Open Access. Powered by Scholars. Published by Universities.®
- Institution
Articles 1 - 5 of 5
Full-Text Articles in Entire DC Network
Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell
Where The Border Ends: How Reactive Policies To Terrorism Became Conduits For Drone Technology And The Enclosure Of Wealthy Nations, Arron Mitchell
PPPA Paper Prize
The Antiterrorism and Effective Death Penalty Act (1996) and the USA PATRIOT Act (2001) are two key examples of reactive policies enacted in response to terrorist attacks on American soil. Expedited passage of both pieces of legislation were reliant on the public’s support for government action in wake of recent atrocities. These acts gave particular attention to securing the nation’s borders, directing an increase in funding for Border Patrol in order to prevent future terrorist attacks. This essay will connect the increased funding for border security directed by Congress with the defense industry’s pursuit of funding and outlets for drone …
Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas
Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas
Mineta Transportation Institute
The intent of this study is to assess the readiness, resourcing, and structure of public transit agencies to identify, protect from, detect, respond to, and recover from cybersecurity vulnerabilities and threats. Given the multitude of connected devices already in use by the transit industry and the vast amount of data generated (with more coming online soon), the transit industry is vulnerable to malicious cyber-attack and other cybersecurity-related threats. This study reviews the state of best cybersecurity practices in public surface transit; outlines U.S. public surface transit operators’ cybersecurity operations; assesses U.S. policy on cybersecurity in public surface transportation; and provides …
Strategic Rocket Forces, Soviet, Bert Chapman
Strategic Rocket Forces, Soviet, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
Describes and analyzes the historic development and evolution of the Soviet Union's Strategic Rocket Forces which were a key part of this country's nuclear weapons arsenal. Covers the technical, political, economic, and military reasons for this force's development. U.S. efforts to monitor and assess the quantity and quality of these weapons are also covered.
Dwight Eisenhower, The Warrior, & John Kennedy, The Cold Warrior: Foreign Policy Under Two Presidents, Andrew C. Nosti
Dwight Eisenhower, The Warrior, & John Kennedy, The Cold Warrior: Foreign Policy Under Two Presidents, Andrew C. Nosti
Student Publications
This paper presents a comparison between President Eisenhower and President Kennedy's foreign affairs policies, specifically regarding the Cold War, by examining the presidents' interactions with four distinct Cold War regions.
Global Assessment Of Ec Mine Action Policy And Actions 2002-2004, Russell Gasser, Robert Keeley
Global Assessment Of Ec Mine Action Policy And Actions 2002-2004, Russell Gasser, Robert Keeley
Global CWD Repository
The Anti-Personnel Landmine Regulation mandates an overall assessment of all EC mine action every three years. This report contains the first such assessment for the period 2002-2004. The total funding by all EC budget lines for 2002-2004 for mine action was about 116M, of which the horizontal mine action budget line was nearly 40% at 45M. The total for the same period for all EU mine action, including contributions by Member States, was about 410M, of which the dedicated budget line is just 11%. The overall assessment reviewed four areas: 1) how the APL Regulation was used to generate mine …