To see the other types of publications on this topic, follow the link: Comprehensive security.

Dissertations / Theses on the topic 'Comprehensive security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Comprehensive security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Feffer, Antonia Lynn. "Comprehensive security strategy for all-optical networks." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/99866.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, 2015.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 107-109).
Optical networking is a powerful means of communication in modem times of high bandwidth demands and high data speeds. While developments in optical networking continue to progress, however, the security implications they create have not yet caught up. In this thesis, we characterize a selection of damaging attacks against optical networks. By providing a detailed description of the attacks, we are also able to better understand their effects across the different layers of the network model. We also propose the current best practices for sensing and detection of these attacks when they occur, as well as mitigation techniques to limit the damage they incur. The attacks are not fully eliminated, however, and so we also identify remaining vulnerabilities these attacks can exploit. After characterizing the attacks, we propose a method for diagnosing attacks as they occur within a network given the analysis we have conducted. We also propose an algorithm for diagnosing attacks, as well as a monitoring system framework that relies on the establishment of autonomous zones of the network in order to efficiently limit damage and quarantine problem areas from the rest of the healthy network. This framework can be applied to a wide variety of network set-ups and topologies, with the ability to customize it to fit the needs of the system.
by Antonia Lynn Feffer.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
2

Homer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Schmid, Markus Thomas. "The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /." Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2007.
Thesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
4

Tong, Sui-yip. "The implementation of the policy of comprehensive social security assistance." Click to view the E-thesis via HKUTO, 2006. http://sunzi.lib.hku.hk/hkuto/record/B36449714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Tong, Sui-yip, and 唐瑞葉. "The implementation of the policy of comprehensive social security assistance." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2006. http://hub.hku.hk/bib/B36449714.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Zwolski, Kamil. "The EU as an international security actor : a comprehensive approach." Thesis, University of Salford, 2010. http://usir.salford.ac.uk/26986/.

Full text
Abstract:
There is a vibrant discussion in academia about the role of the European Union (EU) in international security. However, this discussion largely concentrates on the Common Security and Defence Policy (CSDP) not fully acknowledging the instruments of the European Commission. Also, the majority of publications tend to limit the analysis to more traditional security problems, whilst literature on contemporary security studies often illustrates how the security concept has broadened in the last few decades. This thesis offers an original framework to studying the EU as a security actor, by adopting the comprehensive approach. Such an approach is important in order to address two aforementioned problems in the literature. First, this thesis does not limit its analysis to the CSDP, but also looks at the role of the European Commission in developing the EU’s international security policy. Second, this thesis goes beyond traditional security problems, by including three diverse case studies: a) climate change, representing the so-called ‘non traditional’ security challenge; b) the threat of the proliferation of WMDs, in particular from Russia; and c) piracy off the Somali coast. This PhD concludes that the EU already plays a significant role as an international security actor; there are two important aspects of this role. Firstly, the analysis has demonstrated that the instruments of the European Commission, such as the Instrument for Stability, significantly complement EU policies undertaken within the framework of the CSDP. Secondly, this study has also demonstrated the importance of including the so-called ‘non-traditional’ security challenges, such as climate change, when analysing the role of the EU as a security actor. Thus, it was important to analyse EU policy in this area, alongside EU policies regarding more traditional security problems.
APA, Harvard, Vancouver, ISO, and other styles
7

Brady, Eric Bonham. "Security Analysis: A Suggested Method for a Comprehensive Top-Down Approach." Thesis, The University of Arizona, 2014. http://hdl.handle.net/10150/319941.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Schatz, Daniel. "Towards a comprehensive evidence-based approach for information security value assessment." Thesis, University of East London, 2018. http://roar.uel.ac.uk/7950/.

Full text
Abstract:
This thesis is motivated by the goals of understanding in depth which information security value aspects are relevant in real-world business environments and contributing a value-prioritised information security investment decision model suitable for practitioners in the field. Pursuing this goal, we apply a mixed method research approach that combines the analysis of the relevant literature, expert interviews, practitioner survey data and structural equation modelling and multicriteria decision analysis. In the first step, we address the identified terminology gap to clarify the meaning of 'cyber security' by analysing authoritative definition sources in the literature and presenting an improved definition distinct from that of 'information security'. We then investigate the influence of repeated information security breaches on an organisation's stock market value to benchmark the wider economic impact of such events. We find abnormal returns following a breach event as well as weak statistical significance on abnormal returns for later breach events, confirming that data breaches have a negative impact on organisations. To understand how security practitioners view this topic, we conduct and analyse semi-structured interviews following a grounded theory approach. Our research identifies 15 principles aligned with a conceptual information security investment framework. The key components of this framework such as the business environment, drivers (threat landscape, legal and regulatory) and challenges (cost of security, uncertainty) are found to be a crucial part of value-prioritised information security investment decisions. We verify these findings through a structural model consisting of five latent variables representing key areas in value-focused information security investment decisions. The model shows that security capabilities have the largest direct effect on the value organisations gain from information security investment. In addition, the value outcome is strongly influenced by organisation-specific constructs such as the threat landscape and regulatory requirements, which must therefore be considered when creating security capabilities. By addressing one of the key uncertainty issues, we use a probabilistic topic modelling approach to identify latent security threat prediction topics from a large pool of security predictions publicised in the media. We further verify the prediction outcomes through a survey instrument. The results confirm the feasibility of forecasting notable threat developments in this context, implying that practitioners can use this approach to reduce uncertainty and improve security investment decisions. In the last part of the thesis, we present a multicriteria decision model that combines our results on value-prioritised information security investments in an organisational context. Based on predefined criteria and preferences and by utilising stochastic multicriteria acceptability analysis as the adopted methodology, our model can deal with substantial uncertainty while offering ease of use for practitioners.
APA, Harvard, Vancouver, ISO, and other styles
9

Al, Mayahi Ibrahim Humaid. "Development of a comprehensive information security system for UAE e-Government." Thesis, Bangor University, 2016. https://research.bangor.ac.uk/portal/en/theses/development-of-a-comprehensive-information-security-system-for-uae-egovernment(190cd7ed-2d1d-4805-963a-5f6d1dc46971).html.

Full text
Abstract:
The UAE has a vision of delivering unified e-Government services across numerous departments of seven emirates. The primary goal is to bring all aspects of the government information services online for every citizens and business by completely replacing the existing paper-based bureaucracy. This creates significant risks and information security challenges which the UAE e-Government is seeking to address. This thesis makes a comprehensive review of the UAE e-Government’s information security posture. An analysis of the current strengths and weaknesses of the e-Government was carried out, SWOT analysis was employed and based on the results, a TOWS matrix was constructed facilitating the development of new e-Government strategies to mitigate external threats. To implement an Information Security Management System (ISMS) across the e-Government departments, a framework was developed based on a multi-layered approach that is used to structure the information security program. It considers three factors; technology, operations and people (employees), to increase the effectiveness of information security system. To implement the framework, several international standards were evaluated and subsequently the ISO 27001 standard was used as a benchmark for achieving a secure e-Government. A Gap Analysis was carried out to evaluate the current state of the security culture within the e-Government against the standard and a Risk Assessment was carried out to demonstrate the existing risks faced by e-Government services. A comprehensive series of penetration tests were commissioned on e-Government network infrastructure. Having made interventions to improve the security of physical information technologies and organisational operations, a comprehensive questionnaire was developed to obtain quantitative evaluation of the security culture within the organisation. Subsequently, a training programme was devised and developed for the employees to demonstrably improve the security culture as measured by this approach. Finally, the findings, in conjunction with a consultation with security heads within the UAE e-Government, are used to construct a single comprehensive information security policy that can be rolled out to all e-Government departments within the seven emirates.
APA, Harvard, Vancouver, ISO, and other styles
10

Klenke, Carsten. "Japan's comprehensive National Security and the European Union's Common Foreign and Security Policy convergence towards global cooperation? /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380827.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2000.
Thesis advisor(s): Olsen, Edward A. ; Abenheim, Donald. "June 2000." Includes bibliographical references (p. 97-101). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
11

Egners, André [Verfasser]. "A comprehensive security architecture for multi-operator wireless mesh networks / André Egners." Aachen : Hochschulbibliothek der Rheinisch-Westfälischen Technischen Hochschule Aachen, 2015. http://d-nb.info/1076683851/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Alba, Avril. "Water in Israel and the occupied territories : towards a comprehensive security agenda /." Title page, contents and abstract only, 1994. http://web4.library.adelaide.edu.au/theses/09AR/09ara325.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Morrissey, Joseph Patrick. "The extension and hardware implementation of the comprehensive integrated security system concept." Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/336.

Full text
Abstract:
The current strategy to computer networking is to increase the accessibility that legitimate users have to their respective systems and to distribute functionality. This creates a more efficient working environment, users may work from home, organisations can make better use of their computing power. Unfortunately, a side effect of opening up computer systems and placing them on potentially global networks is that they face increased threats from uncontrolled access points, and from eavesdroppers listening to the data communicated between systems. Along with these increased threats the traditional ones such as disgruntled employees, malicious software, and accidental damage must still be countered. A comprehensive integrated security system ( CISS ) has been developed to provide security within the Open Systems Interconnection (OSI) and Open Distributed Processing (ODP) environments. The research described in this thesis investigates alternative methods for its implementation and its optimisation through partial implementation within hardware and software and the investigation of mechanismsto improve its security. A new deployment strategy for CISS is described where functionality is divided amongst computing platforms of increasing capability within a security domain. Definitions are given of a: local security unit, that provides terminal security; local security servers that serve the local security units and domain management centres that provide security service coordination within a domain. New hardware that provides RSA and DES functionality capable of being connected to Sun microsystems is detailed. The board can be used as a basic building block of CISS, providing fast cryptographic facilities, or in isolation for discrete cryptographic services. Software written for UNIX in C/C++ is described, which provides optimised security mechanisms on computer systems that do not have SBus connectivity. A new identification/authentication mechanism is investigated that can be added to existing systems with the potential for extension into a real time supervision scenario. The mechanism uses keystroke analysis through the application of neural networks and genetic algorithms and has produced very encouraging results. Finally, a new conceptual model for intrusion detection capable of dealing with real time and historical evaluation is discussed, which further enhances the CISS concept.
APA, Harvard, Vancouver, ISO, and other styles
14

Roberts, Christopher B. Humanities &amp Social Sciences Australian Defence Force Academy UNSW. "ASEAN's Security Community Project : Challenges and Opportunities in the Pursuit of Comprehensive Integration." Awarded by:University of New South Wales - Australian Defence Force Academy, 2008. http://handle.unsw.edu.au/1959.4/40261.

Full text
Abstract:
In October 2003, the Association of Southeast Asian Nations (ASEAN) proposed the establishment of a security, economic and socio-cultural community by the year 2020. Given that initiators of the ASEAN proposal were informed by the scholarly literature on the concept of a 'security community', this dissertation develops and then tests the concept in relation to the ASEAN states. Here, the concept of a 'security community' is understood as 'a transnational grouping of two or more states whose sovereignty is increasingly amalgamated and whose people maintain dependable expectations of peaceful change'. The application of the 'security community framework' developed in this study is necessary to provide a conceptual basis for critically assessing the major factors that could potentially impede ASEAN's evolution towards a security community. For the purpose of such an assessment, the study provides a detailed investigation of the most significant historical issues and contemporary security challenges that inform the nature of inter-state relations in Southeast Asia. As a complement to this approach, the dissertation incorporates the analysis of data obtained from extensive fieldwork in all ten of the ASEAN states involving over 100 in-depth interviews and two survey designs (one at the elite level and another at the communal level) involving 919 participants. While the survey work, especially at the communal level, is best considered a pilot study and the results are therefore to be considered as indicative, the research nevertheless represents the first empirical assessment of regional perceptions of trust, intra-mural relations, security, economic integration, and liberalisation and of a broad range of other factors relevant to the analysis. The interview data has also been invaluable in uncovering previously unpublished information and in contextualising the analysis. Despite a considerable strengthening of the region's security architecture since ASEAN's formation, the ten chapters in the study reveal that the Association has a long way to travel before it will satisfy the defining criteria of a security community. The region lacks a common sense of community and consequently the level of trust between the Southeast Asian states remains problematic. The political elite continue to engage in episodes of competitive behaviour, have been unable to resolve territorial disputes, and thus the continued potential for armed conflict undermines the prospect for 'dependable expectations of peaceful change'. Therefore, ASEAN's evolution towards the status of a security community, if it proceeds further, will likely occur over the course of many decades rather than by ASEAN's current goal of 2015.
APA, Harvard, Vancouver, ISO, and other styles
15

Kane, Christian D. "Key issues in the emerging U.S. debate on the Comprehensive Test Ban Treaty." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Dec/09Dec%5FKane.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies(Homeland Security and Defense))--Naval Postgraduate School, December 2009.
Thesis Advisor(s): Yost, David S. ; Wirtz, James J. "December 2009." Description based on title screen as viewed on January 27, 2010. Author(s) subject terms: Comprehensive Test Ban Treaty, nuclear weapons. Includes bibliographical references (p. 53-58). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
16

Suen, Yan-on. "Family care for the portable comprehensive social security assistance (PCSSA) elderly recipients in Guangdong /." Hong Kong : University of Hong Kong, 1998. http://sunzi.lib.hku.hk/hkuto/record.jsp?B22331402.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Moholt, van Reeuwijk Yvonne. "Enhancing the European security and defence policy : European integration and the changing of the Norwegian and the Swedish security identities." Thesis, Uppsala universitet, Teologiska institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-359694.

Full text
Abstract:
This paper examines the relationship between Europeanisation and the recent changes of the Norwegian and Swedish security identities. Since the mid-1990s, these two countries have gone different ways, the former as an active non-member with no decision-making powers and the latter as an active participant in the development of the European Security and Defence Policy (ESDP). Concerning Norway and Sweden’s security identity, both have changed exceedingly over the years. Norway, which has valued the US and the transatlantic partnership through NATO, namely being an ‘Atlanticist’, seeks a deeper connection to the EU as a security actor over the last fifteen years, despite the authorities emphasizing that NATO remains the cornerstone for Norwegian security policy. Sweden, which maintained strongly neutral and non-aligned throughout the 20th century, was initially sceptic to partaking in the security and defence dimension of the Union. Nonetheless, Sweden, as a member, managed to change its perception of EU’s security policy through highlighting crisis management and turned out to become one of EU’s most active contributors in shaping the ESDP. This paper concludes that Norway and Sweden have seen similar outcomes concerning Europeanisation, despite holding different positions in relation to the EU. Norway has not been able to hold an influential role respecting its European integration process, even though the authorities seek to gain as much input as possible into the ESDP through associate membership. Sweden, in contrast, entered the Union with an initial negative attitude concerning the security and defence policy but has changed its perception and chosen to play an active part in the policy making process through influencing and deepening its cooperation.
APA, Harvard, Vancouver, ISO, and other styles
18

Zielinski, Helen. "Cambodia : its effect upon ASEAN unity and regional security pre and post the comprehensive political settlement /." Title page, contents and introduction only, 1993. http://web4.library.adelaide.edu.au/theses/09AR/09arz661.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Berg, Sara E. "Recommendations for a comprehensive identity theft victimization survey framework and information technology prevention strategies /." Link to online version, 2006. https://ritdml.rit.edu/dspace/handle/1850/1647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Sironi, Luke. "The Comprehensive Test Ban Treaty and its security implications for the United Kingdom and the United States." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1998. http://handle.dtic.mil/100.2/ADA359022.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, December 1998.
"December 1998." Thesis advisor(s): David S. Yost, Scott D. Tollefson. Includes bibliographical references (p. 63-67). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
21

Cha, Chang Hoon. "Beyond anti-hegemonism to security regime : China's perspectives, institutions and engagement in the Comprehensive Test Ban Treaty." Thesis, University of Warwick, 2002. http://wrap.warwick.ac.uk/35580/.

Full text
Abstract:
This research analyzes China's socialization in the international Arms Control and Disarmament (ACD) field. Constructing the theoretical framework of "dynamic interaction between state and institution" in order to reconcile the "problem of agend and structure" debated in IR, the research identified the formative effects on China during the last two decades in general and in the post-CTBT (Comprehensive Test Ban Treaty) period in particular, which engaged China in the international ACD institutions and regimes. The socialization effects on China are recognized at the three levels: China's norm internalization (perspective), institutionalization (domestic institutions) and comprehensive participation in the international ACD regimes and institutions. The evidence based on documentary works and a few interviews suggests that the engagement in international institutions is promoting a Chinese nexus in these institutions, creating new Chinese interests and socializing China into building consensus to resolving international ACD issues. The evolution and differentiation of Chinese perspectives on ACD issues resulted into the view that stresses China's role and responsibility within the regimes. The "new security concept" based on mutual security and restructuring of domestic ACD institutions in the late 1990s were the products of the socialization that "dynamic interaction" fostered. During the CTBT talks, China showed the norm-complying and establishing attitude. China also committed to the nuclear test ban norm by sustaining the nuclear test moratorium since 1996. The socialization process led China to more comprehensive and constructive participation in the international ACD institutions and regimes as China joined the Zangger Committee and supported the FMCT (Fissile Material Cutoff Treaty) after its accession to the CTBT. As constructivists argue that state can reshape structure by process. China reconstituted its interests and identities throughout the interaction with the international ACD institutions. China's more proactive role within ACD institutions and regimes will give it more constitutive socialization influence, but the role is basically entrenched in "state enhancement functionalism."
APA, Harvard, Vancouver, ISO, and other styles
22

Li, Mable, and 李美寶. "An exploratory study of the importance of consumption emotion to olderpersons receiving comprehensive social security assistance in HongKong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2009. http://hub.hku.hk/bib/B45418020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Chan, Lit-fai. "Feminization of poverty in Hong Kong : the experiences of pauperization of lone mothers receiving comprehensive social security assistance (CSSA) /." Hong Kong : University of Hong Kong, 1999. http://sunzi.lib.hku.hk/hkuto/record.jsp?B21028953.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Yang, Fang. "A Comprehensive Approach for Bulk Power System Reliability Assessment." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14488.

Full text
Abstract:
Abstract The goal of this research is to advance the state of the art in bulk power system reliability assessment. Bulk power system reliability assessment is an important procedure at both power system planning and operating stages to assure reliable and acceptable electricity service to customers. With the increase in the complexity of modern power systems and advances in the power industry toward restructuring, the system models and algorithms of traditional reliability assessment techniques are becoming obsolete as they suffer from nonrealistic system models and slow convergence (even non-convergence) when multi-level contingencies are considered and the system is overstressed. To allow more rigor in system modeling and higher computational efficiency in reliability evaluation procedures, this research proposes an analytically-based security-constrained adequacy evaluation (SCAE) methodology that performs bulk power system reliability assessment. The SCAE methodology adopts a single-phase quadratized power flow (SPQPF) model as a basis and encompasses three main steps: (1) critical contingency selection, (2) effects analysis, and (3) reliability index computations. In the critical contingency selection, an improved contingency selection method is developed using a wind-chime contingency enumeration scheme and a performance index approach based on the system state linearization technique, which can rank critical contingencies with high accuracy and efficiency. In the effects analysis for selected critical contingencies, a non-divergent optimal quadratized power flow (NDOQPF) algorithm is developed to (1) incorporate major system operating practices, security constraints, and remedial actions in a constrained optimization problem and (2) guarantee convergence and provide a solution under all conditions. This algorithm is also capable of efficiently solving the ISO/RTO operational mode in deregulated power systems. Based on the results of the effects analysis, reliability indices that provide a quantitative indication of the system reliability level are computed. In addition, this research extends the proposed SCAE framework to include the effects of protection system hidden failures on bulk power system reliability. The overall SCAE methodology is implemented and applied to IEEE reliability test systems, and evaluation results demonstrate the expected features of proposed advanced techniques. Finally, the contributions of this research are summarized and recommendations for future research are proposed.
APA, Harvard, Vancouver, ISO, and other styles
25

Hagemann, Frank. "Strategic planning for comprehensive security in the European Union's military operations EUROFOR RD Congo, EUROF Tchad/RCA, and EUNAVFOR Somalia /." Thesis, Monterey, California : Naval Postgraduate School, 2010. http://edocs.nps.edu/npspubs/scholarly/theses/2010/Jun/10Jun%5FHagemann.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Europe and Eurasia))--Naval Postgraduate School, June 2010.
Thesis Advisor(s): Abenheim, Donald ; Yost, David S. "June 2010." Description based on title screen as viewed on July 14, 2010. Author(s) subject terms: European Union, comprehensive security, strategic planning, European security and defense policy, ESDP, common security and defense policy, CSDP, military operations, crisis management, EUFOR RD Congo, EUFOR Tchad/RCA, EUNAVFOR Somalia Includes bibliographical references (p. 83-98). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
26

Toplu, Esra. "The Euro-Mediterranean Partnership: Critical Assessment of the Security Aspects." Thesis, Linköping University, Department of Management and Economics, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2650.

Full text
Abstract:

This thesis attempts to assess the security aspect of the Barcelona Process (Process), or so called Euro-Mediterranean Partnership (EMP) within the theoretical framework of new regionalism and the Copenhagen School (Security complex theory) which agrees with neo/realism, neo-liberal institutionalism and constructivism in some aspects. The end of the Cold War broadened the security agenda and new security concerns emerged. Actually, most of the so- called security threats are not new, but the perception of them by the states has changed with globalization which increased the interconnectedness and density of the interaction. Global challenges have made states more vulnerable so appreciated the cooperative interaction at regional level. Comprehensive and cooperative security approaches gained importance and led regional security partnership among states. The construction of Euro-Mediterranean security partnership is one case stemming from the high level of interdependence between the European and the Mediterranean countries. The historical ties, economic dependency, geographical proximity increased the EU’s interest towards the Mediterranean. While new regionalism enables to grasp systemic factors in the Process, the Copenhagen School permits to understand security partnership at the regional level. The rise of illegal immigration flows and religious fundamentalism in the Mediterranean as well as tension in the Middle East conflict, the Iraqi War, and terrorist attacks to the US, Algeria and recently Turkey appreciated the importance of the EMP policy and security cooperation so make this study more crucial.

This study showed that the security challenges in five sectors of the security defined by the Copenhagen School are observable in the EMP’s case. Both military and non-military concerns threaten the stability and prosperity in the Mediterranean Basin. The three baskets of the EMP depict its comprehensive security approach. Having made an overview of the Barcelona Process, the thesis evaluated the security challenges in general and the thematic areas of concerns in depth. Since security cannot be defined without reference to the perceptions and security cultures of the actors, the study examined the perceptions and security cultures in the EMP.

The evaluation of the EMP showed that the EMP has shown certain developments on the way for the security cooperation. However, it could not produce tangible results due to the fundamental shortcomings categorized as inter and intra-institutional incoherence, definitional/perceptional problems and multi- actor involvement in the region. The lack of institutional structures, asymmetrical relations among partners, unbalanced distribution of powers and lack of commitment of the EU are crucial problems. On the basis of all problems lie the gap between the perceptions and security culture of Europe and the Arab world. Thus, this thesis emphasizes the enhancement of inter- subjective understanding and cultural dialogue in order to improve trust and interaction among partners. The EMP is on right track to build zone of peace in the Basin, but it requires longue durée to achieve this.

APA, Harvard, Vancouver, ISO, and other styles
27

Olufunsho, R. T. "The new partnership for Africa's development (NEPAD) and food security : reviewing the activities of the Comprehensive Africa Agrigulture Development Programme (CAADP)." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/5044.

Full text
Abstract:
Thesis (MBA (Business Management))--University of Stellenbosch, 2009.
ENGLISH ABSTRACT: The Comprehensive Africa Agriculture Development Programme (CAADP) represents the New Partnership for Africa’s Developments’ (NEPAD) framework for revitalising Africa’s agriculture. Improving agricultural performance is at the heart of improved economic development and growth. NEPAD believes that agriculture will provide the engine for growth in Africa. The CAADP framework was developed by the NEPAD Steering Committee in collaboration with the Food and Agricultural Organisation (FAO) of the United Nations. It also includes the contributions of other institutions such as the International Fund for Agricultural Development (FAD), the World Food Programme (WFP), the World Bank, and the Forum for Agricultural Research in Africa (FARA). The CAADP focused on investments in four pillars that can make the earliest difference to Africa’s agricultural crisis. These mutually reinforcing pillars were expected to bring about improvements in terms of Africa’s agriculture, food security, and trade balance. This will ultimately enable Africa to reach its Millennium Development Goal of reducing hunger and poverty by half by 2015 (WDR). For the purpose of this particular study, the first investment pillar, which is water and land management, will be scrutinised extensively, as this is critical to achieving the so much talked about food security. The study will utilise both secondary and primary documents of NEPAD. More specifically the implemented water and irrigation projects in the East and West Africa countries will be reviewed to determine success in African agricultural development under NEPAD. It will identify specifically water management projects already implemented and those already initiated, and find out whether the CAADP is set to deliver the Millennium Development Goal.
AFRIKAANSE OPSOMMING: Die ‘Omvattende Landbou Ontwikkelingsprogram’ (CAADP) is die raamwerk van NEPAD se pogings om Afrika se landbousektor te hergenereer. Verbeterde landbou is die kern van verbeterde ekonomiese groei en ontwikkeling in Afrika. Trouens, NEPAD glo dat landbou die dryfkrag van Afrika se ekonomiese groei sal wees. Die CAADP-raamwerk is ontwikkel deur NEPAD se leierskap, in noue samewerking met die Verenigde Nasies se Voedsel en Landbouorganisasie (FAO). Die raamwerk sluit ook in bydraes van ander liggame, soos die Internasionale Fonds vir Landbouontwikkeling (FAD), die Wêreldvoedselprogram (WFP), die Wêreldbank en die Forum vir Landbounavorsing in Afrika (FARA). Die CAADP fokus op vier investeringspilare wat Afrika se landboukrisis van onder af kan aanpak. Hierdie interafhanklike pilare is veronderstel om Afrika se landbou, voedselversorging en handelsbalans gelyktydig aan te pak. Hierdie stappe behoort te help dat Afrika die Millennium Ontwikkelingsoogmerk (nl. ‘n halvering van honger teen 2015) te bereik. In hierdie studie val die klem op die eerste pilaar, nl. water en grondbestuur, as voorwaarde vir voedselsekuriteit. Die studie maak gebruik van sowel primêre en sekondêre dokumentasies van NEPAD, met besondere fokus op water en besproeiingsprojekte in Oos- en Wes-Afrika. Daar word gekyk na spesifieke projekte wat reeds bestaan en wat geïnisieer is, ten einde die sukses van CAADP te bepaal.
APA, Harvard, Vancouver, ISO, and other styles
28

Wessén, Daniel. "COIN-operationen i Afghanistan : Svårigheterna med de säkerhetspolitiska målsättningarna." Thesis, Försvarshögskolan, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-3007.

Full text
Abstract:
Det kan vara svårt att göra korrekta bedömningar i konflikter likt Afghanistan idag. Nato har definerat insatsen i Afghanistan som en Counter-insurgency (COIN)-operation. Osäkerhetsfaktorerna är många och där skiftningar i framgångarna varierar kraftigt över tiden. Det gör också att i många fall måste det finnas parallella processer för det säkerhetspolitiska arbetet. Komplexiteten med detta har gjort att det har utvecklats multifunktionella strategier. Grundtanken är att samordna militära och civila ansatser för att nå största möjliga effekt. Syftet med uppsatsen är att belysa svårigheterna med de säkerhetspolitiska målsättningarna i en COIN-operation. Resultatet av undersökningen visar att de politiska målsättningarna måste vara tydliga och att det måste finnas en slutmålsättning (Exit Strategy). Den politiska nivån är även ansvarigt för att det finns en gemensam förståelse för vad som ska uppnås samt att samordna resurserna för bästa möjliga effekt. Ekonomiska medel är viktiga men inte självklara för att påverka utvecklingen i konflikten. Effekten av bistånd och utvecklingsarbetet är ifrågasätt p.g.a. korruption och dålig samordning. Utan tydliga målsättningar från den politiska nivån kommer det militära maktmedlet ha svårt att bidra till lösningen av konflikten då risken finns att ansträngningarna leder i fel riktning. Slutligen kan det konstateras att media har en stor inverkan på hur konflikten uppfattas och att oegentligheter kan påverka hela strategin och därmed att målsättningarna inte uppnås.
It can be difficult to make accurate assessments in conflicts like Afghanistan today. NATO has defined the operation in Afghanistan as a counterinsurgency (COIN) operation. The uncertainties are many and where the changes of success varies considerably over time. It also means that in many cases, there must be parallel processes for the security policy work. The complexity of this means it has developed multi-functional strategies. The basic idea is to coordinate military and civilian approaches to achieve maximum impact. The purpose of this paper is to highlight the difficulties of the security policy objectives in a COIN operation. The survey data shows that the political objectives must be clear and that there must be an end goal (Exit Strategy). The political aspect is also responsible for the existence of a common understanding of what is to be achieved, and to coordinate resources to best effect. Financial resources are important but not obvious to influence developments in the conflict. The effect of aid and development work is questionable due corruption and poor coordination. Without clear objectives from the political level, the military power may have difficulty in helping resolve the conflict and then the chances are that the effort will lead in the wrong direction. Finally, it is clear that the media has a huge impact on how conflict is perceived and that irregularities can affect the whole strategy and therefore that the objectives are not achieved.
APA, Harvard, Vancouver, ISO, and other styles
29

Schellekens-Gaiffe, Marie-Ange. "La sécurité environnementale dans les relations extérieures de l’Union européenne : vers une approche intégrée de la prévention des conflits et crises externes." Thesis, La Rochelle, 2017. http://www.theses.fr/2017LAROD004/document.

Full text
Abstract:
Le rapprochement entre dégradation environnementale et défis de sécurité s’est effectué très progressivement, même si de nombreuses divergences subsistent, en particulier sur les causes et enjeux sous-jacents de ce rapprochement. Les effets de plus en plus notables du changement climatique dans nos sociétés ont, pourtant, indirectement permis à ces questions d’opérer une percée dans l’agenda politique international. L’Union européenne, elle-même née d’un exercice réussi de prévention des conflits et leader de la protection internationale de l’environnement est-elle en mesure de contribuer à cet objectif ? Au-delà de l’urgence écologique, la sécurité environnementale porte en son sein des éléments qui pourraient en faire l’un des moteurs de la politique étrangère de l’Union européenne en contribuant à une meilleure appréhension des causes profondes et multiples des conflits, pouvant à la fois soutenir la stabilité internationale et renforcer le rôle de l’UE en tant qu’acteur global
The link between environmental problems and risks to security is progressively gaining ground, even though diverging opinions still prevail as to the exact nature and challenges of this interaction. The increasingly visible impacts of climate change have indirectly strengthened the prominence of this issue on the international agenda. Can the European Union, born itself from a successful approach to conflict prevention and international leader for environmental protection contribute to this aim ? Beyond the immediate urgency of environmental problems, environmental security carries several elements which could turn it into a driving force for the European Union's foreign policy by an improved understanding of the actual roots and multifaceted nature of numerous conflicts. This would allow the EU to support global stability and to strengthen its role on the international scene
APA, Harvard, Vancouver, ISO, and other styles
30

Lambe, Erik. "Information Security Culture and Threat Perception : Comprehension and awareness of latent threats in organisational settings concerned with information security." Thesis, Uppsala universitet, Statsvetenskapliga institutionen, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-352263.

Full text
Abstract:
A new challenge for organisations in the 21st century is how they should ensure information security in a time and environment where the widespread use of Information Communication Technologies (ICTs), such as smartphones, means that information has been made vulnerable in numerous new ways. Recent research on information security has focused on information security culture and how to successfully communicate security standards within an organisation. This study aims to examine how latent threats to information security are conceptualised and examined within an organisation in which information security is important. Since threats posed by ICTs are said to be latent, this study wishes to explore in what ways an inclusion of threat conceptualisation can have in understanding what constitutes an efficacious information security culture when the intention is to ensure information security. The study focuses on the Swedish armed forces, and compare how threats to information security posed by interaction with private ICTs are communicated in information security policies and how they are conceptualised by the members of the organisation. Through interviews conducted with service members, the findings of this study indicate that it is possible to successfully communicate the contents of information security policies without mandating the members of the organisation to read the sources themselves. Furthermore, the study identified a feature of information security culture, in this paper called supererogatory vigilance to threats to information security, which might be of interest for future studies in this area, since it offers adaptive protection to new threats to information security that goes beyond what the established sources protects against.
APA, Harvard, Vancouver, ISO, and other styles
31

Hühnerfuß, Anne. "To Intervene or Not to Intervene? : A Theoretical Account of European Crisis Management in Mali." Thesis, Linköpings universitet, Statsvetenskap, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-132498.

Full text
Abstract:
Aspiring to become a “global security actor,” the EU has, throughout the last decade, increasingly made use of its versatile toolbox in crisis management missions far beyond its own soil. Crisis management missions are particularly challenging when security is threatened on various levels at once, as is the case in Mali. There, addressing the conflict means combining military assistance with development aid, state-building efforts, and security sector reforms. Ambitious to apply a truly comprehensive approach, meaning an approach that bridges military and civilian efforts, the EU has launched two missions in Mali; yet it has refrained from providing a full-scale military operation. This case study aims to foster an understanding of European security actorness by accounting for the challenges of EU crisis management in general and in Mali in particular from a theoretical perspective that integrates realist, institutionalist, and constructivist understandings. Finally, this thesis contributes to the academic debate on the concept of strategic culture by analyzing to what extent the concept proves helpful for understanding the challenges inherent in European crisis management.
APA, Harvard, Vancouver, ISO, and other styles
32

Henning, Rhonda R. "Security Policies That Make Sense for Complex Systems: Comprehensible Formalism for the System Consumer." NSUWorks, 2014. http://nsuworks.nova.edu/gscis_etd/9.

Full text
Abstract:
Information Systems today rarely are contained within a single user workstation, server, or networked environment. Data can be transparently accessed from any location, and maintained across various network infrastructures. Cloud computing paradigms commoditize the hardware and software environments and allow an enterprise to lease computing resources by the hour, minute, or number of instances required to complete a processing task. An access control policy mediates access requests between authorized users of an information system and the system's resources. Access control policies are defined at any given level of abstraction, such as the file, directory, system, or network, and can be instantiated in layers of increasing (or decreasing) abstraction. For the system end-user, the functional allocation of security policy to discrete system components, or subsystems, may be too complex for comprehension. In this dissertation, the concept of a metapolicy, or policy that governs execution of subordinate security policies, is introduced. From the user's perspective, the metapolicy provides the rules for system governance that are functionally applied across the system's components for policy enforcement. The metapolicy provides a method to communicate updated higher-level policy information to all components of a system; it minimizes the overhead associated with access control decisions by making access decisions at the highest level possible in the policy hierarchy. Formal definitions of policy often involve mathematical proof, formal logic, or set theoretic notation. Such policy definitions may be beyond the capability of a system user who simply wants to control information sharing. For thousands of years, mankind has used narrative and storytelling as a way to convey knowledge. This dissertation discusses how the concepts of storytelling can be embodied in computational narrative and used as a top-level requirements specification. The definition of metapolicy is further discussed, as is the relationship between the metapolicy and various access control mechanisms. The use of storytelling to derive the metapolicy and its applicability to formal requirements definition is discussed. The author's hypothesis on the use of narrative to explain security policy to the system user is validated through the use of a series of survey instruments. The survey instrument applies either a traditional requirements specification language or a brief narrative to describe a security policy and asks the subject to interpret the statements. The results of this research are promising and reflect a synthesis of the disciplines of neuroscience, security, and formal methods to present a potentially more comprehensible knowledge representation of security policy.
APA, Harvard, Vancouver, ISO, and other styles
33

Agrebi, Meriem. "Le cadre juridique contemporain de la lutte contre la piraterie maritime." Thesis, Strasbourg, 2017. http://www.theses.fr/2017STRAA019.

Full text
Abstract:
Bien que ni le crime de piraterie maritime ni sa répression ne soient récents, la résurgence de cette forme de criminalité séculaire mais renouvelée la présente sous des aspects inédits, nécessitant la réadaptation de l’arsenal juridique la régissant à sa réalité nouvelle. Son régime traditionnel dérogatoire aux règles classiques du droit de la mer et aux règles de compétence et de juridiction, a pu ainsi s’étoffer par de nouvelles règles intégrant et reflétant les modes contemporains de production normative de la société internationale, ainsi que l’action des structures et acteurs non-étatiques. N’étant cependant pas un problème juridique stricto sensu mais aussi bien le reflet d’une situation présentant des problématiques structurelles plus générales, il demeure évident que la lutte plus durable contre la piraterie nécessite l’adoption d’une approche « globale » ou « holistique », associant à court et à moyen termes un point de vue sécuritaire et judiciaire mais visant également et surtout, une sortie de crise pérenne allant au-delà de l’endiguement de cette menace transnationale
Neither the crime of piracy nor its repression are recent. The upsurge of this ancient form of criminality underlines new aspects which call the readaptation of the legal rules governing its repression. In addition to its traditional regime, new rules were consequently developped, reflecting contemporary modes of normative production and incorporating the action of non-State structures and actors. Because piracy is not exclusively a legal issue but rather encompasses several broader structural problematics, the fight against piracy requires on the other hand a global and comprehensive approach. This approach associates short-term security and judicial aspects, as well as long-term strategies going beyong simply containing piracy as a transnational threat to maritime security to ensure further stability
APA, Harvard, Vancouver, ISO, and other styles
34

Green, Jolina, and Frida Marthinsson. "Kvinnors upplevelse av att leva med bröstcancer : En studie baserad på självbiografier." Thesis, Linnéuniversitetet, Institutionen för hälso- och vårdvetenskap (HV), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-91298.

Full text
Abstract:
Bakgrund: Tidigare forskning visar att insjukna i bröstcancer påverkar hela individens livsvärld, vilket ställer höga krav på sjuksköterskans omvårdnadsarbete. Det behövs fler studier som visar hur dessa individer upplever sin situation. Syfte: Att belysa kvinnors upplevelse av att leva med bröstcancer.Metod: En kvalitativ studie baserad på fem självbiografier med induktiv ansats har använts. Materialet analyserades med hjälp av en manifest innehållsanalys.Resultat: Analysprocessen resulterade i nio underkategorier och tre huvudkategorier; En utveckling av copingstrategier, En oviss framtid och En känsla av trygghet. Resultatet visade att en bröstcancerdiagnos påverkade kvinnans liv drastiskt och att cancerbeskedet var chockartat. Behandlingen och dess biverkningar upplevdes som påfrestande både kroppsligt och mentalt. Genom olika strategier klarade kvinnorna att hantera sin vardag. Behovet av att prata med någon och dela med sig till andra var centralt hos kvinnorna och minskade känslan av ensamhet. Resultatet visade också att ovissheten inför framtiden var känsloladdad och därför hade stödet från närstående och vården en betydande roll under deras sjukdomstid.Slutsats: Kvinnornas upplevelse av att leva med bröstcancer påverkar livsvärlden negativt, både kroppsligt och mentalt. Sjuksköterskan har en central roll under hela sjukdomsperioden, där engagemang, lyhördhet och bemötande är betydelsefullt. Omvårdnadsarbetet bör därför utgå från ett helhetsperspektiv för att skapa en professionell vårdrelation som stärker kvinnans livskvalitet, hälsa och trygghet. Vidare forskning behövs för att få en djupare förståelse och kompetens bland annat kring hur bröstcancerbehandlade kvinnors sexualitet påverkas samt hur man kan stärka olika former av stöd för de mest sårbara kvinnorna.
Background: Previous research shows that breast cancer affects the individual’s entire world, which places high demands on the nurse´s health care efforts. More studies are needed that show how these individuals perceive their situation.Objective: To highlight women’s experience of living with breast cancer.Method: A qualitative study based on five autobiographies with inductive approach has been used. The material was analyzed using a manifest content analysis.Results: The analysis process resulted in nine subcategories and three main categories; A development of coping strategies, An uncertain future and A sense of security. The results showed that a breast cancer diagnosis drastically affected the woman’s life and that the cancer notification was distressing. The treatment and its side effects were perceived as stressful both physically and mentally. Through various strategies, the women managed to maintain their everyday lives. The need to talk to someone and share with others was central to the women and reduced the feeling of loneliness. The results also showed that uncertainty for the future was emotionally charged and therefore the support of relatives and health professionals played a significant role during their illness.Conclusion: The women’s experience of living with breast cancer negatively affects her world, both physically and mentally. The nurse plays a central role throughout the illness period, where commitment, responsiveness and attentiveness are important. Nursing work should therefore be based on a comprehensive perspective in order to create a professional care relationship that strengthens a woman’s quality of life, health and safety. Further research is needed to gain a deeper understanding and competence about how breast cancer-treated women’s sexuality is affected and how to strengthen different forms of support for the most vulnerable women.
APA, Harvard, Vancouver, ISO, and other styles
35

El, Jadie Amna. "L'énergie nucléaire et le droit international public." Thesis, Tours, 2017. http://www.theses.fr/2017TOUR1006/document.

Full text
Abstract:
Tous les États sans discrimination ont un droit inaliénable de développer les utilisations de l'énergie nucléaire à des fins civiles, à condition de ne pas détourner ces utilisations pacifiques vers des armes nucléaires. Cependant, il est accordé à cinq pays le droit de posséder ces armes, à savoir les États-Unis, la France, la Russie, la Chine et le Royaume-Uni. Autour de cette position, un vif débat à la fois juridique et éthique a été soulevé. En effet, pour ses opposants, le nucléaire représente un risque durable et non maîtrisable par la science. Les accidents nucléaires majeurs, les déchets radioactifs et le détournement du nucléaire à des fins militaires sont des risques ingérables et d‟une gravité exceptionnelle. En revanche, les défenseurs de cette énergie la présentent comme sûre, voire partie prenante du développement durable. Selon eux, le nucléaire est un moyen fiable de lutter contre le réchauffement climatique et aussi une solution à la pénurie énergétique à laquelle le monde est confronté. En examinant et analysant la fiabilité et la crédibilité de tous les arguments allant à l‟encontre et en faveur de cette industrie, on constate que la licéité et la légitimité du recours à l'énergie nucléaire sont mal fondées. Par conséquent, nous estimons qu‟il est nécessaire de dépasser le nucléaire par la conclusion d'une convention internationale posant l'interdiction progressive mais complète du nucléaire
All states without discrimination have an inalienable right to develop the uses of nuclear energy for civilian purposes, provided they do not divert these peaceful uses to nuclear weapons. However, five states have been granted the right to possess these weapons, that is : United-States, France, Russia, China and United-Kingdom. Around this position a fierce debate, both legal and ethical, has been raised. Indeed for its opponents nuclear represents a persistent risk that is non controllable by science. Major nuclear accidents, radioactive wastes and the use of nuclear for military purposes are unmanageable risks of exceptionnal serious gravity. On the other hand, the proponents of this energy present it as safe, even as part of sustainable development. According to them, nuclear is a reliable means to fight global warming and is also a solution to the energy shortage the world is facing. When analyzing the reliability and the credibility of all arguments for and against this industry, it can be noticed that the lawfulness and legitimacy of the use of nuclear energy are ill-founded. Therefore, we believe there is a need to go beyond nuclear with the conclusion of an international convention dealing with the progressive but comprehensive nuclear ban
APA, Harvard, Vancouver, ISO, and other styles
36

Chu, Chienjen, and 朱堅仁. "The Role of Military Police in National Security Underthe Comprehensive Security." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/70686555331451251136.

Full text
Abstract:
碩士
國立中正大學
戰略暨國際事務研究所
99
The studies of national security are never faded by the end of Cold war. On the contrary, they have been further diversified because of the development of the world. The connotation of “national security” is no longer limited in military affairs, but has progressively extended to new fields, such as politics, economy, technology, cultures, religions and environment. Therefore, a new concept of security has formed as “comprehensive security”, but the "National Security" is still the focus of Security Studies. After Cold War, the international situation has undergone significant changes and restructures, turning the world into the era of globalization. Briefly, there are two sources of threats menaced the national security in countries. Military activities are the traditional source of threats between countries. On the other hand, the non-traditional security threats are a source with more diversity, forms, characteristics, and changes. The new concept, comprehensive security, is composed of both serious sources of threats, so it has been valued seriously and progressed fast in recent days. After the 911 terrorist attacks in U.S.A, non-traditional security threats have become the focus of national security. Nations paid their attentions on how to adjust their national security organization and started a succession of military reform. However, the maintenance of Military Police is not restricted due to the wave of international disarmament. On the contrary, the expansion of Military Police unit has been seen as a positive recognition and policy to fit novel situations and dangers in nations in this world, no matter at war or peace days. Military Police is a part of armed forces and critical security institutions in the national security system of R.O.C (Taiwan). According to the task goals and laws, Military Police has the duties to execute the garrison operations, special operations, military judicial police services, maintain and support the armed forces combined operations. Furthermore, Military Police will be ordered by government to deal with some emergencies such as disaster Prevention and counter-terrorism support. In many years, Military Police has done remarkable contributions in kinds of missions and tasks, therefore received praise and respect from whole country. In summary, Military Police is essential to maintain democracy, laws, social stability, and national security. For adaptation to impacts of “the policy of disarmament” and continuation of Military Police unit, Military Police must be transformed into a new form with rapidity, flexibility and high operational efficiency to meet the requirements of diverse tasks in modern military. In the peace, it is usually responsible for combating serious crime, support and prevention of terrorist activities, and national emergencies; on the other side, Military Police can be also disposed to battle field in wartime immediately. In conclusion, Military Police will be promoted into an advanced unit to complete both goals of “battle preparation” and “national security” in the future.
APA, Harvard, Vancouver, ISO, and other styles
37

Altamimi, Ahmad. "A Comprehensive Data Security Framework for OLAP Domains." Thesis, 2014. http://spectrum.library.concordia.ca/978232/1/Altamimi_PhD_S2014.pdf.

Full text
Abstract:
Online Analytical Processing (OLAP) has become an increasingly important and prevalent component of enterprise Decision Support Systems. OLAP is associated with a data model known as a Cube, a multi-dimensional representation that allows for the extraction and intuitive visualization of broad patterns and trends that would otherwise not be obvious to the user. One must note, however, that not all of the collected data should be universally accessible. Specifically, DW/OLAP systems almost always house confidential and sensitive data — identification information, medical data, or even religious beliefs and ideologies — that must, by definition, be restricted to authorized users. In this thesis, we provide models and algorithms for protecting the data in multi-dimensional data cube spaces. To this end, the thesis addresses three distinct but related themes. In the opening part of this study, we propose an authentication and authorization framework that builds upon an algebra designed specifically for OLAP domains. It relies on robust query re-writing rules to ensure consistent data access across all levels of the conceptual data cube model. In the second part, we present a framework for controlling malicious inferences caused by unprotected access to coarser level aggregations. Our framework prevents complicated inferences through a combination of initial query restrictions and the removal of the remaining inferences. In the final part, we enhance the core framework with an object-oriented security design model and client side language extensions that collectively produce a more intuitive and usable infrastructure. The purpose of this study is to design a comprehensive end-to-end framework for OLAP security that is flexible, intuitive, and powerful. In short, the framework allows administrators to associate security policies with an intuitive conceptual model that maps directly to the model that users see. Restrictions then can be propagated transparently from users to all the hierarchical data. Moreover, the framework provides an automatic form of inference control that is fast enough in practice to not affect query time. To ground our conceptual work, we have integrated our research themes on the top of an OLAP-specific DBMS server (Sidera). Sidera gives us the opportunity to explore performance and correctness issues that would not be possible without such direct access to a DBMS. In addition, we have evaluated its efficiency with a pair of common industrial DBMS, a row-based DBMS (PostgreSQL) and a column-store DBMS (MonetDB). The evaluation is done using two common benchmarks (e.g., SSB and APB). The results show the ratio of checking time to execution time varies considerable, depending on the specification of the underlying query. These times are acceptable, particularly given that checking costs do not grow with data set size.
APA, Harvard, Vancouver, ISO, and other styles
38

Lin, Chun-Yu, and 林均育. "A Comprehensive Security System for Digital Microfluidic Biochips." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/j97y3a.

Full text
Abstract:
碩士
國立清華大學
資訊工程學系所
106
Digital microfluidic biochips (DMFBs) play an important role in the healthcare industry due to its advantages such as low-cost, portability, and efficiency. According to the recent market report, the growth of biochips market is twice than before. However, as the enormous business opportunities grow, piracy attacks, which are exploited by unscrupulous people to gain illegal profits, become a severe threat to DMFBs. To prevent piracy attacks, the conventional approach uses secret keys to perform authentication. Nevertheless, DMFBs only consist of electrodes to control the operations of droplets, and there are no memories and logic gates integrated on it to store secret keys. This makes designing secure defenses of DMFBs against piracy attacks more difficult. Thus, in this paper, we propose the first authentication method for piracy prevention of DMFBs based on a novel Physical Unclonable Function (PUF). The proposed PUF utilizes the inherent variation of electrodes on DMFBs to generate secret keys, so it does not require memory. Experimental results demonstrate the feasibility of our proposed PUF. Finally, we analyze the security of the proposed method against piracy attacks.
APA, Harvard, Vancouver, ISO, and other styles
39

Chou, Li-Hsiang, and 周立祥. "Comprehensive Security Control System for Computer Data Access." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/37468543522452256333.

Full text
Abstract:
碩士
銘傳大學
資訊工程學系碩士班
103
Network is an indispensable technology in our life. However, any computer in the network may be easily under attack by hackers, like Web page replacement, data loss; that’s to say, the confidential data is tampered, and even the hard disk is stolen by malicious users. All these human factors are difficult to defense for valuable data on computing devices. There are several solutions in current market for computer data protection, but they cannot completely solve the problems mentioned above. If malicious users enter the system’s safe mode, it means the system would open the door for free access to all, and it’s more difficult to defense the malicious access. Since the user’s data access activity is only controlled in user mode for current operating systems, for this characteristic, this thesis attempts to implement a FSG (File System Guardian) system in kernel mode to filter the users’ data access activity on two prevalent operating systems of Microsoft Windows and open-source Linux. They respectively use techniques of filter driver for Windows and hooking system call table for Linux to protect the files comprehensively. On the other hand, the proposed FSG system also encrypts the content of protected file via famous RC5 to ensure the protection reliability and then prevent the possible crisis caused by malicious users.
APA, Harvard, Vancouver, ISO, and other styles
40

Lu-chung, Weng, and 翁履中. "A Study of Singapore''s Comprehensive Security Strategy." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/39007688118385593363.

Full text
Abstract:
碩士
淡江大學
東南亞研究所
92
Abstract In the past, the safety concept during the cold war period all emphasized the threat on national security by external factors, however, countries today all are confronted with uncertain factors coming from inside and also the threat of outside factors on inner stability of the country. As a small state, national survival for Singapore is an issue of the highest priority, given the fluctuations in regional and world politics, and current political and economic challenges in neighboring countries. For the sake of political, economic and diplomatic relations and security, the government of Singapore must to communicate with other Southeast Asian nations positively and attempted to arrange them in a link of the chain of her comprehensive security strategy. Therefore, Singapore also promotes regional security cooperation, especially with immediate neighbors such as Malaysia and Indonesia, in order to achieve the goals of mutual security and good neighborliness. ASEAN therefore offers Singapore and its neighbors the best framework to resolve issues of a bilateral or multilateral nature. Thus, for Singapore, advancing from independent from Malaysia to now, facing the above transition in the inner and external environment, it is necessary to rethink the adjustment of its inner and external security strategies, to cooperate with the situation development and guarantee its national security. This dissertation analyzes and studies the security strategy both internally and externally of Singapore, from the viewpoint of comprehensive security. This dissertation will divide inner security strategy into 1.political security strategy; 2.social security strategy; 3.economic security strategy; and external security strategy into 1.diplomatic security strategy; 2. national defense strategy and the international cooperation of non-traditional security field, from the viewpoint of comprehensive security, and based on the above 6 aspects, this article will analyze how Singapore derived its security strategy from many threatening factors both internally and externally, and also explain the practice for its security strategy. Finally, the author will try to forecast the problems that Singapore may face in the future, and try to find out some useful security strategies that Taiwan can learn from Singapore. Keywords: Singapore, ASEAN, Comprehensive Security, National Security, Foreign Policy
APA, Harvard, Vancouver, ISO, and other styles
41

李文夆. "Singapore's Comprehensive Security in the Post-Cold War Era." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/65765741167855776031.

Full text
Abstract:
碩士
南華大學
亞洲太平洋研究所
90
Singapore’s Comprehensive Security in the Post-Cold War Era Abstract During the post-cold war period, the conflict between eastern and western ideology has ended officially. In the past, the safety concept during the cold war period all emphasized the threat on national security by external factors, however, countries today all are confronted with uncertain factors coming from inside and also the threat of outside factors on inner stability of the country. This dissertation analyzes and studies the security view both internally and externally of Singapore during the cold war period to post-cold war period, from the viewpoint of comprehensive security. During the cold war period, there was threat on the inner and external security of Singapore, with great crisis caused on the national security, and until the post-cold war period, Singapore has become a country with prosperously developed economy and stable and flourishing society, however, the traditional values that held together political and social stability were also eroded, thus there was impact caused on the inner security. At the same time, external environment changed, including the army retreat of USA and Soviet Union, and also emergence of China and Japan, all brought the imbalance of power in Asia-Pacific Region. On the other hand, Southeastern Asia countries’ emphasis on economic cooperation inside the region has also influenced the external security view of Singapore. Thus, for Singapore, advancing from cold war period to post-cold war period, facing the above transition in the inner and external environment, it is necessary to rethink the adjustment of its inner and external security views, to cooperate with the situation development and guarantee its national security. This dissertation will divide inner security views into 1. political security view; 2. social security view; 3. economic security view; and external security views into 1. diplomatic security view; 2. national defense security view from the viewpoint of comprehensive security, and based on the above 5 aspects, this article will analyze how Singapore derived its security view from many threatening factors both internally and externally, and also explain the practice for its security view. Furthermore, it will analyze and discuss how Singapore corrected and adjusted its security view under the significant change of inner and external environment during the cold war period. Finally, the author will try to forecast the problems that Singapore may face in political, social, economic, diplomatic, and national defense security views and its future development direction, from the analysis on security views since the cold war period until now. Keywords: Post-Cold War Period, Singapore, Comprehensive Security, People’s Action Party, National Security
APA, Harvard, Vancouver, ISO, and other styles
42

王韋龍. "Study on the CPC's comprehensive concept of National Security since the end of the Cold War:case study on National Security Committee and Law of National Security." Thesis, 2016. http://ndltd.ncl.edu.tw/handle/c834kn.

Full text
Abstract:
碩士
國立政治大學
國家安全與大陸研究碩士在職專班
104
Afterthe era of Cold War the international arena has been dramatically transformed and changed ever since and the establishment of National Security Committee (NSC) has been greatly in demand in Western countries. From the point of view of Communist Party of China (CPC), the continuing formation and development of concept of national security has been majorly focusing on two basic principleswhich arerespectively aiming at the purpose of defending the core of national interest and in the pursuit ofstabilityinternally as well as to assure sustainability and national development externally. Since Xi Jinping took office of the General Secretary of CPC, the so calledComprehensive Concept of National Security,NSC and the newly legislatedLaw of National Securityhave been brought to the public. The above mentioned party theory, committee and law will be subsequently implemented to coordinate various relevant departments within the party and government and also will be required to cope with wide range of issues in regarding of national security challenge and complexity in the long run. The reason behind the establishment of NSC is not accidental. Since 18th National Congress of the CPC began on November 2012, from perspective of the strategic implementation of national security the CPC has obviously foreseen the coming of dire situation by which it might further jeopardize the legitimacy of the ruling CPC and the safeguarding of political safety has become CPC’s first priority agenda and thereforethe national security strategic deployment to counteract the containment led by US’s Pivot to Asia will be swiftly adjusted to cope with new scenario thereafter. Nevertheless, the NSC as well as National Security Law should both play a significantly critical role in dealing with all kind of challenges in related to national security in the future. The research and study of NSC along with the implication of theNational Security Law, shaping of perspective of national security since the Cold War andtheory of Comprehensive Concept of National Security brought by Xi as well as further assessment of impact and ramifications on the development of Cross Straight relations will be the focal point in my thesis.
APA, Harvard, Vancouver, ISO, and other styles
43

Huang, Li-Fang, and 黃立方. "China’s Economic Security Strategy Toward Taiwan: The Case Study of Pingtan Comprehensive Experimental Zone." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/12957699776600448790.

Full text
Abstract:
碩士
淡江大學
國際事務與戰略研究所碩士在職專班
103
Ever since the implementation of the Reform and Open Policy in 1978, and more than 30 years of economic development through the developing model of Special Economic Zones, China has gained tremendous success and become the world’s second largest economies in 2010. After the Cold War, China initiated a so-called ‘New Security Concept’, of which Economic Security was regarded as vital components of stability and development. To achieve its final goals of ‘peaceful reunification’, China has inputted huge amount of resources in the economic security strategies toward Taiwan. After the Cold War, international relations theories have varied greatly, and what attracted peoples’ attention most was the emerging of the theory of constructivism. The constructivism theory suggests that international politics shall be viewed from the perspectives of sociology, and therefore attention be paid to the social construction existed in the international relations rather than the material construction, and thus take on a critical attitude toward the principle of rationalism of ‘Neo-realism’. Since China has adopted Pingtan, Fujian Province as ‘The 12th 5-Year Plan Guidelines for National Economic and Social Developments’ (abbrev. for 12th 5-Year Plan Guidelines) on Mar. 16, 2011, ‘Pingtan Comprehensive Experimental Zone’ has formally been raised to a high status of national strategy. The Zone advertised itself with ‘Five-Commons’ Principle, of which aimed to explore new organisms for building homes for the people across the strait and broadening mutual exchanges and cooperation, and made it a do-first and try-first zone for reaching the goals of ‘Peaceful Reunification & One Country, Two Systems’. Xi, jiping, as a political giant of China’s new generation, has currently raised the issue of fulfilling ‘China Dream’ as national goal. After Xi’s seizing powers, being one of the very few new leaders who were familiar with Taiwan affairs, what changes of China’s economic security strategy will bring about toward Taiwan? While Xi was serving as Secretary of Fu-jian Province, the ‘Pingtan Comprehensive Experimental Zone’ being developed and built by him, what on earth does it mean anything and special? This thesis, from the perspectives of Constructivism of international relations theory, will try to give it a thought about the different frameworks of national security strategy analysis, and thus, based on these frameworks, to analyze the ‘Pingtan Comprehensive Experimental Zone’, and then to further examine how China’s economic security strategy works toward Taiwan, and the way how does Taiwan cope with it as well.
APA, Harvard, Vancouver, ISO, and other styles
44

Lee, Chi-Kit, and 李志杰. "Construct and Change of China Asia-Pacific Security Strategy (1979~2004) - Comprehensive National Power Perspective." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/59884810868491594152.

Full text
Abstract:
碩士
國立暨南國際大學
公共行政與政策學系
93
Abstract: China became a strong and powerful state since “Reform and Open Policy” was conducted since 1979. As an important actor in the world, Chinese development is closely linked with Asia-Pacific region. So, China Strategy in Asia-Pacific is interrelated with China domestic and overseas security, and interrelated with changing of Asia-Pacific and global situation. Since Deng, Xiao-Ping came into power in 1978 and took “Comprehensive National Power” as the core interests of China. This led to a significant change of China’s security concepts. Deng, Xiao-Ping changed the subsistence-led strategy into a development-led strategy and performed the developmental strategy of “Reform and Open” to accelerate the fulfillment of developmental object of “The Four Modernization” so as to promote China’s “Comprehensive National Power” and to conserve China’s core interests. But in phase of Deng, Xiao-Ping is not to bring up the concept of “Comprehensive National Power”, since 1992, Jiang, Ze-min just to bring up the concept of “Comprehensive National Power”. The raised of China “Comprehensive National Power” to lead Asia-Pacific appear “The China Threat Theory” in 1990’s, and to bring influence of China to development “Comprehensive National Power”. So, Jiang, Ze-min advocated “New Security Concept, NSC” to settle the pressure of “The China Threat Theory”. Since Hu, Jin-tao came into power, except to continue cooperation mode of “New Security Concept”, and expand the security contents to “non-traditional security concept”. Hu, Jin-tao as well as advocate “China’s Peaceful Rise Theory” to settle the pressure of “The China Threat Theory”, can enhance rise of China’s “Comprehensive National Power”. This research tries to use the Comprehensive National Power Perspective to construct China Security Concept, and significance of China Asia-Pacific Security Strategy in Comprehensive National Power development, hope to know well the full view of China Asia-Pacific Security Strategy. Key word: Comprehensive National Power, China security concept, China Asia-Pacific Security Strategy, The China Threat Theory, China’s Peaceful Rise Theory.
APA, Harvard, Vancouver, ISO, and other styles
45

"Japan's comprehensive national security strategy and its economic cooperation with and assistance to the ASEAN countries." Chinese University of Hong Kong, 1989. http://library.cuhk.edu.hk/record=b5886204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

"Empowerment of women recipients of comprehensive social security assistance in the welfare campaign in Hong Kong." Chinese University of Hong Kong, 1995. http://library.cuhk.edu.hk/record=b5888508.

Full text
Abstract:
Wong Siu Wai Winnie.
Thesis (M.Phil.)--Chinese University of Hong Kong, 1995.
Includes bibliographical references (leaves 150-153).
Abstract --- p.ii
Acknowledgment --- p.iii
Introduction --- p.1
Chapter 1. --- Ecumenical Grassroots Development Center and the Welfare Campaign --- p.3
Chapter 2. --- Literature Review and Methodology --- p.19
Chapter 3. --- The Empowerment Process --- p.36
Chapter 4. --- The Free-Riders --- p.72
Chapter 5. --- Selective Incentives: A Panacea? --- p.93
Chapter 6. --- Mobilizing Acts of EGDC --- p.108
Conclusion --- p.137
Appendix I --- p.146
Appendix II --- p.149
Bibliography --- p.150
APA, Harvard, Vancouver, ISO, and other styles
47

Lee, Mei-Hsien, and 李玫憲. "New Research Approach to Regional Security Governance in Europe-A Comprehensive Analysis of Power, Institute, and Idea." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/52646599932664286735.

Full text
Abstract:
博士
國立中興大學
國際政治研究所
98
Because of its oncoming conceptualization, security governance neither becomes a popular research approach, nor has any acceptable operation-definition. This thesis aims to re-construct the analyzing framework of the security governance, and test its applicability for contemporary European security research. First, it re-constructs the security governance research model by combining governance with eclecticism analysis included power, institute, and idea. Second, it comprehensively analyzes the development, practice, and challenge of security governance toward Europe by case-study among Central and Eastern Europe, Arctic Ocean, and South Europe. Finally, it sums up all discussions and verifies research propositions and model. This thesis finds that, in order to deal with multilateral security threats, main regional actors have developed a synthetic governance strategy based on the need to handle different security threats in each sub-region. Regional actors have different choices of governing approach; however, under the same goal of resolving regional security problems, they still work on common principles included policy co-ordination, strategic co-management, and security co-operation.
APA, Harvard, Vancouver, ISO, and other styles
48

LIN, YEN-HUNG, and 林彥宏. "Exploring the New Strategic Relationship between the US and China from the Restricted Realism: Asia Pacific Comprehensive security Research." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/wb7m4x.

Full text
Abstract:
碩士
國立中正大學
戰略暨國際事務研究所
106
As the US and China compete for power, they have considerable influence on the security and peace and stability of the Asia-Pacific region. Therefore, the purpose of this study is to use the theory of international relations “Restrained Realism” as the basis of the argument, and to put forward the “Security of the military to adopt a low profile” and “Economic cooperation” proposed in the theory, and to “Defend regional conflicts with international organizations”. The balance model, together with case studies, verified the stable structure of the “New strategic relationship” between the United States and China in the Asia-Pacific region, and developed the “Asia-Pacific comprehensive security” that constrains “Structure” to restrict “Units”. Keywords:US-China power;The security of the Asia-Pacific region;Restrained Realism;New strategic relationship;Comprehensive security
APA, Harvard, Vancouver, ISO, and other styles
49

Dekker, Adriette Hendrina. "Informal social security : a legal analysis." Thesis, 2005. http://hdl.handle.net/10500/624.

Full text
Abstract:
With the dawn of democracy, the South African social security system was in dire need of change. The right of access to social security was for the first time entrenched as a fundamental right in the 1995 Constitution. Since then, many changes have been effected to the present formal social security system, but these were mostly ad hoc and lacked a comprehensive approach. The past history of the country led to the exclusion of the majority of the population from formal social security protection. The excluded and marginalised had to rely on informal social security measures to provide social protection. This resulted in a system of co-existence between formal and informal social security. Although informal social security is increasingly recognised as part of the social security landscape, the role and importance of informal social security have largely been ignored in all reforms to improve the protective scope of the present social security system. The thesis aims to change this. Informal social security has been denied a rightful place in the South African social security landscape. The thesis recommends a model as to how the divide between formal and informal social security can be bridged. This model will, it is hoped, serve as a baseline for stimulating debate and generating new innovative ideas as to how to improve the present social security system in South Africa.
Jurisprudence
LLD
APA, Harvard, Vancouver, ISO, and other styles
50

Ramovha, Ditebogo Audry. "Socio and economic impact of comprehensive rural development programme : a case study of Muyexe Comprehensive Rural Development Programme Site in the Greater Giyani Local Municipality in Limpopo Province, South Africa." Diss., 2016. http://hdl.handle.net/10500/20990.

Full text
Abstract:
A majority of the South African population live in poverty, particularly those in rural areas. During the year 2009, the South African government identified rural development as a key priority area in socio-economic issues and the Department of Rural Development and Land Reform was created to focus specifically on this issue. This was followed by the development of the Comprehensive Rural Development Programme (CRDP). The CRDP is a government policy on rural development. The main focus of the programme is on agrarian transformation and land reform as pillars of rural development, alongside infrastructure provision such as housing, energy, sanitation, schools, clinics, boreholes and water reticulation system in rural areas. Therefore, the main purpose of this study was to assess the socio-economic impacts of the Comprehensive Rural Development Programme (CRDP). The study used Muyexe village in Greater Giyani Local Municipality as a case study. The objectives of the study included assessing challenges facing the Muyexe village, such as provision of basic services, job creation, skills development and public amenities. The first phase of the literature review focused on the definitions of rural development, rural development theories, development challenges and approaches on rural development. The second phase of the literature review further explored the developmental challenges for rural areas in South Africa since 1994. For this study, the researcher collected the primary data by making use of face to face interviews, while secondary data was gathered from the compiled frameworks, policies, reports of government departments, books, journals, conference papers, proceedings, presentations and the internet. The findings showed that a lot still needs to be done with regards to the development of infrastructure such as road, transport and adequate access to basic services. It was also found that the unemployment rate in the area is a serious concern. It was raised that most of the jobs that were created were only on a short term basis, with lower wages. While the enterprises and cooperatives established were struggling with vii production and generating income. The recommendations intending to strengthen the implementation of rural development initiatives such as the Comprehensive Rural Development Programme to have a better model of addressing rural development that will yield tangible results of sustainable development were also provided
Geography
M. Sc. (Geography)
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography