To see the other types of publications on this topic, follow the link: Security state.

Dissertations / Theses on the topic 'Security state'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Security state.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Frisk, Ulf, and Semir Drocic. "The State of Home Computer Security." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2584.

Full text
Abstract:
<p>Hundreds of millions of people use their home computers every day for different purposes. Many of them are connected to the Internet. Most of them are unaware of the threats or do not know how to protect themselves. This unawareness is a major threat to global computer security. </p><p>This master thesis starts by explaining some security related terms that might be unknown to the reader. It then goes on by addressing security vulnerabilities and flaws in the most popular home computer operating systems. The most important threats to home computer security are reviewed in the following chap
APA, Harvard, Vancouver, ISO, and other styles
2

Majumdar, Ankur. "Security in power system state estimation." Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/33744.

Full text
Abstract:
With the power system evolving from passive to a more active system there is an incorporation of information and communication infrastructures in the system. The measurement data are more prone to tampering from attackers for mala fide intentions. Therefore, security and reliability of distribution have become major concerns. State estimation (SE), being the core function of the energy/distribution management system (EMS/DMS), has become necessary in order to operate the system efficiently and in a controlled manner. Although SE is a well-known task in transmission systems, it is usually not a
APA, Harvard, Vancouver, ISO, and other styles
3

Rockett, Jan P. "Internal security in a democratic state." Thesis, University of Bradford, 1991. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.287117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Fitzgerald, Alan. "DATA SECURITY IN SOLID STATE DISKS." International Foundation for Telemetering, 2005. http://hdl.handle.net/10150/604786.

Full text
Abstract:
ITC/USA 2005 Conference Proceedings / The Forty-First Annual International Telemetering Conference and Technical Exhibition / October 24-27, 2005 / Riviera Hotel & Convention Center, Las Vegas, Nevada<br>Solid state disk characteristics make them ideal for data collection in both harsh environments and secure telemetry application. In comparison to their magnetic counterparts, solid state disks are faster, more reliable, extremely durable and, with changing economies and geometries, more affordable and available in higher capacities than ever before. This paper will discuss solid state dis
APA, Harvard, Vancouver, ISO, and other styles
5

Gordon, Ellen M. "Multi-state initiatives: agriculture security preparedness." Thesis, Monterey, California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1584.

Full text
Abstract:
CHDS State/Local<br>Approved for public release, distribution is unlimited<br>To defend American agriculture against foreign or domestic terrorism, it is essential that states build multi-state partnerships to provide for the collaborative plans, programs and operations needed to protect the nations food security. The National Homeland Security Strategy puts states on the front lines in the war against terrorism---including the struggle to secure the agriculture industry from potentially devastating attack. The issues surrounding agro-terrorism are vast and complex and the resources of the Fed
APA, Harvard, Vancouver, ISO, and other styles
6

Gordon, Ellen M. Homeland Security Advisor and Emergency Management Administrator author (civilian). "Multi-state initiatives--agriculture security preparedness /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FGordon.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 41-42). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
7

Woodbury, Glen L. "Recommendations for Homeland Security Organizational approaches at the State Government level." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FWoodbury.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Paul Stockton. Includes bibliographical references (p. 51-52). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
8

Shamkalo, K. Yu. "Stock market’s security in the context of strengthening the state financial security." Master's thesis, Сумський державний університет, 2020. https://essuir.sumdu.edu.ua/handle/123456789/81804.

Full text
Abstract:
The paper substantiates the theoretical and methodological foundations for ensuring the financial security of the state through the system of investment and stock markets. The role of the stock market and the peculiarity of stock exchange indices in ensuring the financial security of the state are investigated. A comparative analysis of the volatility of the Ukrainian stock market relative to the European and American ones, taking into account the time horizon of investment, is carried out, and a correlation is established between the indices under consideration. Based on the study, conclusion
APA, Harvard, Vancouver, ISO, and other styles
9

Blackwood, Matthew J. "Homeland security within state departments of agriculture : components of an effective security program." Thesis, Monterey, California. Naval Postgraduate School, 2010. http://hdl.handle.net/10945/5128.

Full text
Abstract:
CHDS State/Local<br>Approved for public release; distribution is unlimited<br>ttle understanding of the abilities and capabilities of state departments of agriculture related to homeland security initiatives. The challenge is that these programs tend to fall between agriculture and homeland security programs. This research involved interviewing representatives of 24 state departments of agriculture to identify success factors and barriers related to homeland security programs. Respondents reported multi-state agriculture groups, public-private partnerships, and organizational structure
APA, Harvard, Vancouver, ISO, and other styles
10

Fugere, Charles. "Muslims, National Security and the State in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=108836.

Full text
Abstract:
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, l examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. l argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations:
APA, Harvard, Vancouver, ISO, and other styles
11

Fugère, Charles. "Muslims, national security and the state in Uzbekistan." Thesis, McGill University, 2005. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=98922.

Full text
Abstract:
The idea of an "Islamic threat" to national security in Uzbekistan is widespread in the media and amongst several academics. The regime of Uzbek President Islam Karimov has repeatedly emphasized the seriousness of this threat and acted to contain it. In this thesis, I examine both the present ability of different Muslim political actors to challenge the Uzbek state's defense position and recent historical elements of the Uzbek security strategy related to Islam. I argue that the relationship between Muslims and national security in Uzbekistan is characterized by the two following observations:
APA, Harvard, Vancouver, ISO, and other styles
12

Adelwerth, Shawn. "Security of a Small State: Case of Kuwait." Honors in the Major Thesis, University of Central Florida, 2004. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/694.

Full text
Abstract:
This item is only available in print in the UCF Libraries. If this is your Honors Thesis, you can help us make it available online for use by researchers around the world by following the instructions on the distribution consent form at http://library.ucf<br>Bachelors<br>Arts and Sciences<br>Political Science
APA, Harvard, Vancouver, ISO, and other styles
13

Kirisci, Mustafa. "State Capacity, Security Forces and Terrorist Group Termination." Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609106/.

Full text
Abstract:
This dissertation examines how different forms of state capacity affect the decision of terror groups to end their campaign. Building a theoretical framework about the relationship between state capacity and terrorist group termination, I address the following research questions: How do terror groups respond to the changes in non-repressive forms of state's capacity, such as bureaucratic capacity, extractive capacity, and how do those responses of terror groups affect the chance of their demise? How do the changes in non-repressive forms of state capacity affect the likelihood of termination o
APA, Harvard, Vancouver, ISO, and other styles
14

Furst, Alexander J. "State Regulation of Private Police and Security Agents." Bowling Green State University / OhioLINK, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=bgsu1245626912.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Agrawal, Richa. "FSM State Assignment for Security and Power Optimization." University of Cincinnati / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1535635496357999.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Davis, Joe Benton Seroka Jim. "An examination of state level homeland security organizations." Auburn, Ala, 2008. http://hdl.handle.net/10415/1496.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Giannini, Martina. "Improving Cyber-Security of Power System State Estimators." Thesis, KTH, Reglerteknik, 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-142843.

Full text
Abstract:
During the last century, technological advances have deeply renewed many critical infrastructures, such as transportation networks and power systems. In fact, the strong interconnection between physical process, communication channels, and control systems have led to the new concept of cyber-physical systems. Next to countless new advantages, these systems unfortunately have also new weaknesses. An example is cyber-attacks: malicious intrusions into the communication channel turned to manipulate data. In this thesis the considered cyber-physical system is a power network where hundreds of eld
APA, Harvard, Vancouver, ISO, and other styles
18

Hong, Yong-Pyo. "State security and regime security : the security policy of South Korea under the Syngman Rhee government 1953-1960." Thesis, University of Oxford, 1995. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.308856.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Snetkov, Aglaya. "The evolution of Russia's security discourse 2000-2008 : state identity, security priorities and Chechnya." Thesis, University of Birmingham, 2011. http://etheses.bham.ac.uk//id/eprint/2887/.

Full text
Abstract:
This thesis examines the evolution of Russia’s internal and external security perceptions from 2000-2008. Drawing on social constructivist ontology, it argues that the Putin regime’s articulation of security priorities evolved in relation to its reconceptualisation of Russian state identity from a ‘weak’ to a ‘strong’ state. To trace this evolutionary relationship between state identity and security perceptions, official discourse on Chechnya is examined. In this way, Russian narrative constructions of the process of securitisation and desecuritisation of Chechnya, and the role that this disco
APA, Harvard, Vancouver, ISO, and other styles
20

Ralston, Robert James. "Ontological Security: State Identity and Self-Image in the Digital Age." Thesis, Virginia Tech, 2014. http://hdl.handle.net/10919/76785.

Full text
Abstract:
The driving argument of this thesis is that states, particularly the United States, are vulnerable in cyberspace for reasons that go beyond the material vulnerabilities that present studies on state insecurity in cyberspace focus on. This vulnerability in cyberspace is an ontological insecurity. Ontological insecurity reveals itself in the contradictions in official state discourse regarding cyberspace. State security of self—preserving and maintaining the seemingly concrete and consistent nature of what a state is about, how the state is understood in relation to other states, and how the
APA, Harvard, Vancouver, ISO, and other styles
21

Rosell, Richard G. "What type of state homeland security strategy should the state of New Jersey develop?" Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Sep%5FRosell.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2007.<br>Thesis Advisor(s): Bellavita, Christopher. "September 2007." Description based on title screen as viewed on October 23, 2007. Includes bibliographical references (p. 53-56). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
22

Afful, Ebuley. "Violence and State Security in Africa: A Sociological Analysis." Bulletin of Ecumenical Theology, 1995. http://digital.library.duq.edu/u?/bet,1987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Jastiuginas, Saulius. "Information Security Management: The Study of Lithuanian State Institutions." Doctoral thesis, Lithuanian Academic Libraries Network (LABT), 2012. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20121227_090041-07949.

Full text
Abstract:
Growing information security cases and scope illustrate that the relevance of information security issues becomes critical and present information security means are not sufficient enough to manage information security. Narrow comprehension of information security merely as technological problem is broadened by the research results of economic, managerial, psychological, legal and other related aspects’ influence to information security. Information is named as the object of information security management in this thesis, and new information security management solutions are searched in the in
APA, Harvard, Vancouver, ISO, and other styles
24

Longwill, Edward. "The Irish Army and state security policy, 1956-74." Thesis, University of Ulster, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.554245.

Full text
Abstract:
Security policy is an essential component of any state's governance. It consists of addressing present and predicted future threats to the state's external, border or internal security. In the past security policy analysts merely examined subjects with a myopic militarist or threat based analysis. However in recent years the field became more sophisticated and researchers must assess policy in relation to broader, interconnected considerations such as the state's economic capacity to support the military, domestic idiosyncrasies which may generate public opinion and influence the political eli
APA, Harvard, Vancouver, ISO, and other styles
25

Black, Christina Leanne. "State-building in Afghanistan : a gendered human security perspective." Thesis, University of British Columbia, 2013. http://hdl.handle.net/2429/45042.

Full text
Abstract:
With the transition to Afghan national control underway in Afghanistan, questions of legitimacy and security continue to surround the last decade of international military involvement in the country. The initial bombing campaign and subsequent military operations following the terrorist attacks of 9/11 proclaimed the goal of providing humanitarian relief to Afghans as one of the primary motives behind military action. In order to achieve the stated objectives in Afghanistan, the cooperating states implemented a 'comprehensive approach' to state-building, whereby the military intervention was c
APA, Harvard, Vancouver, ISO, and other styles
26

Campbell, Joshua Michael. "How Information and Communication Security Technologies Affect State Power." Malone University Undergraduate Honors Program / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=ma1462540876.

Full text
APA, Harvard, Vancouver, ISO, and other styles
27

MacCulloch, Robert. "The structure of the welfare state." Thesis, University of Oxford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.339057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Hwang, In Soo. "The United States-Republic of Korea security relationship, 1953-1960 : great power and small state." Thesis, University College London (University of London), 1999. http://discovery.ucl.ac.uk/1318002/.

Full text
Abstract:
This study investigates South Korea's security behaviour vis-a-vis the United States and that of the U.S. towards Korea. The significance of this study lies in its emphasis upon relations between South Korea and the United States during the 1953- 1960 period from the perspective of the patron-client state relationship. This study analyses the issues and historical events in order to trace the development of each nation's strategy, leverages, and tactics towards the other. Each chapter is related to the U.S. security commitment policy to South Korea, and South Korea's response in the frame work
APA, Harvard, Vancouver, ISO, and other styles
29

Nash, Kathryn. "From state security to human security : the evolution of norms at the regional level in Africa." Thesis, SOAS, University of London, 2018. http://eprints.soas.ac.uk/26493/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Moeller, David K. "A model for future military operations : the effect of state security and human security on strategy /." Maxwell AFB, Ala. : School of Advanced Air and Space Studies, 2008. https://www.afresearch.org/skins/rims/display.aspx?moduleid=be0e99f3-fc56-4ccb-8dfe-670c0822a153&mode=user&action=downloadpaper&objectid=9c267789-85b9-4963-9298-936e82991d13&rs=PublishedSearch.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Thomas, Mark D. "Deployment of state traffic law enforcement officers for Homeland Security." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FThomas.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): David Brannan. "March 2006." Includes bibliographical references (p. 55-58). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
32

Silver, Jade. "Food Security on Maui: Reinventing Agriculture in the Aloha State." Scholarship @ Claremont, 2013. http://scholarship.claremont.edu/scripps_theses/143.

Full text
Abstract:
This thesis focuses on the past, present, and future of food sustainability on Maui. It begins by explaining ancient Hawaiian agriculture and how this complex system of agriculture was deeply rooted in the customs and traditions of the Hawaiian people. The second section explores how this sustainable agricultural system changed after the arrival of Captain Cook in 1778. After western settlement, land that was once a communal resource became privatized. As land ownership shifted, the traditional subsistence agricultural system of Hawai’i began to change. Export crops such as sugar cane and pine
APA, Harvard, Vancouver, ISO, and other styles
33

Pohnel, Jonathan R. "State Defense Forces and their role in American homeland security." Thesis, Monterey, California: Naval Postgraduate School, 2015. http://hdl.handle.net/10945/45242.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>State Defense Forces (SDFs), or organized state militias and naval militias, have a long and distinguished history of service in the United States. These state-sanctioned organizations are substantiated and legitimized through the U.S. justice system and constitutional law. Currently, 23 states and U.S. territories have SDFs; unlike National Guard units, they cannot be federalized, which means they remain a state-level asset during emergency management operations. SDFs were utilized successfully during Hurricane Katrina, proving their v
APA, Harvard, Vancouver, ISO, and other styles
34

Criswell, Deanne B. "Homeland Security : Developing National Doctrine to Guide State Strategy Development." Thesis, Monterey, California. Naval Postgraduate School, 2012. http://hdl.handle.net/10945/6783.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>If one subscribes to the belief that doctrine is a common understanding of what fundamental principles guide an organization, then this thesis demonstrates that there is currently no common understanding of homeland security. There is currently a lack of institutional doctrine that can be applied nationally for state level government to develop their homeland security strategies. The military has a long history of successfully using doctrine to develop war-fighting strategy. Comparisons can be made to the Air Forces use of doctrine to g
APA, Harvard, Vancouver, ISO, and other styles
35

Grogan, Michael S. "National security imperatives and the neorealist state: Iran and realpolitik." Thesis, Monterey, California. Naval Postgraduate School, 2000. http://hdl.handle.net/10945/7744.

Full text
Abstract:
Approved for public release; distribution is unlimited<br>This thesis argues that pragmatic, neorealist interests-reducing Iran's international isolation, opening avenues for economic cooperation and commercial exchange, restoring religious and cultural links, and safeguarding the mutually advantageous relationships with influential powers in the region- are the true foundations of Iranian national security and foreign policy decisionmaking. Iran's imperative has been-and still is-focused on the pragmatic national security interests of the nation-state model vice the ideological potential for
APA, Harvard, Vancouver, ISO, and other styles
36

Warmington, Sheray Kimberlyn. "State failure and hybrid security governance : the case of Jamaica." Thesis, University of York, 2017. http://etheses.whiterose.ac.uk/21205/.

Full text
Abstract:
This thesis is concerned with examining the intersection between the failed state and security governance literatures, through the case study of Jamaica. This thesis is primarily concerned with examining the under-researched link between concerns raised in failed state and security governance literatures. The thesis proposes that the presence of state failure and success in the same setting is a direct result of the execution of a problematic security governance framework that impedes the nation’s ability to establish a stable state infrastructure that is capable of fulfilling the welfare need
APA, Harvard, Vancouver, ISO, and other styles
37

Nuqui, Reynaldo Francisco. "State Estimation and Voltage Security Monitoring Using Synchronized Phasor Measurements." Diss., Virginia Tech, 2001. http://hdl.handle.net/10919/28266.

Full text
Abstract:
The phasor measurement unit (PMU) is considered to be one of the most important measuring devices in the future of power systems. The distinction comes from its unique ability to provide synchronized phasor measurements of voltages and currents from widely dispersed locations in an electric power grid. The commercialization of the global positioning satellite (GPS) with accuracy of timing pulses in the order of 1 microsecond made possible the commercial production of phasor measurement units. Simulations and field experiences suggest that PMUs can revolutionize the way power systems are moni
APA, Harvard, Vancouver, ISO, and other styles
38

Kuznietsova, Tetiania, and Andrii Chyrkov. "State and perspectives of aircraft cybersecurity." Thesis, National aviation university, 2021. https://er.nau.edu.ua/handle/NAU/50678.

Full text
Abstract:
During the latest events in the aviation world, where experts in the field of cybersecurity (example) opened the possibility of gaining access to the aircraft's on-board systems, industry experts (and not only) thought about it. And we are doing quite a lot. There are many existing guides that contain recommendations and practices, for example: «Software Considerations in Airborne Systems and Equipment Certification» contains recommendations for evaluating security and assuring software quality. There is a separation of access, because all systems are somehow connected to each other th
APA, Harvard, Vancouver, ISO, and other styles
39

Kliushnyk, T., A. Drofa, Тетяна Володимирівна Щербина, Татьяна Владимировна Щербина, and Tetiana Volodymyrivna Shcherbyna. "The state financial security and sustainability of financial sector in Ukraine: their state and management peculiarities." Thesis, Sumy State University, 2019. https://essuir.sumdu.edu.ua/handle/123456789/77597.

Full text
Abstract:
Constant increasing of financial system’s role and importance is becoming a salient characteristic of the modern development of the domestic economy. It provides uninterrupted process of national product formation and promotes economic growth in the country. Given the undeniable importance of finance in the processes of the state's economy functioning, the issues of financial security ensuring and effective financial security management become especially relevant.
APA, Harvard, Vancouver, ISO, and other styles
40

Ashe, James Patrick. "A vulnerability assessment of the East Tennessee State University administrative computer network." [Johnson City, Tenn. : East Tennessee State University], 2004. http://etd-submit.etsu.edu/etd/theses/available/etd-0301104-151512/unrestricted/AsheJ030204b.pdf.

Full text
Abstract:
Thesis (M.S.)--East Tennessee State University, 2004.<br>Title from electronic submission form. ETSU ETD database URN: etd-0301104-151512. Includes bibliographical references. Also available via Internet at the UMI web site.
APA, Harvard, Vancouver, ISO, and other styles
41

Shropshire, Jordan Douglas. "Predicting compliance with prescribed organizational information security protocols." Diss., Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-10202008-120221.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

MacDonald, Robert L. "Rogue State? The United States, Unilateralism, and the United Nations." See Full Text at OhioLINK ETD Center (Requires Adobe Acrobat Reader for viewing), 2006. http://rave.ohiolink.edu/etdc/view?acc%5Fnum=toledo1154015815.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Hetherington, Christopher John. "Private security as an essential component of Homeland Security /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Jun%5FHetherington.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, June 2004.<br>Thesis advisor(s): Maria Rasmussen. Includes bibliographical references (p. 57-59). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
44

Chen, Darren. "State and urban area homeland security strategy v3.0 evolving strategic planning /." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FChen.pdf.

Full text
Abstract:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2006.<br>Thesis Advisor(s): Robert Bach. "March 2006." Includes bibliographical references (p. 45-46). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
45

Collins, Andrew Elliott Egerton. "Saving State-Building: EU Contributions to Security Sector Reform in Afghanistan." Thesis, University of Canterbury. National Centre for Research on Europe, 2011. http://hdl.handle.net/10092/6311.

Full text
Abstract:
State failure represents one of the most pressing concerns for international security in the 21st century, and Afghanistan represents one of the most concerted efforts ever witnessed to address this phenomenon in a lasting and sustainable way. This thesis takes the position that part of the difficulty in finding a remedy for state failure relates to the contradictions and dilemmas inherent within the state-building enterprise itself. The trade-offs required by certain fundamental aspects of state-building must be better understood if they are to be effectively managed, and these trade-offs can
APA, Harvard, Vancouver, ISO, and other styles
46

Hoffman, Samantha R. "Programming China : the Communist Party's autonomic approach to managing state security." Thesis, University of Nottingham, 2017. http://eprints.nottingham.ac.uk/48547/.

Full text
Abstract:
Programming China: The Communist Party’s Autonomic Approach to Managing State Security, introduces the new analytical framework called China's “Autonomic Nervous System” (ANS). The ANS framework applies complex systems management theory to explain the process the Chinese Communist Party calls “social management”. Through the social management process, the Party-state leadership interacts with both the Party masses and non-Party masses. The process involves shaping, managing and responding and is aimed at ensuring the People’s Republic of China’s systemic stability and legitimacy—i.e. (Party-)
APA, Harvard, Vancouver, ISO, and other styles
47

Busato, Marco <1995&gt. "The State of Strict Transport Security: Current Deployment and Correct Configuration." Master's Degree Thesis, Università Ca' Foscari Venezia, 2021. http://hdl.handle.net/10579/19274.

Full text
Abstract:
Nowadays, the topic of security has become a popular issue due to the contemporary digital society in constant development. Thus, HTTPS only is not enough in order to ensure a high security level (e.g. feeling protected while surfing the net). Therefore, a new mechanism has increased its employment: the Strict Transport Security, which enhances the security between a user agent and a server. In this thesis, it will be defined the best application of this system by observing the common settings over the internet and the reason why it is preferable declaring some directives and carry out its cur
APA, Harvard, Vancouver, ISO, and other styles
48

Scott, Katherine Anne. "Reining in the State: Civil Society, Congress, and the Movement to Democratize the National Security State, 1970-1978." Diss., Temple University Libraries, 2009. http://cdm16002.contentdm.oclc.org/cdm/ref/collection/p245801coll10/id/38730.

Full text
Abstract:
History<br>Ph.D.<br>This dissertation explores the battle to democratize the national security state, 1970-1978. It examines the neo-progressive movement to institutionalize a new domestic policy regime, in an attempt to force government transparency, protect individual privacy from state intrusion, and create new judicial and legislative checks on domestic security operations. It proceeds chronologically, first outlining the state's overwhelming response to the domestic unrest of the 1960s. During this period, the Department of Justice developed new capacities to better predict urban unrest,
APA, Harvard, Vancouver, ISO, and other styles
49

Scollan, Thomas J. "An assessment of the New York State Enhanced Security Guard Training legislation and its efficacy on security officer preparedness." Monterey, California. Naval Postgraduate School, 2011. http://hdl.handle.net/10945/10688.

Full text
Abstract:
CHDS State/Local<br>This thesis analyzes the results of a survey instrument administered to a random sample of New York City security officers in order to understand the relationship between job training and turnover and, in turn, the effect of high turnover on the preparedness and effectiveness of that population in performing its duties. Replicating a 2004 survey sponsored by the New York City Public Advocate Office, which exposed poor training and rampant turnover among security guards and resulted in the August 2005 New York State Enhanced Security Guard Training legislation, this thesi
APA, Harvard, Vancouver, ISO, and other styles
50

Adhikari, Upendra. "BAMBOO FLOWERING, HUMAN SECURITY AND THE STATE: A POLITICAL ECOLOGICAL STUDY OF THE IMPACT OF CYCLICAL BAMBOO FLOWERING ON HUMAN SECURITY AND THE ROLE OF STATE IN MIZORAM." Thesis, University of North Bengal, 2013. http://hdl.handle.net/123456789/1487.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!