Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Terrorism / counterterrorism (12)
- Radicalization (10)
- Violent extremism (9)
- Counterterrorism (8)
- Islamic culture and politics (8)
-
- Ideology (7)
- Religious violence (7)
- Al-Qaida (6)
- Fundamentalism (6)
- Nonstate actors (6)
- Asymmetric warfare (4)
- Gaming (4)
- Homeland security (4)
- Middle East (4)
- Political violence (4)
- Strategy (4)
- Cybersecurity (3)
- Economic development incentives (3)
- Gangs and criminal organizations (3)
- Governance and rule of law (3)
- Intelligence analysis (3)
- Job creation (3)
- National security (3)
- Public diplomacy (3)
- Sociocultural dynamics in security (3)
- Tax incentives (3)
- Conflict studies (2)
- Counterintelligence (2)
- Defense policy (2)
- Diplomacy (2)
- Publication
-
- Journal of Strategic Security (36)
- Hospitality Review (7)
- South Carolina Journal of International Law and Business (7)
- UNLV Gaming Law Journal (6)
- BYU Law Review (1)
-
- Brigham Young University International Law & Management Review (1)
- Business Review (1)
- Georgia Journal of Public Policy (1)
- Online Journal for Workforce Education and Development (1)
- University of Miami Business Law Review (1)
- University of Pennsylvania Journal of Business Law (1)
- William & Mary Business Law Review (1)
Articles 1 - 30 of 64
Full-Text Articles in Law
Sour Chocolate: The U.K. Takeover Panel's Improper Reaction To Kraft's Acquisition Of Cadbury, Michael R. Patrone
Sour Chocolate: The U.K. Takeover Panel's Improper Reaction To Kraft's Acquisition Of Cadbury, Michael R. Patrone
Brigham Young University International Law & Management Review
No abstract provided.
Welcome To Fabulous Las Vegas: The Nevada Gaming Regulatory Response To Sovereign Wealth Fund Investment, John J. Piro
Welcome To Fabulous Las Vegas: The Nevada Gaming Regulatory Response To Sovereign Wealth Fund Investment, John J. Piro
UNLV Gaming Law Journal
The bulk of recent scholarly work surrounding sovereign wealth funds ("SWFs") is dedicated to assessing the federal regulatory systems’ adequacy—or likely, inadequacy—in dealing with issues unique to SWF investment. However, the federal regulatory system has not been the only regulatory body to deal with SWF investment in the United States. In 2008, one of the United Arab Emirates’ (“UAE”) SWFs, Dubai World, made a large investment into the Nevada gaming industry and was found suitable to purchase up to twenty percent of MGM Mirage’s stock. This article will address how the Nevada gaming regulatory system has found an effective way …
"The Rising: Ireland: Easter 1916," Fearghal Mcgarry (New York: Oxford University Press, 2010) And "Guerrilla Warfare In The Irish War Of Independence, 1919-1921," Joseph Mckenna (Jefferson, Nc And London: Mcfarland & Company, Inc., Publishers, 2011), Edward J. Hagerty
Journal of Strategic Security
No abstract provided.
Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray
Extraordinary Rendition And U.S. Counterterrorism Policy, Mark J. Murray
Journal of Strategic Security
This article examines the United States Government policy of extraordinary rendition as a response to terrorism. The paper provides a working definition of the term, outlines why it has become controversial, and uses case studies to examine success and failures of extraordinary rendition in practice. The paper concludes with lessons learned—more specifically, policy amendments—that are necessary to keep extraordinary rendition as a viable tool for the Obama Administration and mitigate political fallout against the United States from both its allies and enemies. This paper argues that extraordinary rendition provides flexibility to policymakers to detain terrorists in cases where an attack …
Hizbollah–Syrian Intelligence Affairs: A Marriage Of Convenience, Carl Anthony Wege
Hizbollah–Syrian Intelligence Affairs: A Marriage Of Convenience, Carl Anthony Wege
Journal of Strategic Security
Since the 1980s, Hizbollah has emerged as the guardian of Lebanon's Shi'a and a stalking horse for Iran. Syria, though allied with Tehran, seeks to manage Hizbollah's freedom of action in Lebanon and is eyed cautiously in Damascus. Hizbollah has managed to maintain independence from these Syrian efforts because of both Lebanese Shi'a religious élan and the protection given Hizbollah by its Shi'a allies in Iran.
Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz
Mitigating The Exploitation Of U.S. Borders By Jihadists And Criminal Organizations, Todd Steinmetz
Journal of Strategic Security
Following the events of September 11, 2001, the U.S. Government began improving security in large population centers and near potential highvalue terrorist targets. Included in these efforts was the development of a more robust border security program, with an emphasis on reducing the threat of terrorist infiltration at America's borders. However, nearly a decade after 9/11, terrorism and organized crime continue to pose significant threats to the United States. As many of these threats emanate from other nations, improved border security helps mitigate these threats. This article summarizes known terrorist activity along the U.S. northern and southern borders, and highlights …
Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii
Buy Off And Buy In: Flipping The Farc, Joel K. Day Ii
Journal of Strategic Security
The election of President Juan Manuel Santos in Columbia marks a new era in Columbian security policy. administration has failed to implementInstead of focusing on a solely military solution to conflict with Revolutionary Armed Forces of Colombia (FARC), as his predecessor did, Santos has committed to a multifaceted effort to resolve the dispute. In spite of this hope, the Santos many critical non-military policy proposals. Like Santos, the scholarly community has ignored important comparative studies of counterterrorism. This essay attempts to fill a gap in the literature by framing a discussion of FARC in light of new advances in counter-insurgency …
"Terrorism And Homeland Security: Perspectives, Thoughts, And Opinions," Edited By Dale L. June (Boca Raton, Fl: Crc Press, 2011), Mark J. Roberts
"Terrorism And Homeland Security: Perspectives, Thoughts, And Opinions," Edited By Dale L. June (Boca Raton, Fl: Crc Press, 2011), Mark J. Roberts
Journal of Strategic Security
No abstract provided.
"Area 51: An Uncensored History Of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown And Company, 2011), Edward M. Roche
"Area 51: An Uncensored History Of America's Top Secret Military Base," Annie Jacobsen (New York: Little, Brown And Company, 2011), Edward M. Roche
Journal of Strategic Security
No abstract provided.
Ignorance Is Not Bliss: Financial Illiteracy, The Mortgage Market Collapse, And The Global Economic Crisis, Jeffrey T. Dinwoodie
Ignorance Is Not Bliss: Financial Illiteracy, The Mortgage Market Collapse, And The Global Economic Crisis, Jeffrey T. Dinwoodie
University of Miami Business Law Review
No abstract provided.
Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer
Modeling Human Behavior To Anticipate Insider Attacks, Frank L. Greitzer , Ph.D., Ryan E. Hohimer
Journal of Strategic Security
The insider threat ranks among the most pressing cyber-security challenges
that threaten government and industry information infrastructures.
To date, no systematic methods have been developed that provide a
complete and effective approach to prevent data leakage, espionage, and
sabotage. Current practice is forensic in nature, relegating to the analyst
the bulk of the responsibility to monitor, analyze, and correlate an overwhelming
amount of data. We describe a predictive modeling framework
that integrates a diverse set of data sources from the cyber domain, as well
as inferred psychological/motivational factors that may underlie malicious
insider exploits. This comprehensive threat assessment approach
provides …
China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal
China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal
Journal of Strategic Security
This article presents three reasons for states to use cyber warfare and
shows that cyberspace is—and will continue to be—a decisive element in
China's strategy to ascend in the international system. The three reasons
are: deterrence through infiltration of critical infrastructure; militarytechnological
espionage to gain military knowledge; and industrial espionage
to gain economic advantage. China has a greater interest in using
cyberspace offensively than other actors, such as the United States, since
it has more to gain from spying on and deterring the United States than
the other way around. The article also documents China's progress in
cyber warfare and …
"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson
"Information Operations Matters: Best Practices," Leigh Armistead, (Washington, D.C.: Potomac Books, 2010), Robin L. Thompson
Journal of Strategic Security
No abstract provided.
"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr.
"Obama's Wars," Bob Woodward, (New York, Ny: Simon And Schuster, 2010), Richard J. Kilroy Jr.
Journal of Strategic Security
No abstract provided.
Succession In Family Businesses: Kinship Culture And Islamic Law Of Inheritance, Nasir Afghan
Succession In Family Businesses: Kinship Culture And Islamic Law Of Inheritance, Nasir Afghan
Business Review
Majority of research has been carried out on succession within family firms in the positivistic tradition of research and also has a very strong normative element to it. The successful research has been defined using researchers determined criterion such as firm performance, viability and harmony among the family members etc. This type of research obviously assumes an independent reality ‘out there’ ready to be collected by objective researcher. This positive stance has been apparent even in the case based research mostly conducted by practitioners. On the contrary, to carry out this research an interpretive approach was adopted. The aim of …
"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis
"The Dynamics Of Terror And Creation Of Homegrown Terrorists," Richard J. Hughbank, Ed. Et Al., (Mustang, Ok: Tate Publishing And Enterprises, 2010), Jennifer Jefferis
Journal of Strategic Security
No abstract provided.
"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D.
"The New Muslim Brotherhood In The West," Lorenzo Vidino, (New York: Columbia University Press, 2010), Sheldon Greaves , Ph.D.
Journal of Strategic Security
No abstract provided.
"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.
"Small Boats, Weak States, Dirty Money: Piracy And Maritime Terrorism In The Modern World," Martin N. Murphy, (New York: Columbia University Press, 2009), Francis D. Bonadonna , Capt.
Journal of Strategic Security
No abstract provided.
Conflict Management Education In Medicine: Considerations For Curriculum Designers, Jeffery Kaufman
Conflict Management Education In Medicine: Considerations For Curriculum Designers, Jeffery Kaufman
Online Journal for Workforce Education and Development
It is important to address conflict in the medical field for a variety of reasons ranging from reducing turnover to increasing the quality of care received by patients. One way to assist with the management of medical conflict is by teaching resolution techniques to medical personnel. There is an opportunity for conflict management curriculum to address many of the issues facing physicians, administrators, staff and patients, however, it is also necessary for those developing that curriculum to understand the nature of the environment and appropriate conflict management tools to be used in that environment as part of the design process. …
Outsourcing, Modularity, And The Theory Of The Firm Margaret M. Blair, Erin O’Hara O’Connor, And Gregg Kirchhoefer, Margaret M. Blair, Erin R O’Hara O’Conno, Gregg Kirchhoefer
Outsourcing, Modularity, And The Theory Of The Firm Margaret M. Blair, Erin O’Hara O’Connor, And Gregg Kirchhoefer, Margaret M. Blair, Erin R O’Hara O’Conno, Gregg Kirchhoefer
BYU Law Review
No abstract provided.
At The Intersection Of Corporate Governance And Environmental Sustainability, Jayne W. Barnard
At The Intersection Of Corporate Governance And Environmental Sustainability, Jayne W. Barnard
William & Mary Business Law Review
Most boards of public companies have learned to live comfortably with audit committees, nominating committees, and compensation committees. An increasing number of companies are now also creating risk-management committees. This Essay explores the early stages of development of yet another board-level committee: the sustainability committee. The Essay posits several advantages to having a board-level sustainability committee and identifies possible sources of pressure for the creation of more such committees. It also suggests some of the disadvantages of sustainability committees and cautions against cosmetic governance reform. By examining what we know today (and can imagine tomorrow) about sustainability committees, this Essay …
Regulation Of Gaming Device Software Development: Nevada’S Paradigm Shift On Independent Contractors, Dan R. Reaser
Regulation Of Gaming Device Software Development: Nevada’S Paradigm Shift On Independent Contractors, Dan R. Reaser
UNLV Gaming Law Journal
On April 22, 2010, the Nevada Gaming Commission (hereinafter the “Commission”) adopted a number of amendments to Regulation 14 governing the manufacture of gaming devices. A subset of these amendments were promulgated pursuant to changes to the Nevada Gaming Control Act (hereinafter the “Act”) during the Seventy-Fifth Session of the Nevada Legislature. The rules relate to “control programs” and the independent contractors who design, develop, program, produce, or compose software, source language or executable code compiled into the control program of a new gaming device or of a modification to a gaming device submitted for approval. These particular rules became …
Not Out Of The (Fox)Woods Yet: Indian Gaming And The Bankruptcy Code, Emir Aly Crowne, Andrew Black, S. Alex Constantin
Not Out Of The (Fox)Woods Yet: Indian Gaming And The Bankruptcy Code, Emir Aly Crowne, Andrew Black, S. Alex Constantin
UNLV Gaming Law Journal
The recent economic downturn has caused Foxwoods Resort Casino, one of the largest casinos in the world, to seek a restructuring of nearly $1.5 billion in debt. Ordinarily, bankruptcy proceedings are triggered when a typical commercial enterprise defaults on its debt. Under these proceedings, creditors step in and collect monies owed to them before any residual equity is dispersed amongst owners. The rub here is that Foxwoods is owned and operated by the Mashantucket Western Pequot Tribal Nation, a sovereign nation under U.S. federal law. This triggers questions of paramountcy; namely, whether tribunal sovereignty can trump federal bankruptcy law.
These …
Has The Time For Large Gaming Property Involved Reits Finally Arrived?: A Review Of The Potential For Reit Investment In Destination Gaming Resort Properties, Simon Johnson
UNLV Gaming Law Journal
Destination gaming resorts demand massive amounts of capital in order to fund their investment in real property, much of which comprises areas where they realize predominantly passive business, including the hotel tower. Consequently, they generate substantial income from passive business, such as fees for hotel occupancy, even as most of their income is attributable to active business, such as gaming and personal services. Because they blend separable passive and active real property, a REIT can theoretically acquire all or some of the real property, realizing income under an operator lease with a substantially unrelated gaming or hotel lessee. Alternatively, a …
Keeping It Clean: Richard H. Bryan And Nevada Gaming, Leslie M. Niño
Keeping It Clean: Richard H. Bryan And Nevada Gaming, Leslie M. Niño
UNLV Gaming Law Journal
When Nevada legalized gaming in 1931, few observers could have predicted the extent to which the gaming industry would grow and evolve. The modern gaming industry has expanded across the globe, and is now regarded as a dynamic avenue of commerce. However, during the industry’s infancy, many Americans denounced gaming as a pariah. Legalized gaming was not viewed as a legitimate industry; rather, it was a haven for swindlers and cheaters. How did Nevada turn this negative perception into a positive one? Legislators and regulators resolved to create and enforce gaming regulations with the highest standards of ethics and integrity, …
Can A State Seize An Internet Gambling Website's Domain Name? An Analysis Of The Kentucky Case, Kirk D. Homeyer
Can A State Seize An Internet Gambling Website's Domain Name? An Analysis Of The Kentucky Case, Kirk D. Homeyer
UNLV Gaming Law Journal
The newly developed Internet gambling forum has produced myriad legal issues affecting state, federal, and international law. The difficulty in addressing the issues arises from the ubiquity of the Internet. Based on an analysis of the Kentucky Case, this Note argues that a state cannot seize an Internet gambling website’s domain name for violating that state’s laws. First, Kentucky did not have personal jurisdiction over the gambling domain names’ registrars to have authority to seize them. Second, Kentucky’s gambling statute violates the Commerce Clause. Part II provides background to and the facts underlying the Kentucky Case and its procedural …
Federal Earmarks In The State Of Georgia, Jeffrey Lazarus
Federal Earmarks In The State Of Georgia, Jeffrey Lazarus
Georgia Journal of Public Policy
Earmarks have been controversial ever since becoming a prominent part of the congressional spending process. Critics charge that earmarks fund projects with little or no economic value (for instance Ted Stevens’ “Bridge to Nowhere,”) but instead allow Congress members to direct government spending to campaign contributors (the charge leading to a federal investigation of the now-defunct lobbying firm PMA Group). On the other side of the controversy, congressional earmarks do fund a number of community improvements which are very valuable, at least locally. In Georgia, the fiscal 2010 appropriations bills included earmarks which allocated $450,000 to update College Park’s emergency …
Resetting U.S.-Turkish Relations: Charting A New Way Forward, Aaron Stein
Resetting U.S.-Turkish Relations: Charting A New Way Forward, Aaron Stein
Journal of Strategic Security
After nearly nine decades of benign neglect, Turkey has set about reestablishing its influence in the Middle East. Although most observers agree that the United States and Turkey share a number of overlapping goals in the Middle East, Turkey's recent rapprochement with Iran has drawn the ire of the United States. In tandem, Turkey's relations with Israel, Washington's closest ally in the region, have deteriorated rapidly following Israel's war in Gaza and the events aboard the Mavi Marmara. These coinciding events have further complicated U.S.-Turkish relations and have led a number of pundits in Washington to openly question Turkey's ideological …