Teses / dissertações sobre o tema "The Concept of Security"

Siga este link para ver outros tipos de publicações sobre o tema: The Concept of Security.

Crie uma referência precisa em APA, MLA, Chicago, Harvard, e outros estilos

Selecione um tipo de fonte:

Veja os 50 melhores trabalhos (teses / dissertações) para estudos sobre o assunto "The Concept of Security".

Ao lado de cada fonte na lista de referências, há um botão "Adicionar à bibliografia". Clique e geraremos automaticamente a citação bibliográfica do trabalho escolhido no estilo de citação de que você precisa: APA, MLA, Harvard, Chicago, Vancouver, etc.

Você também pode baixar o texto completo da publicação científica em formato .pdf e ler o resumo do trabalho online se estiver presente nos metadados.

Veja as teses / dissertações das mais diversas áreas científicas e compile uma bibliografia correta.

1

Dolan, Mark E. "The seamless maritime concept". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Mar%5FDolan.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis (M.A. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, March 2005.
Thesis Advisor(s): S. Starr King. Includes bibliographical references (p. 67-69). Also available online.
2

Neville, Karen M. "IS security leveraging the concept of knowledge management". Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.527132.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
IS Security (ISS) has become a key element of business risk management and can itself create competitive advantage. Thus, organisations seek practical approaches to protect the operation of the business. Protecting the functionality of an organisation is a difficult task but it is the responsibility of both senior management and ISS functions to do so. An analysis of the ISS literature reveals a paucity of research of ISS management, and a need for research to develop a holistic model for managing ISS knowledge to overcome the ever-increasing number of negative security incidents. The ISS research community is restrained by small-scale technical questions as the social aspects of ISS are ignored resulting in fragmented research across the IS field. While several possible methods are scattered throughout the literature – they focus on the development of information systems. ISS professionals require a range of skills encompassing business knowledge, legal awareness, and organisational processes as well as technical security knowledge. Research to date has failed to provide an integrated approach to managing ISS knowledge. This study investigates how ISS could leverage the concept of knowledge management. It proposes a theoretical model derived from the ISS and KM literatures. Thus to address this gap in research, this study adopts an exploratory interpretive holistic case study approach using interviews and document analysis as data gathering methods. The study will focus on the relationship between ISS and KM and the proposed benefits that an ISS KM initiative would produce. An analysis of the approaches used by these specialised structures in managing knowledge within and across the two case studies facilitated the development of an integrated model. The interplay between the functions provided rich description of the approaches used to manage knowledge. This research builds on previous studies documented in the ISS literature, by providing a much needed model against which practitioners may diagnose problems, plan action and implement solutions. ISS models and standards today do not exhibit much flexibility, therefore managers make ISS decisions in a vacuum. ISS problems can be managed or reduced when the ISS functions and management are aware of the full range of controls available and implement the most effective. Unfortunately, they often lack this knowledge and their subsequent actions to cope with threats are less effective. The focus of ISS research to date has been technical and grounded in positivism and few, if any, studies utilise a qualitative approach, therefore eliminating holistic, in-depth rich descriptions of core issues within the field. Comparatively little work has taken a managerial point of view, covering broad organisational and social issues. This study acknowledges these issues and provides a solid conceptual foundation for future studies on ISS by answering calls for a theoretical model to guide research in the area. The study also identifies the positive and negative impacts of compliance and describes how organisations can apply the model to overcome these negative effects.
3

Schmid, Markus Thomas. "The concept of comprehensive security a distinctive feature of a shared security culture in Europe? /". Thesis, Monterey, Calif. : Naval Postgraduate School, 2007. http://bosun.nps.edu/uhtbin/hyperion-image.exe/07Dec%5FSchmid.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis (M.A. in National Security Affairs)--Naval Postgraduate School, December 2007.
Thesis Advisor(s): Biermann, Rafael ; Knopf, Jeffrey. "December 2007." Description based on title screen as viewed on January 18, 2008. Includes bibliographical references (p. 95-105). Also available in print.
4

Tigerstrom, Barbara J. von. "The concept of human security : some implications for international law". Thesis, University of Cambridge, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.423873.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
5

May, Elizabeth. "Attachment security, self-concept clarity and beliefs in obsessive-compulsive disorder". Thesis, University of Hertfordshire, 2007. http://hdl.handle.net/2299/853.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Cognitive models of obsessive-compulsive disorder (OCD) suggest that an ambivalent self-concept and dysfunctional beliefs play an important role in the pathogenesis of OCD. Early attachment experience is argued to be the main process through which such ambivalent self-representations develop. The current study investigated self-concept clarity, a broader construct than ambivalence, attachment security, obsessive-compulsive (OC)-relevant beliefs and their relation to OC symptoms. Forty four people who reported experiencing OC symptoms were compared to 34 individuals who reported no mental health difficulties. People who experienced OC symptoms exhibited significantly less self-concept clarity, less attachment security and higher levels of OC-related beliefs. Once levels of depression were controlled for, no significant relationship between attachment security and self-concept clarity was found in the OCD group. OC symptoms were not significantly correlated with self-concept clarity in the OCD group, although significant negative relationships were found between self-concept clarity and specific OC symptoms. Evidence was found to support the notion that OC-relevant beliefs mediate the relationship between self-concept clarity and OC symptoms, in addition to mediating the relationship between attachment anxiety and OC symptoms. Implications for attachment theory and cognitive models of OCD are discussed, along with clinical and research implications.
6

Lack, Lindsey A. "Using the bootstrap concept to build an adaptable and compact subversion artifice". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Jun%5FLack.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2003.
Thesis advisor(s): Cynthia E. Irvine, Roger R. Schell. Includes bibliographical references (p. 69-71). Also available online.
7

Morrissey, Joseph Patrick. "The extension and hardware implementation of the comprehensive integrated security system concept". Thesis, University of Plymouth, 1995. http://hdl.handle.net/10026.1/336.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The current strategy to computer networking is to increase the accessibility that legitimate users have to their respective systems and to distribute functionality. This creates a more efficient working environment, users may work from home, organisations can make better use of their computing power. Unfortunately, a side effect of opening up computer systems and placing them on potentially global networks is that they face increased threats from uncontrolled access points, and from eavesdroppers listening to the data communicated between systems. Along with these increased threats the traditional ones such as disgruntled employees, malicious software, and accidental damage must still be countered. A comprehensive integrated security system ( CISS ) has been developed to provide security within the Open Systems Interconnection (OSI) and Open Distributed Processing (ODP) environments. The research described in this thesis investigates alternative methods for its implementation and its optimisation through partial implementation within hardware and software and the investigation of mechanismsto improve its security. A new deployment strategy for CISS is described where functionality is divided amongst computing platforms of increasing capability within a security domain. Definitions are given of a: local security unit, that provides terminal security; local security servers that serve the local security units and domain management centres that provide security service coordination within a domain. New hardware that provides RSA and DES functionality capable of being connected to Sun microsystems is detailed. The board can be used as a basic building block of CISS, providing fast cryptographic facilities, or in isolation for discrete cryptographic services. Software written for UNIX in C/C++ is described, which provides optimised security mechanisms on computer systems that do not have SBus connectivity. A new identification/authentication mechanism is investigated that can be added to existing systems with the potential for extension into a real time supervision scenario. The mechanism uses keystroke analysis through the application of neural networks and genetic algorithms and has produced very encouraging results. Finally, a new conceptual model for intrusion detection capable of dealing with real time and historical evaluation is discussed, which further enhances the CISS concept.
8

Schmalen, Daniel. "Security Concept for VPN IPsec Site-to-Site Connections to Third Parties". Thesis, California State University, Long Beach, 2018. http://pqdtopen.proquest.com/#viewpdf?dispub=10688606.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

VPN (Virtual Private Network) connections between two companies are a very common method to pair networks with each other to facilitate the access to specific resources for both sides of the connection. However, the security aspect for such a pairing has not been thoroughly researched either by academic or industrial organizations. Nevertheless, screening this topic from a security perspective is crucial to give companies a recommendation.

This thesis covers every key facet of such a VPN connection and therefore, all components are researched individually to discover the key findings for each part. Furthermore, the findings are applied to create a practical, enterprise-close security concept that is both complete and comprehensible.

The security concept may play a significant role in the overall understanding of the given use-case, a VPN IPsec (Internet Protocol Security) Site-to-Site connection to a third-party company, to avoid security leaks in the owner’s network. Furthermore, the VPN itself has to be secured against outsider adversaries such as eavesdroppers.

9

Zacarias, Agostinho M. "The security concept in Southern Africa : prospects for the post-apartheid era". Thesis, London School of Economics and Political Science (University of London), 1996. http://etheses.lse.ac.uk/1426/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The thesis examines the concept of security that states and other actors in Southern Africa have acted upon. It argues that Southern Africa, due to its peculiar colonial history and apartheid, and the regions' links with great powers, embraced the traditional concept of security, a concept that was unsustainable and inappropriate for its specific conditions. The traditional concept seeks to protect states and domestic societies from outside threats. This concept was inherently militaristic, nationally focused, state-centric and narrow in scope. The emphasis is on immediate problem-solving rather than on a sustained attempt to identify the underlying causes of insecurity. Its application to Southern Africa led to regional confrontation and produced more insecurity than security. Southern Africa needs a new concept which is broader and long term in its outlook in order to restore stability and prosperity. The new concept should essentially be people centred, because people are the only object of security. The new concept should take into account the diverse factors, military and non-military impinging on the security of people. Placing people at the centre, when conceptualising security, requires focusing on making the environment secure rather than on the threats to and the vulnerabilities of the state. The environment of security is defined by the coexistence of three pillars: order, justice and peace. Thus the task of building security in Southern Africa should be orientated towards the strengthening of these pillars. In the final analysis the pillars need to be supported and reinforced by a political process which seeks to promote the good of all members of society as the final goal of all policy. This cannot be achieved without building legitimate states, i.e. states regarded as protectors of their citizens interests and strengthen social agents other than those merely around the state. The task of building a legitimate state and strengthening civil society then become primary steps in the process of building the desired security community in Southern Africa. National integration of different political communities within the states and regional co-operation are essential. This implies strengthening domestic and regional institutions. While domestic institutions are necessary to reduce internal conflicts, regional institutions are essential to allow the predictability of peace in relations among states. The economic and social inequalities between the states and the military asymmetries, will hamper states quick integration, hence the building of the security community. Regional institutions will tend to drain the resources of the relatively richer states, even though there is a strong will to avoid the confrontations of the past. This thesis suggests that a security system, defined as a pattern of relations aimed at assuring the sharing of common values and interests, should be followed in the process of building security in Southern Africa.
10

Ransome, Paul Edward. "An analysis of recent changes in the concept and practice of work". Thesis, University of Cambridge, 1993. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.307014.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
11

Larsson, Sebastian. "Guarding the gates : Reassessing the concept of borders in Tanzania". Thesis, Södertörns högskola, Institutionen för livsvetenskaper, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:sh:diva-17178.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Using discourse analysis, this study will apply a critical theoretical framework and discuss how perceptions of the Tanzanian national borders compares to problematized understandings of the socially constructed concepts of borders, sovereignty, and power. For example, the Tanzanian borders will be reassessed into something creating a safe ‘inside’ opposing an unsafe ‘outside, and into something dividing territories, thus, giving birth to the identities of ‘nationality’. Furthermore, the presence of biopolitical interventions will be discussed in order to see how biopower can help increase security in Tanzania. More substantially, the phenomena of roadblocks will be analysed as something potentially functioning as ‘extended arms’ of the national border. The analysis showed how the so called ‘geopolitical imaginary’, where borders are defined as the outer reaches of a sovereign state, is a well-established idea in Tanzania; the national borders were perceived as important and worthy of protection. However, they can also be seen as something ultimately creating non-coherent ‘insides’ and an ‘outsides’, where outside ‘threats’, often perceived as illegal immigrants, are dependent on the existence of territories. The analysis further showed that biopower in Tanzania is something which can create ‘social’ borders wherever there is authority. This form of exercised power does although suffer severely from corruption, and this leads to a conclusion that Tanzanian ‘security’, to a great extent, is being evaluated in terms of money.
12

Holford, John William. "The concept of self-defending objects and the development of security aware applications". Queensland University of Technology, 2006. http://eprints.qut.edu.au/16227/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The self-defending object (SDO) concept is an extension to the object-oriented programming paradigm, whereby those objects that encapsulate the protected resources of a security aware application (SAA), are made aware of, and responsible for, the defence of those resources. That defence takes two forms, the enforcement of mandatory access control on protected resources and the generation of the corresponding portion of the SAA's audit trail. The SDO concept acts as the philosophy that guides the application level mandatory access control within SAAs which ensures that the provided access control is both complete and non bypassable. Although SDOs accept responsibility for controlling access to the protected data and functionality that they encapsulate, an SDO delegates the responsibility for making authorisation decisions to an associated authorisation object. Thus, SDOs fulfill their access control obligations by initiating the authorisation check and then enforcing the decision made on their behalf. A simple, yet effective mechanism for enforcing that access control at the object level involves controlling the ability to invoke those SDO methods that access protected resources. In the absence of previous research on this approach to the enforcement of application level access control, the primary aim of this research was to demonstrate that the SDO concept is a viable paradigm for developing SAAs. That aim was achieved in two stages. The first stage targeted the provision of a 'proof of concept', that demonstrated that the SDO concept could be applied to the development of non-distributed SAAs. The second stage demonstrated its applicability to the development of distributed SAAs. In the second stage, two versions of a distributed prototype were developed, one based on a traditional (proprietary) distributed computing model, (Java RMI), and the second using the currently popular Web services model, to demonstrate the general applicability of the SDO concept. Having already demonstrated that the SDO concept could be applied to SAAs executing on a single machine, the major focus of that research was to devise a mechanism by which SDOs could be transferred between machines. The research then concentrated on determining what impacts the adoption of the SDO concept would have on SAA development. Experimentation carried out using the distributed prototypes demonstrated that (1) the adoption of the SDO does not restrict the use of inheritance hierarchies that include SDOs, (2) the restriction of the lifetime of SDOs can be supported, (3) usage rights enforcement can be employed, and (4) the use of cryptographic techniques to provide additional security guarantees is not affected. A key feature of the SDO concept, is that no major changes need to be made to current development tools or methodologies, so its adoption is not hampered by significant financial or training impediments. This research demonstrated that the SDO concept is practical and constitutes a valuable extension to the object oriented paradigm that will help address the current lack of security in information systems. The SDO approach warrants additional research and adoption.
13

Busmire, Terence Edward. "Concept definitions and security requirements of a cooperative execution environment for distributed computing". Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 1993. http://handle.dtic.mil/100.2/ADA275515.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
14

Johnson, Olga. "The concept of energy security : implications of EU-Russia energy relations, 2004-2012". Thesis, University of Leeds, 2016. http://etheses.whiterose.ac.uk/14357/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This research project presents a novel and fundamental understanding of energy security and threat perceptions by analysing the EU-Russia energy relationship concerning gas supply during the period 2004-2012. The ultimate goal of this thesis is to address the two-fold research question of why differences exist in the threat perceptions and understandings of energy security among member states of the EU, and how they affect EU’s energy stance and its gas relations with Russia. Encountering endemic problems with the coherence of EU energy policy towards Russia, the research focuses on two case studies, those of Poland and Germany, based on identifying their energy interests and identities and the previous patterns of energy interactions with Russia as an explanatory basis for the construction of threat perceptions.
15

Hockmann, Volker. "Developing a concept for handling IT security with secured and trusted electronic connections". Thesis, University of Wolverhampton, 2014. http://hdl.handle.net/2436/324189.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
In this day and age, the Internet provides the biggest linkage of information, personal data and information, social contact facilities, entertainment and electronic repository for all things including software downloads and tools, online books and technical descriptions, music and movies - both legal and illegal [Clarke, 1994]. With the increasing bandwidth in the last few years worldwide, it is possible to access the so-called "Triple-Play-Solutions" - Voice over lP, High-Speed-Internet and Video on Demand. More than 100 million subscribers have signed on across Asia, Europe, and the Americas in 2007, and growth is likely to continue steadily in all three. As broadband moves into the mainstream, it is reshaping the telecommunications, cable and Internet access industrie [Beardsley, Scott and Doman, Andrew, and EdinMC Kinsey, Par, 2003]. Cisco [Cisco, 2012], one of the biggest network companies, will expect more than 966 exabytes (nearly 1 zettabyte) per year or 80.5 exabytes per month in 2015 and the "Global IP traffic has increased eightfold over the past 5 years, and will increase fourfold over the next 5 years. Overall, IP traffic will grow at a compound annual growth rate (CAGR) of 32 percent from 2010 to 2015" . More and more types of sensible data flow between different recipients. News from around the world are transferred within seconds from the one end to the other end of the world, and affect the financial market, stock exchange [Reuters, 2012] and also bring down whole governments. For instance, worldwide humoil might ensue if a hacker broke into the web-server of an international newspaper or news channel like N-TV in Germany or BBC in England and displayed messages of a political revolution in Dubai or the death of the CEO from Microsoft or IBM.
16

Andreasson, Emelie. "All in the name of security : A qualitative content analysis regarding the concept of security in the movie Zero Dark Thirty". Thesis, Försvarshögskolan, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-7100.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This study explores how the concept of security is presented in current American action movies.This study will use the movie Zero Dark Thirty as an illustrative example to examine the concept ofsecurity during the ’War on Terror’-era. The study will use qualitative content analysis in order toexamine the concept of security.
17

Cobb, Adam Campbell. "Changes in the concept of security since World War II among Western international theorists". Thesis, University of Cambridge, 1996. https://www.repository.cam.ac.uk/handle/1810/252234.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
18

Siko, Isaac Mohlolo. "A critical review of South Africa's approach to the concept of national security since 1994". Diss., Pretoria : [s. n.], 2007. http://upetd.up.ac.za/thesis/available/etd-01242008-121403/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
19

Covic, Mirjana, e Thomas Kohler. "IT security for small and medium-sized enterprises : A didactical concept of a dynamical questionnaire". Thesis, Växjö University, School of Mathematics and Systems Engineering, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-6266.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

This master thesis has been written at the School of Mathematics and System Engineering (MSI) at Växjö University in the field of computer science. IT security has become one of the main topics of every enterprise since they all use information technology in their business. Investments have to be done in order to achieve a high protection status of the IT environments. Specially small and medium-sized enterprises need more knowledge and advisory how to handle their IT security. This thesis analyses management tools that have the goal to improve the IT security. The second and main part of the thesis is the design of a tool that should helps to solve the described problems.

20

Austin, William H. "The United States Department of Homeland Security concept of regionalization - Will it survive the test?" Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Sep%5FAustin.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis (M.S. in Security Studies (Homeland Security and Defense))--Naval Postgraduate School, September 2006.
Thesis Advisor(s): Robert Bach. "September 2006." Includes bibliographical references (p. 75-80). Also available in print.
21

Bude, Cristian, e Bergstrand Andreas Kervefors. "Internet of Things : Exploring and Securing a Future Concept". Thesis, KTH, Radio Systems Laboratory (RS Lab), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-169516.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Internet of Things (IoT) is a concept that encompasses various objects and methods of communication to exchange information. Today IoT is more a descriptive term of a vision that everything should be connected to the internet. IoT will be fundamental in the future because the concept opens up opportunities for new services and new innovations. All objects will be connected and able to communicate with each other, while they operate in unprotected environments. This later aspect leads to major security challenges. Today, IoT is in great need of standardization and clear architectures that describe how this technology should be implemented and how IoT devices interact with each other in a secure manner. The security challenges are rooted in the technology and how information is acquired and manipulated by this technology. This thesis provides an introduction to what the IoT is and how it can be used as well as some of the threats that IoT may face in regards to information security. In addition, the thesis provides the reader with some suggestions about how to potentially solve the fundamental need for authentication and secure communications. The solutions presented are based on both contemporary solutions and technologies that are under development for the future. Contemporary solutions are based on security protocols such as IPSec and DTLS. These protocols are being used in an environment that extends across the Internet and into a 6LoWPAN network. The proposed authentication solution has been developed based on a public key infrastructure and trust models for certificate management. As future work, the thesis presents several research areas where this thesis can be used as a basis. These specialization areas include further analysis of vulnerabilities and an implementation of the proposed solutions.
Internet of Things (IoT) är ett koncept som omfattar olika objekt och kommunikationsmetoder för utbyte av information. Idag är IoT mer en beskrivande term av den framtidsvision som finns att allting ska vara uppkopplat på internet. IoT kommer vara fundamentalt i framtiden eftersom konceptet öppnar upp möjligheter för nya tjänster samt nya innovationer. Då alla objekt ska vara uppkopplade och kunna kommunicera med varandra samtidigt som de skall kunna operera i oskyddade miljöer, bidrar detta till stora säkerhetsutmaningar. Dagens IoT är i stort behov av standardisering och klara strukturer för hur tekniken ska implementeras samt samverka med varandra på ett säkert sätt.  Utmaningarna ligger i att säkra tekniken samt informationen som tekinken bidrar med. Denna rapport ger en introduktion till vad IoT är och hur det kan användas samt vilka hot som IoT kan möta i avseende till informationssäkerhet. Utöver detta så förser rapporten läsaren med förslag om hur man eventuellt kan lösa de fundamentala behoven av autentisering och säker kommunikation. Lösningarna som läggs fram är baserade på både nutida lösningar och teknik som är under utveckling inför framtiden. Nutida lösningar är baserade på säkerhetsprotokoll som IPsec och DTLS som används i en miljö som sträcker över internet och in i ett 6LoWPAN nätverk. Den autentiseringslösning som tagits fram grundar sig på PKI och förtroendemodeller för certifikathantering. För framtida arbete presenteras flertalet vidare fördjupningsområden där denna rapport kan användas som grund. Dessa fördjupningsområden inkluderar vidare analys av sårbarheter och implementation av de lösningar som tagits fram.
22

Shipman-Sercu, Chris. "A False Sense of Security: The Social Security Debate". Scholarship @ Claremont, 2010. http://scholarship.claremont.edu/cmc_theses/65.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
My motivation to write this thesis is based on the controversy surrounding the Social Security system that has recently infiltrated the media. Through my research, I have discovered the debate concerning Social Security is not a recent development but has existed since the 1930’s. Many sources are warning citizens to no longer count on Social Security as they most likely will not receive benefits until a extremely old age if they receive benefits at all. Current retirees are fearful of either a decrease in benefits or not receiving the money they contributed to the system through the years of employment at all. Proposals and options for overhauling the system have moved to center stage in politicians’ agendas and numbers of solutions have surfaced. Unfortunately, this debate is creating a huge divide between party lines in Congress. Some argue for more government control while others advocate privatization. The goal for this thesis is to perform a cost/benefit analysis of the two ideologies and determine which is more practical and realistic for both the government and the people.
23

Le, Bras Jean-Baptiste. "The impact of the SSR (security sector reform) concept in shaping NATO and EU policy discourses". St. Gallen, 2008. http://www.biblio.unisg.ch/org/biblio/edoc.nsf/wwwDisplayIdentifier/06607949001/$FILE/06607949001.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
24

Hürsoy, Siret. "The new security concept and German-French approaches to the European "Pillar of Defence", 1990-2000 /". Marburg : Tectum, 2002. http://catalogue.bnf.fr/ark:/12148/cb41448411t.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
25

Holm, Linnea. "Nord Stream - Vägen till säkerhet?" Thesis, Linnaeus University, LNU, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5745.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

Big dangerous Russia, environmental thief or house warmer? The Nord Stream pipelines are a highly debated theme in Europe and the EU. A number of different countries will be subject to the pipelines direct or indirect. This paper aims to figure out what kind of threats and possibilities Denmark, Finland, Sweden and Germany consider to be the consequences with the pipelines.

The study takes as a standpoint the area of security studies and the widened of the same. The three standpoints within the security study that will be used are military security, environmental security and energy security. It is a comparative study that has been done with help of a text analysis.

The analysis concludes that Sweden is the country of the four that finds the most threats with the pipeline. Sweden thinks Nord Stream is a threat within all of the three securities mentioned above even though Sweden also see a possibility within energy security. Denmark, on the other hand, does not see a threat at all and Germany and Finland see a threat within the environmental area but not within the two other areas. They also see a possibility within the energy security.

26

Pries, Kari Mariska. "Contested concepts and practices in security governance : evolving security approaches in El Salvador". Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8070/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Hope accompanied El Salvador’s peace agreements, ending 12 years of civil war. New peace and democratic renewal were expected in the tiny Central American state. Instead, extreme violence has persisted as a lived experience for individuals and a part of its state operations. Successive governments proved unable to consolidate control over the post-war crime wave. ‘Tough on crime’ public policy agendas, which included hard-handed violence-repression tactics, had little success in mitigating insecurity. In 2009, a new ex-guerrilla party, the National Liberation Front ‘Farabundo Marti’ (FMLN), was elected on a hope and change platform. The party was committed to a new approach in security governance. This presented an opportunity to study the interactions of implicated actors as they negotiated the governance of security. It raises the question: To what extent did security governance change under the FMLN government during their first administration (2009-2014)? To address this question requires an understanding of situated security concepts and an examination of the spaces created for actor interactions to formulate the policy guiding security governance. Broadly, security is often considered to be a response to the issues threatening state, society, or the individual. In the Latin American context, this expansion largely took place within the concept of citizen security – a term which recognised both rights and responsibilities within the state. However, the term has also been responsible for problematising institutional weaknesses or failure where an apparent inability to control violence is observed, justifying the inclusion of a range of non-state security actors. Theories of hybridity or state transformation instead posit that the gaze should be directed on those spaces where security problems, once identified, are managed in practice (Hameiri & Jones, 2015). For this study, three ‘levels’ of security governance are addressed: the national government, the Central American regional diplomatic structure, and strategic municipal jurisdictions. Second, by providing this multi-levelled analysis, the study includes the regional level, which is often ignored in existing Central American security studies. This is crucial to an understanding of the multiple and often competing agendas organising and supporting security interventions within El Salvador in a regional context of transnational threats. Third, this investigation shows the operational changes required of government institutions when other actors are introduced as authoritative participants in the process. Despite multi-actor, multi-level security governance strategies working to mobilise new actors, security concepts, and operational frameworks to reduce and manage security issues, many practical governance efforts enjoy only limited term results. This thesis concludes that broad changes in security governance structures are likely to be continually mitigated by traditional forces, limiting the potential for true transformation of security policy approaches.
27

Uzelman, Alexandra. "The transformation of the concept of the Westphalian sovereignty within the EU Common Foreign and Security Policy". Master's thesis, Vysoká škola ekonomická v Praze, 2012. http://www.nusl.cz/ntk/nusl-164218.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The work overviews the formation process of the European integration after the end of the Cold war and also the evolution of the notion of 'the Westphalian sovereignty' in the framework of the maintenance of the EU CFSP. It is assumed that under the conditions of a political transformation of the category 'the Westphalian sovereignty' in the framework of the EU CFSP it is intensified and requires again as a special political and practical attention, as scientific elaboration in order to figure out the perspectives of the development of the EU as the whole. As the object of this work the category of 'the Westphalia sovereignty' and its evolution in the framework of the European integration processes are taken. The subject of the work is connected with the analysis of the phenomenon of the Westphalian sovereignty in the frames of building of common European defense and security policy of the EU. The main purpose of the work is closely entwined with the identification of significant peculiarities of the ongoing transformation of the CFSP and their influence on the category of 'the Westphalian sovereignty'.
28

Pretorius, William Richard. "The impact of the concept of decent work on the job security and the provisioning of educators". Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1021218.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Section 29(1) of the Constitution of the Republic of South Africa (the Constitution) guarantees the right to a basic education, including a basic adult education and further education. In realising this right, the State is obliged to provide financial and human resources in a manner that will transform society as a whole and deliver a better life for all citizens. The human resources in the main refer to educators. Education is one of key priorities of the present government to the extent that President Zuma has instructed that a presidential commission be established to look into the conditions of service of public servants and in particular that of educators. The International Labour Organisation (ILO) has proposed the Decent Work Country Programmes to help countries align their policies with the international goal of the achievement of Decent Work for all. South Africa has done a lot of work in this regard; however the main challenge remains with the implementation and acceptance of such policies by the major stakeholders especially the trade unions. This treatise investigates the impact of the Decent Work Agenda (DWA) on the job security and provisioning of educators in South Africa. It also explores the conditions of service of temporary educators and those educators who are teaching in the rural areas under extremely difficult conditions in comparison with their counterparts in urban areas. This treatise also examines the status of social dialogue in the education sector and the impact of same on collective bargaining. This treatise recommends that the utilisation of the services of temporary educators need to be regulated to address the continuous extension of temporary contracts that is impacting negatively on job security. It also suggests that urgent measures in the form of norms and standards be determined to improve the working conditions of educators who are teaching in rural areas under very difficult circumstances.
29

Unkenholz, Willard L. "Command and control security: concepts and practices". Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25741.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
30

Khodadadzadeh, Omid. "Strategiska försvarsaktörer : En studie av NATO och EU:s kompatibilitet i rollen som säkerhetspolitiska aktörer". Thesis, Karlstads universitet, Fakulteten för humaniora och samhällsvetenskap (from 2013), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-36305.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This essay conducts a descriptive analysis of the ideas expressed by NATO´s official security strategy "Strategic Concept" from 2010 and the European Union’s security strategy "A Secure Europe in a Better World" from 2003. The purpose of this analysis is to examine whether the ESDP and NATO are compatible with each other when it comes to the role of security policy actor. To do so, I´ve chosen to analyse the actors' security strategies based on three dimensions. These dimensions are: Their view of the international scene, their views on cooperation and their views on how to reach security. As sorting tools I´ve used two different ideal types, based on the theoretical perspectives of liberalism and realism. The results show that ESDP and NATO are compatible with each other as both ESDP and NATO´s security strategies are characterised by liberal values. However, there are a few traits of realism regarding NATO's treatment of international threats which can be seen to some extent as being in opposition to the ESDP´s practices regarding the treatment of threats.
Syftet med denna uppsats är att studera huruvida NATO och ESFP är kompatibla med varandra eller inte när det kommer till rollen som säkerhetspolitiskt aktör. Detta eftersom jag vill undersöka vad det finns för eventuell potential till politiska spänningar och intressekonflikter emellan dessa aktörer då de har en stor världsomfattande påverkan när det kommer till den globala säkerhetspolitiken. Den övergripande forskningsfrågan lyder:  Är den Europeiska säkerhets- och försvarspolitiken (ESFP) och NATO kompatibla med varandra när det kommer till rollen som internationell säkerhetspolitisk aktör? Mitt tillvägagångssätt för att svara på min övergripande forskningsfråga har varit att studera aktörernas säkerhetspolitiska policydokument. Detta har jag gjort genom att göra en idéanalys av aktörernas respektive försvarsdokument. I denna uppsats används idealtyper från de teoretiska perspektiven liberalism och realism för att på så sätt operationalisera och undersöka min övergripande forskningsfråga.  Uppsatsens slutsats visar att NATO och ESFP är kompatibla med varandra där båda aktörernas säkerhetsstrategier är präglade av liberala värderingar. Mycket lutar åt att samarbetet mellan aktörerna kan ses ett ömsesidigt beroende där respektive aktör kompletterar den andra. Dock finns det ett fåtal drag av realism kring NATO:s metoder för bemötandet av internationella hot där dessa i viss mån kan ses som stående till ESFP:s metoder kring samma bemötande.
31

EULANO, ANTHONY CONNOR. "DYSPROSIUM: A UNITED STATES SECURITY CONCERN". Thesis, The University of Arizona, 2016. http://hdl.handle.net/10150/612885.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This paper seeks to explore how United States dependency on foreign supplies of dysprosium affects its ability to produce and maintain current and future military defense systems. Dysprosium, one of the 17 rare earth metals, is necessary for the production of powerful permanent magnets. These magnets are used in high-tech weapon systems, such as Unmanned Aerial Vehicles. The problem is that the U.S. remains completely dependent on China for its dysprosium supply. This paper does not seek to answer the possibility or likelihood of China blocking the supply of dysprosium to the U.S. Instead, it will attempt to identify U.S. vulnerabilities to a foreign supply disruption. This report finds that remaining completely dependent on China for dysprosium and having no stockpile of dysprosium puts U.S. security at risk. There are virtually no current effective substitutes for dysprosium, and in the event of a sustained supply disruption, it would be very difficult for the U.S. military to produce and maintain current and future high-tech weapon systems during the first several years of the disruption. The potential for developing some alternative supplies of dysprosium–as well as developing electronic components that use less or no dysprosium–would increase over the longer-term.
32

Delo, Sarah. "The effects of the teacher-child relationship and caregiver attachment security on children's self-concept in middle childhood". Thesis, University of Southampton, 2016. https://eprints.soton.ac.uk/401545/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
A positive self-concept is associated with a number of outcomes including school adjustment, academic attainment and mental health. Literature suggests individual differences in self-concept derive from children’s relationships with significant others such as parents and teachers. A systematic review of the literature exploring the relationship between teacher-child relationships and children’s self-concept found some associations, however, this was not always consistently found. Furthermore, a number of methodological limitations in the studies were noted. Implications for future research were reported and included using multi-faceted measures of self-concept and teacher-child relationships, as well as controlling for the effect of other social relationships (e.g. parents). To address some of these limitations, this empirical paper examines whether teacher relationships (as characterised by closeness and conflict) are associated with children’s global, academic, behavioural and social self-concept, and whether teacher relationships may buffer children who are less securely attached to their caregivers against negative outcomes, such as low self-concept. 163 children (aged 7-11 years) and their class teachers participated. Questionnaires measured child reports of the teacher relationship, attachment security to their caregiver and self-concept as well as teacher reports of teacher relationship quality. Results found that although there was no evidence for a moderating effect of teacher relationships, attachment security was related to children’s global, academic, behavioural and social self-concept and positive teacher relationships further contributed to children’s behavioural and academic self-concept. Teacher relationships were found not to contribute to children’s global or social self-concept. Implications for future research and educational psychology practice are discussed.
33

Meyer, Patrik Kristof. "Governing Muslim minorities as security treats : the case of the Uyghurs and the concept of a new Chinese nation". Thesis, University of Cambridge, 2012. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.610840.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
34

Deshpande, Pranita. "Assessment Of Two Pedagogical Tools For Cybersecurity Education". ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2557.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Cybersecurity is an important strategic areas of computer science, and a difficult discipline to teach effectively. To enhance and provide effective teaching and meaningful learning, we develop and assess two pedagogical tools: Peer instruction, and Concept Maps. Peer instruction teaching methodology has shown promising results in core computer science courses by reducing failure rates and improving student retention in computer science major. Concept maps are well-known technique for improving student-learning experience in class. This thesis document presents the results of implementing and evaluating the peer instruction in a semester-long cybersecurity course, i.e., introduction to computer security. Development and evaluation of concept maps for two cybersecurity courses: SCADA security systems, and digital forensics. We assess the quality of the concept maps using two well-defined techniques: Waterloo rubric, and topological scoring. Results clearly shows that overall concept maps are of high-quality and there is significant improvement in student learning gain during group-discussion.
35

Hamark, Kindborg Johanna. "The patriarchy dressed in feminist clothes : A discourse analysis of the United Nations Security Council’s gendering of the concept Civilians". Thesis, Försvarshögskolan, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:fhs:diva-6150.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This thesis analyses key documents from the United Nations Security Council (the Council) meetings during the period of 1999 to 2001. This thesis maps out the shift in the discourses that occurred within the Council, when adopting United Nations Security Council’s resolution (UNSCR) 1325. Moreover, this thesis argues that the nodal point ‘Civilians’ has become gendered by being replaced by the concept of ‘Women’. This thesis argues that UNSC is misrepresenting female agency within the discourses, which has contributed to a gendering of the concept of civilians. Sexual violence, defined as a wartime weapon, has also been part of the construction of stereotypical gender binaries, which has constituted a representation of women as either victims or saviors within the discourses. It becomes evident that the notion of female agency as for example independent, empowered or strong has been neglected. The discourse theory provided by Ernesto Laclau and Chantal Mouffe is applied in order to map out the existing discourses within the Security Council meetings. The aim of this study is to acknowledge the importance of that women have been and still are being excluded from the ontology of war. Furthermore, when the role of women in war is described, it is in relation to constructed stereotypical gender binaries.
36

Chung, Kang. "Prototyping and evaluation of TCAPsec". Thesis, Karlstad University, Division for Information Technology, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-826.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

Today, the most frequently used signaling system for telecommunication is called Signaling System No. 7 (SS7). The growing usage of mobile telephones and mobile data communica-tion, and the development of new services mean that the risk of intrusion and exploitation of the SS7 signaling networks increases. The increasing problem with unauthorized access to sensitive information and the operators’ growing demand for security is the origin of our work. This thesis presents a prototype design and implementation of a Security Gateway (SEG), which is a fundamental part of the TCAP user security (TCAPsec) concept. TCAPsec is a security concept for introducing security mechanisms to the signaling system. The proto-type includes three different protection modes that provide security services, ranging from almost no protection to full protection with the use of encryption algorithms. The thesis also contains an evaluation study of the delay penalties caused by the use of these security services. With regards to the restrictions on the prototype, the conclusion drawn from the evaluation results was that the protection mechanisms in the different protection modes did not inflict any significant time penalties. Instead, the results of the study indicate that the routing process of messages in the network is a more significant delaying part in the communication between different nodes. This result implies that the routing process takes longer time than the security services. The thesis also presents a number of discovered features that will require further investigation and development before the TCAPsec concept can be realized.

37

Dewar, Robert Scott. "Cyber security in the European Union : an historical institutionalist analysis of a 21st century security concern". Thesis, University of Glasgow, 2017. http://theses.gla.ac.uk/8188/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This thesis uses cyber security, an important topic in today's world, as a vector for analysis in order to contribute to a better understanding of the European Union (EU)’s policy-making processes. Although EU policy has received extensive scholarly attention, cyber security policy is under-researched, a gap in current literature this thesis addresses. The goal of the thesis is to understand why the Union adopted and maintained a socio-economic approach to cyber security when other actors added military and defence considerations. The thesis employs an historical institutionalist (HI) framework to examine the long-term institutional and ideational influences underpinning policy development in this area between 1985 and 2013. This was achieved using a longitudinal narrative inquiry employing an original, conceptual content analysis technique developed to gather data from both relevant EU acquis communautaire and over 30 interviews. There were three main findings resulting from this analysis, two empirical and one theoretical. The first empirical finding was that the EU’s competences established an institutional framework – a set of rules and procedures – for policy development in this sector. By restricting the EU’s capacity to engage in military or national security-oriented issues, its competences required it to respond to emerging security matters from a socio-economic perspective. The second empirical finding was that there exists a specific discourse underpinning EU cyber security policy. That discourse is predicated upon a set of five ideational elements which influenced policy continuously between 1985 and 2013. These five elements are: maximising the economic benefits of cyberspace; protecting fundamental rights; tackling cyber-crime; promoting trust in digital systems and achieving these goals through facilitating actor co-operation. Throughout the thesis the argument is made that the EU adopted and maintained its socio-economic policy as a result of an interaction between this ideational discourse and the institutional framework provided by competences. This interaction created a linear, but not deterministic path of policy development from which the EU did not deviate. The third, theoretical, finding relates to the HI mechanisms of path dependency and punctuated equilibrium. The EU’s policy discourse was exposed to major stresses after 2007 which, according to punctuated equilibrium, should have caused policy change. Instead, those stresses entrenched the Union’s discourse. This demonstrates an explanatory flexibility not normally associated with punctuated equilibrium. The findings of the thesis have implications for policy practitioners by providing a way to identify underlying ideational dynamics in policy development. Due to a combination of empirical and conceptual findings, the thesis provides a potential basis for future research in EU policy development and HI analyses.
38

Ziegler, Thomas. "The long war concept using the security cooperation Marine Air Ground Task Force to address irregular threats through shaping and deterrence /". Quantico, VA : Marine Corps Command and Staff College, 2008. http://handle.dtic.mil/100.2/ADA490846.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
39

Gabbert, Silke, e Hans-Peter Weikard. "Food deficits, food security and food aid : concepts and measurement". Universität Potsdam, 1998. http://opus.kobv.de/ubp/volltexte/2006/858/.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The concepts of food deficit, hunger, undernourishment and food security are discussed.
Axioms and indices for the assessment of nutrition of individuals and groups are suggested.
Furthermore a measure for food aid donor performance is developed and applied to a sample of bilateral and multilateral donors providing food aid for African countries.
40

Dötzer, Florian. "Security concepts for robust and highly mobile ad-hoc networks". kostenfrei, 2008. http://mediatum2.ub.tum.de/doc/627707/627707.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
41

Палагнюк, Д. М., Д. С. Тищук e О. В. Березюк. "Принципи забезпечення інформаційної безпеки". Thesis, ВНТУ, 2018. http://ir.lib.vntu.edu.ua//handle/123456789/24491.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
In the article the problem of information security as one of the most important in today's information society. The essence of the concept of information security, the basic principles of software.
Представлено завдання забезпечення інформаційної безпеки, як одного із головних в сучасному інформаційному суспільстві. Розкрито сутність поняття інформаційної безпеки, основні принципи її забезпечення.
42

Tallgren, Eva. "The Concept of'European Citizenship': National Experiences and Post-National Expectations?" Thesis, Linköping University, Department of Management and Economics, 2003. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2004.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:

The aim of this thesis is to interpret and understand the concept of citizenship in general, and the European citizenship in particular, placed within a broad theoretical framework. Furthermore, the purpose is to examine whether the development of a European citizenship indicates an emergence of a new ‘post-national’ model of citizenship, based on residence rather than nationality or place of birth. In order to address this, the status of third- country nationals (TCN’s), who are legally long-term residents within the Union, in relation to EU citizens has been analysed from the theoretical perspectives.

Different models of citizenship provide the paper with a theoretical framework, through which the empirical data has been examined. The theoretical approaches dealt with in this paper are the liberal, the republican/communitarian and the ‘post-national’ models of citizenship respectively. Fundamental ‘key concepts’ have been derived from these different models of citizenship, which have facilitated the analysis by providing the interpretation of the EU citizenship with an analytical framework.

To find answers to the initial research questions and fulfil the aim of the paper, a qualitative and hermeneutic study has been carried out, aiming at interpreting and understanding the European citizenship placed within its socio-political context. Text and language constitute the units of analysis and, hence, a textual analysis has been conducted of official EU documents. Following a conceptual history approach, concepts are not just reflections of historical processes, but can themselves contribute to historical change by making new things imaginable. As emphasised throughout the paper, concepts embrace at the same time a ‘space of experience’ and a ‘horizon of expectation’.

The main conclusions drawn from the research can be summarised in a number of points. First, while the concept of European citizenship was originally connected to a formal and economic view upon citizenship, close to a liberal/neo-liberal notion of citizenship, the texts express an aim of a more active citizenship, emphasised in the republican/communitarian tradition. Secondly, despite a multicultural and post-national rhetoric concerning the status of long-term resident TCN’s, the gaining of ‘full’ EU citizenship can still only be attained through nationality in a Member State. Thirdly, the importance of interpreting a concept placed within its socio-political context has been clear from the study. The semantic analysis has showed a close link between the European citizenship andthe goal to create an ‘area of freedom, security and justice’ throughout the Union. This goal is interpreted as a response to recent occurrences in the world, but at the same time it expresses expectations about the EU citizenship, and it can thus itself affect future developments in this field.

To sum up, while the concept of European citizenship is post-national to the extent that it applies to all EU citizens irrespective of where in the Union they live, it is still not completely based on the principle of residence. Only nationals of an EU Member State can obtain citizenship of the Union. Thus, the concept of European citizenship, while establishing a citizenship across national borders, is still based on nationality.

43

Mun, Byeongcheol. "The North Korean nuclear crisis and the Six Party Talks : organising international security : hegemony, concert of powers, and collective security". Thesis, University of Newcastle Upon Tyne, 2010. http://hdl.handle.net/10443/762.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
The end of the Cold war has brought with it the emergence of the new international security environment. State actors can no longer calculate their national interests as they did it before. Thus, it seems sensible to explore the question of how security is being organised in the post-Cold War era. In addition to a significant change in the structure of the international system, a new security concern has emerged. That is, as a result of the termination of two superpowers rivalry between the US and the former USSR, there has been an important change in global nuclear proliferation arena. For example, nuclear proliferation challenge which comes from „suspect states‟ such as Libya and North Korea has become a key issue in relation to nuclear proliferation. The North Korean nuclear crisis has gone through very different historical phases between 2001 and 2008. The first phase of the North Korean nuclear crisis saw the bilateral confrontation between the US and North Korea. The second phase demonstrated the multilateralisation of the North Korean nuclear issue through China‟s proactive engagement in the nuclear issue. The third phase could be distinguished by the United Nations‟ involvement in dealing with the North Korean case. Each phase of the North Korean nuclear crisis has revealed its unique characteristics regarding the notion of international security. Each phase has seen the operation of different security models: the first phase can be interpreted from the perspective of a hegemonic power structure; the second phase might be understood as the operation of a concert of powers; the third phase can be relevant to the notion of collective security. To sum up, the North Korean case can be regarded as a good example which describes how security is being organised in the post-Cold War era. In conclusion, it seems difficult to consider that security in the post Cold War era can be organised through a single way. Rather, it seems reasonable to take into account the mixture of divergent security models when managing security issues in the post-Cold War era.
44

McGovern, Mark, Jeffrey D. Mayor e Joseph Symmes. "An operational utility assessment [electronic resource]: measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS)". Monterey California. Naval Postgraduate School, 2008. http://hdl.handle.net/10945/10312.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
MBA Professional Report
Planning modern military operations requires an accurate intelligence assessment of potential threats, combined with a detailed assessment of the physical theater of operations. This information can then be combined with equipment and manpower resources to set up a logistically supportable operation that mitigates as much of the enemy threat as possible. Given such a daunting challenge, military planners often turn to intelligent software agents to support their efforts. The success of the mission often hinges on the accuracy of these plans and the integrity of the security umbrella provided. The purpose of this project is to provide a comprehensive assessment of the Joint Forces Protection Advanced Security System (JFPASS) Joint Concept Technology Demonstration (JCTD) to better meet forceprotection needs. It will also address the adaptability of this technology to an ever-changing enemy threat by the use of intelligent software. This project will collect and analyze data pertaining to the research, development, testing, and effectiveness of the JFPASS and develop an operational effectiveness model to quantify overall system performance.
45

McGovern, Mark Symmes Joseph Mayor Jeffrey. "An operational utility assessment [electronic resource] : measuring the effectiveness of the Joint Concept Technology Demonstration (JCTD), Joint Forces Protection Advance Security System (JFPASS) /". Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/MBAPR/2008/Dec/08Dec%5FMcGovern%5FMBA.pdf.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
"Submitted in partial fulfillment of the requirements for the degree of Master of Business Administration from the Naval Postgraduate School, December 2008."
Advisor(s): Nussbaum, Daniel ; Franck, Raymond. "December 2008." "MBA professional report"--Cover. Description based on title screen as viewed on January 28, 2009. Includes bibliographical references (p. 81-86). Also available in print.
46

Lefeez, Sophie. "An examination of the validity of the concept of nuclear deterrence within the framework of post-cold war international relations : an analytical conflict resolution approach". Thesis, Nelson Mandela Metropolitan University, 2007. http://hdl.handle.net/10948/827.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Nuclear deterrence is born from the two superpowers’ relations during the Cold War as they were the first countries to get nuclear weapons and they were the main and most powerful rivals in the world. Then new actors joined the game by testing their own nuclear bombs: the UK in 1952, followed by France in 1960, China in 1964, India in 1974, and Pakistan in 1998. Israel pretends it does not have any nuclear weapons but it is an open secret that they do 1. France helped Israel to get its weapons and the nuclear explosion in 1979 off the southern coast of Africa probably involved Israel and South Africa (sourced by the Federation of American Scientists, the Wisconsin Project on Arms Control, the Center for Defense Information, etc.). This was confirmed by Mordechai Vanunu, former Israeli scientist who worked on developing the bomb. The intrusion of new nuclear countries frightened the United States and the USSR because the balance was already fragile and newcomers could break it. Would the game remain "safe" with more players? Therefore in 1968 both countries drafted a treaty to prevent nuclear proliferation. The Non-Proliferation Treaty (NPT) came into force in 1970, at a time when five countries had successfully achieved a nuclear explosion. The NPT officially recognises only these five countries as nuclear-weapons states. They happen to be also the five permanent member states of the UN Security Council. India and Pakistan carried out a nuclear test after 1968 and are therefore referred to as non-official nuclearweapons states. The new nuclear states adopted and adapted the nuclear doctrine to their needs, their geopolitical interests and their place in international relations.
47

Blake, Gatto Sharon Elizabeth. "MAnanA: A Generalized Heuristic Scoring Approach for Concept Map Analysis as Applied to Cybersecurity Education". ScholarWorks@UNO, 2018. https://scholarworks.uno.edu/td/2526.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Concept Maps (CMs) are considered a well-known pedagogy technique in creating curriculum, educating, teaching, and learning. Determining comprehension of concepts result from comparisons of candidate CMs against a master CM, and evaluate "goodness". Past techniques for comparing CMs have revolved around the creation of a subjective rubric. We propose a novel CM scoring scheme called MAnanA based on a Fuzzy Similarity Scaling (FSS) score to vastly remove the subjectivity of the rubrics in the process of grading a CM. We evaluate our framework against a predefined rubric and test it with CM data collected from the Introduction to Computer Security course at the University of New Orleans (UNO), and found that the scores obtained via MAnanA captured the trend that we observed from the rubric via peak matching. Based on our evaluation, we believe that our framework can be used to objectify CM analysis.
48

Anderson, Jamie. "The Looming Threat of an Avian Flu Pandemic: Concepts of Human Security". Thesis, Boston College, 2006. http://hdl.handle.net/2345/374.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Thesis advisor: Paul Gray
As birds throughout Asia, Europe, and Africa have been infected with an avian influenza, public health experts everywhere are worried that if spread to humans, the world could face a pandemic with proportions similar to the 1918 Spanish influenza. In the past, the federal government has been more concerned with foreign militaries than foreign diseases. But today, the government has devoted over $7.1 billion to preventing a potential pandemic. While much of this goes to research and the production of vaccinations, money is also allocated to strengthen local infrastructures and control the disease in other countries. The fact that the federal government has put so much time and effort to prevent a disease that has affected few humans worldwide, let alone any Americans, points to a growing belief in human security rather than national security. This thesis will evaluate the concept of human security and argue that U.S. action and public opinion regarding the threat of an avian flu pandemic clearly shows decision-making based on human security
Thesis (BA) — Boston College, 2006
Submitted to: Boston College. College of Arts and Sciences
Discipline: International Studies
Discipline: College Honors Program
49

Vaughn, Reginald Wayne. "Computer security concepts and issues in the Information Technology Management (370) Curriculum". Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23841.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
Approved for public release; distribution is unlimited
DoD has become increasingly dependent upon storing its sensitive information in electronic form and has a deep concern for the integrity and privacy of this valuable information. In the recent aftermath of numerous electronic break-ins, the DoD continues to express anxiety over technically weak system administrators' inability to protect sensitive electronic information. The solution to minimizing these electronic intrusions and bolstering computer security in DoD is to educate military officers and federal civilians in the methods of computer security. This can be accomplished by integrating concepts and problem solving techniques related to computer security into the Information Technology Management (370) Curriculum at the Naval Postgraduate School.
50

Troják, Pavel. "Přístupové a zabezpečovací systémy v automatizaci budov". Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2009. http://www.nusl.cz/ntk/nusl-228599.

Texto completo da fonte
Estilos ABNT, Harvard, Vancouver, APA, etc.
Resumo:
This thesis deals with automation of buildings, provides the possibility of automation in today's intelligent buildings. The issue of building automation for security and access systems is solved in details. This thesis contains the basic rules of the systems and procedure in the implementation of access and security systems. The target of this thesis is the proposal of the access and security system for buildings. Part of the thesis is also creating a model, on which will be presented the access and security system. This model will be used by the company ELMONT GROUP as a basis for dealing with contracts.

Vá para a bibliografia