Skip to main content

Research Repository

Advanced Search

All Outputs (3)

The counterinsurgency campaign of the Nigerian army : the fight against the Boko-Haram insurgency in north-east Nigeria, 1999-2017 (2020)
Thesis
Yalmi, G. The counterinsurgency campaign of the Nigerian army : the fight against the Boko-Haram insurgency in north-east Nigeria, 1999-2017. (Thesis). University of Salford

The emergence of civilian democratic governance in Nigeria in 1999, which came after three decades of armed forces rule, has been a watershed in the nation’s five decade history. This period is associated with recurrent crises, including militancy an... Read More about The counterinsurgency campaign of the Nigerian army : the fight against the Boko-Haram insurgency in north-east Nigeria, 1999-2017.

A standard European tank? Procurement politics, technology transfer and the challenges of collaborative MBT projects in the NATO alliance since 1945 (2019)
Thesis
Cubbin, M. A standard European tank? Procurement politics, technology transfer and the challenges of collaborative MBT projects in the NATO alliance since 1945. (Thesis). University of Salford

International cooperation in weapons technology projects has long been a feature of alliance politics; and, there are many advantages to both international technology transfer and standardisation within military alliances. International collaboration... Read More about A standard European tank? Procurement politics, technology transfer and the challenges of collaborative MBT projects in the NATO alliance since 1945.

Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology
Thesis
Carruthers, W. (in press). Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology. (Thesis). University of Salford

Over the last three years a number of significant, alleged cyber offensive operations have taken place: the North Korean operations against Sony Pictures in 2014; the BlackEnergy3 Virus which targeted Ukrainian power substations in 2015; and the cybe... Read More about Covert action and cyber offensive operations : revisiting traditional approaches in light of new technology.