Now showing items 1-20 of 44

    • The analysis of Turkey's approach to peace operations 

      Güngör, Uğur (Bilkent University, 2007)
      This dissertation aims at analyzing the motivations that lie at the roots of Turkey’s involvement in peace operations, mostly organized under the leadership of the United Nations in the post-Cold War era. The main ...
    • Approaches to the root causes of state failure and collapse 

      Yumlu, Seda (Bilkent University, 2012)
      In the aftermath of the Cold War, failed states have increasingly been viewed as a cause for concern for the international system due to numerous humanitarian and security challenges they created. Since then, a variety ...
    • Arguing against security communitarianism 

      Bilgin, P. (Routledge, 2015-09-02)
      Anthony Burke’s ‘security cosmopolitanism’ is a fresh and thought-provoking contribution to critical theorizing about security. In this discussion piece, I would like to join Burke’s call for ‘security cosmopolitanism’ by ...
    • Climate change and security: Different perceptions, different approaches 

      Baysal, B.; Karakaş, U. (Forsnet, 2017)
      The concerns about the results of climate change have been increasing as new scientific proofs emerge and people witness its direct effects in environmental catastrophes. There also have been different efforts to frame ...
    • Collusion-secure watermarking for sequential data 

      Yılmaz, Arif (Bilkent University, 2017-10)
      In this work, we address the liability issues that may arise due to unauthorized sharing of personal data. We consider a scenario in which an individual shares his sequential data (such as genomic data or location patterns) ...
    • Cryptographic solutions for credibility and liability issues of genomic data 

      Ayday, E.; Tang, Q.; Yilmaz, A. (Institute of Electrical and Electronics Engineers, 2019)
      In this work, we consider a scenario that includes an individual sharing his genomic data (or results obtained from his genomic data) with a service provider. In this scenario, (i) the service provider wants to make sure ...
    • A demonstration of privacy-preserving aggregate queries for optimal location selection 

      Eryonucu, Cihan; Ayday, Erman; Zeydan, E. (IEEE, 2018)
      In recent years, service providers, such as mobile operators providing wireless services, collected location data in enormous extent with the increase of the usages of mobile phones. Vertical businesses, such as banks, may ...
    • The Europeanization of Turkish security culture : a reality or myth? 

      Bulut, Serkan (Bilkent University, 2010)
      Turkish journey to Europe has a history longer than 40 years however especially in the last 10 years more and more scholars started to study “Europeanization of Turkey” especially the foreign policy dimension. This ...
    • Free riding in peer-to-peer networks 

      Karakaya, M.; Korpeoglu, I.; Ulusoy, Ö. (Institute of Electrical and Electronics Engineers, 2009)
      Free riding in peer-to-peer (P2P) networks poses a serious threat to their proper operation. Here, the authors present a variety of approaches developed to overcome this problem. They introduce several unique aspects of ...
    • Gold and gold jewelry : exploration of consumer practices 

      Ertimur, Burçak (Bilkent University, 2003)
      This thesis explores consumers’ practices and experiences in relation to consumption of gold and gold jewelry. It focuses on the underlying motivations of consumers, the uses of gold and gold jewelry, and examines the ...
    • The Greek Muslim migration : rethinking the role of security and nationalism within the 1923 compulsory exchange of populations between Greece and Turkey 

      Kalayoğlu, Sinan (Bilkent University, 2004)
      In my Masters Thesis, I examine the 1923 Compulsory Population Exchange between Greece and Turkey (CEOPBGT). Endorsed at a convention in Lausanne, Switzerland, the forced transfer of over one million Anatolian Greek ...
    • How can a gender-aware analysis contribute to our understanding of security? 

      Şahin, Hande (Bilkent University, 2006)
      This thesis discusses the possible contribution of a gender-aware analysis to our understanding of security. Within the discipline of International Relations, there is a great diversity in the range of perspectives on ...
    • Illiberal security practices of liberal states in the post 9/11 era : Aberystwyth & Paris School compared 

      Türe, Tuğçe (Bilkent University, 2012)
      The relationship between security and liberty is an issue that has always attracted scholarly attention. After the 9/11 terrorist attacks, this issue received a new lease of life in the literature. This is because some ...
    • An inference attack on genomic data using kinship, complex correlations, and phenotype information 

      Deznabi, I.; Mobayen, M.; Jafari, N.; Tastan, O.; Ayday, E. (IEEE, 2018)
      Abstract—Individuals (and their family members) share (partial) genomic data on public platforms. However, using special characteristics of genomic data, background knowledge that can be obtained from the Web, and family ...
    • Inference attacks against kin genomic privacy 

      Ayday, E.; Humbert M. (Institute of Electrical and Electronics Engineers Inc., 2017)
      Genomic data poses serious interdependent risks: your data might also leak information about your family members' data. Methods attackers use to infer genomic information, as well as recent proposals for enhancing genomic ...
    • A magnificent partnership: Kant and Clausewitz 

      Karaosmanoǧlu, A.L. (2007)
      Kant and Clausewitz, the two great authors of the Enlightenment as well as of the Counter-Enlightenment, still play an important role in the theory of International Relations. The former continues to inspire Liberals and ...
    • Migration and security : history, practice, and theory 

      Aslan, Nazlı Sinem (Bilkent University, 2010)
      Receiving states viewed international migration as a means of economic development well until late 20th century. Since then policy makers around the world have increasingly associated migration to security and sought to ...
    • Multirelational k-anonymity 

      Nergiz, M.E.; Clifton, C.; Nergiz, A.E. (2009)
      k-Anonymity protects privacy by ensuring that data cannot be linked to a single individual. In a k-anonymous data set, any identifying information occurs in at least k tuples. Much research has been done to modify a ...
    • The only thing we have to fear: Post 9/11 institutionalization of in-security 

      Çelikpala, M.; Öztürk, D. (Uluslararasi Iliskiler Dergisi, 2012)
      During the last decade, billions of dollars have been spent to increase security measures in the United States. New institutions, including a department for homeland security, have been established, new security tools have ...
    • The politics of studying securitization? the Copenhagen School in Turkey 

      Bilgin, P. (Sage Publications Ltd., 2011)
      Copenhagen School securitization theory has made significant inroads into the study of security in Western Europe. In recent years, it has also begun to gain a presence elsewhere. This is somewhat unanticipated. Given the ...