Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Entire DC Network

Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo May 2020

Asymmetric Threats: Analyzing The Future Of Nuclear Terrorism & Cyber Attacks; The Value Of Deterrence Theory For Addressing The Challenges Of Nuclear Terrorism In The Age Of 21st Century Cybersecurity, Oliver Demmert-Shelfo

Political Science & International Studies | Senior Theses

Given the rapid development and ease of access to technology, the threat of extremist organizations utilizing cyberspace as a means to target critical American strategic infrastructure is of increasing concern. The risk posed by the acquisition of fissile material, sabotage, or use of a nuclear device by an extremist organization has been exasperated due to technological development outpacing strategy. Despite policy-makers’ attempts to protect the public from cyber-attacks and nuclear terrorism, the federal policies in place have failed to account for the continual evolution of technology and the gaps in security that this advancement brings. Through examining documents from congressional …


The Rising Risk Of Terrorism In The Philippines And Natural Resource Corruption, Blair Mills Mar 2020

The Rising Risk Of Terrorism In The Philippines And Natural Resource Corruption, Blair Mills

Honors Theses

As foreign fighters, who had previously traveled to the Middle East to conduct operations under the flag of ISIL (Islamic State of Iraq and the Levant), return to the Philippines and other countries in Southeast Asia, they are bringing their ideologies and knowledge of terrorist operations with them. In addition to tracking the growing trend of terrorist attacks being conducted in the Philippines in the name of ISIL, it is crucial to determine how these returning fighters are gathering the funds and resources necessary to carry out these attacks and establish new terrorist cells. This question of how returning terrorists …


Utilizing Strategic Culture As A Tool To Tailor U.S. Deterrence Policy Towards Iran, Ryan P. Taylor May 2019

Utilizing Strategic Culture As A Tool To Tailor U.S. Deterrence Policy Towards Iran, Ryan P. Taylor

MSU Graduate Theses

The geostrategic environment since the end of the Cold War has drastically changed the way United States (U.S.) policymakers develop strategies to combat a wide range of hostile threats facing the country, especially in the field of the deterrence of weapons of mass destruction (WMDs). Iran is such an actor, who poses one of the greater proliferation threats in the world and continues to commit hostile actions in the Middle East. In this post-Cold War environment, it is imperative that the United States develop a tailored deterrence strategy to meet this challenge. Past deterrence strategies popular during the bipolar era …


Cyber Warfare: Explaining The Absence Of Physical Force Responses By States, Conor Mcfarland May 2011

Cyber Warfare: Explaining The Absence Of Physical Force Responses By States, Conor Mcfarland

Undergraduate Theses and Capstone Projects

This essay examines the unwillingness of nation-states to use physical force in response to cyber warfare. Specifically, the paper claims that uncertainties regarding international law, state sovereignty, definitions of the use of force, and the problem of attribution in cyberspace contribute to a state’s decision to forego responding to cyber-attacks by using physical force attacks in other domains (i.e., land, air, sea, and space). These concepts are considered within the framework of Neorealist theory and in reference to the literature on cyber warfare. The 2007 series of cyber-attacks on Estonia are utilized as a case study to further examine the …


The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor May 2010

The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor

International Bulletin of Political Psychology

The author discusses terrorism (and terms associated with it), considering the social rhetoric surrounding the terms as well as other potential meanings. The constraints of the words used to define these terms of terror are considered.


Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor Aug 2002

Special Article: Recommendations For Optimal Personnel Security In The Cyberworld, Ibpp Editor

International Bulletin of Political Psychology

This article considers the social construction of recommendations for personnel security in the context of a global cyberworld.