Národní úložiště šedé literatury Nalezeno 38 záznamů.  předchozí9 - 18dalšíkonec  přejít na záznam: Hledání trvalo 0.00 vteřin. 
(De)Securitization of Migration in Germany
Moormann, Britta ; Karyotis, Georgios (vedoucí práce) ; Karásek, Tomáš (oponent) ; Fitzgerald, James (oponent)
This research explores the (de)securitization of migration in the German case through qualitative Critical Discourse Analysis (CDA). By coding multiple primary sources of speech acts of two actors from the political elite, the competing frames of (de)securitization governing migration will be investigated. Subject to this research are the political parties The Left (Die Linke) and Alternative for Germany (Alternative für Deutschland [AfD]) representing sentiments of the most left and right parties on the governmental level of German politics. Analysing speech acts framing migration post 2015, this research identifies the construction of and, emphasis on the security-migration nexus under consideration of characteristic patterns of political communication and the theory of migrantization. This research further exemplifies that neither of the frames of (de)securitization is just a snapshot. To the contrary, both frames need to be elucidated in order to reflect contemporary dynamics of polarized political discourse. Uncovering the security-migration nexus, this research finds that the AfD supports a securitizing and The Left a desecuritizing frame of migration. However, both parties' speech acts are supported to varying degrees. Whereas the speech acts of the AfD receive a high degree of acceptance by...
Countering Religious Extremism and Online Radicalization in Uzbekistan
Khakimov, Farrukh ; Anceschi, Luca (vedoucí práce) ; Fitzgerald, James (oponent) ; Aslan, Emil (oponent)
From the early days of its independence the Republic of Uzbekistan considered religious extremism and terrorism as the most serious threat to national and regional security. During the 1990s internationally designated terrorist organizations: "The Islamic Movement of Uzbekistan" (IMU), "The Islamic Jihad Union" (IJU)1 , Central Asian branch of "Hizbut-Tahrir al Islamiya" (HT) and other radical groups emerged in Uzbekistan as opponents to secular political system of the newly independent state - Republic of Uzbekistan. Due to strict counterterrorism policy of Uzbekistan the level of the threat in the country steadily declined, however, religious extremism and radicalism have not disappeared as major radical organizations moved to neighbouring Afghanistan and Tajikistan; some of which still conduct covert activities within the country and abroad. In addition, the recent emergence of different radical militant groups in Afghanistan such as Katibat al-Imam al-Bukhari (KIB) and Katibat Tavhid wal Jihod (KTJ), which have returned to the region from Syrian civil war, caused concerns for Central Asian countries, especially for Uzbekistan as these radical militant groups are fighting in the north of the Afghanistan, not far from Uzbekistan's border (Cornell & Zenn, 2018). Moreover, with the development of...
Critical Infrastructure Protection and Public-Private Partnerships in the United States and the European Union
Velásquez, Jorge Fidel ; Střítecký, Vít (vedoucí práce) ; Butler, Eamonn (oponent) ; Fitzgerald, James (oponent)
The international system is full of threats and risks that threaten the security and resilience of individuals, organizations, enterprises, and nations which heavily rely on Critical Infrastructure (CI). Therefore, it is necessary to assure the protection of CIs as the damage or disruption of the services provided by CIs can have detrimental effects on society. Consequently, in order to achieve the protection of CIs, governments need to develop effective alliances with the private sector to overcome the issues and challenges that may emerge when creating, protecting or rehabilitating CIs. However, the liaison between the public and the private sector is a delicate topic as effective methodologies and strategies should be developed to assure Critical Infrastructure Protection (CIP). For this reason, this study investigates the role of Public-Private Partnership (PPP) in the creation, protection, and rehabilitation of CIs. Furthermore, this paper analyses the evolution of the CIP and PPP concepts, as well as the United States and the European Union strategic approach to CIP and PPPs. Also, it develops a framework for analysis to evaluate PPPs in CIP, therefore, four projects that applied the PPP methodology for their development were selected for analysis. These projects are the Long Beach California...
Aggrieved misogynists, Violent Terrorists, or Both: Analysing the Manosphere to Understand Acts of Extremist Violence by Men's Rights Activists
McDonald, Heather Buchanan ; Kay, Rebecca (vedoucí práce) ; Střítecký, Vít (oponent) ; Fitzgerald, James (oponent)
In May 2020, a violent attack in Canada was labelled for the first time as incel terrorism; however, this attack is not the first time incels have been linked to acts of mass violence. Incels are just one subgroup of many amidst the manosphere; an online extension of the contemporary men's rights movement rife with anti-feminism, misogyny, and male supremacy. Increasingly we are witnessing real-world violent attacks by individuals affiliated with subgroups of the manosphere or those who have followed the ideas put forth there. This dissertation aimed to identify how the manosphere can aid us in better understanding of the threat posed by extremist men's rights activists. Therefore, the researcher analysed prominent manosphere websites and subsections of the website Reddit.com to uncover the ideologies and the behaviours driving the contemporary men's rights movement, and if these were reflective of the motives and writings of men's rights activists who had committed acts of mass violence. Key words: anti-feminism, misogyny, men's rights movement, male supremacy, gender- based violence, gender, feminism.
From Russia with Fear: The Presence of Emotion in Russian Disinformation Tweets
Pocyte, Agniete ; Butler, Eamonn (vedoucí práce) ; Fitzgerald, James (oponent) ; Střítecký, Vít (oponent)
Russian disinformation continues to be an ongoing issue in the present security environment. International organisations (e.g. EU) and researchers highlight that emotional appeals (mostly related to fear, anger, and prejudice) in Russian disinformation are used to deepen social division and increase polarisation surrounding a particular issue (European Parliamentary Research Service, 2019; Sivek, 2018; Nisbet & Kamenchuk, 2019; Asmolov, 2018; Bennet & Livingston, 2018; Schmitt, 2018; Karlsen, 2016). While the acknowledgement of emotional appeals in the disinformation literature is common, research into these appeals is sparse. The present study provides an overview of both emotion and disinformation literature and aims to answer three research questions: what emotions are present in Russian disinformation, are some emotions more common than others, and does disinformation communicate specific topics through discrete emotions? Through emotion (sentiment) analysis we found presence of all 8 of Plutchik's emotions in a Russian disinformation tweet dataset; fear, anger, trust, anticipation, sadness, joy, disgust, and surprise. Within the tweet corpus, approximately 5% of tweets belonged to a discrete emotional frame, with fear and anger the most prevalent by a large margin. Specific emotion categories...
Cyber Threat Intelligence: A Proposal of a Threat Intelligence Cycle from an Enterprise Perspective
Meli Tsofou, Cedric ; Butler, Eamonn (vedoucí práce) ; Střítecký, Vít (oponent) ; Fitzgerald, James (oponent)
The number of cyber attacks over the last decade has been increasing sharply while being more and more targeted and sophisticated at the same time. These types of targeted and sophisticated attacks are called advanced persistent threats (APTs) and cause lots of damages to companies through data losses, injecting viruses, amongst others. While cyber threat intelligence has been recognized by experts as an efficient tool to combat APTs, its implementation has been rather slow mainly due to a lack in clarity, consensus, and little academic research as to what exactly is cyber threat intelligence from the perspective of enterprise cyber security. Therefore, there is need to provide a unifying definition of cyber threat intelligence and its creation process from enterprise perspective. Through the lens of comparative analysis, this paper aims to challenge the stability of currently existing cyber threat intelligence cycles and definitions by a thematic analysis of various cyber security white papers and academic literature. Qualitative analysis will equally permit to have an insider view of the field and forge subjective opinions and allow for ambiguity, contradiction, and the generation of new ideas.
Saudi Arabia and the Emirates Involvement in Yemen War: A Comparative Analysis
Khalife, Sawsan ; Karásek, Tomáš (vedoucí práce) ; Butler, Eamonn (oponent) ; Fitzgerald, James (oponent)
The dissertation compares the unique involvement of Saudi Arabia and the Emirates in the Yemeni war. The scholarship has yet to provide a comprehensive account on the Saudi and Emirati involvement in Yemen that explains their choice to get involved on such a massive scale military intervention. In comparing the cases of their involvement in Yemen war - this research aims to reflects on intangible aspects of power. That is, the ability to use state resources in order to reach political aims. Never before had we the opportunity to contrast the abilities of the two states to exercise power for political aims on such massive scale. In order to explore these aspects, and further advance the literature around the coalition framework in Yemen, this research mirrors one state, Saudi Arabia, in front of its coalition ally, the Emirates, in a deliberate attempt to value, assess and analyse the state interests in Yemen and the measures to reach them. This is accomplished by linking the national interests with the actual involvement in Yemen. Without making a connection between the incentives in the context of national interests, and the tactical level of the operations, assessment of their power capabilities in this case study remains largely limited in scope and constrained within tactical walls. The...
Responding to Hybrid Warfare: The Case of the Attempted Assassination of Sergey Skripal
Kondrushenko, Yuliia ; Hays II, George (vedoucí práce) ; Van Puyvelde, Damien (oponent) ; Fitzgerald, James (oponent)
The concept of hybrid warfare, parsimonious but poorly defined in terms of theory, failed to provide an operational framework for relevant research or policy purposes. With a more holistic approach to hybrid warfare, this thesis means to revitalize a decaying interest to this topic, prove its relevance, as well as provide a new, broad understanding of the phenomenon that is fit for practical purposes. To study the means of state response to hybrid warfare through public policy, this dissertation adopted a case study approach. Ignoring the more 'traditional' hybrid scenarios, such as cyber attacks in the Baltics, this research focused on a more novel interpretation of a hybrid attack, such as the case of attempted assassination of Sergey Skripal. Cases of such unorthodox nature of hybrid warfare have the potential to unveil significant evidence base for both research and policy-making purposes in terms of prevention and reaction to hybrid scenarios. With findings of the research focusing on the triangulation of theory with a real-world scenario, this dissertation lays foundation for the new understanding of hybrid warfare and, possibly, a more comprehensive theory of hybrid warfare in the future.
Multidimensional Analysis of Security Concerns over Immigration: the Case of the United Kingdom
Cherkas, Alina ; Střítecký, Vít (vedoucí práce) ; Fitzgerald, James (oponent) ; Kay, Rebecca (oponent)
2 Abstract Building upon the Paris school of securitisation, this dissertation investigates the relationship between securitised migration and the perception of the European Union in the United Kingdom. Being among the first quantitative studies in the field of security, the work applies various data visualisation techniques and standard quantitative methods to study the phenomenon of migration securitisation in the UK between 2004 and 2018 based on the European Social Survey Data. Extensive exploratory analysis uncovers the existence of a distinct group of people in the UK who perceive both the EU and migration as threats. The analysis also finds stark regional and temporal differences that suggest a certain degree of securitisation of the migration issue in the run-up of the Brexit referendum, which disappears shortly after. Regression analysis using a fixed-effect model provides a reliable estimate of a strong and substantial effect of securitised migration on the perception of the EU. Keywords: Brexit, migration, securitisation, United Kingdom, visualisation, regression analysis.
Cyber Hype Versus Cyber Reality - How Severe Is The Threat That Chinese Cyber-Attacks Pose To United States' National Security?
Tay, Kai Lin ; Van Puyvelde, Damien (vedoucí práce) ; Fitzgerald, James (oponent) ; Špelda, Petr (oponent)
Cyber threats regarding China's political espionage and intellectual property theft have featured prominently in United States (U.S.) government's public discourse in recent years. This thesis examines the threats that China's cyber-attacks pose to U.S. national security and critically assesses whether the government discourse surrounding China's cyber-attacks accurately reflects the actual threats. Overall, the study shows that China's cyber-attacks do not pose an existential threat to U.S. national security, contrasting U.S. government officials' claims which tend to exaggerate and depict Chinese cyber-attacks as an existential threat. Based on cyber- attack data between the U.S. and China from January 2013 to May 2019, this paper observes that China primarily conducts long-term espionage, exerting economic, diplomatic and social impacts, but does not conduct any degradative cyber-attacks. The study also observes from government statements surrounding two cyber-attacks - Office of Personnel Management (OPM) hack and Operation Cloudhopper - that U.S. government officials exaggerated China's cyber-attacks in imposing counterintelligence impacts of mortal danger, and inflated China as an unprecedented threat that unfairly benefits Chinese firms at the expense of U.S. firms. This paper concludes that...

Národní úložiště šedé literatury : Nalezeno 38 záznamů.   předchozí9 - 18dalšíkonec  přejít na záznam:
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.