Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (93)
- Public Affairs, Public Policy and Public Administration (88)
- Defense and Security Studies (87)
- Physical Sciences and Mathematics (77)
- Computer Law (75)
-
- Computer Sciences (75)
- Information Security (74)
- Legal Studies (74)
- Forensic Science and Technology (73)
- Social Control, Law, Crime, and Deviance (73)
- Sociology (73)
- Aviation (72)
- Aviation Safety and Security (72)
- Engineering (72)
- Other Computer Sciences (72)
- OS and Networks (71)
- Political Science (10)
- Other Political Science (9)
- Other Psychology (8)
- Psychology (8)
- Military, War, and Peace (7)
- Business (5)
- Education (5)
- Higher Education (5)
- Law and Politics (5)
- Air and Space Law (4)
- American Politics (4)
- Personality and Social Contexts (4)
- Keyword
-
- Homeland security (8)
- Personnel Security (4)
- Counterintelligence (3)
- Higher education (3)
- Teaching (3)
-
- Bin Laden (2)
- Boland and Clark Amendments (2)
- CIRG (2)
- Climate change (2)
- Culting Process (2)
- Cybersecurity (2)
- Cybersecurity education (2)
- Digital forensics (2)
- Environment (2)
- Espionage (2)
- Fadlalla (2)
- Mindfulness (2)
- Moralpolitik (2)
- Mougniah (2)
- Outcomes (2)
- Racism (2)
- Salameh (2)
- Terrorism (2)
- 9/11 (1)
- Adjudication (1)
- Airbus 300 (1)
- Airline (1)
- Al Qaeda (1)
- CIA (1)
- Civil Reserve Air Fleet (1)
- Publication Year
- Publication
- Publication Type
Articles 91 - 102 of 102
Full-Text Articles in National Security Law
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Security Studies & International Affairs - Daytona Beach
"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Digital Forensics: Everything Leaves A Trace In Cyberspace, Gary C. Kessler
Applied Aviation Sciences - Daytona Beach
"What is cyberforensics • Legal issues • The computer/network forensics process • Where does the data go ‐- Some examples • Locard's Principle"--Overview
Trends. Personnel Security And Counterintelligence: No Evidence Of Racial Bias As Racism, Ibpp Editor
Trends. Personnel Security And Counterintelligence: No Evidence Of Racial Bias As Racism, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the concepts of race and racial bias in the context of espionage investigations carried out by the US Department of Energy (DOE) and the US Federal Bureau of Investigation (FBI).
Revisiting The United States Hostage Negotiation Policy: An Academic Imperative. Part I, Ibpp Editor
Revisiting The United States Hostage Negotiation Policy: An Academic Imperative. Part I, Ibpp Editor
International Bulletin of Political Psychology
This article comes in two parts - the article and the notes.
Article abstract: To get hostages released without harm requires a national policy committed to that principle. With that in mind, there needs to be an understanding of the perpetrators' "objective view" of reality. These views have political, economic, psychological, cultural, ethno-religious and perceptual dimensions. Those multivariate dimensions of any hostage situation mandate policies that should be based on law enforcement and military perspectives, in order to be flexible enough to permit their consideration and continuously evaluate their national and international implications.
Part II: Notes and bibliography for Part …
Revisiting The United States Hostage Negotiation Policy: An Academic Imperative. Part Ii, Ibpp Editor
Revisiting The United States Hostage Negotiation Policy: An Academic Imperative. Part Ii, Ibpp Editor
International Bulletin of Political Psychology
This article comes in two parts - the article and the notes.
Article abstract: To get hostages released without harm requires a national policy committed to that principle. With that in mind, there needs to be an understanding of the perpetrators' "objective view" of reality. These views have political, economic, psychological, cultural, ethno-religious and perceptual dimensions. Those multivariate dimensions of any hostage situation mandate policies that should be based on law enforcement and military perspectives, in order to be flexible enough to permit their consideration and continuously evaluate their national and international implications.
Part II: Notes and bibliography for Part …
Trends. Accountability In Security Organizations: The Case Of The United States Navy, Ibpp Editor
Trends. Accountability In Security Organizations: The Case Of The United States Navy, Ibpp Editor
International Bulletin of Political Psychology
Controversy surrounds the adjudication of the United States Navy (USN) commander whose submarine collided with and then sank a Japanese fishing boat in February 200l. The USN has Issued a letter of reprimand to the commander and is allowing him to leave the Navy with full pension based on his current rank, as opposed to authorizing a court-martial that would have rendered the commander liable to very serious criminal charges and sentences. At Issue have been the effects of the adjudication on military personnel aware of the adjudication.
Trends. Cognitive Dissonance And Conflation Of Patriotism And Political Advocacy: On The Secrecy Of The Intelligence Budget, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the views of the Federation of American Scientists (FAS) regarding the budgeting practices of the U.S. Central Intelligence Agency (CIA).
More Spy Games: A Problem With Credibility Of Sources For Counterintelligence And Personnel Security, Ibpp Editor
More Spy Games: A Problem With Credibility Of Sources For Counterintelligence And Personnel Security, Ibpp Editor
International Bulletin of Political Psychology
This article identifies implications of recent meta-evaluations of psychological assessment methods for attempts at identifying individuals who are committing treason or otherwise violating security policies.
Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor
Trends. Psychologies Of Personnel Security And Counterintelligence Failure: Racism, Satisficing, And Wen Ho Lee, Ibpp Editor
International Bulletin of Political Psychology
This article discusses issues surrounding the actions of Mr. Wen Ho Lee in the context of espionage, treason, and national security as well as racial profiling and the problems with conducting counterintelligence.
The Pollard Case And The Nature Of Espionage, Ibpp Editor
The Pollard Case And The Nature Of Espionage, Ibpp Editor
International Bulletin of Political Psychology
This article describes some common misconceptions in evaluating the appropriateness of penalties for individuals convicted of espionage.
The Magic Of Science And The Science Of Magic: Polygraphy, Deception, And National Security, Ibpp Editor
The Magic Of Science And The Science Of Magic: Polygraphy, Deception, And National Security, Ibpp Editor
International Bulletin of Political Psychology
This article highlights philosophical problems on the road to identifying deception.
The Psychology Of Moral Judgment: Further Complexities For Personnel Security Programs, Ibpp Editor
The Psychology Of Moral Judgment: Further Complexities For Personnel Security Programs, Ibpp Editor
International Bulletin of Political Psychology
This article describes psychological research that complicates the personnel security quest to minimize intentional violations of law, regulation, and procedure.