christensson served fifteen months conscription in Arvidsjaur at the Army Ranger Battalion (ARB). Christensson was a sniper squad leader and is himself also a trained sniper. Today the Swedish Armed Forces (SAF) takes part in different conflicts around the world. This essay focuses on the SAF contribution to the asymmetric conflict currently taking place inAfghanistan. In today’s conflicts where insurgents cannot fight using conventional warfare, other means and methods are instead used. A problem for COIN forces is the fact that insurgents hide among the civilian populace. A sniper can however, with high precision, both destroy enemy personnel or locate and distinguish insurgents from civilians. The purpose of this essay is to determine how snipers are being used by highly experienced officers when training at the ARB. These experiences will then be compared to how snipers are being utilised in the Swedish contribution to ISAF (called FS19) at the Provincial Reconstruction Team (PRT) in Mazar-i-Sharif in northernAfghanistanbetween April and October 2010. The method of this essay will be a comparison between the ARB and FS19. Commanders will be subjected to a questionnaire and answer a number of questions, based upon four subjects. The subjects are psychological effect, risks, function and organisation linked to the sniper concept. The result of this essay shows that snipers were not nearly as often being used during FS19 than during exercises at ARB. The apparent reason for this was the increased risk and that commanders from FS19 preferably used them as sharpshooters. Soldiers with sniper rifles were being used to destroy enemy personnel with high precision and to determine civilians from enemy personnel. The conclusions are that if snipers are to be used in the proper fashion, the dedicated posting needs to be implemented in the SAF contribution to ISAF. Moreover, both snipers and commanders need to train applicably to get the full understanding of the effects a sniper can have and to gain confidence in the sniper as a concept. Furthermore, the Personnel Recovery ability needs to improve so that commanders can utilise the sniper concept in high risk operations.
Johansson, Daniel. "Illusionisten Putin : Strategisk överraskning genom vilseledning - en fallstudie av rysk krigföring på Krim 2014." Thesis, Försvarshögskolan, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-9301.
Full textIn the aftermath of Russia's annexation of Crimea 2014, discussions arose about Russian military art of war and hybrid warfare. Questions were identified regarding strategic surprise and what strategies todays’ modern Russia was using. This study aims to investigate Russian military deception in connection with Russia's strategic surprise attack in Crimea 2014. The study was conducted as a single case study in which Western as well as Soviet/Russian theories of military deception was compared with the Russian activities during the Crimea annexation in 2014. The result shows Russian activities in accordance with both Western and old Soviet/Russian theories of deception. According to the study Russian main focus was distraction, active measures and disinformation leading to the Russian strategic surprise. The study shows unexpected results regarding the amount of personal activity involving the Russian president, Vladimir Putin. The result shows that the significance of a political representative such as Vladimir Putin cannot be underestimated. Additionally the study also shows that the military deception conducted by Russia in and around the period of the Crimea annexation 2014 mainly extracts from previously documented old Soviet theories. It highlights Russia’s ability to adapt into today's conflict environments by bending and adjusting old theories and doctrines. By that meaning old Soviet/Russian theories are in no way obsolete but instead being very much relevant in today's global world order.
Harvey, Conrad E. "An Army without doctrine the evolution of US Army tactics in the absence of doctrine, 1779 to 1847 /." Fort Leavenworth, KS : US Army Command and General Staff College, 2007. http://handle.dtic.mil/100.2/ADA471336.
Full text"A thesis presented to the Faculty of the U.S. Army Command and General Staff College in partial fulfillment of the requirements for the degree Master of Military Art and Science, Military History." Title from cover page of PDF file (viewed: May 29, 2008).
Lindberg, Filippa. "Hybrid War: A Conceptual History Study : The meaning of hybrid war in the scholarly debate between 2008-2021." Thesis, Försvarshögskolan, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-10271.
Full textMurat, Geoffroy. "L'éthique dans les organisations militaires : traduction sur le terrain et enseignements pour les sciences de gestion." Thesis, Dijon, 2016. http://www.theses.fr/2016DIJOE005/document.
Full textThis research questions the idea of military ethics. Our work uses an analytical framework combining three different disciplines: Ethics of care, developed in moral philosophy, Stakeholder theory, from business ethics, New institutionalism theory, from management science. This framework is then applied on two different research fields: the first one deals with the study of battles where ethical stakes were particularly high: the battle of Alger, the Iraqi war, the Srebrenica battle.The second one is qualitative interviews with officers coming back from the battlefield: 10 US officers from the Iraqi conflict and 7 French militaries from Afghanistan. These two research fields are completed by an analysis of initial trainings made in France and in the US for officers. Research results shows military men act upon a feeling of care, particularly strong towards their regimental comrade. This is a true ethics of care, more than virtues or an attachment to great principles that drives soldiers and officers’ action, even if this care to the other needs does not apply to all stakeholders, only to people from the same unit. Lessons of this work can lead to future researches not only for soldiers and officers trainings, but also in values, ethics and corporate culture.The research originality is also in the implementation of ethics of care and stakeholder theory upon military organisations
Phillippi, David M. "The disparity surrounding the integration of Joint Fires an argument for a Joint Fires Observer (Airborne) (JFO(A)) /." Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490899.
Full textSearle, Deane. "Low Intensity Conflict: Contemporary Approaches and Strategic Thinking." The University of Waikato, 2007. http://hdl.handle.net/10289/2591.
Full textVallotton, Jérémie. "La décision publique et la crise." Thesis, Mulhouse, 2016. http://www.theses.fr/2016MULH5291.
Full textThe public authorities set up a patchwork of relationships determining the standard circuit of adoption and enforcement of public decision, designed to operate within a given institutional framework, in a subsided political climate, and according to strict procedures. Yet, whether we seek to prevent a crisis or it already occured, the crisis, in its own self, questions the efficiency of public decision and even calls the logical sequencing of the various partaking elements into question. The current thesis aims at unvealing what should be the determining factors for public action facing a crisis, through the study of the laws of human action and their permanent and variable features
Lin, Chi-Chen, and 林啟成. "A study of Asymmetrical Warfare thinking and China’s military strategy toward Taiwan." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/19124194392156759291.
Full text銘傳大學
社會科學院國家發展與兩岸關係碩士在職專班
97
“Asymmetric warfare” is an operation combining strategies. Such operation consists of every means, happening everywhere, such as conventional warfare, diplomatic warfare, sanction warfare, regulation warfare, media war, psychological warfare, and information warfare. There are many flexible military strategies in several fields. In the last 20 years, the outcomes of several significant internal wars express a edification: “how to win the partial wars in conditions of high technology and high information.” Therefore, the purposes of the study are as follows: 1. to realize the meditation and meaning of the asymmetric warfare 2. to understand the development of Mainland China’s military strategy toward Taiwan 3. how to figure out our own military strategies As for the studying methodology, Mainland China’s military information is a sensitive issue and it is hard to collect or search, so the thesis adopts documentary analysis. Because of the temporal and spatial limits, historical research and documentary analysis are applicable for the study and discussion of Mainland China’s military strategy. Therefore, the thesis adopts these two methods. Mainland China’s military strategy stresses a partial war in conditions of high technology. Since the focus lies on the partial, it is impossible to extend the war to other fields. Partial military strategies listed in “asymmetric warfare” violate international regulations, such as financial warfare, trade warfare, resource warfare, smuggling warfare, and narcotic warfare. Generally, common countries do not adopt these strategies. If military strategies, such as nuclear, biochemistry, ecology, finance, resources, or trade, are applied to the war, the negative effects will be out of control. The “spillover effect” will threaten the safety of other countries, causing the condemn from those non-belligerents and a following war of a broader area. Therefore, military strategies are still limited even in asymmetric warfare. The asymmetric warfare still V cannot act on its own will.
Tseng, Yi-Hsien, and 曾譯賢. "Taiwan’s Asymmetric Warfare Against China Landing operations." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/19153064918303862374.
Full text國立中正大學
戰略暨國際事務研究所
103
The rapid rise of China's power also comes with a growing military strength. Its influence on Asia’s geostrategic and regional security is continuing increasing. Despite there are official and unofficial interactions between cross-strait relations, the situation thus seems moderated. Once China never give up using forces to liberate Taiwan forces, there are no guarantee of cross -strait relations safety. Taiwan, as a survival of a small country lives besides a great power next door, we have no right to be optimism let along to be pessimism. We must study China's military threat to Taiwan carefully and use "asymmetric warfare" to against China's People's Liberation Army (PLA) amphibious Force landing action. This paper is divided into four parts. The first part of the concept is introducing asymmetric warfare and its background knowledge. Second, China's military rise against Taiwan threat assessment. Third, China possible landing operations. Forth, Combination of asymmetric warfare force to against PLA’s army. Among above, faced with the threat of China's military strength, geographical conditions and battlefield environment given Taiwan's highly valuable strategic asset. In addition, how to use the strength of “asymmetric warfare” to maximize our combat effectiveness with limited defense resources has become a vital question for Taiwan. Keywords:Asymmetric Warfare, Landing Operations, Anti-landing Operations , People's Liberation Army (PLA)
Wu, Chang-hung, and 巫乾煌. "Asymmetric Warfare — A Study of Theory and Applications." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/75680557663123735846.
Full text國防管理學院
國防決策科學研究所
89
Abstract Since the ending of cold war, the whole international system has been reorganizing, the chance of world war is reduced, and the concept of national security is expanded; therefore, the various kinds of threat is everywhere, and the traditional strategic thinking can't cope with the challenge of war in the future any more. In a "Asymmetric warfare", special attention is paid to strategy application, focal point is placed on the sensitive areas, such as analyzing major strategy of both sides, and evaluating the factors that affect confrontation of both sides. Looking at overall strategic guidance, the objective is to destroy military structure of the enemy and achieve the our best performance. The core of carrying out "Asymmetric warfare" is to actively develop our strength, transform the situation to our advantage not disadvantage, utilize our strength and avoid exposing our weakness. We can utilize our strength to attack the enemy's weakness, take actions according to the circumstances, and maintain our flexibility throughout the process. Upon observing military development trend of PRC, in order to win " modern limited war" they have been using " two handed strategy". On one hand, they focus the long term strategic planning on achieving defense independence, they have been developing their capability to deter any threat effectively and maintaining a military force so that they can achieve their objective. In terms of short and medium time frame, they acquire the advanced weapon in order to close up their " technology gap " with western nations, meanwhile they try to improve their military capability which is inadequate and far behind western nations until their military modernization is fully completed. Their experience give us some ideas how we can adopt "Asymmetric warfare" strategy, and expect that "tactical success" can finally achieve "strategic effect". Living in this era of rapid changes, nobody can correctly predict the type of the war which might be taken place in the future, but we ought to carry out the research of possible future war, utilizing limited resources and adopting cautious approach to prepare ourselves for the war in the future, using wisdom, peaceful mind and rationality to analyze, think, construct and evaluate our living environment, finding out the value and strategic direction we really want, then constructing our strategy that provides national security and development, finally build a model that could let us stay here peacefully and joyfully.
Wan-Yu, Chung, and 鍾萬有. "The Development of PRC's Asymmetric Warfare Thinking:Strategic Culture Perspective." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/02923751391470786198.
Full text國防大學
戰略研究所
97
The first appearance of the term “asymmetric warfare” was in the US military doctrine. Since that time, the PRC continues to work on this thought, and applies it to military strategy, tactic and operation levels. The PRC has endeavored to explore thoroughly and comprehensively the concept of “asymmetric warfare”, also has put it into practice with concrete measures on military operation theories and the development of armament. In this study, I have analyzed and examined related documents and history from the viewpoint of strategic culture which is the root of the PRC’s military strategy, trying to figure out the modeling of asymmetric warfare thinking in the PRC strategic culture and the effects of this thinking on the development process of military strategy. And I have also found some concrete movements of the PRC’s asymmetric warfare by observing the asymmetric warfare thinking presented in the development process of military thought and strategy. Facing possible threats of national security, it is necessary to learn from our enemies and take a predominant position in the asymmetric warfare. If we can understand the concrete movements and measures of the PRC in enforcing the asymmetric warfare, learn from their experiences, and combine what we have learned with our existing advantages of military power, we can develop some tactics, skills and battle fields which benefit us but not our enemies, and treat them the same way as they treat us. Moreover, we can create our strategic advantages of asymmetric warfare with the art of “the inferior defeating the superior”.
Arreguín-Toft, Ivan. "Arts of darkness : barbarism & guerrilla warfare in asymmetric conflict /." 1998. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&res_dat=xri:pqdiss&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&rft_dat=xri:pqdiss:9910838.
Full textShier, Peii, and 施佩伊. "A Study of Single-Issue Terrorism─The Weaker’s Asymmetric Warfare." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/15562170645158873919.
Full text