SwePub
Tyck till om SwePub Sök här!
Sök i SwePub databas

  Extended search

Träfflista för sökning "hsv:(NATURVETENSKAP) ;lar1:(fhs);mspu:(doctoralthesis)"

Search: hsv:(NATURVETENSKAP) > Swedish National Defence College > Doctoral thesis

  • Result 1-4 of 4
Sort/group result
   
EnumerationReferenceCoverFind
1.
  • Foyer, Pernilla (author)
  • Early Experience, Maternal Care and Behavioural Test Design : Effects on the Temperament of Military Working Dogs
  • 2015
  • Doctoral thesis (other academic/artistic)abstract
    • Domestication has resulted in animals with broad variations between as well as within breeds, which allows for the selection and breeding of animals for preferred traits. This selection has affected both the genotypes and phenotypes of animals. In dogs, it has allowed for breeding for different purposes, such as companionship or the performance of specific tasks, e.g., herding, hunting, searching and protecting. Each of these types of working dogs has specific traits that are, in part, controlled by genes; however, genes are not solely responsible for the variations in the traits of an individual. The environment also plays a role, which has been studied in rodents and primates in recent decades. For instance, it has been shown that the amount of maternal care that a rat receives as a pup affects its temperament later in life; the more maternal care, i.e., licking, grooming and arched-back nursing (LG-ABN), that a rat receives, the more stress resistant, less reactive and more explorative it will be as an adult. However, the question is whether this is also true for dogs, and the investigation of how temperament in dogs is affected by environmental factors early in life is the main objective of this thesis. Three of the studies presented in this thesis focused on investigating the general parameters, particularly maternal care, that influences offspring behaviour to contribute to the understanding of temperament development in military working dogs. One of these studies concentrated on the environmental factors that influence dogs early in life, and the results indicated that some factors, such as parity, litter size and birth season, affect temperament later in life. Another study investigated how females take care of their young, and the results demonstrated that females consistently vary in their maternal style during the first three weeks postpartum and that this variation affects the temperament of the offspring. The third study focused on factors in the home environment, and the results showed that dogs approved through the evaluative temperament test were significantly associated with being hyperactive or restless and having difficulty settling down in the home environment. However, those dogs were also left home alone for more hours in a day than non-approved dogs. To be able to operate functionally, a military working dog needs to possess certain traits, or a certain temperament, and a vital characteristic is the way it responds to and copes with stress. This was investigated during an evaluative temperament test used to select dogs suitable for further training. Surprisingly, the results showed that the dogs approved for further training had significantly higher levels of salivary cortisol both before and after the test compared with the non-approved dogs. These findings may be of profound importance for understanding individual variations in behaviour and improving breeding schemes for working dogs.
  •  
2.
  • Frank, Anders, 1969- (author)
  • Gamer mode : Identifying and managing unwanted behaviour in military educational wargaming
  • 2014
  • Doctoral thesis (other academic/artistic)abstract
    • Games are rule-governed systems at the same time as they are fiction, simulating or representing a real or an abstract world. This defining characteristic may create for different forms of tensions, that is, at different times players may focus on the rules, the fiction or on both during game play. In military education with games, this poses a problem when the learner becomes too focused on the rules, trying to win at any price rather than taking the representation and what it implies in terms of permissible behaviour seriously. In here we attempt to understand how participants in a wargaming situation act out this tension by studying the interaction between the player and the game in military tactical training.The results first of all confirm that there is a tension – there are occasions where players are mainly concerned with winning the wargame, disregarding what the theme is meant to represent. I propose the term gamer mode to refer to this player orientation: players in gamer mode have an extreme rule-focused interaction, meaning they behave rationally with respect to game rules but irrationally with respect to the portrayed real-life situation they are training for. Gamer mode can probably occur for many reasons. This thesis documents two contributing factors. The first concerns whenever the game does not match players’ expectation on mimicking warfare. In these situations players may find that the game breaks the fragile contract of upholding an accurate representation of warfare. The other factor that may lead to gamer mode are game design features such as explicit reward structures or victory conditions.To remedy the situation, the instructor can, in real-time, actively support players’ orientation towards the game and explain in-game events, keeping them on track. When gamer mode occur I argue that the conditions for learning are compromised as the gaming activity becomes its own learning subject, blurring and overshadowing the learning objective. Although the results suggest that gamer mode is mainly detrimental to learning I conclude that gamer mode is a natural way students will approach games and as such, needs to be dealt with by the instructor.
  •  
3.
  • Liwång, Hans (author)
  • Risk-based ship security analysis : a decision-support approach
  • 2015
  • Doctoral thesis (other academic/artistic)abstract
    • The protection of shipping does not come without hazards and threats for military forces, individual civilian ship operators and crews. With particular focus on security threats, this thesis is about how to prepare for such operations without introducing unnecessary risks, i.e., supporting conscious risk-taking related to ship security. It examines both civilian and military aspects of maritime security and therefore draws from the experience of both fields.Maritime safety regulations, guidelines and methods have a history and culture of systematic research, development and implementation. In contrast, international security is highly politicised and therefore less transparent. Unfortunately, comprehensive studies of ship security risk are rare. Moreover, applying risk-based approaches to security areas requires special considerations, and the limited research in this field has led to a knowledge gap.To reduce the identified challenges with respect to security risk analysis, the goal of this thesis is to improve security decision support by defining an approach to ship security analysis. To increase overall safety, this approach must facilitate compromises between traditional maritime safety and maritime security. Accordingly, the objective is to develop an approach that is both systematic and gives the decision maker an appropriate picture of the security risks. To examine the requirements for a security decision-support approach, the work in the appended papers studies both threats to naval vessels and the security threat posed to commercial vessels by pirates. The results of the studies can be used to further develop military doctrines and civilian guidelines.This study shows that the description and quantification of the (concept of) operation in the risk analysis is central for implementing both security and naval ship survivability. In addition, the crew’s risk perception, procedural safeguards and how the implemented risk controls are perceived have an important role not only in risk analysis but also in deciding the effectiveness of implemented controls. It is also concluded that only using expected values—not collecting and using uncertainties—in the analysis can lead to misleading results. Therefore, the uncertainty treatment offered by a quantitative approach is crucial for risk understanding, especially if the aim is to find robust control options or to support the development of a resilient culture.
  •  
4.
  • Sigholm, Johan (author)
  • Secure Tactical Communications for Inter-Organizational Collaboration : The Role of Emerging Information and Communications Technology, Privacy Issues, and Cyber Threats on the Digital Battlefield
  • 2016
  • Doctoral thesis (other academic/artistic)abstract
    • The development within the area of information and communications technology (ICT) has been rapid during the last couple of decades. Advancements in mobile technology, such as smartphones and other portable devices with embedded sensors, rapid expansion of communications infrastructure, and increased spectrum utilization, has had a major impact on civilian society, but increasingly also on professional organizations such as the Swedish Armed Forces. While this technology allows for enhanced capabilities in the areas of command and control, situational awareness, and information management, it also leads to new challenges in such areas as cyber security and privacy. For armed forces in many parts of the world, being able to deploy in new types of missions, such as humanitarian assistance and response operations due to natural or man-made disasters, is an increasingly sought-after capability. Such operations commonly require collaboration amongst several heterogeneous organizations, which in turn requires technical as well as organizational interoperability. While the actors must be able to share certain information efficiently, with regards to integrity and availability, sensitive or classified information must be safeguarded in terms of confidentiality.This thesis is concerned with studying emerging ICT for use on the battlefield of tomorrow, investigating how it can lead to more effective operations, and what preconditions that must be met in order for the technology to be of utility for inter-organizational collaboration. In particular, the thesis studies how an acceptable level of information security can be upheld in interconnected tactical communications networks. It is found that Mobile Ad-hoc Networks, Software-Defined Radio and Cognitive Radio are emerging technologies that, while still immature, can contribute to improved capabilities for communications, command and control, and information collection. Furthermore, Hastily Formed Networks is found to be an effective framework for collaboration between heterogeneous actors. However, in order for emerging ICTs to provide military utility, several non-technical requirements must be met. These include usability, trust, legality, cost, and verifying that the technology is in accordance with current military doctrine. Antagonistic as well as unintentional threats must also be mitigated, including information leaks caused by cyberattacks or insiders, and possible consequences of reduced user privacy.Besides to the Swedish Armed Forces, this thesis should be of interest to armed forces of comparable countries, and for professional organizations faced with similar challenges. Among the drawn conclusions, the thesis recommends continuously evaluating emerging ICT in support of new capabilities, through academic research as well as internal concept development. Adopting an incremental and modular process is also recommended when developing or procuring new ICT systems, instead of making long-term investments in proprietary technology. Furthermore, a focus should be put on promoting military requirements in future civilian ICT standards. In this way development costs can be reduced, while facilitating tactical use of commercial off-the-shelf products. Regarding information security in tactical networks for inter-organizational collaboration the thesis concludes that employing best-effort methods could allow for efficient information exchange between actors, while upholding acceptable risk levels regarding data leakage.
  •  
Skapa referenser, mejla, bekava och länka
  • Result 1-4 of 4

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

 
pil uppåt Close

Copy and save the link in order to return to this view