Pour voir les autres types de publications sur ce sujet consultez le lien suivant : Research Board for National Security.

Thèses sur le sujet « Research Board for National Security »

Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres

Choisissez une source :

Consultez les 48 meilleures thèses pour votre recherche sur le sujet « Research Board for National Security ».

À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.

Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.

Parcourez les thèses sur diverses disciplines et organisez correctement votre bibliographie.

1

Bruner, William W. « National Security Implications of Inexpensive Space Access ». Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/brunerww.htm.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
2

Martin, Brad. « U.S. EPA NATIONAL HOMELAND SECURITY RESEARCH CENTER : AN INTERNSHIP REPORT ». Miami University / OhioLINK, 2006. http://rave.ohiolink.edu/etdc/view?acc_num=miami1163622231.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
3

Daehnick, Christian C. « Blueprints For The Future Comparing National Security Space Architectures / ». Maxwell AFB, Ala. : Air University Research Coordinator Office, 1998. http://www.au.af.mil/au/database/research/ay1995/saas/daehnicc.htm.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
4

Young, Jason Osgood Ewen. « Novel Materials for Use in Homeland Security Research ». TopSCHOLAR®, 2013. http://digitalcommons.wku.edu/theses/1241.

Texte intégral
Résumé :
Organometallic pyridazines and compounds derived from them have been of interest in polymer research due to their atypical environmental stability (as compared to other non-aromatic organic semiconductors) as well as their conductivity. The off-metal synthesis and characterization of several pyridazyl thallium, manganese, and rhenium complexes, beginning with fulvenes 1,2- C5H3(COHR)(COR), are reported here. The diacyl fulvenes were treated with hydrazine hydrate to ring close to pyridazines. Next, the pyridazines were converted to their respective thallium salts through treatment with thallium (I) ethoxide. Lastly, the salts were transmetallated into the respective rhenium or manganese complexes through treatment with the respective metal bound to five carbonyl groups and one bromide (MnCO5Br, ReCO5Br). Our research focused on the synthesis of a variety of 5,6-fused ring pyridazines that will act as a model for homeland security research in polymer studies and medicinal research. Synthesis and characterization of several aryl-substituted 5,6-fused ring pyridazines have been completed. The fulvenes, pyridazines, and thallium salts are important compounds for research due to their reactivity and stability in moisture and air. The complexes synthesized were confirmed using mass spectrometry, infrared spectroscopy, nuclear magnetic resonance spectroscopy, and elemental analysis. Single crystal X-ray diffraction confirmed the structure of x compound 1A. As evidenced by related previous papers published by the research group, the synthesized complexes displayed stability to air, moisture, and temperature.18, 19, 23, 25
Styles APA, Harvard, Vancouver, ISO, etc.
5

Piekarz, M. J. « Tourism in an unstable and complex world ? Searching for relevant a political risk paradigm and model for tourism organisations ». Thesis, Department of Applied Sciences, Security and Resilience, 2009. http://hdl.handle.net/1826/4018.

Texte intégral
Résumé :
This work has a single aim, focusing on developing a political risk model relevant for tourism organisations, which are operating in an increasingly complex and turbulent international environment. It pays particular attention to the language of risk (how risks are articulated and described), the culture of risk (how risks are viewed), and the risk process (how they are analysed and assessed). The work critically evaluates a variety of methods that can be utilised to scan, analyse and assess political hazards and risks. It finds that many of the existing methods of political and country risk assessment are limited and not sufficiently contextualised to the needs of the tourism industry. Whilst many models can have an attractive façade of using positivistic methods to calculate political risks, in practice these are fraught with problems. The study also highlights a more complex relationship between tourism and political instability, whereby tourism can be characterised as much by its robustness, as its sensitivity. A model is developed which primarily adapts a systems theory approach, whereby a language, culture and practical process is developed through which the analysis of various factors and indicators can take place. The approach adopted has a number of stages, which vary in the amount of data necessary for the analysis and assessment of political risks. The model begins by utilising existing travel advice databases, moving onto an analysis of the frequency of past events, then to the nature of the political system itself, finishing with an analysis and assessment of more complex input factors and indicators which relate to notions of causation. One of the more provocative features of the model is the argument that it is more than possible to make an assessment of the risks that the political environment can pose to a tourism organisation, without necessarily understanding theories of causation.
Styles APA, Harvard, Vancouver, ISO, etc.
6

Culpepper, Anna M. « Effectiveness of using red-teams to identify maritime security vulnerabilities to terrorist attack ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2004. http://library.nps.navy.mil/uhtbin/hyperion/04Sept%5FCulpepper.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Systems Engineering)--Naval Postgraduate School, Sept. 2004.
Thesis advisor(s): Raymond Buettner, Jr., Dorothy Denning. Includes bibliographical references (p. 65-69). Also available online.
Styles APA, Harvard, Vancouver, ISO, etc.
7

Mooi, Roderick David. « A model for security incident response in the South African National Research and Education network ». Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1017598.

Texte intégral
Résumé :
This dissertation addresses the problem of a lack of a formal incident response capability in the South African National Research and Education Network (SA NREN). While investigating alternatives it was found that no clear method exists to solve this problem. Therefore, a second problem is identified: the lack of a definitive method for establishing a Computer Security Incident Response Team (CSIRT) or Computer Emergency Response Team (CERT) in general. Solving the second problem is important as we then have a means of knowing how to start when building a CSIRT. This will set the basis for addressing the initial problem, resulting in a prepared, improved and coordinated response to IT security incidents affecting the SANREN. To commence, the requirements for establishing a CSIRT are identified via a comprehensive literature review. These requirements are categorized into five areas, namely, the basic business requirements followed by the four Ps of the IT Infrastructure Library (ITIL). That is, People, Processes, Product and Partners, adapted to suit the CSIRT context. Through the use of argumentation, the relationships between the areas are uncovered and explored. Thereafter, a Design Science Research-based process is utilised to develop a generic model for establishing a CSIRT. The model is based on the interactions uncovered between the business requirements and the adapted four Ps. These are summarised through two views -- strategic and tactical -- together forming an holistic model for establishing a CSIRT. The model highlights the decisions required for the business requirements, services, team model and staff, policies and processes, tools and technologies, and partners of a CSIRT respectively. Finally, to address the primary objective, the generic model is applied to the SANREN environment. Thus, the second artefact is an instantiation, a specific model, which can be implemented to create a CSIRT for the SA NREN. To produce the specific model, insight into the nature of the SANREN environment was required. The status quo was revealed through the use of a survey and argumentative analysis of the results. The specific decisions in each area required to establish an SA NREN CSIRT are explored throughout the development of the model. The result is a comprehensive framework for implementing a CSIRT in the SA NREN, detailing the decisions required in each of the areas. This model additionally acts as a demonstration of the utility of the generic model. The implications of this research are twofold. Firstly, the generic model is useful as a basis for anyone wanting to establish a CSIRT. It helps to ensure that all factors are considered and that no important decisions are neglected, thereby enabling an holistic view. Secondly, the specific model for the SA NREN CSIRT serves as a foundation for implementing the CSIRT going forward. It accelerates the process by addressing the important considerations and highlighting the concerns that must be addressed while establishing the CSIRT.
Styles APA, Harvard, Vancouver, ISO, etc.
8

Capps, Teresa. « A research study into furthering the understanding of management accounting in practice with specific reference to the practices utilised in the North Derbyshire area of the NCB ». Thesis, University of Sheffield, 1990. http://etheses.whiterose.ac.uk/1836/.

Texte intégral
Résumé :
The primary purpose of this study is concerned with providing improved understanding of both accounting and management systems through the use of case study based research. To provide this improved understanding, this research study is based upon several key assumptions which are also key conclusions. Firstly, that management and accounting systems and practices exist in organisation contexts. Secondly, that these systems and practices obtain their meaning, in part, from the organisation contexts in which they are situated. Thirdly, that accounting knowledge and management theory, to-date, has failed to provide adequate descriptions and prescriptions for the organisations. Fourthly, that the key problem in accounting knowledge and management theory which has prevented adequate understanding is to do with the ontological issues which underlies such knowledge. The contents of this study can be seen to be divided into three parts. The first outlines the nature of management accounting knowledge paying particular attention to the ontological and epistemological assumptions. Through analysis of these assumptions, the importance of understanding the complexity of social reality is introduced. A model of a 'temporal-spatial' reality is introduced and described. The conclusion from this part is that the main problem in understanding accounting practices is linked with the ontological issues and that a more complex subjective reality needs to be explored. Part two provides the description of the case-study utilised to understand accounting practices in an organisational context. Part three provides an analysis of the use of the management and accounting systems by providing an understanding of the social-reality of the dominant decision-makers within the case-study. The conclusion forthcoming from this study is four-fold and stated in paragraph one. However, these have major considerations to the development of accounting knowledge and require major shifts in the dominant methodology of accounting thought. ix.
Styles APA, Harvard, Vancouver, ISO, etc.
9

Piekarz, Mark J. « Tourism in an unstable and complex world ? : searching for a relevant political risk paradigm and model for tourism organisations ». Thesis, Cranfield University, 2008. http://dspace.lib.cranfield.ac.uk/handle/1826/4018.

Texte intégral
Résumé :
This work has a single aim, focusing on developing a political risk model relevant for tourism organisations, which are operating in an increasingly complex and turbulent international environment. It pays particular attention to the language of risk (how risks are articulated and described), the culture of risk (how risks are viewed), and the risk process (how they are analysed and assessed). The work critically evaluates a variety of methods that can be utilised to scan, analyse and assess political hazards and risks. It finds that many of the existing methods of political and country risk assessment are limited and not sufficiently contextualised to the needs of the tourism industry. Whilst many models can have an attractive façade of using positivistic methods to calculate political risks, in practice these are fraught with problems. The study also highlights a more complex relationship between tourism and political instability, whereby tourism can be characterised as much by its robustness, as its sensitivity. A model is developed which primarily adapts a systems theory approach, whereby a language, culture and practical process is developed through which the analysis of various factors and indicators can take place. The approach adopted has a number of stages, which vary in the amount of data necessary for the analysis and assessment of political risks. The model begins by utilising existing travel advice databases, moving onto an analysis of the frequency of past events, then to the nature of the political system itself, finishing with an analysis and assessment of more complex input factors and indicators which relate to notions of causation. One of the more provocative features of the model is the argument that it is more than possible to make an assessment of the risks that the political environment can pose to a tourism organisation, without necessarily understanding theories of causation.
Styles APA, Harvard, Vancouver, ISO, etc.
10

Moore, Gary D. « Domestic production and national security--is there a connection ? a case study of SEMATECH research consortium ». Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25855.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
11

Connolly, Lena Y., M. Lang et D. S. Wall. « Information Security Behavior : A Cross-Cultural Comparison of Irish and US Employees ». Taylor & ; Francis, 2019. http://hdl.handle.net/10454/17906.

Texte intégral
Résumé :
Yes
This study explores how aspects of perceived national culture affect the information security attitudes and behavior of employees. Data was collected using 19 semi-structured interviews in Ireland and the United States of America (US). The main findings are that US employees in the observed organizations are more inclined to adopt formalized information security policies and procedures than Irish employees, and are also more likely to have higher levels of compliance and lower levels of non-compliance.
Styles APA, Harvard, Vancouver, ISO, etc.
12

Sjöstedt, Roxanna. « Talking Threats : The Social Construction of National Security in Russia and the United States ». Doctoral thesis, Uppsala universitet, Institutionen för freds- och konfliktforskning, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-130585.

Texte intégral
Résumé :
Why are some issues seen as threats? This dissertation attempts to explain the dynamics of threat construction by national decision-makers. The theoretical ambition is twofold: first, the dissertation aims at improving the research on threat construction by suggesting a broad approach that analyzes this process in a structured manner. Second, the dissertation also contributes to the more mainstream International Relations security research agenda, which often under-problematizes this issue. The point of departure is that the link between a condition (e.g. structure) and threat framing (e.g. agency) is not to be taken for granted, and that threat construction is subjective and varies among actors.  This assertion is supported by the findings of the dissertation’s component parts. Essay I finds that US security doctrines such as the Truman and Bush doctrines are not routine responses to external threats but rather the natural continuation of a political and societal discourse in which certain norms and identities interact. Essay II finds that a condition that could lay the foundation for a threat construction does not necessarily evoke such a reaction, such as the HIV/AIDS epidemic in Russia. Essay III demonstrates the opposite situation; that a securitization can take place although the contextual conditions do not necessarily point toward such a move, such as US President Clinton’s declaration that AIDS is a threat to the national security of the United States. Essay IV proposes a framework that incorporates explanatory factors from the international, the domestic, and the individual levels of analysis. Such a framework allows for a more refined analysis which better captures the contingent relationships between factors. Taken together, the findings of this dissertation indicate that the correlations between conditions and threat constructions are intricate, and that the explanation of a securitization lies in the interaction of certain social and cognitive processes.
Styles APA, Harvard, Vancouver, ISO, etc.
13

Graham, James H. « Validating a method for enhanced communications and situational awareness at the incident command level ». Thesis, Monterey, Calif. : Naval Postgraduate School, 2006. http://edocs.nps.edu/npspubs/scholarly/theses/2006/Mar/06Mar%5FGraham%5FJames.pdf.

Texte intégral
Résumé :
Thesis (M.S. in Security Studies (Homeland Security and Defense)--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Housel, Tom. "March 2006." Description based on title screen as viewed on July 31, 2009. DTIC Descriptors: Interoperability, Communication And Radio Systems, Situational Awareness, Ground Level, Off The Shelf Equipment, Homeland Security, Manportable Equipment, Commercial Equipment, Research Facilities, Information Exchange. IDE: Communications, Collaboration, Mobile Command Post, Operations Center. Author(s) subject terms: Communications, interoperability, collaboration, situational awareness, mobile command post, operations center. Includes bibliographical references (p. 117-120). Also available in print.
Styles APA, Harvard, Vancouver, ISO, etc.
14

Mjikeliso, Yolanda. « Guidelines to address the human factor in the South African National Research and Education Network beneficiary institutions ». Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/9946.

Texte intégral
Résumé :
Even if all the technical security solutions appropriate for an organisation’s network are implemented, for example, firewalls, antivirus programs and encryption, if the human factor is neglected then these technical security solutions will serve no purpose. The greatest challenge to network security is probably not the technological solutions that organisations invest in, but the human factor (non-technical solutions), which most organisations neglect. The human factor is often ignored even though humans are the most important resources of organisations and perform all the physical tasks, configure and manage equipment, enter data, manage people and operate the systems and networks. The same people that manage and operate networks and systems have vulnerabilities. They are not perfect and there will always be an element of mistake-making or error. In other words, humans make mistakes that could result in security vulnerabilities, and the exploitation of these vulnerabilities could in turn result in network security breaches. Human vulnerabilities are driven by many factors including insufficient security education, training and awareness, a lack of security policies and procedures in the organisation, a limited attention span and negligence. Network security may thus be compromised by this human vulnerability. In the context of this dissertation, both physical and technological controls should be implemented to ensure the security of the SANReN network. However, if the human factors are not adequately addressed, the network would become vulnerable to risks posed by the human factor which could threaten the security of the network. Accordingly, the primary research objective of this study is to formulate guidelines that address the information security related human factors in the rolling out and continued management of the SANReN network. An analysis of existing policies and procedures governing the SANReN network was conducted and it was determined that there are currently no guidelines addressing the human factor in the SANReN beneficiary institutions. Therefore, the aim of this study is to provide the guidelines for addressing the human factor threats in the SANReN beneficiary institutions.
Styles APA, Harvard, Vancouver, ISO, etc.
15

Rocha, Flores Waldo. « Shaping information security behaviors related to social engineering attacks ». Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.

Texte intégral
Résumé :
Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. A large extent of these IT-related threats includes hackers attempting to gain unauthorized access to internal computer networks by exploiting vulnerabilities in the behaviors of employees. A common way to exploit human vulnerabilities is to deceive and manipulate employees through the use of social engineering. Although researchers have attempted to understand social engineering, there is a lack of empirical research capturing multilevel factors explaining what drives employees’ existing behaviors and how these behaviors can be improved. This is addressed in this thesis. The contribution of this thesis includes (i) an instrument to measure security behaviors and its multilevel determinants, (ii) identification of multilevel variables that significantly influence employees’ intent for behavior change, (iii) identification of what behavioral governance factors that lay the foundation for behavior change, (iv) identification that national culture has a significant effect on how organizations cope with behavioral information security threats, and (v) a strategy to ensure adequate information security behaviors throughout an organization. This thesis is a composite thesis of eight papers. Paper 1 describes the instrument measuring multilevel determinants. Paper 2 and 3 describes how security knowledge is established in organizations, and the effect on employee information security awareness. In Paper 4 the root cause of employees’ intention to change their behaviors and resist social engineering is described. Paper 5 and 8 describes how the instrument to measure social engineering security behaviors was developed and validated through scenario-based surveys and phishing experiments. Paper 6 and 7 describes experiments performed to understand reason to why employees fall for social engineering. Finally, paper 2, 5 and 6 examines the moderating effect of national culture.

QC 20160503

Styles APA, Harvard, Vancouver, ISO, etc.
16

Carnal, David D. « An enhanced implementation of models for electric power grid interdiction ». Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Sep%5FCarnal.pdf.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
17

Creech, Greta E. « Holding on to Who They Are : Pathways for Variations in Response to Toxic Workplace Behavior Among U.S. Intelligence Officers ». Antioch University / OhioLINK, 2021. http://rave.ohiolink.edu/etdc/view?acc_num=antioch1622928796706695.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
18

Wiroth, Manuel. « Histoire de l'ufologie en France : des premières recherches individuelles sur les soucoupes volantes à la constitution de réseaux d'étude des ovnis (des années 1940 à nos jours) ». Thesis, Lyon, 2016. http://www.theses.fr/2016LYSE3053.

Texte intégral
Résumé :
La recherche sur les soucoupes volantes commence à la fin des années 1940 en France. Elle est principalement le fait de ceux qui se nomment « soucoupistes ». En parallèle de cette activité exercée essentiellement à titre individuel, l’armée mène également ses propres enquêtes. Son intérêt pour la question ne se dément pas depuis les années 1940, même si les informations concernant son implication et son action se révèlent peu accessibles. De leur côté les soucoupistes s’agrègent et les premiers groupements privés d’envergure apparaissent dans les années 1950 et se généralisent à la fin des années 1960. La décennie 1970 correspond, quant à elle, à l’âge d’or de l’ufologie en France : les organisations se comptent par centaines et les ufologues par milliers. Un véritable réseau de recherche scientifique sur les ovnis apparait donc. Ce réseau s’articule autour des groupements de personnes et des individus -qui publient dans des revues spécialisées- et tente de se connecter à une ufologie scientifique publique en plein essor. Cette dernière, placée sous l’égide du CNES, prend le nom de GEPAN. Ce service, plusieurs fois rebaptisé, existe toujours aujourd’hui. Il s’appuie sur l’armée –principalement la gendarmerie- et certaines administrations qui le pourvoient en informations OVNI. L’ufologie française –en déclin depuis les années 1980- se caractérise donc par la coexistence d’un réseau de recherche privé et d’un réseau public qui, hormis en de rares occasions, collaborèrent très peu, cette situation contribuant à la maigreur des résultats obtenus par les ufologues
The research about unidentified flying objects has started in the late 1940s in France. All this is the doing of those who are commonly known in French as the soucoupistes (the researchers in this field). Currently with this mainly individual initiative, the army also has made their own enquiries. Their interest for the question has proved consistent since the 1940s although the details about their implication and their action have been uneasy to know. As for them, the soucoupistes (or French ufologists) have joined together and the first major private groups have come out in the 1950s to become widespread in the late 1960s. Nonetheless, the decade of the 1970s was the golden age of ufology research in France : there were hundreds of organizations and thousands of ufologists. A real reasearch network came out. This network has revolved both around groups of people and individuals, who publish in specialized reviews, and they try to connect to a booming public scientific ufology. The latter, which is under the aegis of the CNES, is known as GEPAN. The department has been often renamed but still exists today. It is based on the army, mainly on the police force, but also on some administrations which provide them with information about UFO. French ufology, which has been in decline since the 1980s, is characterized by the coexistence of a private research network and a public one. Except for a few occasions, both of them have hardly collaborated and this situation explains why ufologists haven’t found many results
Styles APA, Harvard, Vancouver, ISO, etc.
19

Govender, Rajuvelu. « The contestation, ambiguities and dilemmas of curriculum development at the Solomon Mahlangu Freedom College, 1978-1992 ». Thesis, University of the Western Cape, 2011. http://etd.uwc.ac.za/index.php?module=etd&action=viewtitle&id=gen8Srv25Nme4_6042_1320317218.

Texte intégral
Résumé :
The main problem being investigated is why there were such divergent views on the appropriate curriculum for ANC education-in-exile from within the ANC, and in the light of this contestation, what happened in reality to curriculum practice at the institutions. The arguments for Academic, Political and Polytechnic Education are contextualized in the curriculum debates of the times, that is, the 20th century international policy discourse, the African curriculum debates and Apartheid Education in South Africa. This study examines how Academic Education, despite the sharp debates, was institutionalised at the SOMAFCO High School. It also analyses the arguments for and various notions of Political and Polytechnic Education as well as what happened to these in practice at the school. The SOMAFCO Primary School went through three phases of curriculum development. The school opened in 1980 under a ‘caretaker’ staff and without a structured curriculum. During the second phase 1980-1982 a progressive curriculum was developed by Barbara and Terry Bell. After the Bells resigned in 1982, a conventional academic curriculum was implemented by Dennis September, the new principal.
Styles APA, Harvard, Vancouver, ISO, etc.
20

Berrios-Ayala, Mark. « Brave New World Reloaded : Advocating for Basic Constitutional Search Protections to Apply to Cell Phones from Eavesdropping and Tracking by Government and Corporate Entities ». Honors in the Major Thesis, University of Central Florida, 2013. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/1547.

Texte intégral
Résumé :
Imagine a world where someone’s personal information is constantly compromised, where federal government entities AKA Big Brother always knows what anyone is Googling, who an individual is texting, and their emoticons on Twitter. Government entities have been doing this for years; they never cared if they were breaking the law or their moral compass of human dignity. Every day the Federal government blatantly siphons data with programs from the original ECHELON to the new series like PRISM and Xkeyscore so they can keep their tabs on issues that are none of their business; namely, the personal lives of millions. Our allies are taking note; some are learning our bad habits, from Government Communications Headquarters’ (GCHQ) mass shadowing sharing plan to America’s Russian inspiration, SORM. Some countries are following the United States’ poster child pose of a Brave New World like order of global events. Others like Germany are showing their resolve in their disdain for the rise of tyranny. Soon, these new found surveillance troubles will test the resolve of the American Constitution and its nation’s strong love and tradition of liberty. Courts are currently at work to resolve how current concepts of liberty and privacy apply to the current conditions facing the privacy of society. It remains to be determined how liberty will be affected as well; liberty for the United States of America, for the European Union, the Russian Federation and for the people of the World in regards to the extent of privacy in today’s blurred privacy expectations.
B.S.
Bachelors
Health and Public Affairs
Legal Studies
Styles APA, Harvard, Vancouver, ISO, etc.
21

Scarlato, Michele. « Sicurezza di rete, analisi del traffico e monitoraggio ». Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Texte intégral
Résumé :
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
Styles APA, Harvard, Vancouver, ISO, etc.
22

Lin, Bo-Jun, et 林柏潤. « Research on Security Protection of the National Army ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/sw76c2.

Texte intégral
Résumé :
碩士
義守大學
公共政策與管理學系
106
The national army shoulders the responsibilities of protecting the country and the people and the people. The characteristics of the country’s geopolitical and economic environment, Taiwan must open up freedom and a stable market environment. Therefore, under the premise of unavoidable exchange activities across the Taiwan Strait, it is necessary to conduct various exchanges with China. This may also lead to the collection of various is intelligence information from China. This study intends to conduct research on counter-intelligence work practices from the China and discuss the institutional, practical, and core values of intelligence to understand the concerns of counter-intelligence workers. This study interviewed five people in intelligence work using semi-structured interviews. It can be seen that training then sharing of cases are information-oriented people who can quickly know the current information gathering, especially the development of information technology that tools will change accordingly. The return mechanism can be delivered in a flattened manner to enhance the timeliness of transmission reinforcement, especially to prevent the intelligence personnel in our country from being absorbed. Therefore, the core value of counterintelligence must be based on the inner psychology of workers and shape the mission of counterintelligence. The results of this study can provide insights into the institutional, practical, and core values of the national army when it comes to counter-intelligence workers’ practical work. The result provided in-depth reinforcement of education and training to every counter-intelligence worker.
Styles APA, Harvard, Vancouver, ISO, etc.
23

Yu, Chi, et 余績. « A Research on the Taiwan National Security Association ». Thesis, 2006. http://ndltd.ncl.edu.tw/handle/67319561133961253394.

Texte intégral
Résumé :
碩士
元智大學
資訊社會學研究所
94
This dissertation aimed to discuss the issue of whether Non-Governmental Organization (NGO) could have its manoeuvring over the high politics issues, such as regional security, and tried to find out the contribution of the targeted Taiwan National Security Association on the peace and stability over Taiwan Strait via documentary analyses and interviews. The dissertation would also examine the relevant theories of NGO with actual circumstances and make some useful supplement towards the existing research portfolio at the end. The phenomenon of vast growing NGOs is one of the major events in the 20th Century. Further, NGO has been the alternative for the failure of government and enterprise’s function. Alone with globalization, international affairs has been transformed into a multi-lateral dimension. More actors have joined the forum of international society that changed the dominance of state actor. And NGO would be the most intriguing and ignoring actor of its engagement on international affairs. Regarding the issue of security, Taiwan National Security Association (TNSO) has been the only NGO so far that focused on the peace and prosperity in the region of East Asia. It is reasoning that we should give our full support to such idealistic and value-driven NGO that might encourage more NGOs to participate in such high-level political issue. However, TNSIOshould also reform itself, both structure and objectives, to accommodate different political appeals, especially the opposite opinions. To conclude, the development of NGOs in Taiwan still needs lots of effort and encouragement. They should appeal more supports by clearly delivering their demands at the one hand, and reform the structure with expertise on the other hand that could enable themselves to cross the invisible boundary of high-level politics and have a strong, credible say.
Styles APA, Harvard, Vancouver, ISO, etc.
24

Cheng, Yu-Chih, et 鄭宇智. « Cross-strait Drug Crime Research on Taiwan National Security ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/5ek27j.

Texte intégral
Résumé :
碩士
國立政治大學
國家安全與大陸研究碩士在職專班
106
Cross-strait exchanges After the opening of our country to visit relatives in mainland China in 1987, up to 38 years of cross-strait isolation, it was broken. the cross-strait personnel exchanges and various exchanges were carried out quickly. The cross-strait have gradually moved toward exchanges, dialogue and cooperation from long-term confrontation in the past. In the past three decades, cross-strait relations have gone through a climax of decline. Although the Taiwan Strait crisis and cross-strait risk events continue, the people on both sides of the strait can still remove various obstacles and continue to move forward. The process of cross-strait exchanges has also closely linked the interests of the people on both sides of the strait, and the cross-strait become an inseparable community of interests increasingly. Due to the geographically similar, language communication, and the cultural inheritance of the two sides of the strait, just only the political factors have caused the part of exchange of criminal affair to be scruples, which makes it impossible to exchange effectively of criminal imformation between the two sides of the strait. In addition to the political subject that are not recognized by the two sides of the strait, cause the law for each other not to applied in one body, and even caused the situation of no tracing.And it has become a paradise for transnational or cross-regional criminal organizations. The two sides of the strait to signed the cross-strait joint fight crimes together and mutual legal assistance agreement in 2007. Although they have greatly helped the cross-strait crimes and the application of laws, but most of the exchanges are affected by the rotation of domestic political parties, then unable to cooperate in depth and imformation of commit crimes sometimes have or not. The criminals have insight into such gaps, colluding with each other and conducting various types of transnational or cross-regional crimes (such as drug crimes between the cross-strait), seriously jeopardizing the health, economic security, social security of the people on both sides of the strait and the country safety. Drug crimes are a public crime in the world. The drug crimes between the cross-strait have trend to become organized, grouped, and cross-regional. Not single areas can respond to and face it, Only strengthen the establishment of cross-strait exchanges and continuous cooperation mechanisms. Investigating and conducting exchanges can effectively prevent cross-border drug crimes between the two sides of the strait, to reduce the threat and hidden dangers to our national security of country. According to the UNODC(United Nations Office on Drugs and Crime) "World Drug Report", Taiwan is listed as an international drug smuggling transfer station, because compared with the export of goods from the mainland China and the Philippines, there will be strict inspections. The goods exported from Taiwan are relatively loosely tested in other countries, so many transnationals smuggling drug group likes to transfer drugs through Taiwan, it making a bad reputation of drug transit countries of Taiwan. The harm of drug abuse and drugs is a common problem faced by countries all over the world. According to the "2016 World Drug Report", it is estimated that in 2014, one out of every 20 adults, 15 to 64 years old. There are 250 million people who have used at least one drug. However, more than 29 million drug users are estimated to have disease of drug abuse, of which 12 million are injecting drug users, and 14.0% of whom are infected with HIV, and the effects of drug use and its health still are catastrophic of consequences remain. What makes the global drug abuse even more ambiguous is that many occasional and frequent drug users are often multiple drug users who use more than one drug at the same time or in succession. For example, non-medical use of prescription drugs, synthetic stimulants (drugs) and new psychoactive substances in lieu of or in combination with more conventional drugs blurs the distinction between specific drug users, showing the correlation or cycle of drug use and related health consequences in recent years. The author is engaged in drug investigation and related work, analyzes the causes, forms, cooperation and strategic effects of cross-strait drug crimes, as well as Taiwan legal system, anti-drug organization, structure, strategy, etc., hoping to make a systematic understanding for cross-strait drug crimes problem, further explore the impact of cross-strait drug crimes on national security factors such as national human body, economic development and social security, and it more explore the possibility of exacerbated unishment for drug crime, drug decriminalization and legal drugs trafficking, by legal means Non-traditional safe drug crimes have hidden huge illegal interests and underground economic maps to enhance the government's emphasis on the dangers and proliferation of drugs.
Styles APA, Harvard, Vancouver, ISO, etc.
25

Liao, Wen-Jeng, et 廖文正. « The Research on Changes and Functionsof National Security Council ». Thesis, 2004. http://ndltd.ncl.edu.tw/handle/y66ds3.

Texte intégral
Résumé :
碩士
銘傳大學
公共事務學系碩士班
92
The National Defense Meeting was established in 1954 and later renamed the National Security Council (NSC). It has gone through three phases: the Marshall Law phase, the pre-legalization phase, and the current phase where it is a legal organization under the ROC Constitution. After its legalization, the NSC gradually became an advisory body that maps out national security policy directions for the President’s reference, rather than being an all-powerful decision-making organ in charge of a whole range of agendas as it used to be. The NSC has been in the process of downsizing and accordingly has fewer functions. With its legalization, the NSC is defined as an advisory body that offers advice to the President in formulating national security policy directions. This function, however, was not fully fulfilled due to the lack of proper mechanisms and researchers. On June 25, 2003, the amendment to the NSC Bill was passed. The revised NSC Bill clearly defines the parameters of national security and highlights the NSC’s advisory role. With the amendment, researchers have been introduced into the NSC and various research groups set up to help top officials make decisions. Nevertheless, the revised NSC Bill has been in place for such a short period of time that we don’t know whether the NSC’s organization and functions can produce the best results. This dissertation will look into different aspects of the NSC and make tentative suggestions as to how to expand the category of national security, strengthen the role and function of researchers, improve coordination between the NSC and other state organs (including intelligence bodies), establish contingency mechanisms, etc, so that the NSC is able to fulfill its function as an advisory body offering the President advice in terms of decision-making in national defense, foreign affairs, cross-strait relations and contingencies.
Styles APA, Harvard, Vancouver, ISO, etc.
26

Chang, Hung-Kuan, et 張宏寬. « Research on National Security Intelligence from the perspective crisis administration ». Thesis, 2018. http://ndltd.ncl.edu.tw/handle/my7b79.

Texte intégral
Résumé :
碩士
義守大學
資訊管理學系
106
Under the global tide, the security issue faced by countries are not only traditional military threats, non-traditional security challenges, but also emerging security threats, such as terrorism, hacking, transnational crime, money laundering, smuggling, and drug trafficking. However, crises are omnipresent but unpredictable, which seriously affect the life and property of the people, the image of the organization, and public interest. Therefore, the issue of crises is to encompass the daily life to the survival of the countries. From the perspective of national security, crisis management is an important means to achieve the purpose, which is to prevent crisis and to curb the crisis. Once the crisis occurs, the mechanism of crisis management is immediately activated to reduce the damage caused and control the situation and recover quickly. Therefore, how to properly construct the crisis management mechanism of the national security intelligence work and deal with the crisis is the important task of the national security system. "Intelligence work" and "national security" are getting closer because of new security threats from regional to international. The formulation of political, military, economic, and diplomatic policies that is critical to national security requires accurate intelligence for reference. In addition, the intelligence work has become a means of national security strategy. How to present the information in accordance with strategic objective is an important topic for the formulation of a national security strategy. The motivation of this paper is to avoid the crises that countries may encounter at all levels of national security intelligence, by exploring the relationship between crisis management and national security and intelligence work. And discussesing how to implement crisis management mechanisms by means of intelligence work, in order to avoid risks, or reduce damage to promote national security. In addition, considering the globalization and changes in the war pattern, the form of crises has evolved from the state of war to various national security hazards. Such as terrorism, the spread of infectious diseases, the global financial crisis and information warfare, etc. At this time, the crisis management capability of the intelligence system is being tested. However, in addition to the crisis management mechanism, the government must formulate projects for crisis situations. In order to be able to deal with major crises, we should do a good job in crisis management. Furthermore, intelligence work is the key, intelligence integration and supervision can help administrative departments to use the advanced intelligences to strengthen the ability of crisis management. Finally, the conclusions and recommendations of this study are proposed: I.To maintain national security, it is necessary to introduce knowledges of crisis management. II.Accurate informations are the main key when decision makers face crisis events. III.Intelligence work is an important option to ensure national security.
Styles APA, Harvard, Vancouver, ISO, etc.
27

Thou, Cuang Ci, et 周廣齊. « The Research of the National Security Strategy of The United States ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/44291051261940460549.

Texte intégral
Résumé :
碩士
國防大學
戰略研究所
96
《The National Security Strategy》is the highest rudder dealing with international relations and national strategy, it is the “Grand Strategy” of US. It has contained three essential factors: The national interest, the national ambition and the method which needs to adopt for realizing the national interest or resisting the threat. This article has used the official literatures which are the Clinton and G.W. Bush administration《National Security Strategy》be framework and surrounded this framework for the writing coherence impetus. The《National Security Strategy》of Clinton government emphasized that must maintain the engagement of the overseas , the enlargement of the free market and the democratic community in the world, US must concentrate the resources in the place that can make most change as possible , strengthen the allied and the friendly state exchange for share more responsibilities in the same time. They thought the security and the prosperity in the 21st century must depend on contacting overseas country for the development of global economy. The 《National Security Strategy》 of G.W. Bush administration receives 911 affect of terror attack, let they have to face the global terrorism immediately. In the second《National Security Strategy》, has adjusted the strategic priority, to improve democracy on the one hand, the War on Terror rises to the ideology war has entrusted the new connotation with “the advancement of democratization” on the other hand. The counter-terrorism and the democracy become two grand strategy goals which are compatible and complements. In brief, the 《National Security Strategy》 of Clinton government, although still take US's national survival, the benefit and safe as the main consideration, there are more deeply advises in participating the regional cooperation, expanding the economical integration , improving democracy positively and so on. It shows the national security strategy of the Clinton government to come under the new liberalism influence. The G.W. Bush administration is received by new realism that all affect take the national security and the benefit as consideration, the maintenance consistent in counter-terrorism, the defense for US territory security and the national interest. In the international relations mainstream theory, any theory has not been possible to lead completely, confirms the 《National Security Strategy》 in the nowadays.
Styles APA, Harvard, Vancouver, ISO, etc.
28

ku, Huang An, et 黃安谷. « Research on the Influences of Non-traditionally Threat on the National Security ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/47654419529083518644.

Texte intégral
Résumé :
碩士
國防管理學院
國防決策科學研究所
96
The concept of “National Security” used to be defined mainly on military-security level, as how to defend foreign military interference and invade, and how to safeguard national independency and territorial integrity. However, as Cold War ends, the extremity of opposition between countries has been changed as well. The concept is powerfully affected by economic policies in other countries. Military opposition is no longer the only substance in defining international relationship. With the affects of information revolution and globalization, the boundaries of national sovereignty have been blurred and the concept of security is now with conventional and non-conventional definitions. The broadening definition of national security now includes resources, environmental issues, economic trading, demographic conflict, democracy revolution, drugs and crime, infectious diseases, and terrorism. Under most of the circumstance, these non-military safety factors are more challenging than enemy states’ military threat. Drug dealing has become one of the most serious security problems in the world. It not only affects public security, but also poses as a national security threat. Drug dealings are always well-organized, under different kinds of covers, and trans-territory; furthermore, along come criminal activities such as weapon possessions, violence, pornography, and money laundry. Criminal activities have grown more and more hazardous and even expanded trans-nationally. Nowadays, drug dealing is a common problem to be solved for countries all over the world.
Styles APA, Harvard, Vancouver, ISO, etc.
29

Chen, Tzer-Li, et 陳則黎. « Research & ; Draft of The Security On The National Shared Mobile Banking System ». Thesis, 2001. http://ndltd.ncl.edu.tw/handle/82528987837391186657.

Texte intégral
Résumé :
碩士
國立臺灣科技大學
管理研究所
89
The popularity of mobile phones grows greater rapidly in these years, and the mobile commerce has become the next aim to achieve. Within our island, banks and telecommunication dealers are united in their efforts to make a value-added phone called "Portable ATM" which enables the public to carry "financial services" with them. That raises up the "mobile banking" tendency. Above all, the necessity for the public to handle the investment related affairs, with the real-time requirements for securities market can be met through the use of mobile phones. In view of the above, the electronic commerce will step further into the mobile commerce and thus arises great business opportunities. I during this beginning period in developing the mobile banking, submit this report to research the current status and bottleneck of the development of our domestic mobile banking as well as to propose the solutions.
Styles APA, Harvard, Vancouver, ISO, etc.
30

Yeh, Din-gwo, et 葉定國. « Taiwan''s National Security - A Research of International Relations Theory under the Constructivism Viewpoint ». Thesis, 2004. http://ndltd.ncl.edu.tw/handle/97324703727450936289.

Texte intégral
Résumé :
博士
國立中山大學
中山學術研究所
92
This thesis tries to argue the important influence of culture and identity in national security studies, especially about Taiwan’s security. In my viewpoint, culture and identity have become two powerful elements in security studies. In the Post-Cold War era, material factors are no longer the only base of national security. At the same time, the culture clash has become another potential factor that influences the national and international security. The 911 event offers the best example. Meanwhile, the Taiwan security environment is undergoing a great change. The military competition tendency between Taiwan and Mainland China becomes more and more dangerous. It seems that the elements of culture and norms haven’t been taken into consider by Taiwan authorities upon how these elements could affect Taiwan’s security. In this thesis, the viewpoint of constructivism on international relations theory has been chosen to survey how culture and identity factors influence Taiwan’s security, and I try to figure out the influence of culture and identity in security research of international relations. Three main points of conclusion could be made: 1. Culture and identity have become important factors of national security. At the same time, the scholars of mainstream international theory (like neo-realism and neo-liberalism) have paid more attention to culture and identity research. 2. It is very important to combine cultural and material factors in national security research. An effective cultural strategy could improve the function of national security policy. 3. Taiwan administration has to think over the culture and identity factors’influences upon Taiwan security. Although theses factors don’t construct an immediate and clear threat, but in the future, theses factors may become a dangerous threat of national security. In the long run, they could even destroy the political power.
Styles APA, Harvard, Vancouver, ISO, etc.
31

Liu, Chia-Hsun, et 劉佳勳. « Performance Measurement Framework for Introducing Information Security Management System to the National Research Unit ». Thesis, 2009. http://ndltd.ncl.edu.tw/handle/68438683597104132473.

Texte intégral
Résumé :
碩士
世新大學
企業管理研究所(含碩專班)
97
The current study explored the influential factors and developed a framework for introducing the information security management system (ISMS) to the national research units. The hierarchical structure of indices and items for evaluating the ISMS performance were developed by adopting the methods of literature review, expert questionnaire, and analytic hierarchy process. After completing analysis, the study designed an ISMS performance measurement framework that included 6 dimensions and 29 items. The result implied that three dimensions of safety policy, risk management, and continuous management were most important since they had the highest weights among all ISMS factors. Hence, if the government units want to implement an ISMS, they need to emphasize the critical impacts of safety policy, risk management, and continuous management. Moreover, three National Research Units were subjectively chosen to evaluate their ISMS performance using the proposed framework. The evaluation results showed that overall speaking, Unit A had the best performance than Units B and C, especially for the factors of safety policy and access controlling. But, Unit B had better performance in the item of human safety than other units, and Unit C had better performance in risk management, continuous management, and information properties management. The findings could provide the public or private institutions as a reference tool for developing the mechanism and the standard process for evaluating ISMS performance.
Styles APA, Harvard, Vancouver, ISO, etc.
32

Wang, Chine-Hua, et 王健華. « The Research of Perestroika of National Security from the Soft Power views:Instanced American and China ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/87187931469734449721.

Texte intégral
Résumé :
碩士
國防大學
戰略研究所
96
In this interdependent international security environment, the main body, contents and methods of security were different with traditional cognition. It’s collective, cooperative, combinative security, not only military but also includes politics, economy, culture, society and other untraditional security issues. The international societies are no more focus on military power or wars but rely on influence and attractive to obtain their benefits and security, unless its’ existence has been treated. Therefore, in addition to military and economy, we need nation’s soft power to support our benefit and security. Nye’s “soft power” provide country a second power which include culture attraction, ideology and politics values to create international rules or issues. It really can provide us a new thought to deal our nation’s security issue. Due to our weaker economy and military, the only way to improve Taiwan’s security environment is to promote our “soft power”. It can be found that development of soft power can increase domestic cohesion and enhance people identify nation’s values and influence foreign country’s policy to ensure our benefit and security by researching perestroika of nation’s security in terms of soft power from this thesis. The influence of developing soft power in USA and China tell us some key points of developing soft power as blow:1. The government and private department are the same developing main body. 2. Regarding foreign and domestic layout. 3. Pay attention to culture and diplomacy. 4.Build an intelligent power with half hardness and half softness. The frame of thesis includes:soft power and nation’s security will be discussed in 1st chapter as the basis of demonstration; In terms of evolvement of authority, 2nd chapter will distinguish the value of power from nation’s security;In chapter 3 and 4, USA and China’s module of developing soft power and the mutual relationship to their security strategy will be discussed individually;Apply the reciprocity into our nation’s security strategy, develop perestroika(culture, policy, diplomacy);6th chapter will conclude the value of soft power to nation’s security and state the following research direction.
Styles APA, Harvard, Vancouver, ISO, etc.
33

Liu, kuang-Tzu, et 劉光慈. « The research on Management Information Security Electronic Government -taking in Bureau of National Health Insurance as example ». Thesis, 2000. http://ndltd.ncl.edu.tw/handle/81460988432543150173.

Texte intégral
Résumé :
碩士
國立臺北大學
企業管理學系
88
Abstract In recent years, due to the rapid changes of technology and the emergence of the Internet and the rapid development of networking technology.The governments of lots of countries worldwide have invested tremendous capitals and poured into many resources in setting up NII,and our government too. Our government now is also devoted to developing the electronic government, such as the transmission of electronic documents, and network tax reports. The measures can speed up the service and thus make citizens enjoy the convenience. The main purpose of electronic government is to provide convenient and satisfactory services. To keep up with the rolling wheel of the whole world and enhance the competition power of our nation is the major objective of our efforts. Our government provides citizen participation through Internet.When discussing the security of the information systems, the protection of computer crime is the one of the most important issues.It is desired to conduct these transactions across open networks. It is inevitable to construct a security system for computer networks in order to discard the effects of attackers and such that no person can do an unauthorized transaction. In order to keep the security of computer systems.Last, the paper will discuss the constraints of management information security electronic government and taking in Bureau of National Health Insurance as example,and search for solutions to these constraints.To give conclusions and discuss the improvements or the extensions of the above problems and their solutions for the further researches.The researches for information management security policy making.
Styles APA, Harvard, Vancouver, ISO, etc.
34

Yi, Kung Ling, et 孔令義. « The Research on Role and Function Since the Promulgation Organization Act of National Security Council in 2003 ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/57135494012336465335.

Texte intégral
Résumé :
碩士
國防管理學院
國防決策科學研究所
96
Abstract The Objective of this research is to explore the function of the National Security Council (NSC) which was established in 1954. It has gone through three phases:the Marshall law phase,The pre-legalization phase,and the phase after 2003 when it is a legal organization unber the ROC Constitution . And we emphasis that the NSC gradually became an advisory body that maps out nation secureity policy directions for the prestdent’s reference ,rather than being an all-powerful decision-making organ in charge of a whole range of agendas as it used to be .The NSC has been in the processs of downsizeing and accordingly has fewer functions .After its legalization ,the NSC is defined as an advisory body that offers advice to the president in formulating national secureity policy direction .This function, however, was not fully fulfilled due to the lack of proper mechanicsms and researchers . On June 25,2003, the amendment to the NSC Bill was passed .The revised NSC Bill clearly defines the parameters of national securety and highlights the NSC’s advisory role. With the amendment,researchers have been introduced into the NSC and various research groups set up to help top officials make decisions. Nevertheless, the revised NSC Bill has been in place and reference the experiences of several nations. Such as American And make tentative suggestions as to how to expand the category of national security, strengthen the role and function of researchers, improve coordination between the NSC and other state organd (including intelligence bodies ), establish contingentcy mechanicsms, etc, so that the NSC is able to fulfill its function as an advisory body offering the president advice in terms of decision-making in national defense, foreign affairs, cross-strait relations and contingentcies.
Styles APA, Harvard, Vancouver, ISO, etc.
35

Walther, Gerald, et Malcolm R. Dando. « A phoenix of the modern world : the re-emergence of National Science Advisory Board for Biosecurity and its implications for scientific partners ». 2015. http://hdl.handle.net/10454/9101.

Texte intégral
Résumé :
No
While there are many mythical stories of various kinds about the Phoenix it retains several features throughout all of them. In ancient Egypt, the Phoenix was the prodigy of the sun god Ra and appeared in the shape of a giant bird of fire, which was one of the most beautiful creatures on earth. It was remarkable in that it could not foster any offspring and at the end of its life would explode in a ball of fire. Out of the ashes, an egg is formed which then hatches the Phoenix again in its young form. The cry of a Phoenix was supposed to be of miraculous beauty. This chapter will explore if the Phoenix is a suitable metaphor for the recent re-emergence of the US National Science Advisory Board for Biosecurity (NSABB), which was tasked with providing scientific expertise to the government on questions of the security risks of emerging science and technology in the life sciences. The analogy to the Phoenix suggests itself because the NSABB, chartered in 2004, had been inactive for over two years and only recently took up its work. The comparison between the Phoenix and the NSABB gives rise to several questions: first, has the re-emergence of the NSABB been met with an equally beautiful cry of joy among the scientists and security experts? Second, what happens when the Phoenix lies dormant? And third, what took place before the Phoenix was created?
Styles APA, Harvard, Vancouver, ISO, etc.
36

National, Science Board (NSB). « Long-Lived Digital Data Collections : Enabling Research and Education in the 21st Century : Report of the National Science Board (Pre-publication draft, Approved by the National Science Board May 26, 2005, subject to final editorial changes.) ». 2005. http://hdl.handle.net/10150/105473.

Texte intégral
Résumé :
From the Executive Summary of the 67 page Report: The National Science Board (NSB, the Board) recognizes the growing importance of these digital data collections for research and education, their potential for broadening participation in research at all levels, the ever increasing National Science Foundation (NSF, the Foundation) investment in creating and maintaining the collections, and the rapid multiplication of collections with a potential for decades of curation. In response the Board formed the Long-lived Data Collections Task Force. The Board and the task force undertook an analysis of the policy issues relevant to long-lived digital data collections. This report provides the findings and recommendations arising from that analysis. The primary purpose of this report is to frame the issues and to begin a broad discourse. Specifically, the NSB and NSF working together â with each fulfilling its respective responsibilities â need to take stock of the current NSF policies that lead to Foundation funding of a large number of data collections with an indeterminate lifetime and to ask what deliberate strategies will best serve the multiple research and education communities. The analysis of policy issues in Chapter IV and the specific recommendations in Chapter V of this report provide a framework within which that shared goal can be pursued over the coming months. The broader discourse would be better served by interaction, cooperation, and coordination among the relevant agencies and communities at the national and international levels. Chapters II and III of this report, describing the fundamental elements of data collections and curation, provide a useful reference upon which interagency and international discussions can be undertaken. The Board recommends that the Office of Science and Technology Policy (OSTP) take the lead in initiating and coordinating these interagency and international discussions.
Styles APA, Harvard, Vancouver, ISO, etc.
37

Shen, Nan-Chen, et 沈能成. « The Comparative Research on National Security Decision- Making Institution between the Republic of China and the United States ». Thesis, 2009. http://ndltd.ncl.edu.tw/handle/46265218309661274481.

Texte intégral
Résumé :
碩士
淡江大學
國際事務與戰略研究所碩士在職專班
97
The United States as the global superpower nation has been through the 911 terrorist attack, thus, it is worth monitoring on how U.S. would deal with national security agenda. The national security decision-making institution formulates the direction and policy of the national security. According to the design of constitution law on national security policy, “the president decides national security by establishes National Security Council accountable for National Security Bureau”. The N. S.C., in nature, is the advisory agency that provides the president advices on national security affairs; in function, it is the highest institution that manages national security affairs. In terms of operational analysis, the N.S.C. provides decision-making assistance on integration guide, coordination, and the government apparatus support according to institution responsibility division. The N.S.C. is the most important national security decision-making institution. Legal system and transformation of the N.S.C. has been established during the adjustment period in December 1993 and June 2003. This thesis emphasizes three parts based on analysis structure. Firstly, investigate the theory and concept of national security and the policy-making, which provides the rationale construction of the ideal national security decision-making institution. Secondly, compare the national security decision-making institution evolution of development, legal basis, organization function, and the actual operation execution occurs in the US and us. Finally, analyzes from organizational orientation, policy-making function, and operation system, and generalizes our ideal national security decision-making institution.
Styles APA, Harvard, Vancouver, ISO, etc.
38

Lin, Kuo-Chin, et 林國欽. « The research of the impact in relation to our national defense security from Aviation Technology development of P.R.C ». Thesis, 2014. http://ndltd.ncl.edu.tw/handle/20142831998827024111.

Texte intégral
Résumé :
碩士
銘傳大學
公共事務學系兩岸關係與安全管理碩士在職專班
102
Space war is a pioneer in information warfare. It is a weapon of modern warfare forces, and a key factor in determining the outcome of future wars. People''s Republic of China (PRC) has successfully launched the "Shenzhou-series" manned spacecraft and "Beidou satellite" system. It proves PRC has perfect command, surveillance and reconnaissance capabilities in space and can significantly improve the overall effectiveness of its military operations. This is bound to have a great impact to the military security of our country. In the future, the one who controls the high ground of strategy and the power in space has the strategic superiority and opportunities. Therefore aerospace technology was considered a multiplier of modern fighting force. In recent years, the percentage of PRC defense budget maintains double-digit average growth annually which has accelerated PRC’s military modernization. Besides, the frequent military activities in the Asia Pacific region in these two years and strongly advocating the territorial sovereignty trigger the anxiety and wariness of other neighboring countries, such as Japan, South Korea, Vietnam, and India, also form the competitive strategic pattern with the United States on regional security issues. The rapid military modernization of PRC has significant impact on our national defense operations. How to cope with the attack of PRC’s aerospace combat power is the urgent problem which our government and relevant units should work on. In addition to strengthening military armaments preparedness, the ROC Armed Forces should combine the established strategic guidance and the needs of national defense to work out countermeasures against the advantage and weakness of PRC’s aerospace combat power, moreover, to defeat the enemy and respond to the influence of the development and the use of PRC’s military satellites.
Styles APA, Harvard, Vancouver, ISO, etc.
39

LIN, SHIH-JUNG, et 林士榮. « The Research on Indonesian Terrorism and its Government's Counter-Terrorism Measures Also the Reflections on Taiwan National Security ». Thesis, 2019. http://ndltd.ncl.edu.tw/handle/934cru.

Texte intégral
Résumé :
碩士
國立中正大學
戰略暨國際事務研究所
107
After the independence of Indonesia, the radical Islamic organizations in Indonesia pursued a caliphate Islamic state, which has confronted a foreign colonial regime to an Indonesian government. After the September 11 incident in the United States and the Bali bombing in October 2002, radical Islamic organizations in Indonesia have formed an intensive and extensive cross-border network with radical Islamic organizations in the surrounding countries and even with al-Qaeda. . Today, the al-Qaeda organization and the Islamic State Organization’s stronghold in the Middle East have collapsed. The threat of terrorist attacks in Europe and the United States, especially in Islamic countries, has not been reduced for a while. The paper uses literature analysis and historical analysis to understand the development process of Indonesian radical Islamic organizations, the major events over the years, the current status of activities and their links and cooperation with al-Qaeda, Islamic organizations in the Middle East. The current counter-terrorism measures of the Indonesia government and the counter-terrorism cooperation of foreign governments and regional organizations examine the implementation and effectiveness of its anti-terrorism strategy. As a mirror of the Taiwan government’s counter-terrorism mechanism, the paper could analyze the national security risks of foreign radical radicalism in Indonesia and investigate potential terrorist organizations in Indonesia.
Styles APA, Harvard, Vancouver, ISO, etc.
40

chun-chi, Lo, et 羅鈞琦. « Research of the wartime Courts-martial—Take balances the national security and the human rights safeguard as the center ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00527323596604586513.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
41

« Teacher Leadership : A Little Less Conversation, A Little More Action Research ». Doctoral diss., 2016. http://hdl.handle.net/2286/R.I.38463.

Texte intégral
Résumé :
abstract: Though National Board Certified Teachers (NBCTs) in Arizona have been identified as leaders on a national level, they do not have comparable opportunities to lead within their local contexts or engage in leadership and collaboration activities that align with Interstate Teacher Assessment and Support Consortium (InTASC) Standard 10. The purpose of this sequential, mixed-methods study was to explore how the development of a teacher leadership community of practice for NBCTs might influence their perceptions of themselves as leaders. Social constructionism, action research, and communities of practice guided the innovation and a mixed-methods approach was used for data collection and analysis. Data illustrated NBCTs’ dichotomous feelings about leadership on local and national levels. Findings revealed that NBCTs need continued professional learning opportunities, beyond National Board Certification, to resolve feelings of isolation and fully meet all of the leadership and collaboration indicators for InTASC Standard 10. Participating in a teacher leadership community of practice (a) provided a professional learning opportunity for NBCTs, (b) improved NBCTs’ perceptions of teacher leadership and helped them define it as an active process of learning, reflection, and action, and (c) increased NBCTs’ readiness to take action as teacher leaders within their local contexts to evoke positive change.
Dissertation/Thesis
Doctoral Dissertation Leadership and Innovation 2016
Styles APA, Harvard, Vancouver, ISO, etc.
42

Chang, Hwa-Kuan, et 張花冠. « The research of Taiwan's future development under the cross-strait economic and trade interation : from the view of Taiwan's sovereignty and national security ». Thesis, 2011. http://ndltd.ncl.edu.tw/handle/44063176496947874190.

Texte intégral
Résumé :
碩士
國立中正大學
戰略暨國際事務研究所
99
This thesis uses 3i model to be analytic framework to discuss President Ma’s flexible diplomacy policy. The cross-strait economic and trade interaction has become frequently, but it may crash Taiwan’s sovereignty and national security. Therefore, this thesis induces four points to be policy references. 1. Taiwan and China are two independent nations, and have to be basic on equality and reciprocal foundation. 2. The cross-strait’s stable development can’t sacrifice Taiwan’s sovereignty. 3. Practical policy to China and effective risk management can help Taiwan’s long-term development. 4. We have to recognize China is not the only way to promote Taiwan’s economy, and our economy can’t excessively rely on China.
Styles APA, Harvard, Vancouver, ISO, etc.
43

Mei-Fen, Hsu, et 徐美芬. « A Research on BBS Users'''' Posting up Strategies--A Case Study on Education Board of National Chiao Tung University Department of Computer and Information Science BBS ». Thesis, 2002. http://ndltd.ncl.edu.tw/handle/38941012172633672509.

Texte intégral
Résumé :
碩士
國立屏東師範學院
國民教育研究所
90
This research attempts to through the virtual domain and gets into the BBS users’ real world, to make a study of the field where bbs users are located in, the posting strategies they used, and factors to affect the selection of strategy. The analytic objects in this research are 4 users on Education Board of National Chiao Tung University Department of Computer and Information Science BBS, and the analysis is based on the interviews with users and their bulletins. The results are as follows: 1. Education Board is oriented to “task”, the interaction models are mainly “information increase” and “problem solving”. 2. Most topics on Education Board are “news”, “suspicions from non-educator”, and “sharing teaching experiences from educators”. 3. The bulletins on Education Board have these following characters: (1) immediateness, (2) cycle, (3) correlation, (4) diffusion, and (5) diversification. 4. The interviewees are affected by “purposes” and “norms” while they post up bulletins. 5. The main purposes of interviewees to post up are “identification” and “transformation”. Identification here means self-identity and other people’s identification. Transformation is to influence others’ behaviors and attitudes. To accomplish the purposes, the role-playing in cyberspace can’t separate form real life of the interviewees. The social and cultrual capitals in real world would mirror to cyberspace and become the persuasiveness. 6. The consciousness of self-identity would influences the norms which interviewees recognize and observe, hence the anonymity in cyberspace doesn’t make interviewees act on their own will. The perfect principles among classes would bring about exclusiveness. 7. According to the purposes, bulletins of interviewees can be distinguished into 3 categories as below: telling, persuasion, and negotiation. The strategies used by interviewees include motive, participation, logic, passion, ethics, disregard, concession, opposition, and asking.
Styles APA, Harvard, Vancouver, ISO, etc.
44

Cheng, Ya Wen, et 張雅雯. « The Qualitative Research upon the Economic Security of the Elderly from the Perspectives of Housewives in Taiwan----The Case Study of National Pension Insurance Scheme implemented since October, 2008 Women ». Thesis, 2010. http://ndltd.ncl.edu.tw/handle/jgjr6z.

Texte intégral
Résumé :
碩士
玄奘大學
社會福利學系碩士班
98
This qualitative research aims to explore how National Pension Insurance Scheme, enacted since October 1st, 2008, can guarantee economic security of the elderly women from the perspectives of Taiwanese housewives. Therefore, the qualitative research method in terms of in-depth interview was employed and 13 full-time housewives were invited through snowball sampling, and voluntarily participated in the current study in order to achieve the mentioned above aims. The data collection was conducted one by one between July and August of 2009, and faithfully transcribed from verbal records into Chinese texts, carefully re-read and checked by the researcher as so to confirm its authenticity and trustworthiness (Bryman 2004:273-274). Following this, the transcribed data was analytically and critically categorized into a variety of themes by triangulation method. Then the research findings emerged into the main arguments of the present study, listed as follows: (1) The traditional marriage institution, which has long buttressed the gender division of housework and domestic care within the patriarchal family and society, has not only enforced the gendered housework burden but also deepened the gendered belief of imposing the domestic responsibility of “helping the husband and teaching the children” upon women as their “natural duty”; (2) Furthermore, the traditional gendered division within the family has long promoted the unpaid family care as female another natural duty. Therefore, the qualitative findings explored that housewives must not only care for their own minor children, but also for their grandchildren. This unpaid child-care within the family has certainly led to women’s constraints of participation in the labour market. Not-surprisingly, housewives are hardly to be protected under the Gender Equal Employment Act. (3) Nowadays, the global economic recession, ageism, gender discrimination and low educational attachment, faced by housewives, have resulted in their highly impossible re-employment and forcible house-wifehood. (4) The Labour (Pension) Insurance Scheme can hardly provide fully economic security for housewives, despite their previous employment in the labour market and transient participation in the Labour Insurance, because their employment pattern concentrates on non-full-time jobs and intermittent period of paid work, which have great negative impact upon their entitlement to the Labour Pension Insurance. (5) In spite of its compulsory coverage over all the housewives in Taiwan, National Pension Insurance Scheme is still unlikely to guarantee the economical security for women, full-time participating in unpaid housework and family care. Rather, the compulsory contribution of its Insurance Premium (NT$ 674 per month) has increased financial burden upon unpaid housewives, particularly poor ones. Furthermore, the rate of statutory subsidy to reduce such burden is much less for housewives (40%) than the one for low-income family and the disabled (70% or 55%). Is this fair for those nearly lifelong and full-time participating in the unpaid domestic work and care? Therefore, the conclusions are summarized into the following three points: (1) No matter what attitudes housewives hold toward the compulsory National Pension Insurance Scheme, positively or negatively, as the ensured, the long-term contribution of its Insurance Premium seems a “great worry” for unpaid housewives for sure; (2) The level of payment claimed from the National Pension Insurance Scheme can hardly catch up with the rapid rise of annual inflations. And it is very hard to argue that this amount of money can meet the needs of housewives in their old age; (3) The statutory subsidy rate (40%)paid for housewives is much less than the one paid for the low-income family or the disabled (70% or 55%). It is obvious that the State has not yet recognized the value, which housewives have long contributed to, and the (financial) dependency upon their husbands, which has more likely trapped them into dangerous or uncertain circumstances if their marriage broke down. Following the mentioned above, three proposed programmes have been recommended in order to improve well-beings of unpaid housewives as individual citizens: (1) To promote and recognise that the value of housework is as great as paid work. So it should be treated as formally as paid work; (2) To value the contribution brought about from unpaid housework and family care in terms of income compensation for those once participating in the labour market, but losing their income because of their unpaid love-work in the domestic sphere; (3) To comprehensively construct Social Security system, particularly pension scheme in order to guarantee housewife’s individual citizenship. Therefore, the State should recognise seriously the disadvantages in which housewives have long lived in all aspects, not only in the way of old-age pension. Furthermore, it should take more positive actions in the establishment or implementation of more gender-equal social policies, along with which the economic security for housewives in their old age can be guaranteed and their citizenship can more equally be realized in Taiwanese social context.
Styles APA, Harvard, Vancouver, ISO, etc.
45

曹虹. « A research on the crisis management of the HKSAR government : an analysisis of the legislative procedure of the national security (legislative provisions)bill derived from the Article 23 of the Basic Law ». Thesis, 2005. http://ndltd.ncl.edu.tw/cgi-bin/gs32/gsweb.cgi/login?o=dnclcdr&s=id=%22094CHU00493002%22.&searchmode=basic.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
46

PAO, MING-CHANG, et 包明章. « The Research of the Perceptions of the Transformational Leadership on the Rising Morale of the Substitute Serviceman ofMobile Security Police -A Case of Study of the Special Police FirstHeadquarters National Police Agency ». Thesis, 2006. http://ndltd.ncl.edu.tw/handle/47725948902314579498.

Texte intégral
Styles APA, Harvard, Vancouver, ISO, etc.
47

Tomek, Prokop. « Československá redakce Radio Free Europe : historie a vliv na československé dějiny ». Doctoral thesis, 2012. http://www.nusl.cz/ntk/nusl-326941.

Texte intégral
Résumé :
The disertation is focused on development and importance of the Czechoslovak desk of the Radio Free Europe in period between 1950 and 1994. This broadcasting have gained in time of strong censorship significant and till now unresearched importance. In February 1948 the Communist party took power in the Czechoslovakia. After that Czech and Slovak democratic politicians had left country to the West. They wanted to break the isolation of people living behind the Iron Curtain and promote restoration of democracy in their homeland. In 1949 was in the USA established the National Committee for Free Europe as fomally independent citizens association. As its most known activity had became the Radio Free Europe (RFE). This radio station had became an important tool for political strugle between two blocks in time of the Cold War. The basic qestion is what real position RFE broadcasting have reached in this struggle. The estabilishing of foreign broadcasting to the Czechoslovakia was very difficult task. RFE started its activity as exiles platform for purpose of liberation the Czechoslovakia from rule of the Communistic Party regime. The programming position of the RFE was in reality influented by american politicians and was depending on changing global political conditions as well. The unique position of...
Styles APA, Harvard, Vancouver, ISO, etc.
48

Quigg, Gary Francis. « JB-2 : America's First Cruise Missile ». Thesis, 2014. http://hdl.handle.net/1805/5517.

Texte intégral
Résumé :
My research provides a historical and archaeological context for this thesis, in which I argue the JB-2 missile is historically significant as a unique example of the rapid duplication of enemy technology for both physical and psychological retaliation, as a crucial link in the chain of development for America’s cruise missile program, and for its role in early Cold War deterrence. Jet Bomb model number 2 (JB-2), America’s first operationally successful, mass produced cruise missile, developed as a direct copy of the German V-1, with slight variation in manufacture due to differences between German and American components, machinery and tooling. Continuing modifications of the JB-2 during its service life led to improvements in performance, control, and accuracy. From 1944 to 1953, the JB-2 transitioned from a weapon quickly prepared for wartime deployment to an essential test vehicle for the United States Army, Air Force and Navy while supporting the U.S. policy of containment during the early Cold War.
Styles APA, Harvard, Vancouver, ISO, etc.
Nous offrons des réductions sur tous les plans premium pour les auteurs dont les œuvres sont incluses dans des sélections littéraires thématiques. Contactez-nous pour obtenir un code promo unique!

Vers la bibliographie