To see the other types of publications on this topic, follow the link: Global security.

Dissertations / Theses on the topic 'Global security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Global security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Coffey, Thomas. "A distributed global-wide security system." Thesis, University of Ulster, 1994. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.260989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Carr, Roberta B. "The greening of global security : the U.S. military and international environmental security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA277754.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mukhamedov, Igor. "The domestic, regional and global security stakes in Kazakhstan." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Dec%5FMukhamedov.pdf.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2004.
Thesis advisor(s): Donald Abenheim, Roger McDermott. Includes bibliographical references (p. 67-60). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
4

Ferguson, Iain Andrew. "Global 'sweet enemies' : the EU-Russia security dilemma." Thesis, University of St Andrews, 2014. http://hdl.handle.net/10023/6595.

Full text
Abstract:
This dissertation tells the story of conflict in the EU-Russia relationship. What makes this conflict definitive of a ‘security dilemma', it is argued, is the unintended event of political violence in-between these neighbouring global powers. A narrative method is used to disclose the character of this ‘security dilemma'. The story it presents of ‘sweet enemies' has twin historical and theoretical aims. The historical aim is to explain the violent instability in the making of a regional security order in-between 2003 and 2009, and in-between the borders of the EU and Russia. The theoretical aim is to frame a narrative understanding about this global relationship that describes and explains the politics of collective security in the 21st Century. The political philosopher Michael Oakeshott is the main influence on this thesis. He coined the metaphor ‘sweet enemies' to reveal a new way of seeing the political relationships on the wing of modern Europe. He organises his study around diametrically opposing modes of political association that are, on one hand, civil and respectful of individual difference, and on the other, teleocratic and always looking to master a collective future. This dissertation presents a reframing of Oakeshott's metaphor for the 21st Century. In this version of the story, the relationship of Sweet Enemies is completely uncivil. The associates are global others that move in-between radically polarised modes of political association that are of the same teleocratic kind. This teleocratic politics explains the conflict in the EU-Russia relationship. But it also explains why this conflict did not have to happen, and does not have to be repeated. The existence of this ‘security dilemma' is contingent on the global choice(s) the EU and Russia make at the beginning of their relationship. Having lived through an uncomfortably close and violently unstable experience in the making and breaking of a regional security order, it is possible these global ‘sweet enemies' will come out the other side having learnt something from this experience. This narrative retelling of Oakeshott's metaphor is intended as an aid to learning about the condition of an uneasy global relationship in the first decade of the 21st Century. This is a time defined by permanent war. But it remains the only time there is. The conclusion is the EU-Russia ‘security dilemma' is an ongoing issue. Indeed, the strains of discord that characterise this condition of global ‘sweet enemies' have, if anything, become more intractable and uncivil.
APA, Harvard, Vancouver, ISO, and other styles
5

Al-Qudah, Zakaria. "EFFICIENCY AND SECURITY ISSUES IN GLOBAL HOSTING PLATFORMS." Case Western Reserve University School of Graduate Studies / OhioLINK, 2010. http://rave.ohiolink.edu/etdc/view?acc_num=case1259865300.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Duncan, Jessica. "The reformed Committee on World Food Security and the global governance of food security." Thesis, City University London, 2014. http://openaccess.city.ac.uk/3511/.

Full text
Abstract:
This research explores the reformed UN Committee on World Food Security (CFS) as an institution addressing a changed world, and as an illustration of evolving global food security governance. The research sets out to answer the extent to which the CFS is realising its reform objectives and how it is positioning itself within a changing architecture of global food security governance. Informed by literature on global governance and embedded neoliberalism, the inquiry centres around three case studies – Civil Society Mechanism, Voluntary Guidelines for the Responsible Governance of Tenure of Land, Fisheries and Forests, and the Global Strategic Framework – which serve to highlight the operationalization of key reform objectives while simultaneously providing insight into broader policy processes and dynamics. Data was collected through document analysis, participant observation, and interviews. The resulting analysis provides clear evidence of the impact of enhanced participation on policy outcomes and concludes that the policy recommendations emerging from the CFS are amongst the most comprehensive and useful in terms of applicability and uptake at the national and regional level. The analysis also reveals that despite its methods, outcomes and mandate, the CFS is being systematically undermined by other actors seeking to maintain influence and sustain neoliberal hegemony across food security policies at the global level. The research contributes to global governance theory by describing the functioning of a mechanisms that can address democratic deficits in global governance while elucidating related opportunities and challenges. The research also contributes to scholarship on global food security policy by challenging the application of previous analyses to the contemporary reality. The research addresses limitations in global governance literature by mapping the complexity of social and political relations across sites of negotiation, contestation and compromise between actors. The policy implications derived from this thesis focus on the need to further problematize food security and for policies to target structural causes of food insecurity. Building on the experiences of the CFS, this thesis concludes that transparent, participatory mechanisms need to be created which acknowledge, and seek to rectify, existing imbalances in power relations in policy-making processes.
APA, Harvard, Vancouver, ISO, and other styles
7

Astrada, Marvin. "Conceptualizing American power and security in a post-9/11 security context : conflict, resistance, and global security, 2001-present." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/1355.

Full text
Abstract:
In a post-Cold War, post-9/11 world, the advent of US global supremacy resulted in the installation, perpetuation, and dissemination of an Absolutist Security Agenda (hereinafter, ASA). The US ASA explicitly and aggressively articulates and equates US national security interests with the security of all states in the international system, and replaced the bipolar, Cold War framework that defined international affairs from 1945-1992. Since the collapse of the USSR and the 11 September 2001 terrorist attacks, the US has unilaterally defined, implemented, and managed systemic security policy. The US ASA is indicative of a systemic category of knowledge (security) anchored in variegated conceptual and material components, such as morality, philosophy, and political rubrics. The US ASA is based on a logic that involves the following security components: 1., hyper militarization, 2., intimidation, 3., coercion, 4., criminalization, 5., panoptic surveillance, 6., plenary security measures, and 7., unabashed US interference in the domestic affairs of select states. Such interference has produced destabilizing tensions and conflicts that have, in turn, produced resistance, revolutions, proliferation, cults of personality, and militarization. This is the case because the US ASA rests on the notion that the international system of states is an extension, instrument of US power, rather than a system and/or society of states comprised of functionally sovereign entities. To analyze the US ASA, this study utilizes: 1., official government statements, legal doctrines, treaties, and policies pertaining to US foreign policy; 2., militarization rationales, budgets, and expenditures; and 3., case studies of rogue states. The data used in this study are drawn from information that is publicly available (academic journals, think-tank publications, government publications, and information provided by international organizations). The data supports the contention that global security is effectuated via a discrete set of hegemonic/imperialistic US values and interests, finding empirical expression in legal acts (USA Patriot ACT 2001) and the concept of rogue states. Rogue states, therefore, provide test cases to clarify the breadth, depth, and consequentialness of the US ASA in world affairs vis-a-vis the relationship between US security and global security.
APA, Harvard, Vancouver, ISO, and other styles
8

Mezzour, Ghita. "Assessing the Global Cyber and Biological Threat." Research Showcase @ CMU, 2015. http://repository.cmu.edu/dissertations/535.

Full text
Abstract:
In today’s inter-connected world, threats from anywhere in the world can have serious global repercussions. In particular, two types of threats have a global impact: 1) cyber crime and 2) cyber and biological weapons. If a country’s environment is conducive to cyber criminal activities, cyber criminals will use that country as a basis to attack end-users around the world. Cyber weapons and biological weapons can now allow a small actor to inflict major damage on a major military power. If cyber and biological weapons are used in combination, the damage can be amplified significantly. Given that the cyber and biological threat is global, it is important to identify countries that pose the greatest threat and design action plans to reduce the threat from these countries. However, prior work on cyber crime lacks empirical substantiation for reasons why some countries’ environments are conducive to cyber crime. Prior work on cyber and biological weapon capabilities mainly consists of case studies which only focus on select countries and thus are not generalizeable. To sum up, assessing the global cyber and biological threat currently lacks a systematic empirical approach. In this thesis, I take an empirical and systematic approach towards assessing the global cyber and biological threat. The first part of the thesis focuses on cyber crime. I examine international variation in cyber crime infrastructure hosting and cyber crime exposure. I also empirically test hypotheses about factors behind such variation. In that work, I use Symantec’s telemetry data, collected from 10 million Symantec customer computers worldwide and accessed through the Symantec’s Worldwide Intelligence Network Environment (WINE). I find that addressing corruption in Eastern Europe or computer piracy in Sub-Saharan Africa has the potential to reduce the global cyber crime. The second part of the thesis focuses on cyber and biological weapon capabilities. I develop two computational methodologies: one to assess countries’ biological capabilities and one to assess countries’ cyber capabilities. The methodologies examine all countries in the world and can be used by non-experts that only have access to publicly available data. I validate the biological weapon assessment methodology by comparing the methodology’s assessment to historical data. This work has the potential to proactively reduce the global cyber and biological weapon threat.
APA, Harvard, Vancouver, ISO, and other styles
9

Hu, Aiqun. "Social insurance in twentieth-century China a global historical perspective /." online access from Digital Dissertation Consortium access full-text, 2007. http://libweb.cityu.edu.hk/cgi-bin/er/db/ddcdiss.pl?3289999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Stocker, Peter Candidus. "Switzerland and its relationship to European and global security institutions." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA379783.

Full text
Abstract:
Thesis (M.A. in National Security Affairs) Naval Postgraduate School, June 2000.
Thesis advisor(s): Abenheim, Donald. "June 2000." Includes bibliographical references (p. 137-144). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
11

Mazières, David (David Folkman) 1972. "Security and decentralized control of the SFS global file system." Thesis, Massachusetts Institute of Technology, 1997. http://hdl.handle.net/1721.1/43610.

Full text
Abstract:
Thesis (M.S.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 1997.
Includes bibliographical references (p. 47-53).
SFS (secure file system) is a global file system designed to be secure against all active and passive network attacks, provide a single namespace across all machines in the world, and avoid any form of centralized control. Using SFS, any unprivileged user can access any file server in the world securely and with no prior arrangement on the part of system administrators. New file servers are immediately accessible securely by all client machines. Users can name such new servers from any existing file system by specifying public keys in symbolic links. A prototype implementation of SFS installs easily, coexists with other file systems, and should port trivially to most UNIX platforms. Preliminary performance numbers on application benchmarks show that, despite its use of encryption and user-level servers, SFS delivers performance competitive with an in-kernel NFS implementation.
by David Mazières.
M.S.
APA, Harvard, Vancouver, ISO, and other styles
12

Bennett, Allison C. (Allison Christine), and Yi Zhuan Chin. "100% container scanning : security policy implications for global supply chains." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/45248.

Full text
Abstract:
Thesis (M. Eng. in Logistics)--Massachusetts Institute of Technology, Engineering Systems Division, 2008.
Includes bibliographical references (leaves 164-169).
On August 3, 2007, President George Bush signed into law HR1 the "Implementing Recommendations of the 9/11 Commission Act of 2007." The 9/11 Act requires 100% scanning of US-bound containers at foreign seaports by 2012 through the use of non-intrusive (NII) and radiation detection equipment. Maritime stakeholders and the government community have actively debated the feasibility of this plan, citing economic impacts, barriers to global trade and insufficient technology and physical space. This thesis focuses on importer concerns relating to potential shipment delays, financial burdens, sourcing issues and contingency planning concerns in global supply chain operations. Using port statistics, field study data as well as industry insights, frameworks are developed to identify major stakeholder issues and quantify the financial costs and delay risks bourn across the entire supply chain. Cost and delay analyses are based on 2 prototypical ports - a small/low-volume export port and a large/high-volume export port. Cost analysis is performed for a consolidated (port authority) level installation and a segmented (terminal operator) level installation to calculate a per-box scanning fee. Queuing models and Monte-Carlo simulations are also developed to quantify truck congestion due to primary scanning and the risk of containers missing vessels due to secondary inspections. Results of the cost analysis indicate that scanning configurations, particularly related to NII, greatly affect the-per box scanning cost. It is not economically feasible to scan only US-bound containers at half of the 600 ports with direct connections to the US. Analysis of truck congestion suggests that the ramp metering effect of the entry gate can help to abate congestion at the scanning area.
(cont.) Analysis on secondary inspection delays revealed that under a set of assumptions that reflect current operations, the risk of containers missing sailings could potentially increase to 1.5%, which may in turn require a 0.5% to 5% increase in safety stock. Our study shows that cost and delay implications of 100% export US-bound container scanning may be less severe than industry anticipated. Supply chain disruptions due to scanning is best mitigated through earlier container dispatch, increased safety stock or increased scanning infrastructure and personnel at ports.
by Allison C. Bennett and Yi Zhuan Chin.
M.Eng.in Logistics
APA, Harvard, Vancouver, ISO, and other styles
13

Dong, William. "Beyond morality : global poverty as a threat to national security." [Denver, Colo.] : Regis University, 2009. http://165.236.235.140/lib/WDong2009.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Stuch, Benjamin [Verfasser]. "Food Security and Biodiversity Conservation under Global Change / Benjamin Stuch." Kassel : Kassel University Press, 2016. http://d-nb.info/1123731233/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Huarcaya, Arroyo Ricardo Miguel, Espinoza Gilbert Daniel Lopez, Visaloth Luis Enrique Mendoza, Cribilleros Agustin Bartolome Romero, and Leon Patricia Alcira Torres. "Security Kids." Bachelor's thesis, Universidad Peruana de Ciencias Aplicadas (UPC), 2018. http://hdl.handle.net/10757/625338.

Full text
Abstract:
En la actualidad se ve como la tecnología sigue avanzando y parece que recién se creará el primer Smartphone, años más tarde conoceríamos la primera tableta digital, y ahora los Smartwatch, etc. Pero, así como hay avances muy grandes en tecnología, se puede apreciar también a nivel nacional que aumenta la inseguridad ciudadana, que ataca a cualquier miembro de familia, pero en especial a los seres más indefensos como nuestros niños. Un medio que podría brindar cierta tranquilidad a los padres de familia es un Smartwatch, que además de tener las propiedades convencionales, permite realizar una comunicación telefónica entre padres e hijos, para que así los apoderados sepan en tiempo real la localización a través del GPS y puedan estar en contacto con ellos en el transcurso del día. Sin duda este dispositivo será de gran ayuda para las familias, no solo dará tranquilidad, aumentará la comunicación entre sus miembros, pero sobre todo seguridad a los que usen este dispositivo. Si bien ahora vemos que los familiares más expuestos al tema de inseguridad son los niños, también estos pueden ser usados por las personas de tercera edad.
Nowadays we can see how the technology continues to advance and it seems that the first Smartphone will be created, years later we would know the first digital tablet, and now the Smartwatch, etc. But, just as there are very large advances in technology, it can also be appreciated at the national level that increases citizen insecurity, which attacks any family member, but especially the most defenseless beings such as our children. A means that could provide some peace of mind to parents is a Smartwatch, which in addition to having the conventional properties, allows a telephone communication between parents and children, so that the parents know in real time the location through GPS and can be in contact with them during the day. Undoubtedly this device will be of great help for families, not only will it give peace of mind, it will increase communication among its members, but above all, security for those who use this device. Although now we see that the relatives most exposed to the issue of insecurity are children, they can also be used by the elderly.
Trabajo de investigación
APA, Harvard, Vancouver, ISO, and other styles
16

Klenke, Carsten. "Japan's comprehensive National Security and the European Union's Common Foreign and Security Policy convergence towards global cooperation? /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA380827.

Full text
Abstract:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, June 2000.
Thesis advisor(s): Olsen, Edward A. ; Abenheim, Donald. "June 2000." Includes bibliographical references (p. 97-101). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
17

Muller, Christopher W. "USMILGP Colombia transforming security cooperation in the Global War on Terrorism." Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://bosun.nps.edu/uhtbin/hyperion.exe/06Dec%5FMuller.pdf.

Full text
Abstract:
Thesis (M.S. in Defense Analysis)--Naval Postgraduate School, December 2006.
Thesis Advisor(s): Douglas Porch. "December 2006." Includes bibliographical references (p. 89-94). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
18

Roberts, Stephen L. "Catching the flu : syndromic surveillance, algorithmic governmentality and global health security." Thesis, University of Sussex, 2018. http://sro.sussex.ac.uk/id/eprint/73582/.

Full text
Abstract:
This thesis offers a critical analysis of the rise of syndromic surveillance systems for the advanced detection of pandemic threats within contemporary global health security frameworks. The thesis traces the iterative evolution and ascendancy of three such novel syndromic surveillance systems for the strengthening of health security initiatives over the past two decades: 1) The Program for Monitoring Emerging Diseases (ProMED-mail); 2) The Global Public Health Intelligence Network (GPHIN); and 3) HealthMap. This thesis demonstrates how each newly introduced syndromic surveillance system has become increasingly oriented towards the integration of digital algorithms into core surveillance capacities to continually harness and forecast upon infinitely generating sets of digital, open-source data, potentially indicative of forthcoming pandemic threats. This thesis argues that the increased centrality of the algorithm within these next-generation syndromic surveillance systems produces a new and distinct form of infectious disease surveillance for the governing of emergent pathogenic contingencies. Conceptually, the thesis also shows how the rise of this algorithmic mode of infectious disease surveillance produces divergences in the governmental rationalities of global health security, leading to the rise of an algorithmic governmentality within contemporary contexts of Big Data and these surveillance systems. Empirically, this thesis demonstrates how this new form of algorithmic infectious disease surveillance has been rapidly integrated into diplomatic, legal, and political frameworks to strengthen the practice global health security – producing subtle, yet distinct shifts in the outbreak notification and reporting transparency of states, increasingly scrutinized by the algorithmic gaze of syndromic surveillance.
APA, Harvard, Vancouver, ISO, and other styles
19

Medcalf, Jennifer. "Going global or going nowhere? NATO's role in contemporary international security." Oxford Bern Berlin Bruxelles Frankfurt, M. New York, NY Wien Lang, 2002. http://d-nb.info/990413101/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Pozzobon, Oscar. "Secure location services : vulnerability analysis and provision of security in location systems /." [St. Lucia, Qld.], 2004. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe18315.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Lewis, Paul Simon. "The global vulnerability discovery and disclosure system : a thematic system dynamics approach." Thesis, Cranfield University, 2017. http://dspace.lib.cranfield.ac.uk/handle/1826/12665.

Full text
Abstract:
Vulnerabilities within software are the fundamental issue that provide both the means, and opportunity for malicious threat actors to compromise critical IT systems (Younis et al., 2016). Consequentially, the reduction of vulnerabilities within software should be of paramount importance, however, it is argued that software development practitioners have historically failed in reducing the risks associated with software vulnerabilities. This failure is illustrated in, and by the growth of software vulnerabilities over the past 20 years. This increase which is both unprecedented and unwelcome has led to an acknowledgement that novel and radical approaches to both understand the vulnerability discovery and disclosure system (VDDS) and to mitigate the risks associate with software vulnerability centred risk is needed (Bradbury, 2015; Marconato et al., 2012). The findings from this research show that whilst technological mitigations are vital, the social and economic features of the VDDS are of critical importance. For example, hitherto unknown systemic themes identified by this research are of key and include; Perception of Punishment; Vendor Interactions; Disclosure Stance; Ethical Considerations; Economic factors for Discovery and Disclosure and Emergence of New Vulnerability Markets. Each theme uniquely impacts the system, and ultimately the scale of vulnerability based risks. Within the research each theme within the VDDS is represented by several key variables which interact and shape the system. Specifically: Vender Sentiment; Vulnerability Removal Rate; Time to fix; Market Share; Participants within VDDS, Full and Coordinated Disclosure Ratio and Participant Activity. Each variable is quantified and explored, defining both the parameter space and progression over time. These variables are utilised within a system dynamic model to simulate differing policy strategies and assess the impact of these policies upon the VDDS. Three simulated vulnerability disclosure futures are hypothesised and are presented, characterised as depletion, steady and exponential with each scenario dependent upon the parameter space within the key variables.
APA, Harvard, Vancouver, ISO, and other styles
22

Van, Eeden Johannes Jurie. "A SOAP-based Model for secure messaging in a global context." Thesis, Nelson Mandela Metropolitan University, 2005. http://hdl.handle.net/10948/817.

Full text
Abstract:
For integration between application-systems in a global context, interoperability needs to be established on a global level; global interoperability, in turn, is based on a global common application-interface. This is achieved through resolving differences in, inter alia, protocol profiles, among participants in the global network. ebXML is used as the point of departure. A messaging framework, which is based on existing Web technology and standards, is proposed. Certain security and Web service standards are examined to determine specific parameters for an interoperable secure messaging environment. A security based framework comprising a predefined message format and architecture is investigated for a secure interoperable global electronic marketspace.
APA, Harvard, Vancouver, ISO, and other styles
23

Taylor, Christopher P. "A Security Framework for Logic Locking Through Local and Global Structural Analysis." The Ohio State University, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=osu1587681912604658.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Aiello, Brady Benjamin. "Analyzing Global Cyber Attack Correlates Through an Open Database." DigitalCommons@CalPoly, 2018. https://digitalcommons.calpoly.edu/theses/1898.

Full text
Abstract:
As humanity becomes more reliant on digital storage and communication for every aspect of life, cyber attacks pose a growing threat. However, cyber attacks are generally understood as individual incidents reported in technological circles, sometimes tied to a particular vulnerability. They are not generally understood through the macroscopic lens of statistical analysis spanning years over several countries and sectors, leaving researchers largely ignorant of the larger trends and correlates between attacks. This is large part due to the lack of a coherent and open database of prominent attacks. Most data about cyber attacks has been captured using a repository of common vulnerabilities and exposures (CVE’s), and \honey pots", unsecured internet-connected devices which record attacks as they occur against them. These approaches help in the process of identifying vulnerabilities, but they do not capture the real world impact these attacks achieve. Therefore, in this thesis I create a database of 4,000 cyber attacks using a semi-open data source, and perform analytical queries on it to gather insights into how cyber attack volume varies among countries and sectors, and the correlates of cyber attack victims. From here, it is also possible to relate socio-economic data such as GDP and World Happiness Index to cyber attack volume. The end result is an open database of cyber attacks that allows researchers to understand the larger underlying forces which propel cyber attacks.
APA, Harvard, Vancouver, ISO, and other styles
25

Cordell, Dana. "The Story of Phosphorus : Sustainability implications of global phosphorus scarcity for food security." Doctoral thesis, Linköping : Department of Water and Environmental Studies, [The Tema Institute], Linköping University, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-53430.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Munroe, Megan A. "Global sporting mega-events : a general morphological analysis of Olympic security policy transfer." Thesis, University of Buckingham, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.573422.

Full text
Abstract:
Hosting an Olympic Games is a large and complex undertaking that requires years of planning, billions of pounds and thousands of people to stage. While the rationale behind expending the effort required to stage an event of this scale may vary from host to host, all hosts maintain the primary objective of staging the event safely and securely. The issue of terrorism has been a major concern for Olympic planners since the terrorist attack at the 1972 Munich Olympics. More recently, the terrorist bombing at the 1996 Atlanta Olympics and 9/11 have served to further amplify concerns of terrorism at these events and have increased pressures on hosts to ensure security. With the exception of incidents occurring before Games' openings, minor security breaches taking place during events, and terrorist threats directed at the Games, we have not witnessed a physical terrorist attack during an Olympi~4tft caused injuries or fatalities since the 1996 event. According to US News and World Rep~rt, there were .168 separate, significant terrorist attacks that occurred at sports-related events from 1972-2004.1 While it is impossible to know the reason for the lack of attacks on Olympics events in recent years, it is reasonable to postulate that the security policies in place have acted as a deterrent, at least in part. With this in mind, an array of questions arises: Which security policies have been adopted at events since the 1996 Games? Have all hosts employed the same security measures at their events? How can this be evaluated? Did 9/11 have an impact on Olympic security? Is there a "Best Practice" security model that is transferred from one Olympics to the next? This thesis explores those queries through answering the encompassing question: Is there an efficient, effective and systematic method for comparatively analyzing the security policies employed by various Olympic host cities, and what information would be generated by this . style of analysis? In response to this research question, this thesis applies General Morphological Analysis (GMA) to the topic of Olympic security policy. GMA is a methodology that has gained popularity over the past twenty years in the field of policy analysis and scenario development but has not been previously applied to the discipline of event security studies, which is what this study accomplishes. The core of this thesis consists of a twofold process: first, applying GMA to the topic of Olympic security from 2000 to 2012 to produce an analytical framework which allows for further, detailed analysis to be performed; and second, applying policy data to that framework to generate outcomes that can be analyzed in relation to the questions earlier raised regarding Olympic security policy. Through this process this thesis demonstrates GMA as an efficient and systematic method for comparatively analyzing topics in the field of event security policy and exhibits its effectiveness in generating unique findings from these policy inquiries. Through utilizing this method, an efficient and systematic analysis was able to be performed on an inherently qualitative and judgmental process. GMA's rigorous classifications and systematic process allow for the outcomes of the analysis to be replicated, which is a key benefit of utilizing this method in this topic. Through the use of matrixing, a comparative foundation is created onto which the security policies utilized at the Olympics can be superimposed in order to reveal where correlations in policy usage and event attributes exist. In performing this analysis, this study uncovered 79 trends in Olympics policy implementation that are original and noteworthy discoveries. Furthermore, this method allows for the observance of the transfer of policy between these events, which substantiates the commonly accepted theory of the existence of policy transfer. The fmdings of this research provide unique data on the impacts of 9/11 on the security policies employed at mega-events, and makes some interesting observations on the disconnect between the implementation of security policies and the level of threat present at these events.
APA, Harvard, Vancouver, ISO, and other styles
27

Newman, Edward. "The United Nations Secretary-General, peace and security, and the global political environment." Thesis, University of Kent, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Srivastava, Tina Prabha. "Innovation strategy to sustain a technological edge for national security & global leadership." Thesis, Massachusetts Institute of Technology, 2015. http://hdl.handle.net/1721.1/100679.

Full text
Abstract:
Thesis: Ph. D. in Strategy, Innovation, and Engineering, Massachusetts Institute of Technology, Engineering Systems Division, 2015.
Submitted to the Interdepartmental Thesis Committee: Aeronautics & Astronautics, Engineering Systems, and Sloan School of Management. Cataloged from PDF version of thesis.
Includes bibliographical references (pages 241-259).
The United States' global lead in secure technology innovation is a cornerstone of national defense. Breakthroughs in technology are critical in establishing and maintaining military superiority. Technology innovation strategies enable the U.S. to maintain this superiority by effectively yielding innovation from R&D investment. However, these strategies must evolve within increasing financial pressures, technological complexities, and dynamic geo-political conditions. Through an analysis of the innovation landscape and development of a taxonomy of open innovation, this dissertation shows that emergent open technology innovation strategies (OTIS) have been successfully applied in the commercial sector, and, after analyzing the relevant metrics, establishes that OTIS could be beneficial in secure U.S. Government (USG) R&D environments to enhance technology innovation. A system-level analysis of the complexities endemic to these environments revealed two fundamental challenges: (1) Secrecy Challenge: Secrecy and national security are often conflated. Secrecy can be in tension with innovation, such as when R&D is hampered because specific requirements are obscured for national security reasons. (2) Participation Challenge: Innovation strategies that depend on open collaboration to bring forth the fullest breadth of potential solutions are impeded when regulatory regimes appropriate these innovations in the name of national security without adequately incentivizing participants. This dissertation shows that USG cannot optimize the application of OTIS without addressing these pervasive challenges; high-level change is needed. This dissertation evaluates current approaches by regulatory regimes and uses a combination of legal, policy, and stakeholder analysis to identify opportunities for system-level improvement. This dissertation finds that regulatory regimes should moderate secrecy a) when secrecy is the real interest being protected, and b) if it can be done in a manner that furthers both innovation and national security. In particular, Government agencies tasked with critical innovation must be empowered to do so in a way that thoughtfully balances innovation and national security interests. This dissertation also finds that a system of non-monetary and monetary incentives is needed to prevent short-term national security interests from unintentionally jeopardizing long-term interests. Such system-level change is necessary to ensure sustainable improvement in USG's ability to effectively transition R&D investment into technology innovation to support national security.
by Tina Prabha Srivastava.
Ph. D. in Strategy, Innovation, and Engineering
APA, Harvard, Vancouver, ISO, and other styles
29

Varady, Robert G., Adriana A. Zuniga-Teran, Gregg M. Garfin, Facundo Martín, and Sebastián Vicuña. "Adaptive management and water security in a global context: definitions, concepts, and examples." ELSEVIER SCI LTD, 2016. http://hdl.handle.net/10150/622777.

Full text
Abstract:
Conventional water governance that centralizes decision making and focuses on increasing supply has sometimes led to ecological degradation and inequitable outcomes. As a corrective, Integrated Water Resources Management (IWRM) incorporates sustainability principles that integrate social, ecological, and infrastructural systems. However, this governance mode still does not address complex issues for an uncertain future, and fails to offer a clear goal. Adaptive management, another approach, relies on public participation and active knowledge exchange between scientists and policy-makers; it also incorporates uncertainty into decision-making. The concept of water security emerged subsequently to address the lack of a clear goal for water management. In this paper, we set into context the terms 'adaptive management' and 'water security' and review their evolution and their critiques. Both concepts require measurement and monitoring of outcomes in order to determine progress toward established goals so as to guide decision-making. We discuss the challenges and different ways of measuring water security and offer a representative list of potential indicators. The essay provides some examples of adaptive-management studies across the world and discusses adaptive management as it relates to the UN Sustainable Development Goals. Our concluding remarks reflect on present challenges, practical limitations, and promising ideas for a future type of water governance that is participatory, equitable, and adaptive.
APA, Harvard, Vancouver, ISO, and other styles
30

Weiss, Jeremy. "Strategizing for peace: approaches to global security in crisis and war 1933-1953." Thesis, Boston University, 2012. https://hdl.handle.net/2144/12669.

Full text
Abstract:
Thesis (Ph.D.)--Boston University PLEASE NOTE: Boston University Libraries did not receive an Authorization To Manage form for this thesis or dissertation. It is therefore not openly accessible, though it may be available by request. If you are the author or principal advisor of this work and would like to request open access for it, please contact us at open-help@bu.edu. Thank you.
In this dissertation I examine the evolution of two international relations theories during the years 1933 - 1953. I investigate how the concepts of power balancing and collective security developed in the United States and Great Britain during this period with a focus on academic and foreign policy elites. In addition to analyzing trends in thinking about these two ideas, I also discuss whether the academic debate that occurred during the middle twentieth century can inform modem perspectives on collective security and power balancing. The majority of sources used in this study are drawn from the realm of academia and respected contemporary analysts of foreign policy. The individuals examined feature E.H. Carr, Norman Angell, and Harold Nicolson ofthe United Kingdom and Walter Lippmann, Hans J. Morgenthau, and George Kennan ofthe United States. The dissertation proceeds along chronological lines, dividing the years upon which it focuses into interwar and postwar phases as a means of assessing the impact of the Second World War on the development ofthe theories in question. It demonstrates that during the 1930s, discussion of security paradigms proved strongest in Britain, with the debate in the United States remaining focused largely on isolationism. American policy analysts underwent a dramatic shift in focus as a result of their country's entry into the war, and joined their British counterparts in an intense discussion of how best to organize international security in the years following 1941. In this study I demonstrate that collective security and power balancing, despite interpretations that depict them as contradictory ideals, underwent simultaneous development throughout the middle twentieth century. Furthermore, the sources included in this work indicate that certain influential individuals advocated the two concepts simultaneously. As a result, I conclude that the debate during the period in question demonstrates that collective security and power balancing form only pieces of a wider argument on how best to secure other political ends, and that they can serve as complimentary rather than contradictory approaches to achieving international security and global stability.
APA, Harvard, Vancouver, ISO, and other styles
31

Freeman, Mark Allen. "ENVIRONMENTAL SECURITY IN THE GLOBAL CAPITALIST SYSTEM: A WORLD-SYSTEMS APPROACH AND STUDY OF PANAMA." Master's thesis, University of Central Florida, 2007. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/3008.

Full text
Abstract:
The current global capitalist system is at odds with environmental protection and the protection of indigenous people that are directly linked to the land on which they live. In environmental security literature, many have argued that, theoretically and functionally, it is possible to link national security with environmental security. However possible this may be on paper, in practice, the global capitalist system prevents this from becoming a reality. Using a world-systems approach, this thesis will show that core countries seeking to expand capital by tapping into new markets, locating new sources of raw materials and even forming strategic military partnerships in periphery countries unavoidably degrade the natural environment and thus, adversely affect the lives and health of indigenous people. It is also the argument in this paper that the primary purpose of strategic military partnerships with periphery states, such as those formed in Panama and Colombia, are primarily meant to protect economic interests, thus perpetuating the capitalist cycle. The end result is that, while it is theoretically possible, through a different theoretical lens, to bridge the definitional and theoretical gulf between national security and environmental security, the reality of the system subverts this endeavor, and will continue to do so under its current configuration.
M.A.
Department of Political Science
Sciences
Political Science MA
APA, Harvard, Vancouver, ISO, and other styles
32

Hasler, Jeffrey L. "Rethinking global engagement : the requirement for knowledge before action /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Jun%5FHasler.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Sherrod, Rebecca J. "The Politics of Operationalizing the World Health Organization Activities: Global Politics, health security and the Global Outbreak Alert and Response Network." Thesis, Virginia Tech, 2018. http://hdl.handle.net/10919/88823.

Full text
Abstract:
Infectious diseases attract a lot of mediatic, cultural and political attention. But are those diseases like Ebola, or ‘disease x’ actually what kills us? Since 1946, the WHO is the most authoritative figure in the fights against infectious disease outbreaks. So how does the WHO maintain this power and authority after tremendous budget cuts, competition for authority, and a shift to non-communicable disease epidemiology? This thesis uses a mixed-methods approach of quantitative analysis of ‘Disease Outbreak News’ reports, and qualitative analysis of key WHO literature, to develop the alternative narrative answering those questions. This thesis found that the WHO activities surrounding the collection and distribution of data create a political and institutional environment in which the WHO seems to be the only logical solution to prevent them. Additionally, the narrative put forth by the WHO prioritizes the ‘alert and response’ and operational capabilities of the organization to further expand authority in outbreak response. This study concludes that the WHO, through the collection and distribution of knowledge, and efforts to increase operational capability as seen through the Global Outbreak Alert and Response Network (GOARN), seeks to maintain normative authority and power as an international organization.
M.A.
Globalization of trade and travel has only increased the fear of infectious disease transmission. There is a great demand for a global health security system that is alert and capable. Based on this ‘threat’ the WHO justifies their role as global health leader. The Global Outbreak Alert and Response Network (GOARN) is the system that currently acts as the operational arm of the WHO, monitoring and coordinating response to infectious disease outbreaks globally. Despite the critical role of GOARN, its day-to-day endeavors remain unexplored by the public health field. This thesis analyzes how the WHO uses GOARN and its surveillance capabilities to collect and transform data as a method to maintain normative authority, and projects a powerful narrative as the leader of ‘alert and response’. In a competitive environment with limited financial resources, the WHO has adapted in terms of surveillance and operational capability to maintain its leadership and authority in the global public health field.
APA, Harvard, Vancouver, ISO, and other styles
34

Schiebel, Jennifer, and Daria Hasse. "Global Policies: Discrepancy Between Global Desires and Local Conditions? The Suitability of Global Policies to raise Local Agricultural Productivity Rates and Food Security in Lago District, Mozambique." Thesis, Linnéuniversitetet, Institutionen för samhällsstudier (SS), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-47112.

Full text
Abstract:
The majority of the rural population in developing countries sustains their livelihoods through small-scale family farming on subsistence level. However, agricultural productivity is far from its potential and food insecurity and high absolute poverty rates are widespread challenges in Sub Saharan Africa (SSA), including Mozambique. Global actors, such as the World Bank (WB), frequently publish policy guidelines, strategy papers and reports, all aiming at tackling the focal problem of low agricultural productivity and claiming to be dedicated to the overall goal of economic, social, inclusive and sustainable development. But as agricultural productivity rates in many developing countries remain low, and food insecurity rates have been high for several decades, the adequacy of global policy guidelines for local structures, conditions and needs is questionable. The aim of this study is therefore to analyze the suitability of and identify possible discrepancies between global strategies – that claim to raise agricultural productivity and food security – and the local level. A strong emphasis is placed on a people-centered, local grassroots perspective. To gather data, a five-week field study in Lago District, Mozambique, was carried out, following an abductive approach and using semi-structured interviews on household level, and with a variety of other stakeholders from the public and private sector. The Logical Framework Approach was applied to structure the findings from the WB report and from the field work, with the aim to create a basis for the analysis and comparison of that data, which provides an answer to the research problem of the suitability of global policies on local level. Additional analytical guidance is provided by the concept of human security and a gender perspective. Conclusions from the study demonstrate that the neoliberal point of departure and the different understandings of small-scale farming underlying the problem and objective of (low) agricultural productivity rates identified by the WB, are not coherent in comparison to the local situation identified in Lago District. The development interventions suggested by the WB rather tend to be an obstacle for sustainable rural and agricultural development, as well as local food security/sovereignty, poverty alleviation and inclusive economic growth in the context of Lago District.
APA, Harvard, Vancouver, ISO, and other styles
35

Powell, Thomas William Robert. "Closing loops to rebalance the global carbon cycle : biomass flows modelling of global agricultural carbon fluxes." Thesis, University of Exeter, 2015. http://hdl.handle.net/10871/18699.

Full text
Abstract:
Since the beginning of farming, and even before, humans have been actively modifying our environment in order to harvest biomass. With the ‘Great Acceleration’ of the industrial age, the global system of biomass harvest for food production has become a major driver of Earth system processes, and caused multi-dimensional sustainability issues which must be addressed in order to meet continued increases in demand for food and other biomass. In addition, bioenergy generation, with the subsequent storage of some or all of the carbon content of the feedstock (known as bioenergy with carbon storage or BECS), is now seen as an important tool for rebalancing the carbon cycle. This thesis has used a biomass flows modelling approach to examine possible trajectories for the socio-ecological metabolism of humanity, with a focus on fluxes of carbon contained in biomass. This approach connects social and economic drivers of biomass harvest with physical Earth systems processes such as the global carbon cycle. Meeting growing food demand in the years 2000-2050 is likely to be a significant challenge in its own right, necessitating the harvest of over 30% of terrestrial biomass. This can only be done without significant damage to natural ecosystems if large increases in efficiency and intensity of food production are achieved, or diets are altered. The production of livestock products is shown to be a major cause of inefficiency in biomass harvest, and changes to livestock demand or production are particularly powerful in ensuring a less damaging relationship with Earth system processes. If increases in efficiency are achieved, it may be possible to grow dedicated bioenergy crops, which, combined with the biomass available in waste and residue streams can be used to generate significant carbon dioxide removal (CDR) fluxes via BECS. Following this strategy it is possible to have a non-trivial effect on atmospheric CO2 concentration by 2050. Increasing the intensity of biomass harvest, particularly when low intensity pasture is replaced with intense bioenergy cropping, also has significant implications for ecological energy flows, and the potential trade-off between protecting biodiversity and growing bioenergy crops to mitigate climate change is also discussed. This body of work presents several interesting areas of potential conflict in different drivers of biomass harvest, and suggestions are made for ways in which to develop the approach in order to explore them.
APA, Harvard, Vancouver, ISO, and other styles
36

Derghoukassian, Khatchik. "Illicit Associations in the Global Political Economy: Courtesan Politics, Arms Trafficking and International Security." Scholarly Repository, 2010. http://scholarlyrepository.miami.edu/oa_dissertations/467.

Full text
Abstract:
The accelerated trend of globalization has transformed the traditional role of the state. According to James Mittelman and Robert Johnston, the state is engaged in a courtesan role, which consists in shifting from serving citizens to acting as tacit partners in market relations, including with globally organized criminal groups. Building on the concept of the courtesan role of the state, this study addresses: (a) the general question of direct and indirect connections of states with illicit transactions in the post-Cold War, with a special attention to arms trafficking; (b) the reaction of the United States, as the remaining unique superpower, to the behavior of states associated with global illicit transactions, especially when involving security-sensitive cases such as arms transfer; (c) the security implications of this particular feature of the global illicit economy, particularly how threats are defined in international politics in the post-Cold War unipolar world. Focusing on the Argentina venta de armas case of illicit arms transfer to the Balkans and Ecuador in the 1990s, the research explores (a) the structural conditions and the domestic roots of a state engaged in illegal transactions in the post-Cold War; (b) the superpower's reaction to policies involving illicit transactions; (c) the security consequences. Through these venues, the dissertation aims at refining the debate in IR Theory to provide a better understanding of the international security dynamics in the post-Cold War.
APA, Harvard, Vancouver, ISO, and other styles
37

MAGALHAES, BRUNO EDUARDO PORTELA BORGES DE. "WHAT IS GLOBAL IN THE CLIMATE THREAT?: CARTOGRAPHIC ANALYSIS OF THE CLIMATE-SECURITY NEXUS." PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2010. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=16141@1.

Full text
Abstract:
CONSELHO NACIONAL DE DESENVOLVIMENTO CIENTÍFICO E TECNOLÓGICO
A dissertação reconstrói o plano social formado em torno do debate público sobre os impactos de segurança das mudanças climáticas. Emprega para tanto o método de mapeamento de controvérsias desenvolvido por Pierre Bourdieu, que consiste no posicionamento dos agentes envolvidos no debate em um plano cartesiano, simbolizando as distâncias sociais entre os mesmos. Neste plano se cruzam um eixo horizontal, no qual os agentes são posicionados em função da caracterização que oferecem da ameaça climática (ênfase em segurança humana x ênfase em segurança geopolítica e militar), e um eixo vertical, no qual as coordenadas dos agentes são definidas a partir do tipo de medidas que advogam para o enfrentamento dos impactos de segurança do fenômeno (adaptação preventiva x adaptação reativa). Cruzando as tomadas de posição dos agentes nestes dois eixos, a pesquisa se propõe a avaliar a compatibilidade entre os resultados encontrados e os argumentos de Ulrich Beck, Didier Bigo, Jef Huysmans, Claudia Aradau e Rens Van Munster acerca dos impactos políticos do novo tipo de risco incomensurável que o fenômeno representa. Discute-se, em específico, a tese que associa a securitização das mudanças climáticas à transição de um modelo comunitarista de organização do sistema internacional rumo a um modelo centrado em um senso de pertencimento global. A dissertação tem como ambição, portanto, analisar os efeitos que as diferentes concepções de segurança climática vêm exercendo sobre a compreensão espaço-temporal moderna. Como conclusão, captura uma inclinação do debate em favor de uma concepção do global entendida como troca entre unidades particulares e uma predileção dos agentes por práticas de gerenciamento de risco.
The dissertation maps the social space created around the public discussion concerning the security impacts of climate change. Pierre Bourdieu’s method of controversy mapping was applied, which consisted in positioning the agents involved in the debate on a Cartesian plane, symbolizing the social distances between them. The social map is formed by the intersection of two axes: first, the horizontal axis, in which actors are positioned according to how they frame the climate threat (emphasis on human security x emphasis on geopolitical and military security). Second, a vertical axis, in which agents are located according to the type of measures they advocate to deal with the security impacts of the phenomenon (preventive adaptation x reactive adaptation). By crossing agents’ positions in these two axes, the research tried to evaluate the consistency between its results and the arguments of Ulrich Beck, Didier Bigo, Jef Huysmans, Claudia Aradau and Rens van Munster concerning the political impacts of the new kind of unmanageable risk climate change represents. The dissertation evaluates, in particular, the hypothesis linking the securitization of climate change with the transcendence move from a communitarian international system towards a model based on a global sense of belonging. The research aimed, therefore, to analyze the effects that the different conceptions of climate security are having upon the modern understanding of space and time. As a conclusion, the dissertation identified an inclination among the analyzed agents towards a conception of the global understood as an exchange between well delineated particulars and a propensity towards practices of risk management.
APA, Harvard, Vancouver, ISO, and other styles
38

Swayne, Holly Lynne. "Star Power, Pandemics, and Politics: The Role of Cultural Elites in Global Health Security." Scholar Commons, 2018. https://scholarcommons.usf.edu/etd/7581.

Full text
Abstract:
Celebrities have historically served a variety of roles in society ranging from the inspirational to the cautionary, utilizing their platforms of visibility to promote themselves, their work, as well as their social and political causes. This study focuses on celebrities as activists engaging with global health issues, with particular attention to the form this engagement takes, the publicity it receives in the mass media, and the types of global health issues that receive the most celebrity attention. An interdisciplinary approach drawing from theories of power, social movement theory, agenda-setting, and cultural studies is used to achieve greater understanding of underlying components of the framework within which this activism exists. Guiding this research is the primary question, “How do cultural elites prominent in U.S. media impact global health security?”, where the specific subset of cultural elites examined are the most influential Hollywood celebrity actors in film. A series of secondary research questions provide insight on the multiple dimensions of celebrity influence and impact in the context of global health security. Specifically, how does celebrity activism affect global health security discourses? What “truths” are created by celebrity activism in global health? Finally, are the issues these celebrities are advocating for, the most pressing global health concerns? Utilizing a mixed-methods approach (quantitative-qualitative-quantitative), I demonstrate the most frequent forms of celebrity engagement with their affiliated global health organizations, as well as the media attention devoted to this engagement in the most prominent U.S. newspapers. Furthermore, I offer empirical evidence of how global health engagement of the most influential celebrities compares to the most pressing global health concerns, as expressed through an analysis of the global health issues that claim the most lives globally. Results demonstrate the most effective application of celebrity resources, and determine whether celebrities can be differently situated for greater impact in global health security overall.
APA, Harvard, Vancouver, ISO, and other styles
39

Cheung, Yee-him, and 張貽謙. "Secure object spaces for global information retrieval (SOSGIR)." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2000. http://hub.hku.hk/bib/B29869596.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Abdelmajid, Nabih T. "Innovative Location Based Scheme for Internet Security Protocol. A proposed Location Based Scheme N-Kerberos Security Protocol Using Intelligent Logic of Believes, Particularly by Modified BAN Logic." Thesis, University of Bradford, 2010. http://hdl.handle.net/10454/5270.

Full text
Abstract:
The importance of the data authentication has resulted in the science of the data protection. Interest in this knowledge has been growing due to the increase in privacy of the user's identity, especially after the widespread use of online transactions. Many security techniques are available to maintain the privacy of the user's identity. These include password, smart card or token and face recognition or finger print. But unfortunately, the possibility to duplicate the identity of a user is still possible. Recently, specialists used the user's physical location as a new factor in order to increase the strength of the verification of the user's identity. This thesis focused on the authentication-based user's location. It is based on the idea of using the Global Position System in order to verify the user identity. Improving Kerberos protocol using GPS signal is proposed in order to eliminate the effect of replay attack. This proposal does not expect a high performance from the user during the implementation of the security system. Moreover, to give users more confidence to use security protocol, it has to be evaluated before accepting it. Thus, a measurement tool used to validate protocols called BAN logic was described. In this thesis, a new form of BAN logic which aims to raise the efficiency checking process of the protocol protection strength using the GPS signal is proposed. The proposed form of Kerberos protocol has been analysed using the new form of BAN logic. The new scheme has been tested and compared with the existing techniques to demonstrate its merits and capabilities.
APA, Harvard, Vancouver, ISO, and other styles
41

Gaarde, Ingeborg. "Negotiating a Global Policy Space : la Via Campesina in the Committee on World Food Security." Paris, EHESS, 2016. http://www.theses.fr/2016EHES0008.

Full text
Abstract:
Les modèles dominants des études de mouvements sociaux nationaux décrivent l'institutionnalisation de ces mouvements comme un modèle qui mène à la dé-radicalisation et la cooptation (Kriesi, 1996; Tilly, 2004, Tarrow, 2008; Walker, 1994; Blumer, 1951). Cette thèse explore comment La Via Campesina (LVC), mouvement paysan international réunissant plus de 200 millions de petits producteurs dans 80 pays du monde construit un modèle d'internationalisation beaucoup plus sophistiqué que les précédents modèles. Pour illustrer cela, notre étude présente comment la LVC s'engage au sein du Comité de la Sécurité Alimentaire mondiale (CSA) à travers le Mécanisme de la société civile (MSC). Basées sur la recherche à la fois « multi-sites » et « multi-échelles », les données empiriques de cette thèse ont été recueillies à la fois dans les au sein de l'ONU et lors de réunions globales et locales de mouvements paysans. Cette approche nous permet d'explorer les différentes dimensions des tensions et des débats animant ce mouvement, ainsi que possibilités et défis au sein d'un mouvement cherchant à établir des liens entre les luttes initiées au niveau local et couplées au niveau global. Cette étude conclut que si nous cherchons à explorer davantage comment les mouvements sociaux globaux aujourd'hui cherchent à créer des synergies entre des différents formes d'activisme politique, nous devons aller au-delà des dichotomies et favoriser des cadres d'analyse moins déterministes que ceux qui ont largement dominé la littérature des mouvements sociaux nationaux
The dominant models in social movement studies expect movements to either disappear or to institutionalise following a pattern that has inevitable endpoints. Such as "taming" (Kaldor, 2003), de-radicalisation, co-optation and elite-formation (Kriesi, 1996; Tilly, 2004; Tarrow, 2008; Walker, 1994; Blumer, 1951). This dissertation argues that La Via Campesina (LVC), the global peasant movement that brings together over 200 million small producers in 80 countries of the word, is building a more sophisticated model of internationalisation. In order to demonstrate this, the dissertation present some of the opportunities and challenges arising from the current engagement of small-scale food producers in the 2009-reformed Committee on World Food Security (CFS) through the International Food Security & Nutrition Civil Society Mechanism (CSM). With empirical data collected both in UN arenas and at global and local meetings of farmers' movements, the dissertation explores the tensions and debates within a movement seeking to build links between struggles initiated at grassroots level and engagement in a global policy arena. The dissertation concludes that if we wish to further explore how global movements seek to build synergies between different forms of political activism today, we need to move beyond dichotomies and towards less deterministic analytical frameworks than those that have largely dominated the literature on national social movements
APA, Harvard, Vancouver, ISO, and other styles
42

Zaiets, Tetiana. "Diebold Nixdorf - global leader in providing innovative self-service technology, security systems and related services." Thesis, Київський національний університет технологій та дизайну, 2017. https://er.knutd.edu.ua/handle/123456789/6690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Gryshko, K. V. "Review and comparative analysis of national and global methods of energy security risk index calculaton." Thesis, Sumy State University, 2017. http://essuir.sumdu.edu.ua/handle/123456789/65243.

Full text
Abstract:
Economic security is an essential component of the national security, which provides the conditions for stable state development and resistance to external and internal threats. One of the important components of state economic security is energy security.
APA, Harvard, Vancouver, ISO, and other styles
44

Farry, Stephen A. "Mission impossible : the United Nations' peace and security activities in the post Cold War era." Thesis, Queen's University Belfast, 2000. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.322850.

Full text
APA, Harvard, Vancouver, ISO, and other styles
45

Chateauvert-Gagnon, Beatrice. "Contesting the logics of protection in international security : modern-day parrhesia amongst dissident female protectors." Thesis, University of Sussex, 2018. http://sro.sussex.ac.uk/id/eprint/76911/.

Full text
Abstract:
The thesis examines different international figures of dissident female protectors, who resist, challenge, disrupt and/or reinforce the multiple ‘logics of protection' of/in International Security. Locating the existing approaches to, and explorations of, the notion of ‘logic of masculinist protection' in feminist security studies, the thesis seeks to expand and pluralise this work by arguing that logics of protection are, in fact, plural and intersecting. It investigates how such logics rely on multiple power relations of not only gender, but also race, sexuality, (settler) coloniality, and so forth. From this point of departure, the thesis identifies and examines different practices and sites of resistance to such plural and intersecting logics. It focuses on the acts of iconic female protectors operating within and beyond official institutions of protection. Mobilising Foucault's work on parrhesia, understood as a practice that involves speaking fearless truth to power, the thesis thus analyses the ways in which different female protectors become parrhesiastes, in their acts of ‘snapping' in reaction to logics of protection, by speaking risky truths to their constitutive power. The thesis examines the cases of Malalai Joya, Chelsea Manning, the Gulabi Gang, and Idle No More as parrhesiastic ‘snaps' that problematise, disrupt, and/or reinforce logics of protection of/in International Security. Finally, the thesis concludes by reflecting on what such analysis means for our understanding of parrhesia as a political and ethical practice today in the context of international security, delineating its implications for feminist security studies and IR more generally.
APA, Harvard, Vancouver, ISO, and other styles
46

Lacy, Mark J. "Security and climate change : international relations and the limits of realism /." London [u.a.] : Routledge, 2005. http://www.loc.gov/catdir/toc/ecip051/2004021926.html.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Gaupp, Franziska. "Water security, droughts and the quantification of their risks to agriculture : a global picture in light of climatic change." Thesis, University of Oxford, 2017. https://ora.ox.ac.uk/objects/uuid:a9a1a456-0f3f-4795-8b9d-149cd804aeb0.

Full text
Abstract:
As a consequence of climatic change, climate variability is expected to increase and climate extremes to become more frequent. Rising water and food demand are further exacerbating the risks to global water and food security. The variability but also the spatial inter-connectedness in our globalized world make our systems more vulnerable to shocks and disasters. To sustain the global water and food security, more knowledge about risks, especially risks of simultaneous shocks is needed. This thesis maps and quantifies risks to global water and food security from a water-food-climate perspective. It starts on a global scale looking at water security in major river basins and then concentrates on major food producing regions of three important crops. The thesis explores how storage can buffer inter- and intra-regional hydrological variability. A water balance model is developed and used to find hotspots of water shortages and to identify river basins where more investment in infrastructure is needed to improve and sustain water security. Looking at food security, global wheat, maize and soybean breadbaskets are identified and used to estimate risks of simultaneous production shocks. Focusing on wheat, I apply different copula approaches to model joint risks of low yields. It is shown quantitatively that (i) it is important to include spatial dependencies in risks studies and that (ii) inter-regional risk pooling could decrease post-disaster liabilities of governments and international organizations. The last part of the thesis focuses on climate impacts on food production. Relevant climate variables for crop growth in the breadbaskets are identified and joint climate risks are estimated using regular vine copulas. It is shown that so far, only wheat has experienced an increase in simultaneous climate risks. In maize and soybean production regions, positive and negative climate risk changes are offsetting each other on a global scale. Looking at future projections, however, it is shown that under a 1.5 and 2 °C global mean warming, simultaneous climate risks increase for all three crops, especially for maize where the return periods of all five breadbaskets experiencing climate risks decrease from 16 to every second year. The findings of this thesis can inform policy makers, businesses and international organizations about risks to global water and food security resulting from climate variability and extremes. It indicates where policies and infrastructure investments are needed to maintain water security, it can assist in building inter-governmental risk pooling schemes and contribute to current climate policy discussions.
APA, Harvard, Vancouver, ISO, and other styles
48

Pauschinger, Dennis. "Global security going local : sport mega event and everyday security dynamics at the 2014 World Cup and the 2016 Olympics in Rio de Janeiro." Thesis, University of Kent, 2017. https://kar.kent.ac.uk/62549/.

Full text
Abstract:
The global securitisation models associated with contemporary sport mega events are currently promoted as having an extremely positive impact on pre-existing domestic security conditions in host cities. This PhD project critically assesses these claims, using the 2014 FIFA World Cup and the 2016 Olympics in Brazil as empirical case studies. The research weaves cultural criminological methods with theoretical approaches from the critical scholarship on mega event security. Drawing upon eight months of ethnographic fieldwork in Rio de Janeiro, this work investigates how globally standardised mega event security models were implemented in the everyday practices of security officials at various positions in the Brazilian security apparatus. Structured in two parts, the thesis sheds light on how these models adapted to Brazil's security conditions, and the extent to which they impacted ordinary police work in Rio de Janeiro. Part I outlines the methodological framework of the research, situates the study within the critical literature on sport mega event security, the wider context of the Brazilian crime complex and the development of Rio's urban conflict. Part II of the thesis concentrates on the data analysis. It investigates how the Brazilian authorities planned the mega event security according to three major principles: the implementation of the Integrated Command and Control System (SICC) to foster cooperation among a diverse field of security institutions; investments in technological solutions, such as camera surveillance and communication systems, materialising in the establishment of Integrated Command and Control Centres (CICC); and finally, the realisation of militarised lock-down security perimeters and ostensive policing strategies to secure the mega event boroughs. This first part of the analysis adopts the view from above and mirrors the planners' vision of Rio de Janeiro as a total security fortress. The following parts of the thesis aim to dismantle this vision of security by contrasting it with the mega event security operation at street level. Presenting distinct examples from the field, this work demonstrates how the fortress ambitions played out in selected spaces, thereby illustrating the fortress' permeability. Working from the perspective of a local civil police station and the lived experience of civil police Special Forces, the thesis argues that the planners' rational mega event security model did not affect the everyday conditions of Rio's urban conflict, where traditional patterns of police work still prevail. Furthermore, it reveals how everyday emotions - frustration, pleasure, and adrenaline rushes - and even Special Forces war narratives upset in practice the static and technology-based mega event security models. Finally, the present work critically examines the officially so-called material (technology, buildings, equipment) and non-material (integration concept) mega event security legacy in Rio de Janeiro. The analysis suggests that, while the event's technological legacy cannot fulfil all of the stated security ambitions, it does leave behind a long-lasting surveillance apparatus that will continue to operate in Rio de Janeiro and reproduces the social-spatial division of the city. The integration ambitions worked temporarily, but failed to materialise at street level, provoking questions as to whether these efforts will continue in the future. The security legacy that this thesis puts forth, however, is one of insecurity. While the mega event security spectacle made specific aspects of security visible, it simultaneously produced insecurity and attempted to make invisible the bloody realities of the city's public security drama. Therefore the analysis concludes that both the mega event security and the politics of public security in Rio de Janeiro make use of a security of camouflage to hide the realities of insecurity that shape the complexities of the lived experiences of police officers and marginalised populations.
APA, Harvard, Vancouver, ISO, and other styles
49

Gómez, de Hinojosa Guerrero Alicia. "Seguridad privada global ¿Amenaza u oportunidad en el marco de las Naciones Unidas?" Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/665545.

Full text
Abstract:
El incremento de los servicios de seguridad privada a nivel mundial, tanto cuantitativo como cualitativo, ha generado en los últimos años posturas contrapuestas en cuanto al papel de la seguridad privada y su posible regulación a nivel global. Estas controversias llegan al punto de que las causas y los efectos de la seguridad privada global están siendo tratados en el marco de las Naciones Unidas por diferentes organismos que posicionan sus efectos desde el enfoque de amenaza para los derechos humanos, hasta el de oportunidad para la mejora de la seguridad humana. De estos posicionamientos depende en gran medida la percepción y el reconocimiento social de los más de 20 millones de profesionales que trabajan en el sector de la seguridad privada a nivel mundial. De hecho, aunque estos profesionales están desempeñando cometidos aparentemente de gran valor para el conjunto de la sociedad, su reconocimiento no parece ser proporcional a la labor que desempeñan, y lo que es más, entre otras circunstancias, tras los efectos de la globalización y el inicio del debate de las empresas de seguridad privadas que actúan en entornos complejos desde una perspectiva transnacional, en ocasiones no sólo no se reconoce apropiadamente la contribución de la seguridad privada en relación con la seguridad de las personas y de las comunidades en general, sino que incluso llega a ser considerada como una amenaza para dicha seguridad. Por ello, la presente tesis tiene como objeto analizar la situación actual de la seguridad privada desde un enfoque global, especialmente en relación con las opciones de regulación internacional debatidas en el entorno de las Naciones Unidas desde diferentes perspectivas de análisis y enfoques, ya que pretendemos demostrar que dicha regulación es uno de los principales instrumentos de reconocimiento social de los profesionales del sector de la seguridad privada y que sólo desde un planteamiento global de sus posibilidades y de sus limitaciones podría encontrar su espacio en la gobernanza global de la seguridad para, posteriormente, ser acotado y desarrollado a través de las legislaciones nacionales que constituirían la verdadera legitimización del papel de la seguridad privada en su contribución a la seguridad ciudadana, y por extensión a la seguridad humana. Así pues, teniendo en cuenta todos los aspectos mencionados, la presente tesis se organiza a través de seis capítulos. En el primero de ellos se contextualiza la situación actual de la seguridad privada global, para dar paso en los capítulos posteriores al análisis desde los diferentes enfoques; en concreto, en el capítulo dos desde la perspectiva de la seguridad como amenaza, en el tres como oportunidad y en el cuarto como oportunidad ante la amenaza. Por último, en el capítulo cinco se introduce la importancia del derecho administrativo global para el posible establecimiento de un marco internacional para la regulación de la seguridad privada global, se analizan los principales instrumentos de dimensión global que se han generado o se están generando, y tras el análisis del alcance, la naturaleza, los contenidos, las potencialidades y las limitaciones de dichos instrumentos, realizamos una propuesta integradora que acabamos resumiendo en las conclusiones del capítulo seis, como complemento al conjunto de conclusiones de los cinco capítulos anteriores.
The increase in worldwide private security services, both quantitative and qualitative, has in recent years generated conflicting positions regarding the role of private security and its possible global regulation. These controversies reach a point where the causes and effects of global private security being dealt with within the framework of the United Nations by different agencies that position their effects from the approach of threat to human rights, to the opportunity for the improvement of human security. The perception and social recognition of the more than 20 million professionals working in the private security sector worldwide depends to a large extent on these positions. In fact, though these professionals are apparently performing tasks of great value to society as a whole, their recognition does not seem to be proportional to the tasks they perform, and furthermore, due to other circumstances, after the effects of globalisation and start of the debate of private security companies operating in complex environments from a transnational perspective, sometimes not only is the contribution of private security in relation to the security of people and communities in general not properly recognised, but it can even come to be considered a threat to said security. With this in mind, this thesis aims to analyse the current situation of private security from a global approach, especially in relation to the international regulation options discussed in the United Nations environment from different perspectives of analysis and approaches, as we expect demonstrate that such regulation is one of the main instruments of social recognition of professionals in the private security sector and that only from a global perspective of its possibilities and limitations could it find its place in the global governance of security, subsequently, be limited and developed through the national legislations that would constitute the true legitimisation of the role of private security in its contribution to citizen security, and by extension to human security. Thus, taking into account all the aspects mentioned, this thesis is organised into six chapters. In the first chapter, the current situation of global private security is contextualised to make way for subsequent chapters to analyze from different approaches; in particular, in chapter two from the perspective of security as a threat, in the third as an opportunity and the fourth as an opportunity to face the threat. Lastly, chapter five introduces the importance of global administrative law for the possible establishment of an international framework for the regulation of global private security, discussing the main instruments of global dimension that have been generated or are being generated, and after analysing the scope, nature, contents, potentialities and limitations of these instruments, an integrative proposal is made that ends up summarizing in the conclusions of chapter six, as a complement to the set of conclusions from the previous five chapters.
APA, Harvard, Vancouver, ISO, and other styles
50

Helander, Hanna. "Geographic Disparities in Future Global Food Security : Exploring the Impacts of Population Development and Climate Change." Thesis, Uppsala universitet, Naturresurser och hållbar utveckling, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-314012.

Full text
Abstract:
Meeting the food demands of a growing population is one of the currently most critical issues for the world community. Additionally, negative impacts of climate change on agriculture are expected in some densely populated regions of developing economies. In this thesis, I examine spatial patterns of future impacts of population development and climate change on food security and how these impacts correlate with current patterns of food security and poverty. I aim to assess the global spatial patterns of food insecurity, concerning the current situation and future prognosis, to quantify the impact of population development and climate change on food security, and to examine to what extent poverty can explain spatial patterns. To identify spatial patterns, I performed a multiple correlation analysis. The aggregated impact estimate of population development and climate change was calculated by adding their respective national predictions. The explanatory power of poverty was evaluated using regression models which contained population development  predictions and current food security as functions of poverty rate. Based on the my results and a literature review I discuss the future geographic disparities of food security and the corresponding consequences for combating hunger. My results show that global geographic disparities are likely to increase substantially, mainly because population, and in turn food demand, will increase strongly in sub-Saharan Africa, the region with the highest decline of resources in relation to population. Impacts of climate change show a similar geographic pattern where foodinsecure regions will be affected the most. I found that poverty is a significant explanatory variable for both population growth and food security. The literature review support causality between variables, which places poverty at the core of food security issues. Poverty causes both a barrier to access food markets and population growth,which ultimately decrease food availability. In order to reach zero hunger for the coming generations, there is an urgent need to redistribute resources, change direction in agriculture practices and implement extensive political measures that carefully consider both local and global contexts.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography