You searched for subject:(Human security)
.
Showing records 1 – 30 of
560 total matches.
◁ [1] [2] [3] [4] [5] … [19] ▶

University of Ghana
1.
Otoo, C.K.
Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
Degree: 2016, University of Ghana
URL: http://ugspace.ug.edu.gh/handle/123456789/27439
► In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex…
(more)
▼ In today’s world, cyberspace and cyberpower have become crucial elements of international security. This brings cyber-threats and the measures to counter them to the apex of the modern security dialogue. In the post-Snowden era, national approaches to cybersecurity seem to be sparking a ‘digital arms race’ rather than fostering more security. Hence, cyberspace presents a dilemma of epic proportions, which challenges the traditional notions of state-centric security within the arena of international relations. The reason for this is the supranational architecture of cyberspace, which makes it difficult for states to unilaterally securitize existing and emergent cyber-threats. This study interrogates the cybersecurity dilemma and explores the utility of the application of the human security concept to cyberspace. The research shows that current national security approaches to the cybersecurity dilemma are inadequate in addressing the technical, political and social challenges predominant in cyberspace. The study concludes that a balance of the national security and human security approaches may provide states with a strong framework for addressing 21st century cyber challenges.
Subjects/Keywords: Cybersecurity;
National Security;
Human Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Otoo, C. K. (2016). Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
(Masters Thesis). University of Ghana. Retrieved from http://ugspace.ug.edu.gh/handle/123456789/27439
Chicago Manual of Style (16th Edition):
Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
” 2016. Masters Thesis, University of Ghana. Accessed March 01, 2021.
http://ugspace.ug.edu.gh/handle/123456789/27439.
MLA Handbook (7th Edition):
Otoo, C K. “Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
” 2016. Web. 01 Mar 2021.
Vancouver:
Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
[Internet] [Masters thesis]. University of Ghana; 2016. [cited 2021 Mar 01].
Available from: http://ugspace.ug.edu.gh/handle/123456789/27439.
Council of Science Editors:
Otoo CK. Breaking the Cybersecurity Dilemma; Balancing National Security and Human Security in Cyberspace.
[Masters Thesis]. University of Ghana; 2016. Available from: http://ugspace.ug.edu.gh/handle/123456789/27439

University of Pretoria
2.
Nzibo, Rukia Y.A.
External
Threats to Human Security in Kenya with Reference to the Conflict
in Somalia.
Degree: Political Sciences, 2016, University of Pretoria
URL: http://hdl.handle.net/2263/51283
► The study deals with the external threats to human security in Kenya with reference to the conflict in Somalia. The central question of the study…
(more)
▼ The study deals with the external threats to
human
security in Kenya with reference to the conflict in Somalia. The
central question of the study is whether the Kenyan government’s
conceptualization and response to the
human security challenges
resulting from the conflict in Somalia is resolving the
human
security challenges in Kenya. At a theoretical level the research
explores the concept of
human security and how it is conceptualized
in Kenya. At a practical level the paper assesses the conflict in
Somalia, the
human security challenges that have resulted in Kenya
due to the conflict in Somalia and the government’s
conceptualization of and response to the threats.
The main
finding of the study reflected that Kenya’s response to the
conflict in Somalia and the
human security threats emanating from
the conflict were dependent on the
security interests of the state
and determined by the intensity of threats emanating from Somalia
at different times. While some positive outcomes were realised, the
state’s aggressive approach towards the conflict in Somalia,
through military intervention and counter terrorism efforts,
outweighed the good. The failure to also adequately implement
policies and manage refugee affairs created
human insecurity in the
rural areas that affected the access to basic needs, while the
urban areas were plagued with issues of ethnic profiling,
human
rights violations and the marginalisation of the Kenyan Muslim
community. While state
security was prioritised, the core of
Kenya’s main strategies created more
human insecurity rather than
offering solutions towards acquiring
human security.
Advisors/Committee Members: Africa, Sandy (advisor).
Subjects/Keywords: Human
Security; UCTD
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Nzibo, R. Y. A. (2016). External
Threats to Human Security in Kenya with Reference to the Conflict
in Somalia. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/51283
Chicago Manual of Style (16th Edition):
Nzibo, Rukia Y A. “External
Threats to Human Security in Kenya with Reference to the Conflict
in Somalia.” 2016. Masters Thesis, University of Pretoria. Accessed March 01, 2021.
http://hdl.handle.net/2263/51283.
MLA Handbook (7th Edition):
Nzibo, Rukia Y A. “External
Threats to Human Security in Kenya with Reference to the Conflict
in Somalia.” 2016. Web. 01 Mar 2021.
Vancouver:
Nzibo RYA. External
Threats to Human Security in Kenya with Reference to the Conflict
in Somalia. [Internet] [Masters thesis]. University of Pretoria; 2016. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/2263/51283.
Council of Science Editors:
Nzibo RYA. External
Threats to Human Security in Kenya with Reference to the Conflict
in Somalia. [Masters Thesis]. University of Pretoria; 2016. Available from: http://hdl.handle.net/2263/51283

Victoria University of Wellington
3.
Lynch, Matthew Ian.
The Utility of Critical and Human Security Approaches and Perspectives in Contemporary Settings.
Degree: 2012, Victoria University of Wellington
URL: http://hdl.handle.net/10063/2484
► This thesis seeks to demonstrate that Critical and Human Security approaches and perspectives – under conditions associated with the ‘globalisation of security’ and the ‘bifurcation…
(more)
▼ This thesis seeks to demonstrate that Critical and
Human Security approaches and perspectives – under conditions associated with the ‘globalisation of security’ and the ‘bifurcation of the
security environment’ – should be increasingly influential in shaping New Zealand’s contemporary approach to
Security.
‘Security’ exists as a fundamental and legitimate quest for all Humankind. It is accepted as a core organising principle within societies, states and the international system, with efforts to preserve
security central to the
human condition. Critically though – within contemporary settings – the idea and concept of
security is increasingly proving to be so weakly developed as to be inadequate for task. In the 21st Century, insecurity not only remains, but is intensifying globally. It is becoming one of the primary development challenges of our time, while today, one-and-a-half billion people continue to live in areas affected by social fragility, unrelenting competition, conflict and violence. The persistence of such alarming degrees of insecurity is partially symptomatic, and a consequence of the continuing prevalence of traditional state-centric notions of
security. Such approaches are coming to be recognised for their increasingly narrow and reductionist focus on statist calculations of power; and notions of survival, sovereignty, threat and conflict. Crucially, they are proving ill-suited or inadequate to understanding, explaining and coping with the challenges of today’s transforming
security environment.
As a consequence, an increasing number of
security of
security scholars and practitioners are speaking to the emergence of a transformative evolution in contemporary
security and insecurity. Such an evolution is founded upon a critical recognition that many of today’s
security challenges are a consequence of the ‘globalisation of security’ and ‘bifurcation of the
security environment.’ Under the conditions of globalisation and bifurcation, the resilience and utility of prevailing
security ideas, institutions and practices can no longer be assumed. Indeed, many of the emerging challenges to
security are the result of forces outside the traditional framework of strategic analysis that have little to do with the exercise of power by competing nation-states, but everything to do with the stability of states and
human survival.
While traditional state-centric
security discourses continue to maintain measures of relevance, such orthodoxies – while necessary – are a not wholly complete, adequate or sufficient means by which to understand and respond to today’s complex and interdependent
security challenges. As this Thesis will demonstrate, profound changes in today’s
security environment and agenda, and the corresponding need for effective responses to such, is prompting the re-consideration of
security concepts and policies adopted in the past, while also providing a window of opportunity for the development of fresh approaches and concepts. In this respect, I will advance the position that Critical approaches and…
Advisors/Committee Members: Ayson, Robert.
Subjects/Keywords: Critical; Security; Human
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Lynch, M. I. (2012). The Utility of Critical and Human Security Approaches and Perspectives in Contemporary Settings. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/2484
Chicago Manual of Style (16th Edition):
Lynch, Matthew Ian. “The Utility of Critical and Human Security Approaches and Perspectives in Contemporary Settings.” 2012. Masters Thesis, Victoria University of Wellington. Accessed March 01, 2021.
http://hdl.handle.net/10063/2484.
MLA Handbook (7th Edition):
Lynch, Matthew Ian. “The Utility of Critical and Human Security Approaches and Perspectives in Contemporary Settings.” 2012. Web. 01 Mar 2021.
Vancouver:
Lynch MI. The Utility of Critical and Human Security Approaches and Perspectives in Contemporary Settings. [Internet] [Masters thesis]. Victoria University of Wellington; 2012. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10063/2484.
Council of Science Editors:
Lynch MI. The Utility of Critical and Human Security Approaches and Perspectives in Contemporary Settings. [Masters Thesis]. Victoria University of Wellington; 2012. Available from: http://hdl.handle.net/10063/2484

Royal Roads University
4.
Farquharson, Jennifer Ashley.
Implementation of United Nations Security Council Resolution 1325 in Cambodia
.
Degree: 2017, Royal Roads University
URL: http://hdl.handle.net/10613/4888
► United Nations Security Council Resolution 1325 (UNSCR 1325) was created in 2000 for the purpose of promoting women’s equal and meaningful participation throughout peace and…
(more)
▼ United Nations Security Council Resolution 1325 (UNSCR 1325) was created in 2000 for the purpose of promoting women’s equal and meaningful participation throughout peace and security processes. This research examined how and where UNSCR 1325 has been implemented in Cambodia, a post-conflict state, and what the impact has been on gendered peace and security processes. In examining successful implementation of the resolution, key tenets of “prevention, protection, participation and peacebuilding and recovery” were examined (Coomaraswamy, 2015, p. 13). Central throughout this research are human security and gendered peace and security frameworks. From participant interviews and document analysis, this thesis concluded that although UNSCR 1325 has begun to be implemented by civil society, international organizations and government bodies, there remains opportunity for further implementation. This thesis adds to the growing body of knowledge on how UNSCR 1325 has been implemented around the world.
Subjects/Keywords: human security;
UNSCR 1325;
women;
peace;
security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Farquharson, J. A. (2017). Implementation of United Nations Security Council Resolution 1325 in Cambodia
. (Thesis). Royal Roads University. Retrieved from http://hdl.handle.net/10613/4888
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Farquharson, Jennifer Ashley. “Implementation of United Nations Security Council Resolution 1325 in Cambodia
.” 2017. Thesis, Royal Roads University. Accessed March 01, 2021.
http://hdl.handle.net/10613/4888.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Farquharson, Jennifer Ashley. “Implementation of United Nations Security Council Resolution 1325 in Cambodia
.” 2017. Web. 01 Mar 2021.
Vancouver:
Farquharson JA. Implementation of United Nations Security Council Resolution 1325 in Cambodia
. [Internet] [Thesis]. Royal Roads University; 2017. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10613/4888.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Farquharson JA. Implementation of United Nations Security Council Resolution 1325 in Cambodia
. [Thesis]. Royal Roads University; 2017. Available from: http://hdl.handle.net/10613/4888
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of New South Wales
5.
Goldblatt, Beth.
Developing the right to social security from a gender perspective.
Degree: Law, 2015, University of New South Wales
URL: http://handle.unsw.edu.au/1959.4/54207
;
https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13429/SOURCE02?view=true
► This thesis develops the right to social security in international human rights law from a gender perspective. The right to social security is of increasing…
(more)
▼ This thesis develops the right to social
security in international
human rights law from a gender perspective. The right to social
security is of increasing importance in framing efforts to address poverty. Since, throughout the world, poverty is deeply gendered, it is important to ensure that the right to social
security is interpreted from a gender perspective with the achievement of gender equality as a central objective. The gender perspective developed in this thesis draws on feminist theory to reinterpret ideas of ‘work’ within the definition of the right to social
security. It recognises the diversity of women and the need to address intersectional discrimination. It uses a substantive equality approach to propose a set of principles for a substantively equal, gendered right to social
security. The thesis applies this conceptual framework and set of principles to an analysis of international law looking specifically at the work of four United Nations’ bodies: the Committee on the Elimination of Discrimination against Women; the Committee on Economic, Social and Cultural Rights, the International Labour Organisation and the Special Rapporteur on extreme poverty and
human rights. The framework and principles are also applied to an analysis of three country studies (South Africa, Australia and India). Specific aspects of the social
security systems of each country are selected for examination within the country studies to undertake a deeper evaluation in terms of the framework and principles. The thesis concludes that the framework and principles could be used effectively within international law to ensure that a gender perspective is built into the interpretation of the right to social
security. The thesis finds that in each country studied, there could be improvements to the social
security programmes to advance the rights of women and to promote gender equality. The approach to the right to social
security developed in the thesis can assist in reshaping the way the right is understood and applied to advance gender equality and address gendered poverty.
Advisors/Committee Members: Byrnes, Andrew, Law, Faculty of Law, UNSW, Forster, Christine, Law, Faculty of Law, UNSW.
Subjects/Keywords: Human rights; Social security; Gender
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Goldblatt, B. (2015). Developing the right to social security from a gender perspective. (Doctoral Dissertation). University of New South Wales. Retrieved from http://handle.unsw.edu.au/1959.4/54207 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13429/SOURCE02?view=true
Chicago Manual of Style (16th Edition):
Goldblatt, Beth. “Developing the right to social security from a gender perspective.” 2015. Doctoral Dissertation, University of New South Wales. Accessed March 01, 2021.
http://handle.unsw.edu.au/1959.4/54207 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13429/SOURCE02?view=true.
MLA Handbook (7th Edition):
Goldblatt, Beth. “Developing the right to social security from a gender perspective.” 2015. Web. 01 Mar 2021.
Vancouver:
Goldblatt B. Developing the right to social security from a gender perspective. [Internet] [Doctoral dissertation]. University of New South Wales; 2015. [cited 2021 Mar 01].
Available from: http://handle.unsw.edu.au/1959.4/54207 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13429/SOURCE02?view=true.
Council of Science Editors:
Goldblatt B. Developing the right to social security from a gender perspective. [Doctoral Dissertation]. University of New South Wales; 2015. Available from: http://handle.unsw.edu.au/1959.4/54207 ; https://unsworks.unsw.edu.au/fapi/datastream/unsworks:13429/SOURCE02?view=true

University of Aberdeen
6.
Dowsett, Andrew James.
Methods for improving unfamiliar face matching.
Degree: PhD, 2015, University of Aberdeen
URL: https://abdn.alma.exlibrisgroup.com/view/delivery/44ABE_INST/12152806870005941
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.678791
► Matching unfamiliar faces is known to be a very difficult task. Yet, despite this, we frequently rely on this method to verify people's identity in…
(more)
▼ Matching unfamiliar faces is known to be a very difficult task. Yet, despite this, we frequently rely on this method to verify people's identity in high security situations, such as at the airport. Because of such security implications, recent research has focussed on investigating methods to improve our ability to match unfamiliar faces. This has involved methods for improving the document itself, such that photographic-ID presents a better representation of an individual, or training matchers to be better at the task. However, to date, no method has demonstrated significant improvements that would allow the technique to be put into practice in the real world. The experiments in this thesis therefore further explore methods to improve unfamiliar face matching. In the first two chapters both variability and feedback are examined to determine if these previously used techniques do produce reliable improvements. Results show that variability is only of use when training to learn a specific identity, and feedback only leads to improvements when the task is difficult. In the final chapter, collaboration is explored as a new method for improving unfamiliar face matching in general. Asking two people to perform the task together did produce consistent accuracy improvements, and importantly, also demonstrated individual training benefits. Overall, the results further demonstrate that unfamiliar face matching is difficult, and although finding methods to improve this is not straightforward, collaboration does appear to be successful and worth exploring further. The findings are discussed in relation to previous attempts at improving unfamiliar face matching, and the effect these may have on real world applications.
Subjects/Keywords: 150; Face perception; Human security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dowsett, A. J. (2015). Methods for improving unfamiliar face matching. (Doctoral Dissertation). University of Aberdeen. Retrieved from https://abdn.alma.exlibrisgroup.com/view/delivery/44ABE_INST/12152806870005941 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.678791
Chicago Manual of Style (16th Edition):
Dowsett, Andrew James. “Methods for improving unfamiliar face matching.” 2015. Doctoral Dissertation, University of Aberdeen. Accessed March 01, 2021.
https://abdn.alma.exlibrisgroup.com/view/delivery/44ABE_INST/12152806870005941 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.678791.
MLA Handbook (7th Edition):
Dowsett, Andrew James. “Methods for improving unfamiliar face matching.” 2015. Web. 01 Mar 2021.
Vancouver:
Dowsett AJ. Methods for improving unfamiliar face matching. [Internet] [Doctoral dissertation]. University of Aberdeen; 2015. [cited 2021 Mar 01].
Available from: https://abdn.alma.exlibrisgroup.com/view/delivery/44ABE_INST/12152806870005941 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.678791.
Council of Science Editors:
Dowsett AJ. Methods for improving unfamiliar face matching. [Doctoral Dissertation]. University of Aberdeen; 2015. Available from: https://abdn.alma.exlibrisgroup.com/view/delivery/44ABE_INST/12152806870005941 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.678791

University of Oxford
7.
Chen, Bangdao.
Using human interactive security protocols to secure payments.
Degree: PhD, 2012, University of Oxford
URL: http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053
► We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our research by conducting extensive investigations into the payment industry. After interacting…
(more)
▼ We investigate using Human Interactive Security Protocols (HISPs) to secure payments. We start our research by conducting extensive investigations into the payment industry. After interacting with different payment companies and banks, we present two case studies: online payment and mobile payment. We show how to adapt HISPs for payments by establishing the reverse authentication method. In order to properly and thoroughly evaluate different payment examples, we establish two attack models which cover the most commonly seen attacks against payments. We then present our own payment solutions which aim at solving the most urgent security threats revealed in our case studies. Demonstration implementations are also made to show our advantages. In the end we show how to extend the use of HISPs into other domains.
Subjects/Keywords: 005.82; Computing; Computer security; payment; security; human interactive security protocol
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Chen, B. (2012). Using human interactive security protocols to secure payments. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053
Chicago Manual of Style (16th Edition):
Chen, Bangdao. “Using human interactive security protocols to secure payments.” 2012. Doctoral Dissertation, University of Oxford. Accessed March 01, 2021.
http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053.
MLA Handbook (7th Edition):
Chen, Bangdao. “Using human interactive security protocols to secure payments.” 2012. Web. 01 Mar 2021.
Vancouver:
Chen B. Using human interactive security protocols to secure payments. [Internet] [Doctoral dissertation]. University of Oxford; 2012. [cited 2021 Mar 01].
Available from: http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053.
Council of Science Editors:
Chen B. Using human interactive security protocols to secure payments. [Doctoral Dissertation]. University of Oxford; 2012. Available from: http://ora.ox.ac.uk/objects/uuid:f73a0165-410f-4a69-a56c-b6f004253ba3 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.581053

University of St. Andrews
8.
Dario, Diogo M.
Human security policies in the Colombian conflict during the Uribe government
.
Degree: 2013, University of St. Andrews
URL: http://hdl.handle.net/10023/4516
► The aim of this dissertation is to analyse the use of narratives informed by the discourse of human security in the context of the Colombian…
(more)
▼ The aim of this dissertation is to analyse the use of narratives informed by the discourse of
human security in the context of the Colombian conflict during the government of President Alvaro Uribe Velez (2002-2010). Its main contribution is to map the transformation of these narratives from the site of their formulation in the international institutions to the site of their appropriation into domestic settings; and then consider their role in the formation of the actors' strategies and the construction of the subjectivities of the individuals affected by the conflict dynamics. The research proceeds to this analysis through an investigation of the policies for the internally displaced and those relating to the rights of the victims informed by the framework of transitional justice. It shows that, with a combination of narratives of empowerment and reconciliation, they fulfill complementary roles in the construction of the subjectivities of individuals affected by the conflict in Colombia. The dissertation also concludes that the flexibility of the
human security discourse allowed the Uribe government to reinforce its position
Advisors/Committee Members: Fierke, K. M. (Karin M.) (advisor).
Subjects/Keywords: Colombian conflict;
Critical security studies;
Security in Latin America;
Human security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dario, D. M. (2013). Human security policies in the Colombian conflict during the Uribe government
. (Thesis). University of St. Andrews. Retrieved from http://hdl.handle.net/10023/4516
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dario, Diogo M. “Human security policies in the Colombian conflict during the Uribe government
.” 2013. Thesis, University of St. Andrews. Accessed March 01, 2021.
http://hdl.handle.net/10023/4516.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dario, Diogo M. “Human security policies in the Colombian conflict during the Uribe government
.” 2013. Web. 01 Mar 2021.
Vancouver:
Dario DM. Human security policies in the Colombian conflict during the Uribe government
. [Internet] [Thesis]. University of St. Andrews; 2013. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10023/4516.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dario DM. Human security policies in the Colombian conflict during the Uribe government
. [Thesis]. University of St. Andrews; 2013. Available from: http://hdl.handle.net/10023/4516
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Columbia University
9.
Kim, Yoo Jin.
Democratizing National Security: Implications of Human Security Framework on Human Rights and Civil Society in the Republic of Korea.
Degree: 2017, Columbia University
URL: https://doi.org/10.7916/D8GB39WB
► This thesis analyzes the intersection among civil society, human rights, and national security narratives in the Republic of Korea. It first traces the evolution of…
(more)
▼ This thesis analyzes the intersection among civil society, human rights, and national security narratives in the Republic of Korea. It first traces the evolution of civil society, human rights, and national security narratives in South Korea, followed by an examination of the aptness of current national security narratives and its impact on human rights and civil society. The thesis attempts to answer the following questions: first, what are the dominant national security narratives in contemporary South Korean society; second, what are the human rights implications of South Korea’s national security narratives; and third, what are the significance and role of South Korean civil society under a new security framework? Finally, it argues for a shift toward a new security framework, namely one based on human security and comprehensive security frameworks.
Subjects/Keywords: Human rights; National security; Civil society; Human security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kim, Y. J. (2017). Democratizing National Security: Implications of Human Security Framework on Human Rights and Civil Society in the Republic of Korea. (Masters Thesis). Columbia University. Retrieved from https://doi.org/10.7916/D8GB39WB
Chicago Manual of Style (16th Edition):
Kim, Yoo Jin. “Democratizing National Security: Implications of Human Security Framework on Human Rights and Civil Society in the Republic of Korea.” 2017. Masters Thesis, Columbia University. Accessed March 01, 2021.
https://doi.org/10.7916/D8GB39WB.
MLA Handbook (7th Edition):
Kim, Yoo Jin. “Democratizing National Security: Implications of Human Security Framework on Human Rights and Civil Society in the Republic of Korea.” 2017. Web. 01 Mar 2021.
Vancouver:
Kim YJ. Democratizing National Security: Implications of Human Security Framework on Human Rights and Civil Society in the Republic of Korea. [Internet] [Masters thesis]. Columbia University; 2017. [cited 2021 Mar 01].
Available from: https://doi.org/10.7916/D8GB39WB.
Council of Science Editors:
Kim YJ. Democratizing National Security: Implications of Human Security Framework on Human Rights and Civil Society in the Republic of Korea. [Masters Thesis]. Columbia University; 2017. Available from: https://doi.org/10.7916/D8GB39WB

University of Sydney
10.
Baker, Christopher Gary.
The problem with environmental security: challenging the either/or approach of national versus human security in the context of the Mekong River Basin
.
Degree: 2015, University of Sydney
URL: http://hdl.handle.net/2123/13927
► One of the most important ideas to emerge from security studies in the past forty years is the field of research known as ‘environmental security…
(more)
▼ One of the most important ideas to emerge from security studies in the past forty years is the field of research known as ‘environmental security studies’ (ESS). It has not, however, had the impact on security studies in general that it might have expected to – given the growing concerns regarding the scale and pace of environmental changes in the 20th and 21st centuries. This thesis therefore firstly seeks to understand the nature of ESS, asking whether ESS has a central theoretical core that enables it to analyse the links between the environment and security. The research shows that the ESS literature does not have a central tenet, nor a united epistemological or methodological approach. The second area of research therefore asks if there is a common theme that can be discerned within the literature. Research indicates that there is a way of understanding ESS in a more coherent fashion in that the majority of ESS scholars endeavour to comprehend the systemic security impact of environmental processes. The problem is that there is no analytical bridge between the environment, the state and the individual. This thesis therefore forwards a unique approach that argues that rather than the current either state-centric or a human security approach to ESS, it must be understood as a combination of both. This approach is termed “Systemic Environmental Security” (SES). SES is an analytical framework that takes into account the way that environmental processes give rise to both state security and human security concerns simultaneously. The thesis finally explores the unique insights provided by SES. This is achieved through a relevant case study of the Mekong River Basin. It is hoped that these unique insights provided by Systemic Environmental Security can be applied in a range of contexts, providing clearer conceptualisations of the complex relationship between security and the environment.
Subjects/Keywords: environmental security;
international security;
human security;
hydropower;
Mekong River;
systemic environmental security;
Lancang Jiang
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Baker, C. G. (2015). The problem with environmental security: challenging the either/or approach of national versus human security in the context of the Mekong River Basin
. (Thesis). University of Sydney. Retrieved from http://hdl.handle.net/2123/13927
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Baker, Christopher Gary. “The problem with environmental security: challenging the either/or approach of national versus human security in the context of the Mekong River Basin
.” 2015. Thesis, University of Sydney. Accessed March 01, 2021.
http://hdl.handle.net/2123/13927.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Baker, Christopher Gary. “The problem with environmental security: challenging the either/or approach of national versus human security in the context of the Mekong River Basin
.” 2015. Web. 01 Mar 2021.
Vancouver:
Baker CG. The problem with environmental security: challenging the either/or approach of national versus human security in the context of the Mekong River Basin
. [Internet] [Thesis]. University of Sydney; 2015. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/2123/13927.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Baker CG. The problem with environmental security: challenging the either/or approach of national versus human security in the context of the Mekong River Basin
. [Thesis]. University of Sydney; 2015. Available from: http://hdl.handle.net/2123/13927
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Oxford
11.
Kainda, Ronald.
Usability and security of human-interactive security protocols.
Degree: PhD, 2011, University of Oxford
URL: http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36
;
http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.547472
► We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or…
(more)
▼ We investigate the security and usability of Human-Interactive Security Protocols (HISPs); specifically, how digests of 4 or more digits can be compared between two or more sys- tems as conveniently as possible while ensuring that issues such as user complacency do not compromise security. We address the research question: given different association scenarios and modes of authentication in HISPs, how can we improve on existing, or design new, empirical channels that suit human and contextual needs to achieve acceptable effective security? We review the literature of HISPs, proposed empirical channels,and usability studies of HISPs; we follow by presenting the methodology of the research reported in this thesis. We then make a number of contributions discussing the effectiveness of empirical channels and address the design, analysis, and evaluation of these channels. In Chapter 4 we present a user study of pairwise device associations and discuss the factors affecting effective security of empirical channels in single-user scenarios. In Chapter 5 we present a user study of group device associations and discuss the factors affecting effective security of empirical channels in multi-user scenarios. In Chapter 7 we present a framework designed for researchers and system designers to reason about empirical channels in HISPs. The framework is grounded in experimental data, related research, and validated by experts. In Chapter 8 we present a methodology for analysing and evaluating the security and usability of HISPs. We validate the methodology by applying it in laboratory experiments of HISPs. Finally, in Chapter 6 we present a set of principles for designing secure and usable empirical channels. We demonstrate the effectiveness of these principles by proposing new empirical channels.
Subjects/Keywords: 621.382; Computing : Computer security : Computer security : Human computer interaction : usable security : human-computer interaction : security protocols : mobile device interactions
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Kainda, R. (2011). Usability and security of human-interactive security protocols. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.547472
Chicago Manual of Style (16th Edition):
Kainda, Ronald. “Usability and security of human-interactive security protocols.” 2011. Doctoral Dissertation, University of Oxford. Accessed March 01, 2021.
http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.547472.
MLA Handbook (7th Edition):
Kainda, Ronald. “Usability and security of human-interactive security protocols.” 2011. Web. 01 Mar 2021.
Vancouver:
Kainda R. Usability and security of human-interactive security protocols. [Internet] [Doctoral dissertation]. University of Oxford; 2011. [cited 2021 Mar 01].
Available from: http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.547472.
Council of Science Editors:
Kainda R. Usability and security of human-interactive security protocols. [Doctoral Dissertation]. University of Oxford; 2011. Available from: http://ora.ox.ac.uk/objects/uuid:ea14d34a-d232-4c8b-98ab-abbf0d7a5d36 ; http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.547472

University of Zambia
12.
Chileshe, Nancy Chola.
The Impact of the international terrorism on the contemporary law of asylum
.
Degree: 2013, University of Zambia
URL: http://hdl.handle.net/123456789/2989
From the rainstorm of the mountains they get drenched, And because there is no shelter they hug a rock. (Psalms 24:8)
Subjects/Keywords: War on Terrorism;
Security, International.;
Human rights.
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Chileshe, N. C. (2013). The Impact of the international terrorism on the contemporary law of asylum
. (Thesis). University of Zambia. Retrieved from http://hdl.handle.net/123456789/2989
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Chileshe, Nancy Chola. “The Impact of the international terrorism on the contemporary law of asylum
.” 2013. Thesis, University of Zambia. Accessed March 01, 2021.
http://hdl.handle.net/123456789/2989.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Chileshe, Nancy Chola. “The Impact of the international terrorism on the contemporary law of asylum
.” 2013. Web. 01 Mar 2021.
Vancouver:
Chileshe NC. The Impact of the international terrorism on the contemporary law of asylum
. [Internet] [Thesis]. University of Zambia; 2013. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/123456789/2989.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Chileshe NC. The Impact of the international terrorism on the contemporary law of asylum
. [Thesis]. University of Zambia; 2013. Available from: http://hdl.handle.net/123456789/2989
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Alberta
13.
Vogt, Ryan A.
Human Mobility and Location Privacy in Wireless Sensor
Networks.
Degree: PhD, Department of Computing Science, 2014, University of Alberta
URL: https://era.library.ualberta.ca/files/6h440t39c
► By eavesdropping on a user's query in a sensor network, an adversary can deduce both the user's current location and his/her location of interest. Issuing…
(more)
▼ By eavesdropping on a user's query in a sensor
network, an adversary can deduce both the user's current location
and his/her location of interest. Issuing k queries instead of one
(our "k-query" scheme) protects the privacy of the user's location
of interest, but facilitates the adversary determining the user's
current location. We propose a formal method for measuring how well
issuing k queries to locations dispersed throughout the network
protects the privacy of the user's location of interest, as well as
a quantitative measure of how much information the k queries leak
about the user's current location. Experiments reveal that how
physically dispersed the k queries are has no meaningful effect on
the user's privacy. However, there is a direct trade-off between
the user's location-of-interest privacy and his/her
current-location privacy, controlled by the value of k the user
chooses. User interactions with sensor networks do not occur in
featureless, uniform environments. To facilitate the study of our
k-query scheme in a rich environment characterized by realistically
mobile users, we developed a new generative mobility model to
produce mobility data for simulated agents. Existing generative
mobility models suffer from a number of limitations. Most
significantly, existing models are not representative of actual
human movement. Our new mobility model is based on state-of-the-art
work in understanding pedestrian mobility patterns in urban areas,
known as Space Syntax. Under our model, agents move in a meaningful
fashion in terms of destination selection and pathfinding,
constrained by their surroundings in an outdoor urban environment.
Results obtained from our publicly available Destination-Based
Space Syntax Simulator (DBS3), independent from our k-query
experiments, demonstrate which mobility model parameters affect
wireless network simulations in general: the pathfinding metric in
grid-based urban centres and centrality bias in other urban
centres. We combined DBS3 with our k-query scheme in order to study
how long in advance a user should issue the k queries if travelling
from some current location to his/her location of interest. While
the exact threshold depends on the urban environment and speed of
the agents in question, the typical threshold is very low, e.g., 10
minutes when using k=3 in downtown Edmonton, Canada.
Subjects/Keywords: networks; human mobility; location privacy; security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vogt, R. A. (2014). Human Mobility and Location Privacy in Wireless Sensor
Networks. (Doctoral Dissertation). University of Alberta. Retrieved from https://era.library.ualberta.ca/files/6h440t39c
Chicago Manual of Style (16th Edition):
Vogt, Ryan A. “Human Mobility and Location Privacy in Wireless Sensor
Networks.” 2014. Doctoral Dissertation, University of Alberta. Accessed March 01, 2021.
https://era.library.ualberta.ca/files/6h440t39c.
MLA Handbook (7th Edition):
Vogt, Ryan A. “Human Mobility and Location Privacy in Wireless Sensor
Networks.” 2014. Web. 01 Mar 2021.
Vancouver:
Vogt RA. Human Mobility and Location Privacy in Wireless Sensor
Networks. [Internet] [Doctoral dissertation]. University of Alberta; 2014. [cited 2021 Mar 01].
Available from: https://era.library.ualberta.ca/files/6h440t39c.
Council of Science Editors:
Vogt RA. Human Mobility and Location Privacy in Wireless Sensor
Networks. [Doctoral Dissertation]. University of Alberta; 2014. Available from: https://era.library.ualberta.ca/files/6h440t39c

Cornell University
14.
Brigden, Noelle.
Uncertain Odysseys: Migrant Journeys And Transnational Routes.
Degree: PhD, Government, 2013, Cornell University
URL: http://hdl.handle.net/1813/34327
► How do people behave when confronted with uncertainty and violence? This dissertation examines how Central American migrants cope with escalating violence in transit and how…
(more)
▼ How do people behave when confronted with uncertainty and violence? This dissertation examines how Central American migrants cope with escalating violence in transit and how these coping tactics reshape the social landscape of transnational routes. From villages in El Salvador into Mexico and through the United States, the sustained practice of migration informs behavior along a dangerous route, not only through social networks, but also by carving a transit political economy and transnational imaginary. Migration decisions are rational, but must be viewed as an ongoing process of learning constituted by information gathering, imagination and improvisation en route. As people move along these routes, migrants and citizens improvise new identities, shifting national, racial and gendered boundaries. The ethnographic framework of this dissertation elucidates the implications of this process for the governance of states through which transnational flows pass. The attempt to impede these flows within the territory of transit states, like Mexico, has not only thickened borders and policing; it has extended the social ambiguities and uncertainty of the borderlands, inviting the Hobbesian anarchy of the international system into the domestic domain of the state. Thus, this dissertation points to how migrants and citizens share the catastrophic
human security consequences of migration policing.
Advisors/Committee Members: Katzenstein, Peter Joachim (chair), Roberts, Kenneth (committee member), Bensel, Richard F (committee member), Way, Christopher Robert (committee member).
Subjects/Keywords: Transnational Migration; Political Ethnography; Human Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Brigden, N. (2013). Uncertain Odysseys: Migrant Journeys And Transnational Routes. (Doctoral Dissertation). Cornell University. Retrieved from http://hdl.handle.net/1813/34327
Chicago Manual of Style (16th Edition):
Brigden, Noelle. “Uncertain Odysseys: Migrant Journeys And Transnational Routes.” 2013. Doctoral Dissertation, Cornell University. Accessed March 01, 2021.
http://hdl.handle.net/1813/34327.
MLA Handbook (7th Edition):
Brigden, Noelle. “Uncertain Odysseys: Migrant Journeys And Transnational Routes.” 2013. Web. 01 Mar 2021.
Vancouver:
Brigden N. Uncertain Odysseys: Migrant Journeys And Transnational Routes. [Internet] [Doctoral dissertation]. Cornell University; 2013. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/1813/34327.
Council of Science Editors:
Brigden N. Uncertain Odysseys: Migrant Journeys And Transnational Routes. [Doctoral Dissertation]. Cornell University; 2013. Available from: http://hdl.handle.net/1813/34327

Nelson Mandela Metropolitan University
15.
Jansson, Kenny.
A model for cultivating resistance to social engineering attacks.
Degree: Faculty of Engineering, the Built Environment and Information Technology, 2011, Nelson Mandela Metropolitan University
URL: http://hdl.handle.net/10948/1588
► The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in…
(more)
▼ The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
Subjects/Keywords: Computer security; Data protection; Human-computer interaction
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Jansson, K. (2011). A model for cultivating resistance to social engineering attacks. (Thesis). Nelson Mandela Metropolitan University. Retrieved from http://hdl.handle.net/10948/1588
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Thesis, Nelson Mandela Metropolitan University. Accessed March 01, 2021.
http://hdl.handle.net/10948/1588.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Jansson, Kenny. “A model for cultivating resistance to social engineering attacks.” 2011. Web. 01 Mar 2021.
Vancouver:
Jansson K. A model for cultivating resistance to social engineering attacks. [Internet] [Thesis]. Nelson Mandela Metropolitan University; 2011. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10948/1588.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Jansson K. A model for cultivating resistance to social engineering attacks. [Thesis]. Nelson Mandela Metropolitan University; 2011. Available from: http://hdl.handle.net/10948/1588
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Royal Roads University
16.
Dunning, Nicholas.
Sovereignty and human security at Canadian Forces Station Alert
.
Degree: 2016, Royal Roads University
URL: http://hdl.handle.net/10170/944
► The Canadian Armed Forces (CAF) is a major player in exercising sovereignty and ensuring human security in Canada’s Arctic. This research examined whether the mandate…
(more)
▼ The Canadian Armed Forces (CAF) is a major player in exercising sovereignty and ensuring
human security in Canada’s Arctic. This research examined whether the mandate of Canadian Forces Station (CFS) Alert should be changed to enable the CAF to play an enhanced role in exercising sovereignty in the Arctic, in order to enable
human security. Four overarching themes – presence (as a factor in sovereignty), innovation, Arctic mobility, and further presence (as a factor in
human security) – were identified that describe how CFS Alert currently achieves this mandate and articulates further ways to advocate for
human security. Through participant interviews, this research concluded that changes to the mandate of CFS Alert are not required. The research adds to the literature on
human security, Arctic sovereignty, and provides policymakers and military commanders with practical recommendations on how to use existing strategic infrastructure to further safeguard Canada’s Arctic and protect its citizens.
Advisors/Committee Members: Dunning, Nicholas (advisor).
Subjects/Keywords: Arctic sovereignt;
CFS Alert;
human security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Dunning, N. (2016). Sovereignty and human security at Canadian Forces Station Alert
. (Thesis). Royal Roads University. Retrieved from http://hdl.handle.net/10170/944
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Dunning, Nicholas. “Sovereignty and human security at Canadian Forces Station Alert
.” 2016. Thesis, Royal Roads University. Accessed March 01, 2021.
http://hdl.handle.net/10170/944.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Dunning, Nicholas. “Sovereignty and human security at Canadian Forces Station Alert
.” 2016. Web. 01 Mar 2021.
Vancouver:
Dunning N. Sovereignty and human security at Canadian Forces Station Alert
. [Internet] [Thesis]. Royal Roads University; 2016. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10170/944.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Dunning N. Sovereignty and human security at Canadian Forces Station Alert
. [Thesis]. Royal Roads University; 2016. Available from: http://hdl.handle.net/10170/944
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
17.
Williams, Meredydd.
Exploring the influence of privacy awareness on the Privacy Paradox on smartwatches.
Degree: PhD, 2018, University of Oxford
URL: http://ora.ox.ac.uk/objects/uuid:b4a1b178-34c8-49d2-bc80-0b4a23358959
;
https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770580
► While the public claim to be concerned about privacy, they rarely express protective behaviour. This disparity has been labelled the Privacy Paradox. The Internet-of-Things (IoT)…
(more)
▼ While the public claim to be concerned about privacy, they rarely express protective behaviour. This disparity has been labelled the Privacy Paradox. The Internet-of-Things (IoT) is ubiquitous and data-collecting. It has therefore been considered a privacy risk. However, the Paradox has not been assessed in this context. Hence, we explored whether the issue could be mitigated in novel environments. Before analysing these devices, we began by confirming the Paradox's prevalence. This was undertaken through street surveys, which suggested that views had little relationship with behaviour. We continued by comparing user perceptions across a range of technologies. Through an online survey [n = 170], participants rated 'IoT' devices as most concerning. They were also considered less usable, potentially placing constraints on protection. To dissect the issue, we then conducted detailed interviews. Discussions were undertaken with 40 users, 20 of which had an IoT product. Protection was less common in the IoT, contributing to greater Paradox prevalence. Wearables were particularly prone, and therefore we scoped our focus to smartwatches. Through analysing participant rationale, a lack of awareness appeared the greatest IoT issue. Since educational games had proved effective in the literature, we developed privacy apps. Our online prototype was trialled by 504 smartwatch owners. In our treatment group, we found the Paradox was mitigated in posttest results. Therefore, for our final study, we implemented the first smartwatch privacy game. Through a two-month longitudinal study, we analysed empirical behaviour. Users were given an (Android) Wear OS watch, with half playing the game. Protection increased and persisted in this group, with the Paradox mitigated over an extended period. Our research has novelty, in that this has not been achieved in previous work. Furthermore, by analysing smartwatch behaviour, we provide novel insights into user rationale. As the IoT expands, it is crucial that individuals are informed to make privacy decisions.
Subjects/Keywords: Human computer interaction; Behaviour change; Computer security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Williams, M. (2018). Exploring the influence of privacy awareness on the Privacy Paradox on smartwatches. (Doctoral Dissertation). University of Oxford. Retrieved from http://ora.ox.ac.uk/objects/uuid:b4a1b178-34c8-49d2-bc80-0b4a23358959 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770580
Chicago Manual of Style (16th Edition):
Williams, Meredydd. “Exploring the influence of privacy awareness on the Privacy Paradox on smartwatches.” 2018. Doctoral Dissertation, University of Oxford. Accessed March 01, 2021.
http://ora.ox.ac.uk/objects/uuid:b4a1b178-34c8-49d2-bc80-0b4a23358959 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770580.
MLA Handbook (7th Edition):
Williams, Meredydd. “Exploring the influence of privacy awareness on the Privacy Paradox on smartwatches.” 2018. Web. 01 Mar 2021.
Vancouver:
Williams M. Exploring the influence of privacy awareness on the Privacy Paradox on smartwatches. [Internet] [Doctoral dissertation]. University of Oxford; 2018. [cited 2021 Mar 01].
Available from: http://ora.ox.ac.uk/objects/uuid:b4a1b178-34c8-49d2-bc80-0b4a23358959 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770580.
Council of Science Editors:
Williams M. Exploring the influence of privacy awareness on the Privacy Paradox on smartwatches. [Doctoral Dissertation]. University of Oxford; 2018. Available from: http://ora.ox.ac.uk/objects/uuid:b4a1b178-34c8-49d2-bc80-0b4a23358959 ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.770580

Uppsala University
18.
Claudia, Forsberg.
Säkerhet för vem? Säkerhetisering av migrationsfrågor och dess påverkan för människor på flykt.
Degree: Theology, 2016, Uppsala University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-295921
► This thesis examines two proposals, Särskilda åtgärder vid allvarlig fara för den allmänna ordningen och inre säkerheten i landet (2015/16:67) och Tillfälliga begränsningar av…
(more)
▼ This thesis examines two proposals, Särskilda åtgärder vid allvarlig fara för den allmänna ordningen och inre säkerheten i landet (2015/16:67) och Tillfälliga begränsningar av möjligheten att få uppehållstillstånd (2015/16:174), in light of the concept of securitization, and analyze the effects the resulting provisions to the law and the government bill may have on displaced people. The theoretical framework used for analysis is primarily the theory of securitization in international relations and secondarily the perspective of human security. The analysis of the proposals shows that the Swedish Government considers the inflow of a high amount of asylum seekers as a threat to national security, and the special measures are in need to ensure public order and national internal security. This points to the fact that asylum seekers it to be considered as securitized. Additionally the proposals confirms that asylum seekers is to be seen as a security issue threatening specific societal structures. Hence the need of id-checks. The proposed legislation concerning limiting residence permits is viewed, both from a majority of the national consultative bodies and the Government itself, as affecting asylum seekers in various negative ways. The conclusion of the analysis is that the combination of legislating identity checks and proposing legislation to limit residence permits indicates a more significant shift in Sweden's migration policy than has been evident in the public sphere. Policies has gradually changed from defending rights and guarding safety for fleeing human beings to primarily focus on protecting the nation and guarding the citizens. Furthermore, this study accentuates a previously obscure phenomenon in Swedish migration policy. A Swedish government has proposed legislation based on protecting the Swedish society from severe threats from people in need of security and protection, which the Swedish parliament has passed as a law.
Subjects/Keywords: migration; asylum seekers; securitization; human security; Sweden
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Claudia, F. (2016). Säkerhet för vem? Säkerhetisering av migrationsfrågor och dess påverkan för människor på flykt. (Thesis). Uppsala University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-295921
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Claudia, Forsberg. “Säkerhet för vem? Säkerhetisering av migrationsfrågor och dess påverkan för människor på flykt.” 2016. Thesis, Uppsala University. Accessed March 01, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-295921.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Claudia, Forsberg. “Säkerhet för vem? Säkerhetisering av migrationsfrågor och dess påverkan för människor på flykt.” 2016. Web. 01 Mar 2021.
Vancouver:
Claudia F. Säkerhet för vem? Säkerhetisering av migrationsfrågor och dess påverkan för människor på flykt. [Internet] [Thesis]. Uppsala University; 2016. [cited 2021 Mar 01].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-295921.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Claudia F. Säkerhet för vem? Säkerhetisering av migrationsfrågor och dess påverkan för människor på flykt. [Thesis]. Uppsala University; 2016. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-295921
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Linnaeus University
19.
Berg, Frida.
Turkey's Security and the Syrian Civil War : A Case Study about how the Syrian Civil War has Impacted Turkey's State and Human Security from 2011 until 2019.
Degree: Political Science, 2020, Linnaeus University
URL: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-91065
► This essay addresses the issue of how the Syrian civil war has impacted Turkey’s state and human security. The study aimed to provide an…
(more)
▼ This essay addresses the issue of how the Syrian civil war has impacted Turkey’s state and human security. The study aimed to provide an enhanced understanding of how the Syrian war has impacted Turkey’s security, within the timeframe of 2011-2019. The method that was applied to this study was a single case study where theories of state and human security were used to analyze the Syrian war’s impact on Turkey’s security. The results showed that the advancement of Kurdish forces as well as the Islamic state’s territorial expansion posed a threat towards the Turkish state’s territorial integrity and sovereignty. The war also impacted the authoritarian turn of the Turkish government, which generated in a coup attempt causing additional internal disability and threat towards the state’s security. In terms of Turkey’s human security, increased terrorism within the state as a cause of the Syrian war has impacted the physical security of the people. Moreover, health concerns arose due to the vast number of Syrian refugees in Turkey and posed a threat to the Turkish population. The refugee influx also changed the ethnic balance in some areas showing indications of ethnic tensions to foster, threatening the population. One can conclude that the Syrian war has impacted Turkey’s state security, through direct military threats regarding the rise and expansion the of PKK-YPG and ISIS. In terms of Turkey’s human security one can conclude that increasing terrorism and the vast number of refugees residing in the state caused by the Syrian war has impacted the safety and security of the Turkish people.
Subjects/Keywords: Turkey; Syria; civil war; human security; state security; international security.; Social Sciences; Samhällsvetenskap
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Berg, F. (2020). Turkey's Security and the Syrian Civil War : A Case Study about how the Syrian Civil War has Impacted Turkey's State and Human Security from 2011 until 2019. (Thesis). Linnaeus University. Retrieved from http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-91065
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Berg, Frida. “Turkey's Security and the Syrian Civil War : A Case Study about how the Syrian Civil War has Impacted Turkey's State and Human Security from 2011 until 2019.” 2020. Thesis, Linnaeus University. Accessed March 01, 2021.
http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-91065.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Berg, Frida. “Turkey's Security and the Syrian Civil War : A Case Study about how the Syrian Civil War has Impacted Turkey's State and Human Security from 2011 until 2019.” 2020. Web. 01 Mar 2021.
Vancouver:
Berg F. Turkey's Security and the Syrian Civil War : A Case Study about how the Syrian Civil War has Impacted Turkey's State and Human Security from 2011 until 2019. [Internet] [Thesis]. Linnaeus University; 2020. [cited 2021 Mar 01].
Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-91065.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Berg F. Turkey's Security and the Syrian Civil War : A Case Study about how the Syrian Civil War has Impacted Turkey's State and Human Security from 2011 until 2019. [Thesis]. Linnaeus University; 2020. Available from: http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-91065
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Univerzitet u Beogradu
20.
Теpavac, Dejan N., 1976-.
Заштита пословних информација у функцији националне
безбедности.
Degree: Fakultet bezbednosti, 2018, Univerzitet u Beogradu
URL: https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get
► Društvene nauke / Studije bezbednosti Social sciences / security studies
Поуздане информације представљају основ смисленог људског деловања, успостављања међуљудских, међународних и пословних односа. Информације посебно…
(more)
▼ Društvene nauke / Studije bezbednosti Social
sciences / security studies
Поуздане информације представљају основ смисленог
људског деловања, успостављања међуљудских, међународних и
пословних односа. Информације посебно добијају на значају са
напретком информационо‒комуникационих технологија и настајањем
глобалних пословних мрежа, односно умрежавањем институција и
присутношћу неког од видова информационо‒комуникационих технологија
у животу највећег дела људске популације. Добра селекција и
правовремена употреба информација доприносе развоју људског знања и
квалитетнијег деловања човека у свим подручјима његовог
интересовања. На основу расположивих знања поткрепљених актуелним
информацијама, државници доносе одлуке од важности за развој
читавог друштва и човечанства. Посебно местo и улогу у свету
информација имају пословне информације јер од њих зависи ефикасност
функционисања информационо‒комуникационог система (ИКС) националних
држава, као и привредних субјеката. Прикупљање квалитетних
информација представља сложен задатак организационих целина које се
баве обавештајном делатношћу. Појава великог броја пословних
информација намеће следећа питања: како из мноштва информација
извући потребне и корисне; како расположиве информације употребити
тако да се постигне најбољи пословни резултат; како онемогућити
злоупотребу информација и ИКС‒а; и како заштитити информације и
обезбедити сигуран и несметан рад ИКС‒а. Заштита пословних
информација је активност која се реализује у циљу обезбеђивања
несметаног и континуираног рада ИКС‒а, сводећи ризике и претње на
минимум. Заштита пословних информација представља заједнички
задатак пословних субјеката и државних институција. Државне службе,
обавештајне и контраобавештајне, као део државног система, на тај
начин штите и националне интересе будући да је пословање великих
привредних субјеката уско повезано са интересима националних
држава. Квалитетна заштита пословних информација, између осталог,
подразумева стандардизацију информационе безбедности, а савремени
стандарди који се данас употребљавају односе се на генерисање,
пријем и чување података унутар ИКС‒а.
Advisors/Committee Members: Đorđević, Ivica, 1966-.
Subjects/Keywords: National security; business information; information
security; information and communication system; human security;
indicators; protection.
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Теpavac, Dejan N., 1. (2018). Заштита пословних информација у функцији националне
безбедности. (Thesis). Univerzitet u Beogradu. Retrieved from https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Теpavac, Dejan N., 1976-. “Заштита пословних информација у функцији националне
безбедности.” 2018. Thesis, Univerzitet u Beogradu. Accessed March 01, 2021.
https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Теpavac, Dejan N., 1976-. “Заштита пословних информација у функцији националне
безбедности.” 2018. Web. 01 Mar 2021.
Vancouver:
Теpavac, Dejan N. 1. Заштита пословних информација у функцији националне
безбедности. [Internet] [Thesis]. Univerzitet u Beogradu; 2018. [cited 2021 Mar 01].
Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Теpavac, Dejan N. 1. Заштита пословних информација у функцији националне
безбедности. [Thesis]. Univerzitet u Beogradu; 2018. Available from: https://fedorabg.bg.ac.rs/fedora/get/o:18442/bdef:Content/get
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

George Mason University
21.
Hammond, Timothy G.
Global Security Shifts: The Agendas Made and the Threats Unaddressed
.
Degree: 2013, George Mason University
URL: http://hdl.handle.net/1920/8005
► This thesis explores the evolution of the concept of security to unveil the characteristics that describe the current dominant security architecture. In other words, it…
(more)
▼ This thesis explores the evolution of the concept of
security to unveil the characteristics that describe the current dominant
security architecture. In other words, it examines the dominant global perception of
security and the methods that are used to ensure that form of
security. Next, the
security environment (the actors, threats, and dynamics present) is analyzed in order to discover whether or not the dominant
security architecture is suitably designed for addressing the world’s contemporary
security environment. The discovery is that the dominant
security architecture is that which is designed for a world defined by the Westphalian World Order, an imagined world order with origins in medieval Europe which has been critically disintegrating in the 21st century. Overshadowing this global shift is the literature on the
security changes present since the end of the Cold War. In place of the traditional understanding of national
security, a product of the Westphalian World Order that was further solidified during the bipolar interstate relations of the Cold War era, the United Nations Development Programme held that their concept of
human security would redefine
security in the 21st century. This thesis critically analyzes several case studies which demonstrate that despite the arguments or desires for the referent object of
security to shift from being states to humans,
human security is predominantly language further used by states to assert their dominance in the global arena and pursue their own interests amidst substantial and rising challenges to authority and sovereignty in the 21st
security environment. Due to the interconnectedness of diverse and borderless
security concerns, as well as the unclear distinctions between state and non-state issues, implementation of state-centric
security agendas actually threatens the stability and success of the state itself. This research suggests that three main referent objects must equally be taken into consideration in
security analysis for the achievement of
human survival and prosperity on Earth: humans, their states, and the environment upon which they depend. The Agenda for the
Security of Humanity (ASH) is advanced as an analytical tool that demonstrates the interconnectedness of
security concerns within these three main pillars in a preemptive manner so that efforts to ensure one form of
security do not unsustainably and self-destructively take place at the expense of the other key forms of
security.
Advisors/Committee Members: Calleya, Stephen C (advisor).
Subjects/Keywords: human security;
Westphalian World Order;
national security;
hybrid conflict;
environmental security;
Conflict resolution
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Hammond, T. G. (2013). Global Security Shifts: The Agendas Made and the Threats Unaddressed
. (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/8005
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Hammond, Timothy G. “Global Security Shifts: The Agendas Made and the Threats Unaddressed
.” 2013. Thesis, George Mason University. Accessed March 01, 2021.
http://hdl.handle.net/1920/8005.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Hammond, Timothy G. “Global Security Shifts: The Agendas Made and the Threats Unaddressed
.” 2013. Web. 01 Mar 2021.
Vancouver:
Hammond TG. Global Security Shifts: The Agendas Made and the Threats Unaddressed
. [Internet] [Thesis]. George Mason University; 2013. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/1920/8005.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Hammond TG. Global Security Shifts: The Agendas Made and the Threats Unaddressed
. [Thesis]. George Mason University; 2013. Available from: http://hdl.handle.net/1920/8005
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Victoria
22.
Botel, Gabriel.
Fuelling insecurity?: Sino-Myanmar energy cooperation and human security in Myanmar.
Degree: Dept. of Political Science, 2012, University of Victoria
URL: http://hdl.handle.net/1828/4049
► This thesis examines the relationship between energy, development and human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China’s industrial and…
(more)
▼ This thesis examines the relationship between energy, development and
human security in Sino-Myanmar relations. Rapid economic growth and increased urbanisation have intensified China’s industrial and domestic energy consumption, drastically increasing demand and overwhelming national supply capacities. Chinese foreign policy has responded by becoming more active in securing and protecting foreign energy resources and allowing Chinese companies more freedom and opportunities for investment abroad. Consequently, Chinese foreign investment and policies have become increasing sources of scrutiny and debate, typically focusing on their (presumed) intentions and the social, economic, environmental and political impacts they have on the rest of the world.
Within this debate, a key issue has been China’s engagement with so-called pariah states. China has frequently received substantial international criticism for its unconditional engagement with such countries, often seen as a geopolitical pursuit of strategic national (energy) interests, unconcerned with international opprobrium. In the case of Myanmar, traditional
security analyses interpret this as, at best, undermining (Western) international norms and, at worst, posing a direct challenge to international
security.
However, traditional
security analyses rely on state-centric concepts of
security, and tend to over-simply Sino-Myanmar relations and the dynamics which inform it. Conversely, implications for
human security are overlooked; this is in part because
human security remains poorly defined and also because there are questions regarding its utility. However,
human security is a critical tool in delineating between state, corporate and ‘civilian’ interests, and how these cleavages shape the
security environment and potential for instability in the region.
iv
This thesis takes a closer look at some of the entrenched and changing
security dynamics shaping this Sino-Myanmar energy cooperation, drawing on an extensive literature in
human security rarely applied in this context. This includes a brief review of
human security and Sino-Myanmar relations, and is grounded in an empirical analysis of Chinese investment in Myanmar’s hydropower and oil and gas sectors. Ultimately, this thesis argues that, while insightful, many traditional interpretations of Sino-Myanmar energy cooperation overlook the
security interests of those worst affected. Furthermore, that the worst excesses of Chinese companies in Myanmar are not unique to China, but common across all investors in the regime, Western or otherwise.
Advisors/Committee Members: Wu, Guoguang (supervisor).
Subjects/Keywords: energy security; Myanmar; Burma; China; hydropower; human security; energy; security; oil; natural gas
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Botel, G. (2012). Fuelling insecurity?: Sino-Myanmar energy cooperation and human security in Myanmar. (Masters Thesis). University of Victoria. Retrieved from http://hdl.handle.net/1828/4049
Chicago Manual of Style (16th Edition):
Botel, Gabriel. “Fuelling insecurity?: Sino-Myanmar energy cooperation and human security in Myanmar.” 2012. Masters Thesis, University of Victoria. Accessed March 01, 2021.
http://hdl.handle.net/1828/4049.
MLA Handbook (7th Edition):
Botel, Gabriel. “Fuelling insecurity?: Sino-Myanmar energy cooperation and human security in Myanmar.” 2012. Web. 01 Mar 2021.
Vancouver:
Botel G. Fuelling insecurity?: Sino-Myanmar energy cooperation and human security in Myanmar. [Internet] [Masters thesis]. University of Victoria; 2012. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/1828/4049.
Council of Science Editors:
Botel G. Fuelling insecurity?: Sino-Myanmar energy cooperation and human security in Myanmar. [Masters Thesis]. University of Victoria; 2012. Available from: http://hdl.handle.net/1828/4049

Macquarie University
23.
Asghar, Hassan Jameel.
Design and analysis of human identification protocols.
Degree: PhD, 2012, Macquarie University
URL: http://hdl.handle.net/1959.14/214483
► Bibliography: p. 149-154.
1. Introduction – 2. Preliminaries and related work – 3. Security analysis of PAS (Predicate-based Authentication Service) – 4. Security analysis of…
(more)
▼ Bibliography: p. 149-154.
1. Introduction – 2. Preliminaries and related work – 3. Security analysis of PAS (Predicate-based Authentication Service) – 4. Security analysis of CHC (Convex Hull Click) – 5. Protocol construction 1: Kangaroo Hopping – 6. Protocol construction 2: Counting Edges – 7. Fixed-parameter intractable problems in human identification protocols – 8. Conclusion and future research directions.
Human identification protocols are authentication protocols that enable a human using an insecure terminal to authenticate to a remote server. The goal of such protocols is to ensure secure authentication in the presence of an adversary who can not only view the user's inputs, and the internal computations and display of the terminal, but also eavesdrop on the communication link between the terminal and the server. An active adversary can in addition actively interfere with this communication link. However, protocols secure against active adversaries fall well short of usability. As a result, the focus of recent research has been on security against passive adversaries. Traditional authentication methods such as password-based authentication are not secure under this model, since the adversary can impersonate the user by learning the user's password after observing a single authentication session. – Since the introduction of the problem by Matsumoto and Imai in 1991, there have been sporadic attempts at constructing secure human identification protocols. However, to date there is no accepted solution, mainly because such protocols require mental computations from humans, and therefore the tradeoff between security and usability is huge. State-of-the-art protocols take between one to three minutes for authentication, but guarantee stronger security than traditional authentication methods. While this authentication time is not acceptable for most practical purposes, many interesting new mathematical problems and ideas have resulted in search for usable protocols. – This thesis aims to further the research in human identification protocols by focusing on the mathematical and analytical aspects of such protocols. We generalize some aspects of these protocols by analyzing their general structure. We give detailed security analysis of two protocols from literature, showing that without a thorough security analysis, these protocols are vulnerable to simple but innovative attacks. We also give the construction of two protocols with detailed security analysis and clearly defined design goals. Finally, we analyze the link between fixed-parameter intractability and human identification protocols. It is suggested that problems that are fixed-parameter intractable can be natural candidates for primitives in human identification protocols.
1 online resource (xviii, 154 p.) col. ill
Advisors/Committee Members: Macquarie University. Dept. of Computing.
Subjects/Keywords: Computers – Access control – Passwords; Computer security; computer security; information security; passwords; human identification protocols
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Asghar, H. J. (2012). Design and analysis of human identification protocols. (Doctoral Dissertation). Macquarie University. Retrieved from http://hdl.handle.net/1959.14/214483
Chicago Manual of Style (16th Edition):
Asghar, Hassan Jameel. “Design and analysis of human identification protocols.” 2012. Doctoral Dissertation, Macquarie University. Accessed March 01, 2021.
http://hdl.handle.net/1959.14/214483.
MLA Handbook (7th Edition):
Asghar, Hassan Jameel. “Design and analysis of human identification protocols.” 2012. Web. 01 Mar 2021.
Vancouver:
Asghar HJ. Design and analysis of human identification protocols. [Internet] [Doctoral dissertation]. Macquarie University; 2012. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/1959.14/214483.
Council of Science Editors:
Asghar HJ. Design and analysis of human identification protocols. [Doctoral Dissertation]. Macquarie University; 2012. Available from: http://hdl.handle.net/1959.14/214483

Universiteit Utrecht
24.
Verburg, Matty.
The Humanitarian-Security Balance in the Response to the Iraqi Refugee Crisis.
Degree: 2008, Universiteit Utrecht
URL: http://dspace.library.uu.nl:8080/handle/1874/30758
► This paper is about the humanitarian-security balance in the response to the Iraqi refugee crisis. Although over 2 million Iraqis are displaced within the borders…
(more)
▼ This paper is about the humanitarian-
security balance in the response to the Iraqi refugee crisis. Although over 2 million Iraqis are displaced within the borders of Iraq and a further 2 million have looked for refuge in neighbouring countries, this crisis has gone largely unnoticed by the international community. Both the host states and the refugees are suffering from this lack of response to humanitarian crises. Therefore this thesis looks into the question how we can explain the passive approach of the international community to the refugee crisis despite the enormous international involvement and attention for the war in Iraq. To come to a conclusion about this question, an assessment is made of the magnitude of the crisis. Then, I will look into the different mechanisms and paradigm shifts that the international community has gone through with regard to conflict resolution, and I will look at the implications of these paradigm shifts for the response to humanitarian crises in general and the Iraqi refugee crisis in specific. It appears that the rise of the
security paradigm is the most important factor that determines how the international community responds to the Iraqi refugee crisis. Hereby it is influenced by the fact that
security is not a neutral label. Therefore, state
security or the
security of the community is always put in favour of refugee populations and other vulnerable populations that find themselves not to “belong” to a certain community. Lastly, I will conclude what implications this neglect of a massive refugee population has for the future reconstruction of Iraq. I will conclude that there is a need to de-securitize the discourse around humanitarian situations because they can negatively affect conflict resolution.
Advisors/Committee Members: Demmers, Jolle.
Subjects/Keywords: Letteren; Iraq; refugee; security paradigm; human security; refugee crisis; international community
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Verburg, M. (2008). The Humanitarian-Security Balance in the Response to the Iraqi Refugee Crisis. (Masters Thesis). Universiteit Utrecht. Retrieved from http://dspace.library.uu.nl:8080/handle/1874/30758
Chicago Manual of Style (16th Edition):
Verburg, Matty. “The Humanitarian-Security Balance in the Response to the Iraqi Refugee Crisis.” 2008. Masters Thesis, Universiteit Utrecht. Accessed March 01, 2021.
http://dspace.library.uu.nl:8080/handle/1874/30758.
MLA Handbook (7th Edition):
Verburg, Matty. “The Humanitarian-Security Balance in the Response to the Iraqi Refugee Crisis.” 2008. Web. 01 Mar 2021.
Vancouver:
Verburg M. The Humanitarian-Security Balance in the Response to the Iraqi Refugee Crisis. [Internet] [Masters thesis]. Universiteit Utrecht; 2008. [cited 2021 Mar 01].
Available from: http://dspace.library.uu.nl:8080/handle/1874/30758.
Council of Science Editors:
Verburg M. The Humanitarian-Security Balance in the Response to the Iraqi Refugee Crisis. [Masters Thesis]. Universiteit Utrecht; 2008. Available from: http://dspace.library.uu.nl:8080/handle/1874/30758

University of Pretoria
25.
Stoltz, Abitt.
Official
views on the environment and security in South Africa, 2007-2012 :
a case of securitisation?.
Degree: Political Sciences, 2015, University of Pretoria
URL: http://hdl.handle.net/2263/43759
► This research study emanates from the inclusion of environmental risks on the global security agenda. Although dating back to the Rio Summit on Environment and…
(more)
▼ This research study emanates from the inclusion of
environmental risks on the global
security agenda. Although dating
back to the Rio Summit on Environment and Development (UNEP, 1992),
this trend gained momentum following the publication of the Fourth
Assessment Report of the United Nations Intergovernmental Panel on
Climate Change (IPCC) in February 2007 (IPCC, 2007a). The report
warned that the global climate system is changing mainly because of
man-made greenhouse gas emissions, exposing, amongst others, Africa
as a continent most vulnerable to the impact of climate variability
and change. Subsequent to the report, the
security implications of
climate change were discussed by the United Nations
Security
Council in April 2007 (UN, 2007a). With these developments as a
point of departure, the aim of this exploratory study is to
investigate the securitisation of environmental risks, particularly
the impact of climate change, in South Africa, with specific
reference to official perceptions of (and where applicable, policy
responses to) environmental
security between 2007 and 2012.
As a
literature and documentary case study on South Africa, the research
utilises a conceptual framework that broadens and deepens the
concept of
security to include the environment as a non-traditional
(non-military) aspect. In this context, environmental risks are
discussed as a challenge to
security, considering their
contemporary relevance. Environmental
security is discussed as an
emerging
security issue in the context of its global and regional
scope; its linkage to and impact on food, water and energy
security; and its influence on the political, economic, and social
sectors of
security. Further, the study indicates that Southern
Africa in general, and South Africa in particular, are highly
vulnerable to the impact of environmental risks such as climate
change; and that such risks indeed exacerbate existing
security
risks and threats.
Against this backdrop, the South African
government’s securitisation (or lack of securitisation) of the
environment is described and explored with reference to official
views on environmental
security. The analysis indicates that the
Government securitises environmental risks such as climate change
to a limited degree only (in terms of securitising speech and act);
and the issue thus does not fall within the ambit of
security, but
rather that of sustainable development. The Government base their
unsecuritised stance on the impact of environmental risks, on the
country’s basic natural resources (such as food, water and energy)
being overwhelmed by existing growth pressures; and that the
Administration’s current priority is inter alia social development
issues, such as employment and poverty eradication.
The study
concludes with a summary of key findings in response to the stated
research problem, and with recommendations concerning the South
African government’s response to environmental
security.
Advisors/Committee Members: Du Plessis, Anton (advisor).
Subjects/Keywords: Environmental security;
Securitisation theory; Human
security;
Environmental risks; UCTD
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Stoltz, A. (2015). Official
views on the environment and security in South Africa, 2007-2012 :
a case of securitisation?. (Masters Thesis). University of Pretoria. Retrieved from http://hdl.handle.net/2263/43759
Chicago Manual of Style (16th Edition):
Stoltz, Abitt. “Official
views on the environment and security in South Africa, 2007-2012 :
a case of securitisation?.” 2015. Masters Thesis, University of Pretoria. Accessed March 01, 2021.
http://hdl.handle.net/2263/43759.
MLA Handbook (7th Edition):
Stoltz, Abitt. “Official
views on the environment and security in South Africa, 2007-2012 :
a case of securitisation?.” 2015. Web. 01 Mar 2021.
Vancouver:
Stoltz A. Official
views on the environment and security in South Africa, 2007-2012 :
a case of securitisation?. [Internet] [Masters thesis]. University of Pretoria; 2015. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/2263/43759.
Council of Science Editors:
Stoltz A. Official
views on the environment and security in South Africa, 2007-2012 :
a case of securitisation?. [Masters Thesis]. University of Pretoria; 2015. Available from: http://hdl.handle.net/2263/43759

University of Canterbury
26.
Monks, James.
Food security in Solomon Islands: Preliminary results from a survey of the Honiara Central Market.
Degree: 2018, University of Canterbury
URL: http://dx.doi.org/10.26021/869
► This article presents preliminary descriptive data findings from a study focusing on vendors and produce at the Honiara Central Market (HCM), the largest fresh food…
(more)
▼ This article presents preliminary descriptive data findings from a study focusing on vendors and produce at the Honiara Central Market (HCM), the largest fresh food market in Solomon Islands and the main source of fresh produce for Honiara’s growing population. The study aims to map the supply of fresh produce to HCM to provide baseline data that will enable the assessment of risks and vulnerabilities to the human and food security of Solomon Islands. This article first presents an overview of the relationship between human security and food security in Solomon Islands. It then provides a summary of the study method, before presenting descriptive data on HCM vendors and their produce. Data show that female vendors are most common at HCM by a factor of four to one over males. Most vendors are married and sell the food they grow. Most vendors sell leafy vegetables, fruits or root vegetables, and stay for between half a day and a day at market. The majority of most produce categories come from East Guadalcanal, and are transported by truck to HCM. The data supports the contention that the HCM provides an opportunity for rural farmers to earn income through the sale of produce as well as helping urban Honiara residents meet their food security needs.
Subjects/Keywords: Solomon Islands; food security; human security; Honiara; gender
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Monks, J. (2018). Food security in Solomon Islands: Preliminary results from a survey of the Honiara Central Market. (Thesis). University of Canterbury. Retrieved from http://dx.doi.org/10.26021/869
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Monks, James. “Food security in Solomon Islands: Preliminary results from a survey of the Honiara Central Market.” 2018. Thesis, University of Canterbury. Accessed March 01, 2021.
http://dx.doi.org/10.26021/869.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Monks, James. “Food security in Solomon Islands: Preliminary results from a survey of the Honiara Central Market.” 2018. Web. 01 Mar 2021.
Vancouver:
Monks J. Food security in Solomon Islands: Preliminary results from a survey of the Honiara Central Market. [Internet] [Thesis]. University of Canterbury; 2018. [cited 2021 Mar 01].
Available from: http://dx.doi.org/10.26021/869.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Monks J. Food security in Solomon Islands: Preliminary results from a survey of the Honiara Central Market. [Thesis]. University of Canterbury; 2018. Available from: http://dx.doi.org/10.26021/869
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

George Mason University
27.
Vestermark, Christian.
National and Human Security Issues in Irregular Migration in the USA: The Cuban Irregular Migration Crisis
.
Degree: 2015, George Mason University
URL: http://hdl.handle.net/1920/9145
► National Security and Human Security are two concepts of the larger field of Security that have been and currently remain at odds with each other.…
(more)
▼ National
Security and
Human Security are two concepts of the larger field of
Security that have been and currently remain at odds with each other. On one hand, National
Security seeks to uphold the sovereignty of this synthetic idea of the ‘State’, while, on the other hand,
Human Security seeks the recognition of the internationally accepted rights of the individual, in any situation, whether the State recognizes them or not. As one can imagine, based on this ongoing division within the field of
security, such as issue as migration is
subject to just as heated as debate. National
Security would state that the protection of the sovereign nation from the effects from the movement of unknown persons is paramount over the rights of the individual.
Human Security rejects this notion, arguing that the well-being of the
human person should be the primary focus in all matters, whether the action be a legal matter or one of state sovereignty. While the division between these views of
security usually results in one taking precedence over the other, the case of Cuban irregular migration to the United States is a unique case. The shared history between the island and the US, be it the Cuban War for Independence or the Bay of Pigs Invasion and subsequent Missile Crisis after, is one wrought with
security issues stemming from the field of National
Security. The migration crisis, however, spurred on by these events, resulted in a shift in focus from the protection of the state, to the care of the individual. US policy towards Cuba would come to develop a unique focus on
Human Security out of a setting that was highly reliant upon the ideals of National
Security. This dissertation hopes to use the case of US and Cuban policy development with between National Defense and Cuban Migration to the US to effectively demonstrate that both the principles of National
Security and
Human Security have a place in policy and can be used effectively without jeopardizing the ideals of either field.
Advisors/Committee Members: Maulden, Patricia A (advisor).
Subjects/Keywords: conflict;
Wetfoot; Dryfoot;
human security;
Cuba;
national security;
irregular migration
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Vestermark, C. (2015). National and Human Security Issues in Irregular Migration in the USA: The Cuban Irregular Migration Crisis
. (Thesis). George Mason University. Retrieved from http://hdl.handle.net/1920/9145
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Vestermark, Christian. “National and Human Security Issues in Irregular Migration in the USA: The Cuban Irregular Migration Crisis
.” 2015. Thesis, George Mason University. Accessed March 01, 2021.
http://hdl.handle.net/1920/9145.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Vestermark, Christian. “National and Human Security Issues in Irregular Migration in the USA: The Cuban Irregular Migration Crisis
.” 2015. Web. 01 Mar 2021.
Vancouver:
Vestermark C. National and Human Security Issues in Irregular Migration in the USA: The Cuban Irregular Migration Crisis
. [Internet] [Thesis]. George Mason University; 2015. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/1920/9145.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Vestermark C. National and Human Security Issues in Irregular Migration in the USA: The Cuban Irregular Migration Crisis
. [Thesis]. George Mason University; 2015. Available from: http://hdl.handle.net/1920/9145
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

University of Kansas
28.
Innes, Alexandria Jayne.
ASYLUM SEEKERS AND THE STATE. WHOSE THREAT? WHOSE SECURITY?.
Degree: PhD, Political Science, 2011, University of Kansas
URL: http://hdl.handle.net/1808/9789
► This dissertation examines the disparity between how states define asylum seekers and who identifies him or herself to be an asylum seeker. Using interpretive methodologies…
(more)
▼ This dissertation examines the disparity between how states define asylum seekers and who identifies him or herself to be an asylum seeker. Using interpretive methodologies I examine how states construct asylum seekers in
security discourses, and the role of international geopolitics in solidifying state-based identities in state discourses. Narrative interviews with asylum seekers offer insight into how state
security discourses act upon asylum seekers as individuals. I juxtapose narratives addressing the experience of being an asylum seeker with the state based analysis. I use the theory of ontological
security as an analytical tool capable of furthering a comprehension of the contention between state-based
security discourses and decentered
security that reveals the power of state-based identities and how the dominance of state-based identities in the international system actively detracts from other identities. The theory of ontological
security can offer an explanation as to how and why state discourse positions asylum seekers as a threat. The biographical identity narrative within the state and the way the state acts amongst its international peers offers insight into the ways migrants contest state identity and state
security. By intersecting the this
security literature that assumes the state and migration literature that problematizes the state I make an intervention. This intervention is situated within the
human security paradigm, in which I offer a decentered
human security that incorporates the logic of ontological
security without the state, whereby
human security does not have to rely on state based identities.
Advisors/Committee Members: Steele, Brent J. (advisor), Omelicheva, Mariya (cmtemember), Britton, Hannah E. (cmtemember), Heilke, Thomas W. (cmtemember), Metz, Brent E (cmtemember).
Subjects/Keywords: International relations; Political science; Asylum seekers; Human security; Migration; Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Innes, A. J. (2011). ASYLUM SEEKERS AND THE STATE. WHOSE THREAT? WHOSE SECURITY?. (Doctoral Dissertation). University of Kansas. Retrieved from http://hdl.handle.net/1808/9789
Chicago Manual of Style (16th Edition):
Innes, Alexandria Jayne. “ASYLUM SEEKERS AND THE STATE. WHOSE THREAT? WHOSE SECURITY?.” 2011. Doctoral Dissertation, University of Kansas. Accessed March 01, 2021.
http://hdl.handle.net/1808/9789.
MLA Handbook (7th Edition):
Innes, Alexandria Jayne. “ASYLUM SEEKERS AND THE STATE. WHOSE THREAT? WHOSE SECURITY?.” 2011. Web. 01 Mar 2021.
Vancouver:
Innes AJ. ASYLUM SEEKERS AND THE STATE. WHOSE THREAT? WHOSE SECURITY?. [Internet] [Doctoral dissertation]. University of Kansas; 2011. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/1808/9789.
Council of Science Editors:
Innes AJ. ASYLUM SEEKERS AND THE STATE. WHOSE THREAT? WHOSE SECURITY?. [Doctoral Dissertation]. University of Kansas; 2011. Available from: http://hdl.handle.net/1808/9789

Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ)
29.
Tzimas, Themistoklis.
Η ανθρώπινη ασφάλεια στο πλαίσιο της συλλογικής ασφάλειας.
Degree: 2016, Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ)
URL: http://hdl.handle.net/10442/hedi/37155
► The theme of the thesis is human security and more specifically, the way it is incorporated within the collective security system, as an inherent part…
(more)
▼ The theme of the thesis is human security and more specifically, the way it is incorporated within the collective security system, as an inherent part of the latter. Through this approach to the relationship between human and collective security are interpreted forms of use of force, interventionist and intervening policies in furtherance of the collective security system goals. The main argument is that a legally accurate and a practically effective implementation of the collective security system, in terms of its capacity to tackle a variety of threats and challenges which occur within the international community, human and state- centered security must be comprehended as equally important pillars of the collective security system. The legal part of the argument is derived from the foundation of human security on the UN Charter and more specifically its preamble, principles as well as article 55. Concerning the effectiveness of the collective security system, the argument is based on the impact of the entrance of the “human paragon” both at the individual and at the collective level at the international forefront, not only through statehood but also directly; a condition which has formulated a situation of multiple actors, state and non- state alike, bearing as a consequence the subsequent multiplicity and diversity of challenges to collective security, which are derived not only from the international but also at the sub- national and national level.The structure of the thesis is comprised from a theoretical first part and from a second part focusing on the examination of the implementation of the theoretical part, in the framework of collective security. The first chapter refers to the legal categorization and the definition of human security, the second chapter to the relationship between human security, human rights, right to self- determination and human development and the third chapter places human security within the necessities of the international community, supranational statehood and eventually collective security.In the second part are examined the specific policies which bear directly or indirectly the spirit of human security, attempting to implement it. In the fourth chapter the focus is on responsibility to protect and more specifically its responsibility to prevent and to rebuild aspects. In the fifth chapter the use of force is examined, from humanitarian intervention to responsibility to react. In the sixth chapter are analyzed matters of regime change, given that it constitutes the most intervening policy within the state authority. In the conclusions, the position about the impact of the human paragon, as a catalyst for the development of international law is formulated.
Το θέμα της εργασίας είναι η ανθρώπινη ασφάλεια και ειδικότερα ο τρόπος που αυτή τίθεται μέσα στο σύστημα συλλογικής ασφάλειας ως συστατικό στοιχείο του τελευταίου. Δια της εν λόγω ένθεσης και συσχέτισης της ανθρώπινης ασφάλειας με τη συλλογική ασφάλεια, ερμηνεύονται μορφές χρήσης βίας, παρεμβατικές και επεμβατικές…
Subjects/Keywords: Ανθρώπινη ασφάλεια; Συλλογική ασφάλεια; Human security; Collective Security
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Tzimas, T. (2016). Η ανθρώπινη ασφάλεια στο πλαίσιο της συλλογικής ασφάλειας. (Thesis). Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ). Retrieved from http://hdl.handle.net/10442/hedi/37155
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Chicago Manual of Style (16th Edition):
Tzimas, Themistoklis. “Η ανθρώπινη ασφάλεια στο πλαίσιο της συλλογικής ασφάλειας.” 2016. Thesis, Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ). Accessed March 01, 2021.
http://hdl.handle.net/10442/hedi/37155.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
MLA Handbook (7th Edition):
Tzimas, Themistoklis. “Η ανθρώπινη ασφάλεια στο πλαίσιο της συλλογικής ασφάλειας.” 2016. Web. 01 Mar 2021.
Vancouver:
Tzimas T. Η ανθρώπινη ασφάλεια στο πλαίσιο της συλλογικής ασφάλειας. [Internet] [Thesis]. Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ); 2016. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/10442/hedi/37155.
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
Council of Science Editors:
Tzimas T. Η ανθρώπινη ασφάλεια στο πλαίσιο της συλλογικής ασφάλειας. [Thesis]. Aristotle University Of Thessaloniki (AUTH); Αριστοτέλειο Πανεπιστήμιο Θεσσαλονίκης (ΑΠΘ); 2016. Available from: http://hdl.handle.net/10442/hedi/37155
Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Angelo State University
30.
Goecker, Jamin Nathanael.
Human Trafficking: A Weapon in Our Enemies' Hands.
Degree: Masters of Security Studies, Security Studies, 2015, Angelo State University
URL: http://hdl.handle.net/2346.1/30394
► Fairly recently in history, most societies abolished slavery, but the practice continues to thrive in different forms. Unfortunately, the enemies of the U.S. have adopted…
(more)
▼ Fairly recently in history, most societies abolished slavery, but the practice continues to thrive in different forms. Unfortunately, the enemies of the U.S. have adopted it as a tool to strengthen themselves. Chapter one covers this versatile topic by focusing upon the global scale of it and its different embodiments. Chapter two discusses the conditions in which
human trafficking thrives. Chapter three explores the ways a terrorist organization uses
human trafficking. Chapter four covers the ways organized crime uses it to generates money. Chapter five discusses how rogue nations use it to support themselves. These chapters demonstrate how
human traffickers use globalization, culture, and religion to operate
Advisors/Committee Members: Bechtol, Bruce (advisor), Celso, Anthony (committee member), Taylor, William (committee member), Dewar, David (committee member).
Subjects/Keywords: Human Trafficking; National Security; Human Security; Corruption; Globalization; Organized Crime; Terrorism; Rogue Nations; Culture
Record Details
Similar Records
Cite
Share »
Record Details
Similar Records
Cite
« Share





❌
APA ·
Chicago ·
MLA ·
Vancouver ·
CSE |
Export
to Zotero / EndNote / Reference
Manager
APA (6th Edition):
Goecker, J. N. (2015). Human Trafficking: A Weapon in Our Enemies' Hands. (Masters Thesis). Angelo State University. Retrieved from http://hdl.handle.net/2346.1/30394
Chicago Manual of Style (16th Edition):
Goecker, Jamin Nathanael. “Human Trafficking: A Weapon in Our Enemies' Hands.” 2015. Masters Thesis, Angelo State University. Accessed March 01, 2021.
http://hdl.handle.net/2346.1/30394.
MLA Handbook (7th Edition):
Goecker, Jamin Nathanael. “Human Trafficking: A Weapon in Our Enemies' Hands.” 2015. Web. 01 Mar 2021.
Vancouver:
Goecker JN. Human Trafficking: A Weapon in Our Enemies' Hands. [Internet] [Masters thesis]. Angelo State University; 2015. [cited 2021 Mar 01].
Available from: http://hdl.handle.net/2346.1/30394.
Council of Science Editors:
Goecker JN. Human Trafficking: A Weapon in Our Enemies' Hands. [Masters Thesis]. Angelo State University; 2015. Available from: http://hdl.handle.net/2346.1/30394
◁ [1] [2] [3] [4] [5] … [19] ▶
.