Thèses sur le sujet « Research Board for National Security »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les 48 meilleures thèses pour votre recherche sur le sujet « Research Board for National Security ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.
Bruner, William W. « National Security Implications of Inexpensive Space Access ». Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.
Texte intégralMartin, Brad. « U.S. EPA NATIONAL HOMELAND SECURITY RESEARCH CENTER : AN INTERNSHIP REPORT ». Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1163622231.
Texte intégralDaehnick, Christian C. « Blueprints For The Future Comparing National Security Space Architectures / ». Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.
Texte intégralYoung, Jason Osgood Ewen. « Novel Materials for Use in Homeland Security Research ». TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1241.
Texte intégralPiekarz, M. J. « Tourism in an unstable and complex world ? Searching for relevant a political risk paradigm and model for tourism organisations ». Thesis, Department of Applied Sciences, Security and Resilience, 2009. http://hdl.handle.net/1826/4018.
Texte intégralCulpepper, Anna M. « Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FCulpepper.pdf.
Texte intégralThesis advisor(s): Raymond Buettner, Jr., Dorothy Denning. Includes bibliographical references (p. 65-69). Also available online.
Mooi, Roderick David. « A model for security incident response in the South African National Research and Education network ». Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1017598.
Texte intégralCapps, Teresa. « A research study into furthering the understanding of management accounting in practice with specific reference to the practices utilised in the North Derbyshire area of the NCB ». Thesis, University of Sheffield, 1990. http://etheses.whiterose.ac.uk/1836/.
Texte intégralPiekarz, Mark J. « Tourism in an unstable and complex world ? : searching for a relevant political risk paradigm and model for tourism organisations ». Thesis, Cranfield University, 2008. http://dspace.lib.cranfield.ac.uk/handle/1826/4018.
Texte intégralMoore, Gary D. « Domestic production and national security--is there a connection ? a case study of SEMATECH research consortium ». Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25855.
Texte intégralConnolly, Lena Y., M. Lang et D. S. Wall. « Information Security Behavior : A Cross-Cultural Comparison of Irish and US Employees ». Taylor & ; Francis, 2019. http://hdl.handle.net/10454/17906.
Texte intégralThis study explores how aspects of perceived national culture affect the information security attitudes and behavior of employees. Data was collected using 19 semi-structured interviews in Ireland and the United States of America (US). The main findings are that US employees in the observed organizations are more inclined to adopt formalized information security policies and procedures than Irish employees, and are also more likely to have higher levels of compliance and lower levels of non-compliance.
Sjöstedt, Roxanna. « Talking Threats : The Social Construction of National Security in Russia and the United States ». Doctoral thesis, Uppsala universitet, Institutionen för freds- och konfliktforskning, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-130585.
Texte intégralGraham, James H. « Validating a method for enhanced communications and situational awareness at the incident command level ». Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://edocs.nps.edu/npspubs/scholarly/theses/2006/Mar/06Mar%5FGraham%5FJames.pdf.
Texte intégralThesis Advisor(s): Housel, Tom. "March 2006." Description based on title screen as viewed on July 31, 2009. DTIC Descriptors: Interoperability, Communication And Radio Systems, Situational Awareness, Ground Level, Off The Shelf Equipment, Homeland Security, Manportable Equipment, Commercial Equipment, Research Facilities, Information Exchange. IDE: Communications, Collaboration, Mobile Command Post, Operations Center. Author(s) subject terms: Communications, interoperability, collaboration, situational awareness, mobile command post, operations center. Includes bibliographical references (p. 117-120). Also available in print.
Mjikeliso, Yolanda. « Guidelines to address the human factor in the South African National Research and Education Network beneficiary institutions ». Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/9946.
Texte intégralRocha, Flores Waldo. « Shaping information security behaviors related to social engineering attacks ». Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.
Texte intégralQC 20160503
Carnal, David D. « An enhanced implementation of models for electric power grid interdiction ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCarnal.pdf.
Texte intégralCreech, Greta E. « Holding on to Who They Are : Pathways for Variations in Response to Toxic Workplace Behavior Among U.S. Intelligence Officers ». Antioch University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=antioch1622928796706695.
Texte intégralWiroth, Manuel. « Histoire de l'ufologie en France : des premières recherches individuelles sur les soucoupes volantes à la constitution de réseaux d'étude des ovnis (des années 1940 à nos jours) ». Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE3053.
Texte intégralThe research about unidentified flying objects has started in the late 1940s in France. All this is the doing of those who are commonly known in French as the soucoupistes (the researchers in this field). Currently with this mainly individual initiative, the army also has made their own enquiries. Their interest for the question has proved consistent since the 1940s although the details about their implication and their action have been uneasy to know. As for them, the soucoupistes (or French ufologists) have joined together and the first major private groups have come out in the 1950s to become widespread in the late 1960s. Nonetheless, the decade of the 1970s was the golden age of ufology research in France : there were hundreds of organizations and thousands of ufologists. A real reasearch network came out. This network has revolved both around groups of people and individuals, who publish in specialized reviews, and they try to connect to a booming public scientific ufology. The latter, which is under the aegis of the CNES, is known as GEPAN. The department has been often renamed but still exists today. It is based on the army, mainly on the police force, but also on some administrations which provide them with information about UFO. French ufology, which has been in decline since the 1980s, is characterized by the coexistence of a private research network and a public one. Except for a few occasions, both of them have hardly collaborated and this situation explains why ufologists haven’t found many results
Govender, Rajuvelu. « The contestation, ambiguities and dilemmas of curriculum development at the Solomon Mahlangu Freedom College, 1978-1992 ». Thesis, University of the Western Cape, 2011. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6042_1320317218.
Texte intégralBerrios-Ayala, Mark. « Brave New World Reloaded : Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities ». Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.
Texte intégralB.S.
Bachelors
Health and Public Affairs
Legal Studies
Scarlato, Michele. « Sicurezza di rete, analisi del traffico e monitoraggio ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Texte intégralLin, Bo-Jun, et 林柏潤. « Research on Security Protection of the National Army ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/sw76c2.
Texte intégral義守大學
公共政策與管理學系
106
The national army shoulders the responsibilities of protecting the country and the people and the people. The characteristics of the country’s geopolitical and economic environment, Taiwan must open up freedom and a stable market environment. Therefore, under the premise of unavoidable exchange activities across the Taiwan Strait, it is necessary to conduct various exchanges with China. This may also lead to the collection of various is intelligence information from China. This study intends to conduct research on counter-intelligence work practices from the China and discuss the institutional, practical, and core values of intelligence to understand the concerns of counter-intelligence workers. This study interviewed five people in intelligence work using semi-structured interviews. It can be seen that training then sharing of cases are information-oriented people who can quickly know the current information gathering, especially the development of information technology that tools will change accordingly. The return mechanism can be delivered in a flattened manner to enhance the timeliness of transmission reinforcement, especially to prevent the intelligence personnel in our country from being absorbed. Therefore, the core value of counterintelligence must be based on the inner psychology of workers and shape the mission of counterintelligence. The results of this study can provide insights into the institutional, practical, and core values of the national army when it comes to counter-intelligence workers’ practical work. The result provided in-depth reinforcement of education and training to every counter-intelligence worker.
Yu, Chi, et 余績. « A Research on the Taiwan National Security Association ». Thesis, 2006. http://ndltd.ncl.edu.tw/handle/67319561133961253394.
Texte intégral元智大學
資訊社會學研究所
94
This dissertation aimed to discuss the issue of whether Non-Governmental Organization (NGO) could have its manoeuvring over the high politics issues, such as regional security, and tried to find out the contribution of the targeted Taiwan National Security Association on the peace and stability over Taiwan Strait via documentary analyses and interviews. The dissertation would also examine the relevant theories of NGO with actual circumstances and make some useful supplement towards the existing research portfolio at the end. The phenomenon of vast growing NGOs is one of the major events in the 20th Century. Further, NGO has been the alternative for the failure of government and enterprise’s function. Alone with globalization, international affairs has been transformed into a multi-lateral dimension. More actors have joined the forum of international society that changed the dominance of state actor. And NGO would be the most intriguing and ignoring actor of its engagement on international affairs. Regarding the issue of security, Taiwan National Security Association (TNSO) has been the only NGO so far that focused on the peace and prosperity in the region of East Asia. It is reasoning that we should give our full support to such idealistic and value-driven NGO that might encourage more NGOs to participate in such high-level political issue. However, TNSIOshould also reform itself, both structure and objectives, to accommodate different political appeals, especially the opposite opinions. To conclude, the development of NGOs in Taiwan still needs lots of effort and encouragement. They should appeal more supports by clearly delivering their demands at the one hand, and reform the structure with expertise on the other hand that could enable themselves to cross the invisible boundary of high-level politics and have a strong, credible say.
Cheng, Yu-Chih, et 鄭宇智. « Cross-strait Drug Crime Research on Taiwan National Security ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5ek27j.
Texte intégral國立政治大學
國家安全與大陸研究碩士在職專班
106
Cross-strait exchanges After the opening of our country to visit relatives in mainland China in 1987, up to 38 years of cross-strait isolation, it was broken. the cross-strait personnel exchanges and various exchanges were carried out quickly. The cross-strait have gradually moved toward exchanges, dialogue and cooperation from long-term confrontation in the past. In the past three decades, cross-strait relations have gone through a climax of decline. Although the Taiwan Strait crisis and cross-strait risk events continue, the people on both sides of the strait can still remove various obstacles and continue to move forward. The process of cross-strait exchanges has also closely linked the interests of the people on both sides of the strait, and the cross-strait become an inseparable community of interests increasingly. Due to the geographically similar, language communication, and the cultural inheritance of the two sides of the strait, just only the political factors have caused the part of exchange of criminal affair to be scruples, which makes it impossible to exchange effectively of criminal imformation between the two sides of the strait. In addition to the political subject that are not recognized by the two sides of the strait, cause the law for each other not to applied in one body, and even caused the situation of no tracing.And it has become a paradise for transnational or cross-regional criminal organizations. The two sides of the strait to signed the cross-strait joint fight crimes together and mutual legal assistance agreement in 2007. Although they have greatly helped the cross-strait crimes and the application of laws, but most of the exchanges are affected by the rotation of domestic political parties, then unable to cooperate in depth and imformation of commit crimes sometimes have or not. The criminals have insight into such gaps, colluding with each other and conducting various types of transnational or cross-regional crimes (such as drug crimes between the cross-strait), seriously jeopardizing the health, economic security, social security of the people on both sides of the strait and the country safety. Drug crimes are a public crime in the world. The drug crimes between the cross-strait have trend to become organized, grouped, and cross-regional. Not single areas can respond to and face it, Only strengthen the establishment of cross-strait exchanges and continuous cooperation mechanisms. Investigating and conducting exchanges can effectively prevent cross-border drug crimes between the two sides of the strait, to reduce the threat and hidden dangers to our national security of country. According to the UNODC(United Nations Office on Drugs and Crime) "World Drug Report", Taiwan is listed as an international drug smuggling transfer station, because compared with the export of goods from the mainland China and the Philippines, there will be strict inspections. The goods exported from Taiwan are relatively loosely tested in other countries, so many transnationals smuggling drug group likes to transfer drugs through Taiwan, it making a bad reputation of drug transit countries of Taiwan. The harm of drug abuse and drugs is a common problem faced by countries all over the world. According to the "2016 World Drug Report", it is estimated that in 2014, one out of every 20 adults, 15 to 64 years old. There are 250 million people who have used at least one drug. However, more than 29 million drug users are estimated to have disease of drug abuse, of which 12 million are injecting drug users, and 14.0% of whom are infected with HIV, and the effects of drug use and its health still are catastrophic of consequences remain. What makes the global drug abuse even more ambiguous is that many occasional and frequent drug users are often multiple drug users who use more than one drug at the same time or in succession. For example, non-medical use of prescription drugs, synthetic stimulants (drugs) and new psychoactive substances in lieu of or in combination with more conventional drugs blurs the distinction between specific drug users, showing the correlation or cycle of drug use and related health consequences in recent years. The author is engaged in drug investigation and related work, analyzes the causes, forms, cooperation and strategic effects of cross-strait drug crimes, as well as Taiwan legal system, anti-drug organization, structure, strategy, etc., hoping to make a systematic understanding for cross-strait drug crimes problem, further explore the impact of cross-strait drug crimes on national security factors such as national human body, economic development and social security, and it more explore the possibility of exacerbated unishment for drug crime, drug decriminalization and legal drugs trafficking, by legal means Non-traditional safe drug crimes have hidden huge illegal interests and underground economic maps to enhance the government's emphasis on the dangers and proliferation of drugs.
Liao, Wen-Jeng, et 廖文正. « The Research on Changes and Functionsof National Security Council ». Thesis, 2004. http://ndltd.ncl.edu.tw/handle/y66ds3.
Texte intégral銘傳大學
公共事務學系碩士班
92
The National Defense Meeting was established in 1954 and later renamed the National Security Council (NSC). It has gone through three phases: the Marshall Law phase, the pre-legalization phase, and the current phase where it is a legal organization under the ROC Constitution. After its legalization, the NSC gradually became an advisory body that maps out national security policy directions for the President’s reference, rather than being an all-powerful decision-making organ in charge of a whole range of agendas as it used to be. The NSC has been in the process of downsizing and accordingly has fewer functions. With its legalization, the NSC is defined as an advisory body that offers advice to the President in formulating national security policy directions. This function, however, was not fully fulfilled due to the lack of proper mechanisms and researchers. On June 25, 2003, the amendment to the NSC Bill was passed. The revised NSC Bill clearly defines the parameters of national security and highlights the NSC’s advisory role. With the amendment, researchers have been introduced into the NSC and various research groups set up to help top officials make decisions. Nevertheless, the revised NSC Bill has been in place for such a short period of time that we don’t know whether the NSC’s organization and functions can produce the best results. This dissertation will look into different aspects of the NSC and make tentative suggestions as to how to expand the category of national security, strengthen the role and function of researchers, improve coordination between the NSC and other state organs (including intelligence bodies), establish contingency mechanisms, etc, so that the NSC is able to fulfill its function as an advisory body offering the President advice in terms of decision-making in national defense, foreign affairs, cross-strait relations and contingencies.
Chang, Hung-Kuan, et 張宏寬. « Research on National Security Intelligence from the perspective crisis administration ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/my7b79.
Texte intégral義守大學
資訊管理學系
106
Under the global tide, the security issue faced by countries are not only traditional military threats, non-traditional security challenges, but also emerging security threats, such as terrorism, hacking, transnational crime, money laundering, smuggling, and drug trafficking. However, crises are omnipresent but unpredictable, which seriously affect the life and property of the people, the image of the organization, and public interest. Therefore, the issue of crises is to encompass the daily life to the survival of the countries. From the perspective of national security, crisis management is an important means to achieve the purpose, which is to prevent crisis and to curb the crisis. Once the crisis occurs, the mechanism of crisis management is immediately activated to reduce the damage caused and control the situation and recover quickly. Therefore, how to properly construct the crisis management mechanism of the national security intelligence work and deal with the crisis is the important task of the national security system. "Intelligence work" and "national security" are getting closer because of new security threats from regional to international. The formulation of political, military, economic, and diplomatic policies that is critical to national security requires accurate intelligence for reference. In addition, the intelligence work has become a means of national security strategy. How to present the information in accordance with strategic objective is an important topic for the formulation of a national security strategy. The motivation of this paper is to avoid the crises that countries may encounter at all levels of national security intelligence, by exploring the relationship between crisis management and national security and intelligence work. And discussesing how to implement crisis management mechanisms by means of intelligence work, in order to avoid risks, or reduce damage to promote national security. In addition, considering the globalization and changes in the war pattern, the form of crises has evolved from the state of war to various national security hazards. Such as terrorism, the spread of infectious diseases, the global financial crisis and information warfare, etc. At this time, the crisis management capability of the intelligence system is being tested. However, in addition to the crisis management mechanism, the government must formulate projects for crisis situations. In order to be able to deal with major crises, we should do a good job in crisis management. Furthermore, intelligence work is the key, intelligence integration and supervision can help administrative departments to use the advanced intelligences to strengthen the ability of crisis management. Finally, the conclusions and recommendations of this study are proposed: I.To maintain national security, it is necessary to introduce knowledges of crisis management. II.Accurate informations are the main key when decision makers face crisis events. III.Intelligence work is an important option to ensure national security.
Thou, Cuang Ci, et 周廣齊. « The Research of the National Security Strategy of The United States ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/44291051261940460549.
Texte intégral國防大學
戰略研究所
96
《The National Security Strategy》is the highest rudder dealing with international relations and national strategy, it is the “Grand Strategy” of US. It has contained three essential factors: The national interest, the national ambition and the method which needs to adopt for realizing the national interest or resisting the threat. This article has used the official literatures which are the Clinton and G.W. Bush administration《National Security Strategy》be framework and surrounded this framework for the writing coherence impetus. The《National Security Strategy》of Clinton government emphasized that must maintain the engagement of the overseas , the enlargement of the free market and the democratic community in the world, US must concentrate the resources in the place that can make most change as possible , strengthen the allied and the friendly state exchange for share more responsibilities in the same time. They thought the security and the prosperity in the 21st century must depend on contacting overseas country for the development of global economy. The 《National Security Strategy》 of G.W. Bush administration receives 911 affect of terror attack, let they have to face the global terrorism immediately. In the second《National Security Strategy》, has adjusted the strategic priority, to improve democracy on the one hand, the War on Terror rises to the ideology war has entrusted the new connotation with “the advancement of democratization” on the other hand. The counter-terrorism and the democracy become two grand strategy goals which are compatible and complements. In brief, the 《National Security Strategy》 of Clinton government, although still take US's national survival, the benefit and safe as the main consideration, there are more deeply advises in participating the regional cooperation, expanding the economical integration , improving democracy positively and so on. It shows the national security strategy of the Clinton government to come under the new liberalism influence. The G.W. Bush administration is received by new realism that all affect take the national security and the benefit as consideration, the maintenance consistent in counter-terrorism, the defense for US territory security and the national interest. In the international relations mainstream theory, any theory has not been possible to lead completely, confirms the 《National Security Strategy》 in the nowadays.
ku, Huang An, et 黃安谷. « Research on the Influences of Non-traditionally Threat on the National Security ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/47654419529083518644.
Texte intégral國防管理學院
國防決策科學研究所
96
The concept of “National Security” used to be defined mainly on military-security level, as how to defend foreign military interference and invade, and how to safeguard national independency and territorial integrity. However, as Cold War ends, the extremity of opposition between countries has been changed as well. The concept is powerfully affected by economic policies in other countries. Military opposition is no longer the only substance in defining international relationship. With the affects of information revolution and globalization, the boundaries of national sovereignty have been blurred and the concept of security is now with conventional and non-conventional definitions. The broadening definition of national security now includes resources, environmental issues, economic trading, demographic conflict, democracy revolution, drugs and crime, infectious diseases, and terrorism. Under most of the circumstance, these non-military safety factors are more challenging than enemy states’ military threat. Drug dealing has become one of the most serious security problems in the world. It not only affects public security, but also poses as a national security threat. Drug dealings are always well-organized, under different kinds of covers, and trans-territory; furthermore, along come criminal activities such as weapon possessions, violence, pornography, and money laundry. Criminal activities have grown more and more hazardous and even expanded trans-nationally. Nowadays, drug dealing is a common problem to be solved for countries all over the world.
Chen, Tzer-Li, et 陳則黎. « Research & ; Draft of The Security On The National Shared Mobile Banking System ». Thesis, 2001. http://ndltd.ncl.edu.tw/handle/82528987837391186657.
Texte intégral國立臺灣科技大學
管理研究所
89
The popularity of mobile phones grows greater rapidly in these years, and the mobile commerce has become the next aim to achieve. Within our island, banks and telecommunication dealers are united in their efforts to make a value-added phone called "Portable ATM" which enables the public to carry "financial services" with them. That raises up the "mobile banking" tendency. Above all, the necessity for the public to handle the investment related affairs, with the real-time requirements for securities market can be met through the use of mobile phones. In view of the above, the electronic commerce will step further into the mobile commerce and thus arises great business opportunities. I during this beginning period in developing the mobile banking, submit this report to research the current status and bottleneck of the development of our domestic mobile banking as well as to propose the solutions.
Yeh, Din-gwo, et 葉定國. « Taiwan''s National Security - A Research of International Relations Theory under the Constructivism Viewpoint ». Thesis, 2004. http://ndltd.ncl.edu.tw/handle/97324703727450936289.
Texte intégral國立中山大學
中山學術研究所
92
This thesis tries to argue the important influence of culture and identity in national security studies, especially about Taiwan’s security. In my viewpoint, culture and identity have become two powerful elements in security studies. In the Post-Cold War era, material factors are no longer the only base of national security. At the same time, the culture clash has become another potential factor that influences the national and international security. The 911 event offers the best example. Meanwhile, the Taiwan security environment is undergoing a great change. The military competition tendency between Taiwan and Mainland China becomes more and more dangerous. It seems that the elements of culture and norms haven’t been taken into consider by Taiwan authorities upon how these elements could affect Taiwan’s security. In this thesis, the viewpoint of constructivism on international relations theory has been chosen to survey how culture and identity factors influence Taiwan’s security, and I try to figure out the influence of culture and identity in security research of international relations. Three main points of conclusion could be made: 1. Culture and identity have become important factors of national security. At the same time, the scholars of mainstream international theory (like neo-realism and neo-liberalism) have paid more attention to culture and identity research. 2. It is very important to combine cultural and material factors in national security research. An effective cultural strategy could improve the function of national security policy. 3. Taiwan administration has to think over the culture and identity factors’influences upon Taiwan security. Although theses factors don’t construct an immediate and clear threat, but in the future, theses factors may become a dangerous threat of national security. In the long run, they could even destroy the political power.
Liu, Chia-Hsun, et 劉佳勳. « Performance Measurement Framework for Introducing Information Security Management System to the National Research Unit ». Thesis, 2009. http://ndltd.ncl.edu.tw/handle/68438683597104132473.
Texte intégral世新大學
企業管理研究所(含碩專班)
97
The current study explored the influential factors and developed a framework for introducing the information security management system (ISMS) to the national research units. The hierarchical structure of indices and items for evaluating the ISMS performance were developed by adopting the methods of literature review, expert questionnaire, and analytic hierarchy process. After completing analysis, the study designed an ISMS performance measurement framework that included 6 dimensions and 29 items. The result implied that three dimensions of safety policy, risk management, and continuous management were most important since they had the highest weights among all ISMS factors. Hence, if the government units want to implement an ISMS, they need to emphasize the critical impacts of safety policy, risk management, and continuous management. Moreover, three National Research Units were subjectively chosen to evaluate their ISMS performance using the proposed framework. The evaluation results showed that overall speaking, Unit A had the best performance than Units B and C, especially for the factors of safety policy and access controlling. But, Unit B had better performance in the item of human safety than other units, and Unit C had better performance in risk management, continuous management, and information properties management. The findings could provide the public or private institutions as a reference tool for developing the mechanism and the standard process for evaluating ISMS performance.
Wang, Chine-Hua, et 王健華. « The Research of Perestroika of National Security from the Soft Power views:Instanced American and China ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/87187931469734449721.
Texte intégral國防大學
戰略研究所
96
In this interdependent international security environment, the main body, contents and methods of security were different with traditional cognition. It’s collective, cooperative, combinative security, not only military but also includes politics, economy, culture, society and other untraditional security issues. The international societies are no more focus on military power or wars but rely on influence and attractive to obtain their benefits and security, unless its’ existence has been treated. Therefore, in addition to military and economy, we need nation’s soft power to support our benefit and security. Nye’s “soft power” provide country a second power which include culture attraction, ideology and politics values to create international rules or issues. It really can provide us a new thought to deal our nation’s security issue. Due to our weaker economy and military, the only way to improve Taiwan’s security environment is to promote our “soft power”. It can be found that development of soft power can increase domestic cohesion and enhance people identify nation’s values and influence foreign country’s policy to ensure our benefit and security by researching perestroika of nation’s security in terms of soft power from this thesis. The influence of developing soft power in USA and China tell us some key points of developing soft power as blow:1. The government and private department are the same developing main body. 2. Regarding foreign and domestic layout. 3. Pay attention to culture and diplomacy. 4.Build an intelligent power with half hardness and half softness. The frame of thesis includes:soft power and nation’s security will be discussed in 1st chapter as the basis of demonstration; In terms of evolvement of authority, 2nd chapter will distinguish the value of power from nation’s security;In chapter 3 and 4, USA and China’s module of developing soft power and the mutual relationship to their security strategy will be discussed individually;Apply the reciprocity into our nation’s security strategy, develop perestroika(culture, policy, diplomacy);6th chapter will conclude the value of soft power to nation’s security and state the following research direction.
Liu, kuang-Tzu, et 劉光慈. « The research on Management Information Security Electronic Government -taking in Bureau of National Health Insurance as example ». Thesis, 2000. http://ndltd.ncl.edu.tw/handle/81460988432543150173.
Texte intégral國立臺北大學
企業管理學系
88
Abstract In recent years, due to the rapid changes of technology and the emergence of the Internet and the rapid development of networking technology.The governments of lots of countries worldwide have invested tremendous capitals and poured into many resources in setting up NII,and our government too. Our government now is also devoted to developing the electronic government, such as the transmission of electronic documents, and network tax reports. The measures can speed up the service and thus make citizens enjoy the convenience. The main purpose of electronic government is to provide convenient and satisfactory services. To keep up with the rolling wheel of the whole world and enhance the competition power of our nation is the major objective of our efforts. Our government provides citizen participation through Internet.When discussing the security of the information systems, the protection of computer crime is the one of the most important issues.It is desired to conduct these transactions across open networks. It is inevitable to construct a security system for computer networks in order to discard the effects of attackers and such that no person can do an unauthorized transaction. In order to keep the security of computer systems.Last, the paper will discuss the constraints of management information security electronic government and taking in Bureau of National Health Insurance as example,and search for solutions to these constraints.To give conclusions and discuss the improvements or the extensions of the above problems and their solutions for the further researches.The researches for information management security policy making.
Yi, Kung Ling, et 孔令義. « The Research on Role and Function Since the Promulgation Organization Act of National Security Council in 2003 ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/57135494012336465335.
Texte intégral國防管理學院
國防決策科學研究所
96
Abstract The Objective of this research is to explore the function of the National Security Council (NSC) which was established in 1954. It has gone through three phases:the Marshall law phase,The pre-legalization phase,and the phase after 2003 when it is a legal organization unber the ROC Constitution . And we emphasis that the NSC gradually became an advisory body that maps out nation secureity policy directions for the prestdent’s reference ,rather than being an all-powerful decision-making organ in charge of a whole range of agendas as it used to be .The NSC has been in the processs of downsizeing and accordingly has fewer functions .After its legalization ,the NSC is defined as an advisory body that offers advice to the president in formulating national secureity policy direction .This function, however, was not fully fulfilled due to the lack of proper mechanicsms and researchers . On June 25,2003, the amendment to the NSC Bill was passed .The revised NSC Bill clearly defines the parameters of national securety and highlights the NSC’s advisory role. With the amendment,researchers have been introduced into the NSC and various research groups set up to help top officials make decisions. Nevertheless, the revised NSC Bill has been in place and reference the experiences of several nations. Such as American And make tentative suggestions as to how to expand the category of national security, strengthen the role and function of researchers, improve coordination between the NSC and other state organd (including intelligence bodies ), establish contingentcy mechanicsms, etc, so that the NSC is able to fulfill its function as an advisory body offering the president advice in terms of decision-making in national defense, foreign affairs, cross-strait relations and contingentcies.
Walther, Gerald, et Malcolm R. Dando. « A phoenix of the modern world : the re-emergence of National Science Advisory Board for Biosecurity and its implications for scientific partners ». 2015. http://hdl.handle.net/10454/9101.
Texte intégralWhile there are many mythical stories of various kinds about the Phoenix it retains several features throughout all of them. In ancient Egypt, the Phoenix was the prodigy of the sun god Ra and appeared in the shape of a giant bird of fire, which was one of the most beautiful creatures on earth. It was remarkable in that it could not foster any offspring and at the end of its life would explode in a ball of fire. Out of the ashes, an egg is formed which then hatches the Phoenix again in its young form. The cry of a Phoenix was supposed to be of miraculous beauty. This chapter will explore if the Phoenix is a suitable metaphor for the recent re-emergence of the US National Science Advisory Board for Biosecurity (NSABB), which was tasked with providing scientific expertise to the government on questions of the security risks of emerging science and technology in the life sciences. The analogy to the Phoenix suggests itself because the NSABB, chartered in 2004, had been inactive for over two years and only recently took up its work. The comparison between the Phoenix and the NSABB gives rise to several questions: first, has the re-emergence of the NSABB been met with an equally beautiful cry of joy among the scientists and security experts? Second, what happens when the Phoenix lies dormant? And third, what took place before the Phoenix was created?
National, Science Board (NSB). « Long-Lived Digital Data Collections : Enabling Research and Education in the 21st Century : Report of the National Science Board (Pre-publication draft, Approved by the National Science Board May 26, 2005, subject to final editorial changes.) ». 2005. http://hdl.handle.net/10150/105473.
Texte intégralShen, Nan-Chen, et 沈能成. « The Comparative Research on National Security Decision- Making Institution between the Republic of China and the United States ». Thesis, 2009. http://ndltd.ncl.edu.tw/handle/46265218309661274481.
Texte intégral淡江大學
國際事務與戰略研究所碩士在職專班
97
The United States as the global superpower nation has been through the 911 terrorist attack, thus, it is worth monitoring on how U.S. would deal with national security agenda. The national security decision-making institution formulates the direction and policy of the national security. According to the design of constitution law on national security policy, “the president decides national security by establishes National Security Council accountable for National Security Bureau”. The N. S.C., in nature, is the advisory agency that provides the president advices on national security affairs; in function, it is the highest institution that manages national security affairs. In terms of operational analysis, the N.S.C. provides decision-making assistance on integration guide, coordination, and the government apparatus support according to institution responsibility division. The N.S.C. is the most important national security decision-making institution. Legal system and transformation of the N.S.C. has been established during the adjustment period in December 1993 and June 2003. This thesis emphasizes three parts based on analysis structure. Firstly, investigate the theory and concept of national security and the policy-making, which provides the rationale construction of the ideal national security decision-making institution. Secondly, compare the national security decision-making institution evolution of development, legal basis, organization function, and the actual operation execution occurs in the US and us. Finally, analyzes from organizational orientation, policy-making function, and operation system, and generalizes our ideal national security decision-making institution.
Lin, Kuo-Chin, et 林國欽. « The research of the impact in relation to our national defense security from Aviation Technology development of P.R.C ». Thesis, 2014. http://ndltd.ncl.edu.tw/handle/20142831998827024111.
Texte intégral銘傳大學
公共事務學系兩岸關係與安全管理碩士在職專班
102
Space war is a pioneer in information warfare. It is a weapon of modern warfare forces, and a key factor in determining the outcome of future wars. People''s Republic of China (PRC) has successfully launched the "Shenzhou-series" manned spacecraft and "Beidou satellite" system. It proves PRC has perfect command, surveillance and reconnaissance capabilities in space and can significantly improve the overall effectiveness of its military operations. This is bound to have a great impact to the military security of our country. In the future, the one who controls the high ground of strategy and the power in space has the strategic superiority and opportunities. Therefore aerospace technology was considered a multiplier of modern fighting force. In recent years, the percentage of PRC defense budget maintains double-digit average growth annually which has accelerated PRC’s military modernization. Besides, the frequent military activities in the Asia Pacific region in these two years and strongly advocating the territorial sovereignty trigger the anxiety and wariness of other neighboring countries, such as Japan, South Korea, Vietnam, and India, also form the competitive strategic pattern with the United States on regional security issues. The rapid military modernization of PRC has significant impact on our national defense operations. How to cope with the attack of PRC’s aerospace combat power is the urgent problem which our government and relevant units should work on. In addition to strengthening military armaments preparedness, the ROC Armed Forces should combine the established strategic guidance and the needs of national defense to work out countermeasures against the advantage and weakness of PRC’s aerospace combat power, moreover, to defeat the enemy and respond to the influence of the development and the use of PRC’s military satellites.
LIN, SHIH-JUNG, et 林士榮. « The Research on Indonesian Terrorism and its Government's Counter-Terrorism Measures Also the Reflections on Taiwan National Security ». Thesis, 2019. http://ndltd.ncl.edu.tw/handle/934cru.
Texte intégral國立中正大學
戰略暨國際事務研究所
107
After the independence of Indonesia, the radical Islamic organizations in Indonesia pursued a caliphate Islamic state, which has confronted a foreign colonial regime to an Indonesian government. After the September 11 incident in the United States and the Bali bombing in October 2002, radical Islamic organizations in Indonesia have formed an intensive and extensive cross-border network with radical Islamic organizations in the surrounding countries and even with al-Qaeda. . Today, the al-Qaeda organization and the Islamic State Organization’s stronghold in the Middle East have collapsed. The threat of terrorist attacks in Europe and the United States, especially in Islamic countries, has not been reduced for a while. The paper uses literature analysis and historical analysis to understand the development process of Indonesian radical Islamic organizations, the major events over the years, the current status of activities and their links and cooperation with al-Qaeda, Islamic organizations in the Middle East. The current counter-terrorism measures of the Indonesia government and the counter-terrorism cooperation of foreign governments and regional organizations examine the implementation and effectiveness of its anti-terrorism strategy. As a mirror of the Taiwan government’s counter-terrorism mechanism, the paper could analyze the national security risks of foreign radical radicalism in Indonesia and investigate potential terrorist organizations in Indonesia.
chun-chi, Lo, et 羅鈞琦. « Research of the wartime Courts-martial—Take balances the national security and the human rights safeguard as the center ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00527323596604586513.
Texte intégral« Teacher Leadership : A Little Less Conversation, A Little More Action Research ». Doctoral diss., 2016. http://hdl.handle.net/2286/R.I.38463.
Texte intégralDissertation/Thesis
Doctoral Dissertation Leadership and Innovation 2016
Chang, Hwa-Kuan, et 張花冠. « The research of Taiwan's future development under the cross-strait economic and trade interation : from the view of Taiwan's sovereignty and national security ». Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44063176496947874190.
Texte intégral國立中正大學
戰略暨國際事務研究所
99
This thesis uses 3i model to be analytic framework to discuss President Ma’s flexible diplomacy policy. The cross-strait economic and trade interaction has become frequently, but it may crash Taiwan’s sovereignty and national security. Therefore, this thesis induces four points to be policy references. 1. Taiwan and China are two independent nations, and have to be basic on equality and reciprocal foundation. 2. The cross-strait’s stable development can’t sacrifice Taiwan’s sovereignty. 3. Practical policy to China and effective risk management can help Taiwan’s long-term development. 4. We have to recognize China is not the only way to promote Taiwan’s economy, and our economy can’t excessively rely on China.
Mei-Fen, Hsu, et 徐美芬. « A Research on BBS Users'''' Posting up Strategies--A Case Study on Education Board of National Chiao Tung University Department of Computer and Information Science BBS ». Thesis, 2002. http://ndltd.ncl.edu.tw/handle/38941012172633672509.
Texte intégral國立屏東師範學院
國民教育研究所
90
This research attempts to through the virtual domain and gets into the BBS users’ real world, to make a study of the field where bbs users are located in, the posting strategies they used, and factors to affect the selection of strategy. The analytic objects in this research are 4 users on Education Board of National Chiao Tung University Department of Computer and Information Science BBS, and the analysis is based on the interviews with users and their bulletins. The results are as follows: 1. Education Board is oriented to “task”, the interaction models are mainly “information increase” and “problem solving”. 2. Most topics on Education Board are “news”, “suspicions from non-educator”, and “sharing teaching experiences from educators”. 3. The bulletins on Education Board have these following characters: (1) immediateness, (2) cycle, (3) correlation, (4) diffusion, and (5) diversification. 4. The interviewees are affected by “purposes” and “norms” while they post up bulletins. 5. The main purposes of interviewees to post up are “identification” and “transformation”. Identification here means self-identity and other people’s identification. Transformation is to influence others’ behaviors and attitudes. To accomplish the purposes, the role-playing in cyberspace can’t separate form real life of the interviewees. The social and cultrual capitals in real world would mirror to cyberspace and become the persuasiveness. 6. The consciousness of self-identity would influences the norms which interviewees recognize and observe, hence the anonymity in cyberspace doesn’t make interviewees act on their own will. The perfect principles among classes would bring about exclusiveness. 7. According to the purposes, bulletins of interviewees can be distinguished into 3 categories as below: telling, persuasion, and negotiation. The strategies used by interviewees include motive, participation, logic, passion, ethics, disregard, concession, opposition, and asking.
Cheng, Ya Wen, et 張雅雯. « The Qualitative Research upon the Economic Security of the Elderly from the Perspectives of Housewives in Taiwan----The Case Study of National Pension Insurance Scheme implemented since October, 2008 Women ». Thesis, 2010. http://ndltd.ncl.edu.tw/handle/jgjr6z.
Texte intégral玄奘大學
社會福利學系碩士班
98
This qualitative research aims to explore how National Pension Insurance Scheme, enacted since October 1st, 2008, can guarantee economic security of the elderly women from the perspectives of Taiwanese housewives. Therefore, the qualitative research method in terms of in-depth interview was employed and 13 full-time housewives were invited through snowball sampling, and voluntarily participated in the current study in order to achieve the mentioned above aims. The data collection was conducted one by one between July and August of 2009, and faithfully transcribed from verbal records into Chinese texts, carefully re-read and checked by the researcher as so to confirm its authenticity and trustworthiness (Bryman 2004:273-274). Following this, the transcribed data was analytically and critically categorized into a variety of themes by triangulation method. Then the research findings emerged into the main arguments of the present study, listed as follows: (1) The traditional marriage institution, which has long buttressed the gender division of housework and domestic care within the patriarchal family and society, has not only enforced the gendered housework burden but also deepened the gendered belief of imposing the domestic responsibility of “helping the husband and teaching the children” upon women as their “natural duty”; (2) Furthermore, the traditional gendered division within the family has long promoted the unpaid family care as female another natural duty. Therefore, the qualitative findings explored that housewives must not only care for their own minor children, but also for their grandchildren. This unpaid child-care within the family has certainly led to women’s constraints of participation in the labour market. Not-surprisingly, housewives are hardly to be protected under the Gender Equal Employment Act. (3) Nowadays, the global economic recession, ageism, gender discrimination and low educational attachment, faced by housewives, have resulted in their highly impossible re-employment and forcible house-wifehood. (4) The Labour (Pension) Insurance Scheme can hardly provide fully economic security for housewives, despite their previous employment in the labour market and transient participation in the Labour Insurance, because their employment pattern concentrates on non-full-time jobs and intermittent period of paid work, which have great negative impact upon their entitlement to the Labour Pension Insurance. (5) In spite of its compulsory coverage over all the housewives in Taiwan, National Pension Insurance Scheme is still unlikely to guarantee the economical security for women, full-time participating in unpaid housework and family care. Rather, the compulsory contribution of its Insurance Premium (NT$ 674 per month) has increased financial burden upon unpaid housewives, particularly poor ones. Furthermore, the rate of statutory subsidy to reduce such burden is much less for housewives (40%) than the one for low-income family and the disabled (70% or 55%). Is this fair for those nearly lifelong and full-time participating in the unpaid domestic work and care? Therefore, the conclusions are summarized into the following three points: (1) No matter what attitudes housewives hold toward the compulsory National Pension Insurance Scheme, positively or negatively, as the ensured, the long-term contribution of its Insurance Premium seems a “great worry” for unpaid housewives for sure; (2) The level of payment claimed from the National Pension Insurance Scheme can hardly catch up with the rapid rise of annual inflations. And it is very hard to argue that this amount of money can meet the needs of housewives in their old age; (3) The statutory subsidy rate (40%)paid for housewives is much less than the one paid for the low-income family or the disabled (70% or 55%). It is obvious that the State has not yet recognized the value, which housewives have long contributed to, and the (financial) dependency upon their husbands, which has more likely trapped them into dangerous or uncertain circumstances if their marriage broke down. Following the mentioned above, three proposed programmes have been recommended in order to improve well-beings of unpaid housewives as individual citizens: (1) To promote and recognise that the value of housework is as great as paid work. So it should be treated as formally as paid work; (2) To value the contribution brought about from unpaid housework and family care in terms of income compensation for those once participating in the labour market, but losing their income because of their unpaid love-work in the domestic sphere; (3) To comprehensively construct Social Security system, particularly pension scheme in order to guarantee housewife’s individual citizenship. Therefore, the State should recognise seriously the disadvantages in which housewives have long lived in all aspects, not only in the way of old-age pension. Furthermore, it should take more positive actions in the establishment or implementation of more gender-equal social policies, along with which the economic security for housewives in their old age can be guaranteed and their citizenship can more equally be realized in Taiwanese social context.
曹虹. « A research on the crisis management of the HKSAR government : an analysisis of the legislative procedure of the national security (legislative provisions)bill derived from the Article 23 of the Basic Law ». Thesis, 2005. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22094CHU00493002%22.&searchmode=basic.
Texte intégralPAO, MING-CHANG, et 包明章. « The Research of the Perceptions of the Transformational Leadership on the Rising Morale of the Substitute Serviceman ofMobile Security Police -A Case of Study of the Special Police FirstHeadquarters National Police Agency ». Thesis, 2006. http://ndltd.ncl.edu.tw/handle/47725948902314579498.
Texte intégralTomek, Prokop. « Československá redakce Radio Free Europe : historie a vliv na československé dějiny ». Doctoral thesis, 2012. http://www.nusl.cz/ntk/nusl-326941.
Texte intégralQuigg, Gary Francis. « JB-2 : America's First Cruise Missile ». Thesis, 2014. http://hdl.handle.net/1805/5517.
Texte intégral