Národní úložiště šedé literatury Nalezeno 36 záznamů.  předchozí11 - 20dalšíkonec  přejít na záznam: Hledání trvalo 0.01 vteřin. 
Critical Infrastructure Protection and Public-Private Partnerships in the United States and the European Union
Velásquez, Jorge Fidel ; Střítecký, Vít (vedoucí práce) ; Butler, Eamonn (oponent) ; Fitzgerald, James (oponent)
The international system is full of threats and risks that threaten the security and resilience of individuals, organizations, enterprises, and nations which heavily rely on Critical Infrastructure (CI). Therefore, it is necessary to assure the protection of CIs as the damage or disruption of the services provided by CIs can have detrimental effects on society. Consequently, in order to achieve the protection of CIs, governments need to develop effective alliances with the private sector to overcome the issues and challenges that may emerge when creating, protecting or rehabilitating CIs. However, the liaison between the public and the private sector is a delicate topic as effective methodologies and strategies should be developed to assure Critical Infrastructure Protection (CIP). For this reason, this study investigates the role of Public-Private Partnership (PPP) in the creation, protection, and rehabilitation of CIs. Furthermore, this paper analyses the evolution of the CIP and PPP concepts, as well as the United States and the European Union strategic approach to CIP and PPPs. Also, it develops a framework for analysis to evaluate PPPs in CIP, therefore, four projects that applied the PPP methodology for their development were selected for analysis. These projects are the Long Beach California...
The Influence of National Cultures on Cybersecurity Strategies: A Comparative Case Studies analysis of the UK and Italy's Cybersecurity Postures
Viscardi, Valerio ; Butler, Eamonn (vedoucí práce) ; Špelda, Petr (oponent) ; Dowd, Caitriona (oponent)
The Influence of National Cultures on Cybersecurity Strategies: A Comparative Case Studies analysis of the UK and Italy's Cybersecurity Postures Abstract This thesis explores the influence that national cultures have on the countries' approaches to cybersecurity. The main idea is that cultural characteristics inform different strategic policy developments. For this purpose, it was selected a comparative case studies approach with the UK's and Italy's as the selected case studies. Through a thematic analysis of those countries' cybersecurity strategic documents, it was possible to identify and compare the main elements where national cultures informed different policy choices. From the analysis, it emerged that the Italian and the UK's national cultures shaped the ways the two countries have developed their national cybersecurity strategies over time. Consequently, to gain a better understanding of how a country could behave when facing new security challenges, researchers should not underestimate the role of culture.
From Russia with Fear: The Presence of Emotion in Russian Disinformation Tweets
Pocyte, Agniete ; Butler, Eamonn (vedoucí práce) ; Fitzgerald, James (oponent) ; Střítecký, Vít (oponent)
Russian disinformation continues to be an ongoing issue in the present security environment. International organisations (e.g. EU) and researchers highlight that emotional appeals (mostly related to fear, anger, and prejudice) in Russian disinformation are used to deepen social division and increase polarisation surrounding a particular issue (European Parliamentary Research Service, 2019; Sivek, 2018; Nisbet & Kamenchuk, 2019; Asmolov, 2018; Bennet & Livingston, 2018; Schmitt, 2018; Karlsen, 2016). While the acknowledgement of emotional appeals in the disinformation literature is common, research into these appeals is sparse. The present study provides an overview of both emotion and disinformation literature and aims to answer three research questions: what emotions are present in Russian disinformation, are some emotions more common than others, and does disinformation communicate specific topics through discrete emotions? Through emotion (sentiment) analysis we found presence of all 8 of Plutchik's emotions in a Russian disinformation tweet dataset; fear, anger, trust, anticipation, sadness, joy, disgust, and surprise. Within the tweet corpus, approximately 5% of tweets belonged to a discrete emotional frame, with fear and anger the most prevalent by a large margin. Specific emotion categories...
Cyber Threat Intelligence: A Proposal of a Threat Intelligence Cycle from an Enterprise Perspective
Meli Tsofou, Cedric ; Butler, Eamonn (vedoucí práce) ; Střítecký, Vít (oponent) ; Fitzgerald, James (oponent)
The number of cyber attacks over the last decade has been increasing sharply while being more and more targeted and sophisticated at the same time. These types of targeted and sophisticated attacks are called advanced persistent threats (APTs) and cause lots of damages to companies through data losses, injecting viruses, amongst others. While cyber threat intelligence has been recognized by experts as an efficient tool to combat APTs, its implementation has been rather slow mainly due to a lack in clarity, consensus, and little academic research as to what exactly is cyber threat intelligence from the perspective of enterprise cyber security. Therefore, there is need to provide a unifying definition of cyber threat intelligence and its creation process from enterprise perspective. Through the lens of comparative analysis, this paper aims to challenge the stability of currently existing cyber threat intelligence cycles and definitions by a thematic analysis of various cyber security white papers and academic literature. Qualitative analysis will equally permit to have an insider view of the field and forge subjective opinions and allow for ambiguity, contradiction, and the generation of new ideas.
The cyber-transition of the electricity sector and V-4 energy cooperation
van Dam, Dorien ; Butler, Eamonn (vedoucí práce) ; Pili, Giangiuseppe (oponent) ; Špelda, Petr (oponent)
With our societies undergoing an energy transition which favours increased electrification over the use of fossil fuels, electric grid governance may in the future be of greater importance than traditional pipeline politics. Parallel to the energy transition, critical infrastructure is witnessing a process of digitalisation, opening up a range of new security threats as illustrated by the 2015 hack of the Ukrainian electricity grid. This research uses a socio- technical approach to highlight the relationship between technology and politics at the nexus of energy- and cybersecurity. By using the concept of imaginaries as an analytical framework, the effects of the cyber-transition in the electricity sector on V-4 energy cooperation are studied. Finally, this paper will argue that international political discourse surrounding the energy sector is still dominated by traditional energy security concerns, rather than incorporating newly emerging threats thereby emphasizing the role of politics over technology.
A Critical Review of Bangladesh's Relations with China and India
Hasan, Rakibul ; Butler, Eamonn (vedoucí práce) ; Kaczmarski, Marcin (oponent) ; Schlotti, Jivanta (oponent)
Over recent years Bangladesh has managed to receive plenty of investments from China and India. The dissertation answers how Bangladesh, being a small state, has been able to benefit from two rival powers, China and India, at the same time without being completely aligned with either one. Small states usually tend to balance one powerful state by bandwagoning with another one. In South Asia, it seems Bangladesh has successfully avoided the tendency and retained its strategic autonomy up to some point. For how long Bangladesh will continue to stay equally open to China and India or choose one over another in years to come remains unanswered in much of International Relations (IR) literature. Many IR theories suggesting small states having less bargaining capacities in affairs with their powerful counterparts simply do not apply here. Here the thesis argues that reduced rivalry and increased economic interdependence between China and India in an age of economic globalization has contributed to the ability of Bangladesh taking advantage of both without falling into the strategic orbit of either power. However, if the rivalry between China and India intensifies, Bangladesh may have to make a clear choice of picking a side. The thesis also answers how will such intense rivalry, if it ever happens,...
Saudi Arabia and the Emirates Involvement in Yemen War: A Comparative Analysis
Khalife, Sawsan ; Karásek, Tomáš (vedoucí práce) ; Butler, Eamonn (oponent) ; Fitzgerald, James (oponent)
The dissertation compares the unique involvement of Saudi Arabia and the Emirates in the Yemeni war. The scholarship has yet to provide a comprehensive account on the Saudi and Emirati involvement in Yemen that explains their choice to get involved on such a massive scale military intervention. In comparing the cases of their involvement in Yemen war - this research aims to reflects on intangible aspects of power. That is, the ability to use state resources in order to reach political aims. Never before had we the opportunity to contrast the abilities of the two states to exercise power for political aims on such massive scale. In order to explore these aspects, and further advance the literature around the coalition framework in Yemen, this research mirrors one state, Saudi Arabia, in front of its coalition ally, the Emirates, in a deliberate attempt to value, assess and analyse the state interests in Yemen and the measures to reach them. This is accomplished by linking the national interests with the actual involvement in Yemen. Without making a connection between the incentives in the context of national interests, and the tactical level of the operations, assessment of their power capabilities in this case study remains largely limited in scope and constrained within tactical walls. The...
Quantum Technology and Its Influence in Global Power Politics
Padilla Cruz, Andrea Marzeth ; Tesař, Jakub (vedoucí práce) ; Butler, Eamonn (oponent) ; Dowd, Caitriona (oponent)
The interpretation of technology as a form of power in global politics has played a crucial role in the shaping of the structure of the international system throughout history. Despite the relevance of technology in power politics, relatively little systematic attention has been given to the role of new and emerging technologies, especially in terms of the influence of their spread and effects on the dynamics of the international system and the strategic balance of power. This dissertation studies the influence of Quantum Technology (QT) in global power politics. It empirically explores and evaluates the relationship between QTs and three major global powers: China, the United States, and the European Union, in order to assess how future trajectories in this technology can influence the dynamics of the international system and the strategic balance of power. Building on a theory on military innovation and technological change, i.e. Horowitz's Adoption-Capacity (AC) theory, the study focuses on deepening the understanding of the spread of QTs by analysing the incentives and constraints behind major global power's decision to adopt and develop such technology. Furthermore, it evaluates the implications of this technology for the balance of power, the structure of international competition, and future...
Financial Intelligence and Money Laundering: A Comparative Case Study of the UK and Brazil
Silveira, Louise Nathalie Vingert ; Butler, Eamonn (vedoucí práce) ; Erkomashvili, David (oponent) ; Biagini, Erika (oponent)
Financial Intelligence and Money Laundering: A Comparative Case Study of the UK and Brazil July 2020 Glasgow University Student ID: 2401161s DCU Student ID: 18114270 Charles University Student ID: 46010726 Louise Nathalie Vingert Silveira Presented in partial fulfilment of the requirements for the Degree of International Master in Security, Intelligence and Strategic Studies Word Count: 24,094 Supervisor: Dr. Eamonn Butler McIntosh Date of Submission: 29th July 2020 Abstract: Money Laundering (ML) offers criminals the means to hide their illicit proceeds allowing them to enjoy their profits or further reinvest in criminal activities. Financial intelligence provides a comprehensive and effective strategy to disrupt these criminal networks increasing security worldwide. To this purpose the use of Financial Intelligence Units (FIUs) are central in detecting suspicious transactions and providing law enforcement with useful intelligence. The international Anti-Money Laundering (AML) regime offers flexibility on the type of their institutional arrangement which have translated into four models by state practice. The aim of this dissertation is to explore this flexibility and question if the model adopted by a country influences its operations. A mix method approach consisting of document analysis and comparative...
Artificial Intelligence and Human Security: AI Strategy Analysis
Wilson, Elizabeth ; Butler, Eamonn (vedoucí práce) ; Pili, Giangiuseppe (oponent) ; Špelda, Petr (oponent)
The capabilities of Artificial Intelligence are growing quickly while the technology widely proliferates. Many risks and benefits are emerging as it becomes more powerful. This thesis aims to identify the set of risks and benefits emerging from AI that affect Human Security and the implications of how they are being acknowledged and addressed in government strategies. A definition of Human Security was chosen after a review of the literature. Due to its individual country agnosticism and useful split into 7 dimensions (Economic, Food, Health, Environmental, Personal, Community, and Political Security) the 1994 UN Human Development report's definition was chosen. Inductive document analysis was performed using the 7 dimensions of Human Security as an analytical framework. Twenty-four documents from 18 different governments were identified, and then keyword analysis was implemented on each to highlight their relevancy to each of the 7 dimensions. This allowed for the creation of a binary set of data showing the coverage of those 7 dimensions in each document and the overall coverage of each dimension across all documents. The relevancies that were identified were then qualitatively and quantitatively analysed by addressing the trends seen across the documents and each document's relevancy to the 7...

Národní úložiště šedé literatury : Nalezeno 36 záznamů.   předchozí11 - 20dalšíkonec  přejít na záznam:
Chcete být upozorněni, pokud se objeví nové záznamy odpovídající tomuto dotazu?
Přihlásit se k odběru RSS.