Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Selected Works (19)
- Liberty University (13)
- SelectedWorks (12)
- Embry-Riddle Aeronautical University (9)
- Universitas Indonesia (4)
-
- Gettysburg College (3)
- University of Wollongong (3)
- William & Mary Law School (3)
- Eastern Kentucky University (2)
- Pepperdine University (2)
- University of Tennessee, Knoxville (2)
- Washington University in St. Louis (2)
- Air Force Institute of Technology (1)
- Chapman University (1)
- Edith Cowan University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- The University of Akron (1)
- University of Arkansas, Fayetteville (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Mississippi (1)
- University of South Florida (1)
- Walden University (1)
- Wilfrid Laurier University (1)
- Publication Year
- Publication
-
- Liberty University Journal of Statesmanship & Public Policy (10)
- International Bulletin of Political Psychology (8)
- Professor Katina Michael (7)
- Jan Kallberg (6)
- Arsalan Suleman (4)
-
- William Wunderle (4)
- Associate Professor Katina Michael (3)
- Alev Dudek (2)
- Baker Scholar Projects (2)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (2)
- Jurnal Kajian Stratejik Ketahanan Nasional (2)
- Kevin H. Govern (2)
- Murray Weidenbaum Publications (2)
- Pepperdine Policy Review (2)
- Samuel W Bettwy (2)
- Student Publications (2)
- William & Mary Environmental Law and Policy Review (2)
- Alexander Hayes Mr. (1)
- Australian Information Security Management Conference (1)
- Doctoral Dissertations and Projects (1)
- Dr. Mutaz M. Al-Debei (1)
- EKUOPEN: Open Textbooks (1)
- Faculty Publications (1)
- Honors Theses (1)
- Independent Study Project (ISP) Collection (1)
- Joshua P Monroe (1)
- Journal of Business & Technology Law (1)
- Journal of Strategic and Global Studies (1)
- Journal of Terrorism Studies (1)
- Linda A. Malone (1)
- Publication Type
- File Type
Articles 1 - 30 of 85
Full-Text Articles in Social and Behavioral Sciences
Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore
Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore
Helm's School of Government Conference - American Revival: Citizenship & Virtue
This paper explores the complex economic interdependence between the US, China, and Taiwan, specifically in the semiconductor industry. China’s increased aggression and intellectual property (IP) theft threatens to unbalance the iron triangle of US, China, and Taiwan trade relations. The problem overview elaborates on Taiwan’s crucial role in the semiconductor supply chain, and China’s threat against it. The argument is made that the US must take a nuanced and multifaceted approach to solving the diplomatic, economic, and military policy problem. Criteria for success are outlined, emphasizing the need to address root causes and not compromise US commitment to a free …
Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris
Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris
Liberty University Journal of Statesmanship & Public Policy
Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …
A Unified Voice: The Us-Taliban Peace Deal, Matthew Feldstein
A Unified Voice: The Us-Taliban Peace Deal, Matthew Feldstein
The Gettysburg Journal for Public Policy
The United States signed a peace deal with the Taliban on February 29th, 2020 that would result in the complete withdrawal of US forces from the country at the end of a fourteenth month period, assuming the Taliban holds up their end of the deal. This would mark the end of one of the longest wars in United States history, lasting nearly two decades. The purpose of this paper is twofold, to determine if there is a presence of bias or misinformation by five major public policy think tanks in the United States and to examine the United …
Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky
Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky
Honors Theses
Russia and China are critical actors who deploy far-reaching and impactful information operations in pursuit of their national interests. Their use of information operations is multifaceted and should be subject to study due to how influential these operations are and how significant the effects can be. In pursuit of this knowledge, the aim of this study was to conduct an in-depth analysis of these two countries' information operations and how their operations differ. The first area analyzed was the evolution of these countries' modern day information operations, primarily looking for the factors and historical context which influenced the development of …
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott
The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott
Baker Scholar Projects
Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …
The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott
The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott
Baker Scholar Projects
Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
Publications
The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
Doctoral Dissertations and Projects
The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …
The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph
The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph
Liberty University Journal of Statesmanship & Public Policy
This paper examines the statements and actions by China and Russia and its leaders, ascertains what their economic and military objectives are and why, and describes how this powerful “Axis” intends to achieve them.
Security Analysis: A Critical Thinking Approach, Michael W. Collier
Security Analysis: A Critical Thinking Approach, Michael W. Collier
EKUOPEN: Open Textbooks
Security Analysis: A Critical-Thinking Approach is for anyone desiring to learn techniques for generating the best answers to complex questions and best solutions to complex problems. It furnishes current and future analysts in national security, homeland security, law enforcement, and corporate security an alternative, comprehensive process for conducting both intelligence analysis and policy analysis. The target audience is upper-division undergraduate students and new graduate students, along with entry-level practitioner trainees. The book centers on a Security Analysis Critical-Thinking Framework that synthesizes critical-thinking and existing analytic techniques. Ample examples are provided to assist readers in comprehending the material. Newly created material …
The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back
The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back
Williams Honors College, Honors Research Projects
There are numerous threats to U.S. National Security within higher education. Through this paper, I will provide an analysis of current and future threats using a literature review and informational interviewing. The literature review revealed four major National Security threats facing higher education institutions due to Foreign Intelligence Entities (FIE): foreign recruitment of faculty and students, increase in foreign students and screening difficulties, campus openness/easy access to facilities and information, and foreign funding for research. A set of informational interviews were conducted with The University of Akron faculty, employees, and partners to evaluate whether these same threats were present. The …
Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah
Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah
Journal of Terrorism Studies
Tension between privacy and security is nothing new, however due to the development of information and communication technology use as well as more intensive efforts of terrorism eradication have affected to the increasing level of the conflict. The need for national security is often similar to the situation of state of emergency, which enables the state to conduct several limitations to the implementation of right to privacy. Many states use the said justification and further position the element of national security to be in the superior position compared to the protection of civil liberties, including right to privacy. As …
Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor
Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor
Liberty University Journal of Statesmanship & Public Policy
Twenty-one years ago, one of the greatest attacks on the American republic occurred. On September 11, 2001, American Airlines Flights 11, 77, 93, and 177 were hijacked by Islamic extremists and crashed in New York City, Washington D.C., and Pennsylvania. The atrocity of these incidents and the extensive loss of life impacted not only the United States but the entire world. Nevertheless, in light of this tragedy the American people found unity in patriotism, rekindling a sense of national purpose in the form of the “Global War on Terrorism.” This document is a compilation of reflection articles written by individuals …
How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler
How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler
Helm's School of Government Conference - American Revival: Citizenship & Virtue
No abstract provided.
Tactical Mistakes: Women's Role In Terrorism, Laura Daniel
Tactical Mistakes: Women's Role In Terrorism, Laura Daniel
Liberty University Journal of Statesmanship & Public Policy
Since the 1970s, the word "terrorism" has become a well-known term. Almost two decades after 9/11, it has become a part of everyday vocabulary and, at times, dominates the news cycle. However, the faces we see associated with terrorism are mainly men. When talking of a training camp or a video claiming responsibility for terrorist attacks, women are not a part of the majority. However, women do play a significant role in terrorism. This article evaluates the history of women in terrorism and their positions in terror organizations, as well as the tactical mistake of overlooking women's role in global …
Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight
Theses and Dissertations (Comprehensive)
In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …
Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii
Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii
Journal of Strategic and Global Studies
Current information has become a very important commodity. Some even say that our society is already in an "information-based society". The ability to access and provide information quickly and accurately is very important for an organization, such as companies, universities, government agencies, and individuals. Once the importance of the value of information causes often the desired information can only be accessed by certain people. The fall of information in the hands of other parties can cause harm to the information owner. Security issues are an important aspect of an information system management. Unfortunately, this security problem often gets less attention …
Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*]
Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*]
Faculty Publications
This article will examine the proposed space operations structure by first outlining the historical foundations for differences in maritime and air domain military capabilities, specifically brown-water versus blue-water navies, and “local/ regional” versus “global” airpower. Next, the article will present the concept of black space and blue space in terms of an environment-specific definition, as well as an examination of the technical capability requirements, mission types, and national prestige and geopolitical considerations underpinning the proposed operation types. Finally, the article will explore how the USSF might support future space exploration within the black-space and blue-space operations structure.
Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara
Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara
Liberty University Journal of Statesmanship & Public Policy
The growth of cyberspace has challenged existing frameworks for strategic competition. As a result, government, private, and academic planners seek to develop a novel framework for integrating cyberspace into diplomatic, military, and intelligence planning. This has been a difficult proposition and continues to be an area of vulnerability for the United States. To date, the United States has threatened nuclear retaliation for large scale cyber-attacks, but a comprehensive strategy has not been made publicly clear. However, this integration challenge has been encountered and solved previously. Nuclear weapons changed warfare in the twentieth century, but the United States used Mutual Assured …
Liberalism Versus Fundamentalism: The Ideological Conflict Between Tocqueville And Qtub, Mary Catherine E. Morris
Liberalism Versus Fundamentalism: The Ideological Conflict Between Tocqueville And Qtub, Mary Catherine E. Morris
Liberty University Journal of Statesmanship & Public Policy
This paper seeks to conclude whether Qtub has successfully discredited the values supported by Tocqueville to draw more Muslims to support an increased role of religion in society and influence the majority of Muslims to conduct violent jihad. It is hypothesized that Muslims agree with Qtub that Islam must be increasingly influential in society, but the majority do not seek to increase its role through, or for the purposes of, violent jihad. Differing in their views on freedom and liberty, freedom of religion and separation of church and state, and man-made laws but agreeing on the negative effects of materialism, …
The Sovereignty Solution: A Common Sense Approach To Global Security, Andrew Higgins
The Sovereignty Solution: A Common Sense Approach To Global Security, Andrew Higgins
Liberty University Journal of Statesmanship & Public Policy
The Sovereignty Solution calls for a new grand strategy for the United States. The current security paradigm, the book’s authors hold, has yet to be properly modified from a 20th-century cast of mind. The ad hoc system inherited after the end of the Cold War now fails because it too often applies national power equally to each emerging threat. But security challenges in the 21st century arise so quickly and unexpectedly that continuing in this manner incurs overextension and further, risks strategic defeat. If the United States continues to behave as if it can be in all …
Europe And Asia’S Melded Future: A Critique Of The Dawn Of Eurasia, Faith A. Chudkowski
Europe And Asia’S Melded Future: A Critique Of The Dawn Of Eurasia, Faith A. Chudkowski
Liberty University Journal of Statesmanship & Public Policy
This book review examines political scientist Bruno Maçães’ The Dawn of Eurasia, which presents the emergent Eurasia, China and Russia’s role in shaping it, and what preceded this shift. His book delves into the background that shows the pairing of Europe and Asia to be key in understanding today’s political landscape. Maçães writes that the world has stepped into globalization’s second stage, which is unsteady due to the heightening juxtaposition of different nations that muddle the geopolitics of Europe and Asia. He goes on to argue that this new moment has made a shift in power feasible and appealing …
Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener
Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener
Liberty University Journal of Statesmanship & Public Policy
Biological warfare is a national security concern that transcends centuries. In the current international climate, biowarfare is of particular interest due to the COVID-19 pandemic. This article seeks to follow historical cases of biological warfare and international response to these cases in order to understand the implications of COVID-19, if it were to be weaponized. Also covered is the current capabilities that Russia, China, and Iran are assessed to possess.
Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite
Combining Competition And Cooperation: A Guide To U.S. Space Relations, Paul Prentice, Nathan Waite
Liberty University Journal of Statesmanship & Public Policy
Space is the future for humanity. Whether that is a future of amity and cooperation, or competition and conflict depends in large part to what America makes it. While America cannot afford to entirely abandon cooperation with the world in the final frontier, neither can it afford to cede the advantage in a new field of potential warfare to adversaries in China and Russia. What is needed is a moderate path of competition where necessary and cooperation where beneficial, in order to most fully advance the cause of American national security. By utilizing arms treaties to prevent Chinese domination, while …
The Effects Of Unauthorized Immigrants On Crime, Shane C. Shannon
The Effects Of Unauthorized Immigrants On Crime, Shane C. Shannon
Student Publications
The effects of immigrants on crime has been the subject of hostile conversations and bold claims. As anti-immigrant sentiments see an increase in mainstream society, the empirical research suggesting an explanation to such claims are direly needed. Using PEW Research databases, and the States 2016 database in Stata, I evaluate the effects of unauthorized immigrant density of a given region on various crime rates of the aforementioned region. In particular, I assess the violent crime rate, murder crime rate, and property crime rates of states in America. Utilizing confidence intervals, ordinary least squares regression models (OLS), and a number of …
Narrative Policy Analysis, John W. Burns
Narrative Policy Analysis, John W. Burns
Student Publications
This review explores the book All Hell Breaking Loose: The Pentagons View on Climate Change, written by Micheal Klare, highlighting how the US national security offices are viewing and responding to the ominous looming threats posed by climate change.
The Bureaucratic Politics Of The Federal Bureau Of Investigation, Cooper Hearn
The Bureaucratic Politics Of The Federal Bureau Of Investigation, Cooper Hearn
Political Science Undergraduate Honors Theses
This is a comprehensive study of how the administrative powers of the Federal Bureau of Investigation (FBI) have evolved in response to external political forces. To analyze the changes made to FBI administrative powers, this project will assess theories of public administration, bureaucratic politics, various congressional statutes, court rulings, and executive policies that have affected the bureau’s capacity to perform investigations and intelligence operations.
Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone
Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone
Linda A. Malone
No abstract provided.
Pelibatan Organisasi Masyarakat Dalam Intelijen Keamanan Nasional, Yudha Fernando
Pelibatan Organisasi Masyarakat Dalam Intelijen Keamanan Nasional, Yudha Fernando
Jurnal Kajian Stratejik Ketahanan Nasional
The problem examined in this study is the role of civil society in intelligence activities for national security,
while the purpose is to determine the role and form of civil society can play in intelligence activities. Theories
that researchers use include theories of intelligence, national security, institutions and sociology. The research
approach used in this study is a qualitative approach and the type of descriptive qualitative research using a case
study model. Researchers used interview techniques, document studies and observations. Then the data is
analyzed with an interactive analysis model and validated. There are two roles that can be bound …