Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- James Madison University (2721)
- US Army War College (697)
- Embry-Riddle Aeronautical University (583)
- University of Nebraska at Omaha (238)
- Universitas Indonesia (222)
-
- University of South Florida (151)
- Selected Works (150)
- University of Nebraska - Lincoln (120)
- SelectedWorks (84)
- Claremont Colleges (73)
- University of Tennessee, Knoxville (66)
- Purdue University (63)
- National Defense University (60)
- University of Denver (53)
- Old Dominion University (51)
- Air Force Institute of Technology (49)
- Missouri State University (44)
- Kennesaw State University (33)
- Liberty University (33)
- World Maritime University (33)
- University of Central Florida (31)
- University of Nevada, Las Vegas (29)
- Chinese Academy of Sciences (26)
- SIT Graduate Institute/SIT Study Abroad (26)
- Edith Cowan University (20)
- Gettysburg College (20)
- San Jose State University (20)
- Concordia University St. Paul (19)
- Montclair State University (18)
- Singapore Management University (18)
- Keyword
-
- Journal (1267)
- Mine Action (951)
- DDAS (849)
- CISR (832)
- JMU (783)
-
- AP (633)
- ERW (623)
- Afghanistan (448)
- Excavation (371)
- ERW Clearance (364)
- Centers and Organizations (319)
- Centers and organizations (294)
- Advocacy and International Law (290)
- GICHD (227)
- Terrorism (223)
- 2001 (216)
- The Journal (216)
- 2008 (209)
- ERW clearance (202)
- 2006 (195)
- MAIC (190)
- Missed mine (177)
- 2003 (176)
- 2000 (172)
- PMN (171)
- Iraq (161)
- Country profile (159)
- Victim Assistance (151)
- 2009 (147)
- Cambodia (146)
- Publication Year
- Publication
-
- Global CWD Repository (1443)
- The Journal of Conventional Weapons Destruction (1267)
- The US Army War College Quarterly: Parameters (520)
- International Bulletin of Political Psychology (448)
- Space and Defense (231)
-
- Journal of Strategic Security (120)
- Jurnal Kajian Stratejik Ketahanan Nasional (89)
- Department of Defense Military Intelligence (88)
- Annual ADFSL Conference on Digital Forensics, Security and Law (75)
- Global: Jurnal Politik Internasional (68)
- Articles & Editorials (65)
- Joint Force Quarterly (60)
- International Journal of Nuclear Security (59)
- Parameters Bookshelf – Online Book Reviews (59)
- Journal of Terrorism Studies (56)
- Monographs & Collaborative Studies (53)
- CGU Faculty Publications and Research (50)
- Human Rights & Human Welfare (45)
- MSU Graduate Theses (44)
- Theses and Dissertations (44)
- Publications (37)
- Libraries Faculty and Staff Scholarship and Research (36)
- World Maritime University Dissertations (31)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (26)
- Independent Study Project (ISP) Collection (23)
- Electronic Theses and Dissertations (19)
- Graduate Program in International Studies Theses & Dissertations (19)
- CUP Undergraduate Research (18)
- Honors Theses (18)
- Libraries Faculty and Staff Presentations (18)
- Publication Type
Articles 931 - 960 of 6215
Full-Text Articles in Entire DC Network
On "Projecting Stability: A Deployable Nato Police Command", Raymond E. Bell
On "Projecting Stability: A Deployable Nato Police Command", Raymond E. Bell
The US Army War College Quarterly: Parameters
No abstract provided.
From The Editor In Chief, Antulio J. Echevarria Ii
From The Editor In Chief, Antulio J. Echevarria Ii
The US Army War College Quarterly: Parameters
No abstract provided.
Never Again? Germany's Lessons From The War In Afghanistan, Philipp Münch
Never Again? Germany's Lessons From The War In Afghanistan, Philipp Münch
The US Army War College Quarterly: Parameters
No abstract provided.
Book Reviews, Usawc Parameters
Book Reviews, Usawc Parameters
The US Army War College Quarterly: Parameters
No abstract provided.
Problematika Manajemen Risiko Dalam Mitigasi Terorisme Kelompok Feto Di Turki Pada Masa Presiden Erdogan, Mega Prastika, Dwi Impiani
Problematika Manajemen Risiko Dalam Mitigasi Terorisme Kelompok Feto Di Turki Pada Masa Presiden Erdogan, Mega Prastika, Dwi Impiani
Journal of Terrorism Studies
This article aims to describe the new risks that emerged in mitigating the risk of FETO (Fethullah Gulen Terrorist Organization) in Turkey during President Erdogan's era. By having its own view of the state order and its strong network in 150 countries, the Gulen Movement is considered to threaten the existence of the ideology of the Turkish state, especially during the leadership of President Erdogan. After the failed coup attempt on July 15, 2016, the Gulen Movement was designated as a dangerous group called FETO as it was considered responsible for the incident. Furthermore, the Turkish government adopted an anti-terror …
Parameters Winter 2020, Usawc Parameters
Parameters Winter 2020, Usawc Parameters
The US Army War College Quarterly: Parameters
No abstract provided.
Civilians, Urban Warfare, And Us Doctrine, Andrew Bell
Civilians, Urban Warfare, And Us Doctrine, Andrew Bell
The US Army War College Quarterly: Parameters
No abstract provided.
Diverging Interests: Us Strategy In The Middle East, Christopher J. Bolan, Jerad I. Harper, Joel R. Hillison
Diverging Interests: Us Strategy In The Middle East, Christopher J. Bolan, Jerad I. Harper, Joel R. Hillison
The US Army War College Quarterly: Parameters
No abstract provided.
Challenging Prevailing Models Of Us Army Suicide, Dr. Tim Hoyt, Dr. Pamela Holtz
Challenging Prevailing Models Of Us Army Suicide, Dr. Tim Hoyt, Dr. Pamela Holtz
The US Army War College Quarterly: Parameters
No abstract provided.
Stability Operations In Ww Ii: Insights And Lessons, Raymond A. Millen
Stability Operations In Ww Ii: Insights And Lessons, Raymond A. Millen
The US Army War College Quarterly: Parameters
No abstract provided.
Contribution Warfare: Sweden's Lessons From The War In Afghanistan, Jan Ångström
Contribution Warfare: Sweden's Lessons From The War In Afghanistan, Jan Ångström
The US Army War College Quarterly: Parameters
No abstract provided.
India And Pakistan: Managing Tensions, Philip K. Kao
India And Pakistan: Managing Tensions, Philip K. Kao
The US Army War College Quarterly: Parameters
No abstract provided.
Russian Active Measures Campaigns And Interference In The 2016 U. S. Election Report, Volumes I–V, Together With Additional Views, Select Committee On Intelligence, United States Senate
Russian Active Measures Campaigns And Interference In The 2016 U. S. Election Report, Volumes I–V, Together With Additional Views, Select Committee On Intelligence, United States Senate
United States Senate Documents
Russian Active Measures Campaigns and Interference in the 2016 U. S. Election Report Together with Additional Views
"The United States Select Committee on Intelligence’s investigation totaled more than three years of investigative activity, more than 200 witness interviews, and more than a million pages of reviewed documents. All five volumes total more than 1,300 pages." From press release for Volume V, available at https://www.intelligence.senate.gov/press/senate-intel-releases-volume-5-bipartisan-russia-report.
Volume I: Russian Efforts against Election Infrastructure with Additional Views (pages 4-69)
Volume II: Russia's Use of Social Media with Additional Views (pages 71-155)
Volume III: U. S. Government Response to Russian Activities (pages 157-210) …
The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques
The Restrictive Deterrent Effect Of Warning Messages Sent To Active Romance Fraudsters: An Experimental Approach, Fangzhou Wang, C. Jordan Howell, David Maimon, Scott Jacques
EBCS Articles
Victims of romance fraud experience both a financial and emotional burden. Although multiple studies have offered insight into the correlates of perpetration and victimization, no known study has examined if, and how, romance fraud can be curtailed. The current study uses a randomized experimental design to test the restrictive deterrent effect of warning messages sent to romance fraudsters via email. We find that active romance fraudsters who receive a deterrence message, instead of non-deterrence messages, respond at a lower rate; and, among those who respond, use fewer words and have a lower probability of seeking reply without denying wrongdoing. The …
Peningkatan Dana Anggaran Pendidikan Terhadap Ketimpangan Pendidikan (Studi Kasus: Provinsi Papua), Rayinda Sephira Putri, Athor Subroto
Peningkatan Dana Anggaran Pendidikan Terhadap Ketimpangan Pendidikan (Studi Kasus: Provinsi Papua), Rayinda Sephira Putri, Athor Subroto
Jurnal Kajian Stratejik Ketahanan Nasional
Education is one of the most important factors in the development of a country's progress. Currently, apart from economics and health, education is also an investment and achievement on sustainable development. However, until now education in Indonesia is still not evenly distributed in various regions. There are several areas where education is still not feasible of good quality even though the budget allocation in Indonesia are increasing almost every year, no exception in the Province of Papua. The budget allocation for special autonomy funds in Papua Province is fairly large compared to other parts of Indonesia, what the government is …
Examining The Implementation Framework Of The International Safety Management Code In The Republic Of Azerbaijan, Seyidilyas Gadirov
Examining The Implementation Framework Of The International Safety Management Code In The Republic Of Azerbaijan, Seyidilyas Gadirov
World Maritime University Dissertations
No abstract provided.
An Assessment Of The Impact Of Maritime (In)Security In The Gulf Of Guinea: Special Emphasis On Sao Tome And Principe, Paulo De Araújo Ribeiro De Ceita
An Assessment Of The Impact Of Maritime (In)Security In The Gulf Of Guinea: Special Emphasis On Sao Tome And Principe, Paulo De Araújo Ribeiro De Ceita
World Maritime University Dissertations
No abstract provided.
Analysis Of The Effectiveness Of Monitoring, Control And Surveillance Measures : South Africa As A Case Study, Elsie M. Morake
Analysis Of The Effectiveness Of Monitoring, Control And Surveillance Measures : South Africa As A Case Study, Elsie M. Morake
World Maritime University Dissertations
No abstract provided.
Legal Analysis On Cambodia Regulation Apply To Isps Code, Chanveasna Teth
Legal Analysis On Cambodia Regulation Apply To Isps Code, Chanveasna Teth
World Maritime University Dissertations
No abstract provided.
Improving Energy Efficiency In Warships : Environmental & Economic Incentive To Reducing Greenhouse Gas Emissions From Naval Operations, Abiodun Abidemi Folorunsho
Improving Energy Efficiency In Warships : Environmental & Economic Incentive To Reducing Greenhouse Gas Emissions From Naval Operations, Abiodun Abidemi Folorunsho
World Maritime University Dissertations
No abstract provided.
Maritime Search & Rescue Services In Nigeria : Examining The Regional Maritime Rescue Coordination Centre Lagos, Nigeria, Hashim Bala Ibrahim
Maritime Search & Rescue Services In Nigeria : Examining The Regional Maritime Rescue Coordination Centre Lagos, Nigeria, Hashim Bala Ibrahim
World Maritime University Dissertations
No abstract provided.
A Comparative Study Of The Combined Maritime Force (Cmf) And The Djibouti Code Of Conduct (Dcoc) Aimed At Maintaining Maritime Security In The Area Of The Western Indian Ocean And The Gulf Of Aden, Abdullah Mohammed Mubaraki
A Comparative Study Of The Combined Maritime Force (Cmf) And The Djibouti Code Of Conduct (Dcoc) Aimed At Maintaining Maritime Security In The Area Of The Western Indian Ocean And The Gulf Of Aden, Abdullah Mohammed Mubaraki
World Maritime University Dissertations
No abstract provided.
Penguatan Reformasi Sektor Keamanan Di Wilayah Perbatasan (Border) Indonesia, Abimanyu Hendi Asyono
Penguatan Reformasi Sektor Keamanan Di Wilayah Perbatasan (Border) Indonesia, Abimanyu Hendi Asyono
Jurnal Kajian Stratejik Ketahanan Nasional
The implementation of Security Sector Reform in the context of security and supervision in Indonesia's border areas still has a lot of homework that needs to be done, both in terms of regulations and institutions. In addition to the multidimensional sources of threat, the operational institutions of the Border Agency components (Customs and Excise, TNI, Polri, National Border Management Agency (BNPP) and immigration) still seem to work in a sectoral, overlapping, and not cross integrated manner. sector, which of course in carrying out their duties there will be clashes and conflicts of interest from each of these institutions. The handling …
Uk Think-Tanks, The War On Terror And The Radicalisation Debate, Hadi Enayat
Uk Think-Tanks, The War On Terror And The Radicalisation Debate, Hadi Enayat
Abdou Filali-Ansary Occasional Paper Series
This paper maps the discursive and ideological habitus in which UK think-tanks operate in connection with the ‘war on terror’. It discusses how UK think-tanks have both shaped and been shaped by this habitus and the impact their work has had on counter-terrorism policy in the UK. It begins by discussing the concept of think-tanks and their role and input into politics. It then sketches the rise of ‘terrorism’ as both an academic object of study, from the mid-1970s onwards, and as an increasingly vital policy area for governments and the military-security establishment, especially after 9/11. The paper then focuses …
Standardising Beneficiary Definitions In Humanitarian Mine Action (2nd Ed.), Danchurchaid, Danish Demining Group, The Halo Trust, Humanity And Inclusion, Mines Advisory Group, Norwegian People's Aid, Swiss Foundation For Demining
Standardising Beneficiary Definitions In Humanitarian Mine Action (2nd Ed.), Danchurchaid, Danish Demining Group, The Halo Trust, Humanity And Inclusion, Mines Advisory Group, Norwegian People's Aid, Swiss Foundation For Demining
Global CWD Repository
This document lays out standard definitions and guidelines for measuring recording and reporting beneficiary numbers for EORE, land release, victim assistance and explosive ordnance disposal (EOD) spot tasks. The guidelines do not include beneficiary definitions for the two remaining mine action pillars: advocacy and stockpile destruction.
It is hoped that this document can be used as a guide for other mine action operators donors and national authorities, to share best practice and contribute to international standards for the sector in beneficiary reporting.
A Hard Look At Hard Power: Assessing The Defense Capabilities Of Key Us Allies And Security Partners—Second Edition, Gary J. Schmitt Mr.
A Hard Look At Hard Power: Assessing The Defense Capabilities Of Key Us Allies And Security Partners—Second Edition, Gary J. Schmitt Mr.
Monographs & Collaborative Studies
With the United States facing two major revisionist powers, Russia and China, as well as additional security threats from North Korea, Iran, and jihadist terrorism, a critical advantage for the United States is its global network of alliances and strategic partners. As the 2018 National Defense Strategy states, “Alliances and partnerships are crucial to our strategy, providing a durable asymmetric strategic advantage that no competitor or rival can match.”
The advantage of having military allies and partners is enhanced by the core capacity of the American military having remained largely the same over the past decade, though the global security …
Situational Awareness And Public Wi-Fi Users' Self-Protective Behaviors, David Maimon, C. Jordan Howell, Scott Jacques, Robert Perkins
Situational Awareness And Public Wi-Fi Users' Self-Protective Behaviors, David Maimon, C. Jordan Howell, Scott Jacques, Robert Perkins
EBCS Articles
Accessing public Wi-Fi networks can be as dangerous as it is convenient. People who access a public Wi-Fi network should engage in self-protective behaviors to keep their data safe from malicious actors on the same network as well as persons looking over their shoulder, literally and proverbially. Using two independent research designs, we examined under what circumstances were people more likely to access an unsecured Wi-Fi network and engage in risky behavior on these networks. Findings from the first study, based on survey data, reveal that people who are more situationally aware are less likely to access personal accounts on …
U.S. Government Military And Space Force Literature, Bert Chapman
U.S. Government Military And Space Force Literature, Bert Chapman
Libraries Faculty and Staff Presentations
Established in 2018, the U.S. Space Force is the newest branch of the U.S. military. The reality of space as an arena for international geopolitical and military competition has been around for decades in scholarly literature. This presentation will examine recently published and publicly accessible U.S. Government and military literature on Space Force. These works examine various economic, military, and political aspects of this entity and how it may affect U.S. national security policy in years to come.
Policing In A Democratic Constitution, Michael Wasco
Policing In A Democratic Constitution, Michael Wasco
Indiana Journal of Constitutional Design
Most constitutions contain provisions relating to or impacting policing. Separate from the armed forces and intelligence services, the police are the state’s internal security apparatus, and codifying issues related to policing within a constitution can ensure efficient service delivery and human rights protections.
Originating from the Libyan constitution making process, this paper provides a taxonomy of options for constitution drafters and scholars. More so than other issues, such as separation of powers or human rights protections generally, policing sections are very country specific. While not advocating for specific best practices, the work gives ample justifications for certain policing principles and …
قبول المعلومات الأمنية وردها في ضوء مناهج المحدثين, Hicham Almaghari
قبول المعلومات الأمنية وردها في ضوء مناهج المحدثين, Hicham Almaghari
Al Jinan الجنان
عالج الباحث الموضوع في مبحثين: قدّم في الأول تعريف المعلومة الأمنية لغة واصطلاحا، وأشار إلى مجالات النشاط الاستخباري بشكل عام، ثم عرّف المعلومة الأمنية، وأصل في المبحث الثاني طرققبول المعلومة الأمنية وردها مستفيدا من مناهج المحدثين. اتبع الباحث المنهج الوصفي بغرض التعريف بالأمن والمعلومات، وتتبع منهج المحدثين في قبول ورد الرواية، كما اتبع المنهج التحليلي في مقاربة طرق المحدثين عند قبولهم أو ردهم للرواية، ومقارنة ذلك مع المعلومة الأمنية للوصول إلى النتائج المرجوة . توصل الباحث إلى وجود كثير من القواسم المشتركة بين صناعة المعلومة الأمنية ومنهج المدثين في التعاطي مع الرواية. خلص الباحث إلى ضرورة الاستفادة من مناهج المحدّثين …