Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

International Relations

2016

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 476

Full-Text Articles in Entire DC Network

Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …


A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini Dec 2016

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga Dec 2016

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa Dec 2016

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk Dec 2016

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath Dec 2016

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr Dec 2016

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Some Remarks On Self-Defense And Intervention: A Reaction To Reading Law And Civil War In The Modern World, Josef Rohlik Dec 2016

Some Remarks On Self-Defense And Intervention: A Reaction To Reading Law And Civil War In The Modern World, Josef Rohlik

Georgia Journal of International & Comparative Law

No abstract provided.


The Effect Of Economic Integration And Political Centralization On Linguistic Diversity - And The New Function And Status Of The English Language In Europe, Demba K. Baldeh Dec 2016

The Effect Of Economic Integration And Political Centralization On Linguistic Diversity - And The New Function And Status Of The English Language In Europe, Demba K. Baldeh

Theses and Dissertations

This paper examines the effect of economic integration (EI) and political unity on

linguistic diversity and the new function and status of the English language in

Europe. It shows the current sociolinguistic transformation and the growing use of

English both as strong effects and key indicators of the process.


People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green Dec 2016

People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green

Military Cyber Affairs

China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese doctrine, controlling …


Ajit Singh [Malyasia, Asean Secretary-General, Diplomat], Ajit Singh Dec 2016

Ajit Singh [Malyasia, Asean Secretary-General, Diplomat], Ajit Singh

Digital Narratives of Asia

After thirty years as a career diplomat, Malaysia's first ASEAN Secretary-General Ajit Singh, sees his five-year term as the most productive, golden years of his life. He speaks to DNA about the challenges he faced with admitting Myanmar to ASEAN, and the visionary ASEAN leadership. He also expounds on the differences in impacts of work between an ambassador and a bureaucrat.


The New Normal? Climate Variability And Ecoviolence In Sub-Saharan Africa, Alfonso Sanchez Dec 2016

The New Normal? Climate Variability And Ecoviolence In Sub-Saharan Africa, Alfonso Sanchez

University of New Orleans Theses and Dissertations

Climate change presents a wide range of concerns that can jeopardize international security. Among those concerns are neo-Malthusian worries of diminishing natural resources. Predictive models suggest that rainfall and temperature anomalies have the potential to reduce water basins, crop production, increase land degradation among other perils that threaten human security. This concern is particularly true in sub-Saharan Africa given the region’s strong dependence on rain-fed agriculture. Despite strong claims from various world leaders and scientists of a direct climate-conflict nexus, little empirical evidence has been devoted to find a systematic causal pathway of this kind. What is more, the literature …


"Who Am I?": The Development Of A Male Palestinian Political Identity, Tala J. Dayyat Dec 2016

"Who Am I?": The Development Of A Male Palestinian Political Identity, Tala J. Dayyat

Master's Theses

The Palestinian people have lived under numerous imperial rulers; first, the Ottoman Empire, then later the British. Today they live under the military occupation of the state of Israel as second class citizen millions more living abroad as refugees. Young Palestinian men have become the leaders and the physical manifestation of the struggle against Israel, a political Goliath that has used tactics to repress the Palestinians such as, detentions, beatings, and land confiscation, which many outside of the Israeli state deem as illegal. Scholar Rashid Khalidi states that “the quintessential Palestinian experience, which illustrates some of the most basic issues …


The Evolving Security Policy Of Japan And The Adherence To Antimilitarism Culture, Chaula Rininta Anindya Dec 2016

The Evolving Security Policy Of Japan And The Adherence To Antimilitarism Culture, Chaula Rininta Anindya

Global: Jurnal Politik Internasional

Japan has reinterpreted Article 9 as the fundamental constitution of their antimilitarist culture and shows its willingness to play a more active role in the International security. This article seeks to examine the changes of Japan’s security and the potential shift of antimilitarist strategic culture, arguing that despite the continuous changes, Japan has not changed its strategic culture due to perpetual debates within the domestic politics that are vital in shaping the security identity. The changing security practices are merely a natural response to the current dynamic of International security environments. Therefore, it remains unlikely for Prime Minister Shinzo Abe …


Contesting Global Civil Society’S Legitimacy Claims: Evaluating International Non-Governmental Organizations (Ingos)’ Representation Of And Accountability To Beneficiaries, Cazadira Fediva Tamzil Dec 2016

Contesting Global Civil Society’S Legitimacy Claims: Evaluating International Non-Governmental Organizations (Ingos)’ Representation Of And Accountability To Beneficiaries, Cazadira Fediva Tamzil

Global: Jurnal Politik Internasional

The global civil society is often regarded as a progressive moral force that provides advocacy and protection of marginalized groups in the global political arena. Nevertheless, departing from the belief that civil society has great power and influence over global dynamics, it sees that the legitimacy claims they articulate and articulated by academics are essential to be evaluated, especially with regard to their representation and accountability groups and individual beneficiaries. This paper concludes that the claims of legitimacy of civil society are less justifiable, both normatively and empirically. From the normative point of view, claims for civil society representation are …


Kerja Sama Pembangunan Korea Selatan Di Vietnam Dalam Pengembangan Area Pedesaan Melalui Model Saemaul Undong, Indah Lestari Dec 2016

Kerja Sama Pembangunan Korea Selatan Di Vietnam Dalam Pengembangan Area Pedesaan Melalui Model Saemaul Undong, Indah Lestari

Global: Jurnal Politik Internasional

In this last decade, a closed cooperation of rural development “Saemaul Undong” between South Korea and Vietnam has been formed. Saemaul Undong is a success model of South Korea’s rural development. Along with it, question related to the possibility of adopting Saemaul Undong by developing countries arises. With this regard, this research attempts to explain the reasons why this cooperation has been formed. By using concept of cooperation, this research tries to observe the existence of goals and benefits in “Saemaul Undong” cooperation between South Korea and Vietnam. Result of this research affirmed that goals and benefits spurred “Saemaul Undong” …


How Threat Assessment Could Become Self-Fulfilling Prophecy: Case Of U.S.-China Relations, Muhamad Arif Dec 2016

How Threat Assessment Could Become Self-Fulfilling Prophecy: Case Of U.S.-China Relations, Muhamad Arif

Global: Jurnal Politik Internasional

This article tries to explain how misperception can trigger conflict between countries. The article would employ spiral model of conflict proposed by Robert Jervis as a theoretical framework to scrutinize contemporary US and Chinese contemporary competition. As a result, this paper shows how threat assessment could trigger a spiral of conflict through state’s tendency to overestimate threat level and its failure to perceive that defensive behavior can be interpreted as offensive by the belligerent. Based on this analysis, the probability of conflicts can be reduced as each country tries to comprehend motivations that drive other behavior, perceptions and reactions that …


Plastic Oceans: A New Way In Solving Our Plastic Pollution, Dakota S. Floyd Dec 2016

Plastic Oceans: A New Way In Solving Our Plastic Pollution, Dakota S. Floyd

Master's Theses

By 2050, the world’s oceans will have more plastic than fish with potentially catastrophic consequences on sea life and the health of the ocean. Economically, countries with coastal boundaries will be heavily impacted as plastic pollution has already generated a 13 billion dollars in monetary losses. Considering that this is an extreme problem that we are currently facing the current solution is not enough in curbing our plastic pollution. While, recycling programs have been beneficial in reclaiming some plastic our mass consumption of plastic has outpaced the capabilities of recycling efforts. If we are to find a solution in our …


Us Small Arms To Syrian Rebels, Roberto Capocelli Dec 2016

Us Small Arms To Syrian Rebels, Roberto Capocelli

Capstones

The capstone is an investigation into the procurement of Russian-style weapons by small companies to the US government for shipment to Syrian rebels, Iraqi and Afghani military. Through an analysis of procurement contracts, court records and audits the investigation unveils the checkered past of some of the company procuring weapons for the Special Operation Command.