Open Access. Powered by Scholars. Published by Universities.®
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Political Science (69)
- Other Political Science (60)
- Psychology (53)
- Public Affairs, Public Policy and Public Administration (53)
- Other Psychology (50)
-
- Defense and Security Studies (43)
- International Relations (37)
- Peace and Conflict Studies (19)
- Law (18)
- American Politics (17)
- Terrorism Studies (17)
- Engineering (11)
- Personality and Social Contexts (11)
- Arts and Humanities (9)
- Philosophy (8)
- Physical Sciences and Mathematics (7)
- Aviation (6)
- International and Area Studies (6)
- Aviation Safety and Security (5)
- Business (4)
- Computer Sciences (4)
- Environmental Studies (4)
- Ethics and Political Philosophy (4)
- Legal Studies (4)
- Military, War, and Peace (4)
- Near and Middle Eastern Studies (4)
- Social Psychology (4)
- Computer Engineering (3)
- Computer Law (3)
- Publication Year
- Publication
- Publication Type
Articles 1 - 30 of 88
Full-Text Articles in Social and Behavioral Sciences
Telemedicine Security: Challenges And Solutions, Crystal Fausett, Joseph R. Keebler, Megan C. Christovich, Jarod M. Parker, John M. Baker
Telemedicine Security: Challenges And Solutions, Crystal Fausett, Joseph R. Keebler, Megan C. Christovich, Jarod M. Parker, John M. Baker
Publications
The proliferation of telemedicine spurred by the COVID-19 pandemic has come with a variety of human factors challenges. Such challenges include mitigating potential risks associated with the quick transition to virtual care. We identify challenges and solutions related to telemedicine security, and analyze our results using Schlarman’s People, Policy, Technology framework (2001). Our systematic literature review synthe-sizes gray literature (white papers, news articles, and blog posts) in addition to formal (published) litera-ture. This methodology closes the gap between academic research and professional practice and aids in providing timely, practical insights related to cybersecurity and safety in virtual care environments. As …
Agent Based Modeling For Low-Cost Counter Uas Protocol In Prisons, Travis L. Cline, J. Eric Dietz
Agent Based Modeling For Low-Cost Counter Uas Protocol In Prisons, Travis L. Cline, J. Eric Dietz
International Journal of Aviation, Aeronautics, and Aerospace
Technological advances have led to the prevalence of small unmanned aerial systems (sUAS) which has proven to be a security concern for fixed facilities to include prisons, airports, and forward operating bases. This study explores if agent-based simulation modeling can serve as a useful tool for developing counter unmanned aerial system (C-UAS) parameters for a fixed facility. The relationship between threat speed and a hypothetical C-UAS is explored in an AnyLogic model designed to represent a prison and general sUAS smuggling threats that prisons have experienced in recent years. The data suggests there is a critical threat sUAS speed in …
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Publications
This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …
Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor
Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor
International Bulletin of Political Psychology
There have been reports of a growing number of Transportation Security Administration (TSA) agents calling in sick and refusing to work for no pay (1). The immediate question becomes, what’s the impact on aviation security? The answer is a negative one, but not as negative as one might think, and one only adding to festering, pre-shutdown problems.
Airport Policing In Pakistan: Structure, Training, And Issue, Muhammad Israr, Muhammad Abrar
Airport Policing In Pakistan: Structure, Training, And Issue, Muhammad Israr, Muhammad Abrar
International Journal of Aviation, Aeronautics, and Aerospace
Airports are strategically and economically important installations of any country. Airports are the gateway of any country and any incidents at these gateways may harm the very aspects of a country in the comity of nations. What are the types of unlawful interferences that are faced by the aviation industry? The establishment as well as preparedness of the airport security force in Pakistan is described in the detail. The airports security is of prime importance in Pakistan because of the wave of terrorism and security situations all around the country. Airport Security Force (ASF) established in 1976, due to the …
A Realist Ethnography Of Nuclear Security Officer Culture, Douglas J. Evans
A Realist Ethnography Of Nuclear Security Officer Culture, Douglas J. Evans
Publications
This realist ethnography describes the heretofore unexamined culture of commercial nuclear power security officers over a one-year period from an active participant observer’s perspective. Data include field notes taken during observations at various sites and 15 interviews with security leaders working at or who had recently worked at 12 different commercial nuclear power plants and had previously worked at a dozen other commercial nuclear power plants, thus representing a broad overview of the commercial nuclear security culture. The data also include more than 58 unclassified documents from these sites, industry organizations, and regulatory agencies. An analysis of the data reveals …
Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling
Evidentiary Power And Propriety Of Digital Identifiers And The Impact On Privacy Rights In The United States, Michael Losavio, Deborah Keeling
Journal of Digital Forensics, Security and Law
Media and network systems capture and store data about electronic activity in new, sometimes unprecedented ways; computational systems make for new means of analysis and knowledge development. These new forms offer new, powerful tactical tools for investigations of electronic malfeasance under traditional legal regulation of state power, particular that of Fourth Amendment limitations on police searches and seizures under the U.S. Constitution. But autonomy, identity and authenticity concerns with electronic data raise issues of public policy, privacy and proper police oversight of civil society. We examine those issues and their implications for digital and computational forensics
The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor
The Name Game As Blame Game: The Domodedovo Terrorist Bombing, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the relevance of blame in the context of terrorism.
The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor
The Yemen Narrative: Cargo Cults And Cargo Security, Ibpp Editor
International Bulletin of Political Psychology
The author gives a psychological perspective on the security of aviation cargo shipments.
Are You Down With Ppp? A Look At Prohibited Personnel Practices In The United States Government, Ibpp Editor
Are You Down With Ppp? A Look At Prohibited Personnel Practices In The United States Government, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the prevalence of identified proscribed personnel practices, and the power dynamics of such identifications among federal employees.
Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor
Spot Off: The Gao Takes On The Tsa’S Behavior Detection Program, Ibpp Editor
International Bulletin of Political Psychology
The United States Government Accountability Office (GAO) has recently Issued Efforts to Validate TSA’s Passenger Screening Behavior Detection Program Underway, but Opportunities Exist to Strengthen Validation and Address Operational Problems (May 2010, GAO-10-763). This IBPP article will describe and comment on the main GAO findings and additional data on which the findings are based. The article will end with some basic challenges to behavior detection as a useful security measure.
Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala
Data Security Measures In The It Service Industry: A Balance Between Knowledge & Action, N. Mlitwa, Y. Kachala
Journal of Digital Forensics, Security and Law
That “knowledge is power” is fast becoming a cliché within the intelligentsia. Such power however, depends largely on how knowledge itself is exchanged and used, which says a lot about the tools of its transmission, exchange, and storage. Information and communication technology (ICT) plays a significant role in this respect. As a networked tool, it enables efficient exchanges of video, audio and text data beyond geographical and time constraints. Since this data is exchanged over the worldwide web (www), it can be accessible by anyone in the world using the internet. The risk of unauthorised access, interception, modification, or even …
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Alphaco: A Teaching Case On Information Technology Audit And Security, Hüseyin Tanriverdi, Joshua Bertsch, Jonathan Harrison, Po-Ling Hsiao, Ketan S. Mesuria, David Hendrawirawan
Journal of Digital Forensics, Security and Law
Recent regulations in the United States (U.S.) such as the Sarbanes-Oxley Act of 2002 require top management of a public firm to provide reasonable assurance that they institute internal controls that minimize risks over the firm’s operations and financial reporting. External auditors are required to attest to the management’s assertions over the effectiveness of those internal controls. As firms rely more on information technology (IT) in conducting business, they also become more vulnerable to IT related risks. IT is critical for initiating, recording, processing, summarizing and reporting accurate financial and non-financial data. Thus, understanding IT related risks and instituting internal …
When The Risk Is Strategically And Operationally Insignificant, Ibpp Editor
When The Risk Is Strategically And Operationally Insignificant, Ibpp Editor
International Bulletin of Political Psychology
The article discusses some of the dangers in labelling a risk as strategically and operationally insignificant in a security setting.
Trends. Non-Physical Approaches To Physical Security, Ibpp Editor
Trends. Non-Physical Approaches To Physical Security, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses the vulnerabilities of protecting physical assets with purely physical means, as well as the potential benefits of non-physical approaches.
The Psychology Of Intelligent Video Analysis, Ibpp Editor
The Psychology Of Intelligent Video Analysis, Ibpp Editor
International Bulletin of Political Psychology
This article examines issues surrounding software-enhanced video analysis in an intelligence context.
Trends. Car Bomb Explosion And An Explosion Of Truths, Ibpp Editor
Trends. Car Bomb Explosion And An Explosion Of Truths, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses multiple political psychological aspects of the August 29, 2003 car bomb explosion adjacent to the Imam Ali Mosque in Najaf, Iraq
Trends. The Federal Bureau Of Investigation Reform Act Of 2003 (S.1440): A Polygraph Update, Ibpp Editor
Trends. The Federal Bureau Of Investigation Reform Act Of 2003 (S.1440): A Polygraph Update, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses The Federal Bureau of Investigation Reform Act of 2003 (S.1440), and the continuing popularity of the polygraph with security bureaucracies.
Is Virtual Conferencing Virtually The Same?, Ibpp Editor
Is Virtual Conferencing Virtually The Same?, Ibpp Editor
International Bulletin of Political Psychology
The article discusses the pros and cons of virtual conferencing and the optimizing of decision making in a security context.
National Security And Multiple Selves, Ibpp Editor
National Security And Multiple Selves, Ibpp Editor
International Bulletin of Political Psychology
This article describes the positive and negative consequences for national security of the ontology and phenomenology of multiple selves.
Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor
Security Watch: No-Fly Zones And Flying Blind, Ibpp Editor
International Bulletin of Political Psychology
The article evaluates the gain in security from no-fly zones from a security perspective.
Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor
Trends. Espionage And Sex: A Commentary On Personnel Security Criteria, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses one aspect of sexual orientation – homosexuality - in a security and intelligence context.
Trends. Social Cognition And The Legal Adjudication Of Terrorism Cases, Ibpp Editor
Trends. Social Cognition And The Legal Adjudication Of Terrorism Cases, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses the impact of terrorism on the justice system and security.
Trends. Disclosure Of Post-9-11 Arrestees And Maslow’S Hierarchy Of Needs, Ibpp Editor
Trends. Disclosure Of Post-9-11 Arrestees And Maslow’S Hierarchy Of Needs, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses the Maslowian hierarchy of needs in the context of 9-11 terrorist attacks and the relationship between executive and judicial branches of American government.
The Societal Costs Of Surveillance: An Alternative View On Civil Liberties Constraints, Ibpp Editor
The Societal Costs Of Surveillance: An Alternative View On Civil Liberties Constraints, Ibpp Editor
International Bulletin of Political Psychology
This article explores some psychological phenomena bearing on the consequences of civil liberties constraints.
Trends. Personnel Security In An Age Of Terrorism With Global Reach, Ibpp Editor
Trends. Personnel Security In An Age Of Terrorism With Global Reach, Ibpp Editor
International Bulletin of Political Psychology
This Trends article discusses what an appropriate level of commitment to a security bureaucracy might look like.
Trends. Husbands, Wives, And Terrorism: The Validity Of Beliefs And The Threat Of Interpretive Strategies, Ibpp Editor
Trends. Husbands, Wives, And Terrorism: The Validity Of Beliefs And The Threat Of Interpretive Strategies, Ibpp Editor
International Bulletin of Political Psychology
This article discusses threat assessment via linguistic analysis.
Trends. Fetishism, Secrecy, And Security, Ibpp Editor
Trends. Fetishism, Secrecy, And Security, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the Federation of American Scientists’ Secrecy News and how it characterized the Bush Administration’s stance towards the President’s Daily Brief as “fetishism.”
Trends. Personnel Security And Counterintelligence: No Evidence Of Racial Bias As Racism, Ibpp Editor
Trends. Personnel Security And Counterintelligence: No Evidence Of Racial Bias As Racism, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the concepts of race and racial bias in the context of espionage investigations carried out by the US Department of Energy (DOE) and the US Federal Bureau of Investigation (FBI).
Trends. Border Security Legislation, Terrorism-Sponsoring Nations, And Evil, Ibpp Editor
Trends. Border Security Legislation, Terrorism-Sponsoring Nations, And Evil, Ibpp Editor
International Bulletin of Political Psychology
The IBPP editor discusses limiting temporary visas for visitors from alleged terrorism-sponsoring nations as a way of "tightening" the security of national borders.