Open Access. Powered by Scholars. Published by Universities.®
![Digital Commons Network](http://assets.bepress.com/20200205/img/dcn/DCsunburst.png)
Social and Behavioral Sciences Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Public Affairs, Public Policy and Public Administration (87)
- Political Science (62)
- Defense and Security Studies (48)
- Law (32)
- International Relations (29)
-
- Public Policy (27)
- Physical Sciences and Mathematics (18)
- Engineering (17)
- Sociology (16)
- Science and Technology Studies (15)
- American Politics (14)
- Business (14)
- Computer Sciences (14)
- International and Area Studies (14)
- Internet Law (13)
- Computer Law (12)
- Criminology (12)
- Law and Society (12)
- Peace and Conflict Studies (12)
- Social Policy (12)
- Technology and Innovation (12)
- Arts and Humanities (11)
- National Security Law (11)
- Other Engineering (11)
- Other Political Science (11)
- Terrorism Studies (10)
- Other Psychology (9)
- Psychology (9)
- History (8)
- Institution
-
- Selected Works (23)
- Liberty University (16)
- SelectedWorks (13)
- Embry-Riddle Aeronautical University (12)
- Universitas Indonesia (5)
-
- University of Tennessee, Knoxville (4)
- University of Wollongong (4)
- William & Mary Law School (4)
- Gettysburg College (3)
- Pepperdine University (3)
- Washington University in St. Louis (3)
- Claremont Colleges (2)
- Eastern Kentucky University (2)
- The University of Akron (2)
- University of Arkansas, Fayetteville (2)
- University of Central Florida (2)
- University of Nebraska - Lincoln (2)
- University of North Florida (2)
- University of South Florida (2)
- Air Force Institute of Technology (1)
- California State University, San Bernardino (1)
- Chapman University (1)
- Colby College (1)
- Eastern Michigan University (1)
- Edith Cowan University (1)
- James Madison University (1)
- Marshall University (1)
- SIT Graduate Institute/SIT Study Abroad (1)
- Seattle University School of Law (1)
- The University of Southern Mississippi (1)
- Publication Year
- Publication
-
- Liberty University Journal of Statesmanship & Public Policy (13)
- International Bulletin of Political Psychology (11)
- Professor Katina Michael (9)
- Jan Kallberg (7)
- William Wunderle (5)
-
- Arsalan Suleman (4)
- Associate Professor Katina Michael (4)
- Honors Theses (3)
- Pepperdine Policy Review (3)
- Alev Dudek (2)
- Baker Scholar Projects (2)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (2)
- Honors Undergraduate Theses (2)
- Journal of Terrorism Studies (2)
- Jurnal Kajian Stratejik Ketahanan Nasional (2)
- Kevin H. Govern (2)
- Murray Weidenbaum Publications (2)
- Saffy Collection - All Textual Materials (2)
- Samuel W Bettwy (2)
- Student Publications (2)
- William & Mary Environmental Law and Policy Review (2)
- Williams Honors College, Honors Research Projects (2)
- Alexander Hayes Mr. (1)
- Australian Information Security Management Conference (1)
- CGU Theses & Dissertations (1)
- CMC Senior Theses (1)
- Chancellor’s Honors Program Projects (1)
- Communications Faculty Research (1)
- Dissertations (1)
- Doctoral Dissertations (1)
- Publication Type
- File Type
Articles 1 - 30 of 126
Full-Text Articles in Social and Behavioral Sciences
Implication Of Artificial Intelligence On National Security For The Nigeria Security Agencies, Musa Zakari
Implication Of Artificial Intelligence On National Security For The Nigeria Security Agencies, Musa Zakari
Journal of Terrorism Studies
The study examines the implications of AI for national security in Nigeria in the field of military logistics for Nigerian security agencies. A documentary research design was utilized for the study. Document analysis of existing policies, reports, and case studies related to AI and national security in Nigeria was utilized. The study revealed that artificial intelligence (AI) has significant prospects for national security for Nigeria's security agencies. It was revealed that AI-powered technologies enable advanced surveillance capabilities, such as facial recognition and video analytics, which aid in identifying potential threats and monitoring security situations more effectively. The Air Force uses …
Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore
Rethinking Supply Chains: Mitigating The Risk Of Chinese Dependence And Protecting Us Semiconductor Intellectual Property, Jamison Finnamore
Helm's School of Government Conference - American Revival: Citizenship & Virtue
This paper explores the complex economic interdependence between the US, China, and Taiwan, specifically in the semiconductor industry. China’s increased aggression and intellectual property (IP) theft threatens to unbalance the iron triangle of US, China, and Taiwan trade relations. The problem overview elaborates on Taiwan’s crucial role in the semiconductor supply chain, and China’s threat against it. The argument is made that the US must take a nuanced and multifaceted approach to solving the diplomatic, economic, and military policy problem. Criteria for success are outlined, emphasizing the need to address root causes and not compromise US commitment to a free …
Brics: The World’S New Emerging Economic Alliance, Robert J. Flanigan Iii
Brics: The World’S New Emerging Economic Alliance, Robert J. Flanigan Iii
Master's Theses
National Security is ever-changing and evolving. As our nation moves forward in today’s world after the conclusion of the Iraq War and Afghanistan War, and moves into a new modern warfare, our nation must be on alert; searching for the next threat to keep our sovereignty alive and our citizens free and safe. This is especially important when nations who desire to harm our great nation find common interests in others to join forces against the United States of America. While looking at Brazil, Russia, India, China, and South Africa Coalition (BRICS) and what these countries coming together could do …
Ambitions Of Chinese Hegemony: An Analysis Of The Hundred Year Marathon, Ruben E. Frivold
Ambitions Of Chinese Hegemony: An Analysis Of The Hundred Year Marathon, Ruben E. Frivold
Liberty University Journal of Statesmanship & Public Policy
Few national security threats challenge the magnitude posed by the People’s Republic of China toward the United States. This current reality is due to various factors, including Chinese persistence in implementing a grand strategy while facing minimal U.S. resistance due to various foreign policy missteps over the last half-century. China’s overarching approach to geopolitics has been a subject of much discussion and has often been referred to by experts as the ‘hundred-year marathon.’ The term derives its name from China’s objective of usurping America’s position as hegemon by 2049, a significant year that falls on the one-hundredth anniversary of the …
Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris
Ai And National Security: The United States Risks Losing Its Competitive Edge, Royce Morris
Liberty University Journal of Statesmanship & Public Policy
Recent developments in artificial intelligence (AI) have caused concern over the ethical implications of large-scale AI implementation. As a result, leading technologists and computer scientists have advocated an incremental rather than comprehensive approach to AI development and implementation to allow ethical and structural guidelines to provide a public safety net. However, such an approach does not account for the geopolitical and national security implications of lagging behind competitors like China, who have publicly stated goals of reaching AI supremacy within the next ten years. This article presents a national security analysis of the risks to American national security by allowing …
A Unified Voice: The Us-Taliban Peace Deal, Matthew Feldstein
A Unified Voice: The Us-Taliban Peace Deal, Matthew Feldstein
The Gettysburg Journal for Public Policy
The United States signed a peace deal with the Taliban on February 29th, 2020 that would result in the complete withdrawal of US forces from the country at the end of a fourteenth month period, assuming the Taliban holds up their end of the deal. This would mark the end of one of the longest wars in United States history, lasting nearly two decades. The purpose of this paper is twofold, to determine if there is a presence of bias or misinformation by five major public policy think tanks in the United States and to examine the United …
Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky
Comparing The Evolution, Form, And Function Of Russian And Chinese Information Operations, Briana Berger Slowinski, Marissa J. Skulsky
Honors Theses
Russia and China are critical actors who deploy far-reaching and impactful information operations in pursuit of their national interests. Their use of information operations is multifaceted and should be subject to study due to how influential these operations are and how significant the effects can be. In pursuit of this knowledge, the aim of this study was to conduct an in-depth analysis of these two countries' information operations and how their operations differ. The first area analyzed was the evolution of these countries' modern day information operations, primarily looking for the factors and historical context which influenced the development of …
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer
Military Cyber Affairs
On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.
The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott
The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Scott
Baker Scholar Projects
Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …
The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott
The Eagle’S Eye On The Rising Dragon: Why The United States Has Shifted Its View Of China, Jackson Craig Scott
Baker Scholar Projects
Since 1978, the People’s Republic of China (PRC) has long been viewed as an economic trading partner of the United States of America (US). The PRC has grown to be an economic powerhouse, and the US directly helped with that process and still benefits from it. However, during the mid-2010’s, US rhetoric began to turn sour against the PRC. The American government rhetoric toward the PRC, beginning with the Obama administration, switched. As Trump’s administration came along, they bolstered this rhetoric from non-friendly to more or less hostile. Then, Biden’s administration strengthened Trump’s rhetoric. Over the past ten years or …
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
Doctoral Dissertations and Projects
The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
A Conceptual Frame For Us Counterterrorism Policy: Examining The Effectiveness Against Al Qaeda And Its Associates Prior To 9/11, "Tod" Thomas Patrick Brown
Publications
The United States (US) has been engaged in a “war on terrorism” to “defeat” al Qaeda since 2001. This study presented and tested an over-arching conceptual framework for US Counterterrorism (CT) policy. The conceptual frame was tested using qualitative thematic analysis of archival records from the Reagan through Clinton era. The research also used a case study of al Qaeda as the context to bound the selected records for the study. This new conceptual frame was used to evaluate the success, failure, and effects of US CT policy activities related to al Qaeda, using the records identified for the study. …
Using Game Theory To Model Tripolar Deterrence And Escalation Dynamics, Grace Farson
Using Game Theory To Model Tripolar Deterrence And Escalation Dynamics, Grace Farson
Honors Theses
The study investigated how game theory can been utilized to model multipolar escalation dynamics between Russia, China, and the United States. In addition, the study focused on analyzing various parameters that affected potential conflict outcomes to further new deterrence thought in a tripolar environment.
A preliminary game theoretic model was created to model and analyze escalation dynamics. The model was built upon framework presented by Zagare and Kilgour in their work ‘Perfect Deterrence’. The model is based on assumptions and rules set prior to game play. The model was then analyzed based upon these assumptions using a form of mathematical …
The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph
The China-Russia Axis: What Does It Want And How Will It Get It?, Douglas J. Joseph
Liberty University Journal of Statesmanship & Public Policy
This paper examines the statements and actions by China and Russia and its leaders, ascertains what their economic and military objectives are and why, and describes how this powerful “Axis” intends to achieve them.
Security Analysis: A Critical Thinking Approach, Michael W. Collier
Security Analysis: A Critical Thinking Approach, Michael W. Collier
EKUOPEN: Open Textbooks
Security Analysis: A Critical-Thinking Approach is for anyone desiring to learn techniques for generating the best answers to complex questions and best solutions to complex problems. It furnishes current and future analysts in national security, homeland security, law enforcement, and corporate security an alternative, comprehensive process for conducting both intelligence analysis and policy analysis. The target audience is upper-division undergraduate students and new graduate students, along with entry-level practitioner trainees. The book centers on a Security Analysis Critical-Thinking Framework that synthesizes critical-thinking and existing analytic techniques. Ample examples are provided to assist readers in comprehending the material. Newly created material …
Post, Share, Like: The Role Of Facebook In The Russo-Ukrainian War, Hannah Michelle Snyder
Post, Share, Like: The Role Of Facebook In The Russo-Ukrainian War, Hannah Michelle Snyder
Honors Undergraduate Theses
Facebook is being used by both Russia and Ukraine as a tool of war, for very different purposes. This demonstrates that the platform no longer serves the sole function of connecting communities together. Existing literature has recognized that social media is being used in the current Russo-Ukrainian war but has yet to conduct comparative and contrastive analyses of Russian and Ukrainian social media strategies and effects. Conducting these analyses will illustrate not only what strategies are being used, but how they can be simultaneously advantageous and disadvantageous for belligerents. By focusing on one platform, Facebook, one can not only learn …
The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back
The Higher Education Risk To National Security: A Case Study Of The University Of Akron, Anna Back
Williams Honors College, Honors Research Projects
There are numerous threats to U.S. National Security within higher education. Through this paper, I will provide an analysis of current and future threats using a literature review and informational interviewing. The literature review revealed four major National Security threats facing higher education institutions due to Foreign Intelligence Entities (FIE): foreign recruitment of faculty and students, increase in foreign students and screening difficulties, campus openness/easy access to facilities and information, and foreign funding for research. A set of informational interviews were conducted with The University of Akron faculty, employees, and partners to evaluate whether these same threats were present. The …
Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah
Developing An Equilibrium Of Protection Of The Right To Privacy And National Security In Terrorism Eradication In Indonesia, Wahyudi Djafar, Muhamad Syauqillah
Journal of Terrorism Studies
Tension between privacy and security is nothing new, however due to the development of information and communication technology use as well as more intensive efforts of terrorism eradication have affected to the increasing level of the conflict. The need for national security is often similar to the situation of state of emergency, which enables the state to conduct several limitations to the implementation of right to privacy. Many states use the said justification and further position the element of national security to be in the superior position compared to the protection of civil liberties, including right to privacy. As …
Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor
Twenty-One Years Later: Reflections On 9/11, Bessie Blackburn, Shaddi Spencer, Hayden O'Connor
Liberty University Journal of Statesmanship & Public Policy
Twenty-one years ago, one of the greatest attacks on the American republic occurred. On September 11, 2001, American Airlines Flights 11, 77, 93, and 177 were hijacked by Islamic extremists and crashed in New York City, Washington D.C., and Pennsylvania. The atrocity of these incidents and the extensive loss of life impacted not only the United States but the entire world. Nevertheless, in light of this tragedy the American people found unity in patriotism, rekindling a sense of national purpose in the form of the “Global War on Terrorism.” This document is a compilation of reflection articles written by individuals …
How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler
How Reagan’S National Security Decision Directives Can Be Applied Today, Audrey Sightler
Helm's School of Government Conference - American Revival: Citizenship & Virtue
No abstract provided.
Tactical Mistakes: Women's Role In Terrorism, Laura Daniel
Tactical Mistakes: Women's Role In Terrorism, Laura Daniel
Liberty University Journal of Statesmanship & Public Policy
Since the 1970s, the word "terrorism" has become a well-known term. Almost two decades after 9/11, it has become a part of everyday vocabulary and, at times, dominates the news cycle. However, the faces we see associated with terrorism are mainly men. When talking of a training camp or a video claiming responsibility for terrorist attacks, women are not a part of the majority. However, women do play a significant role in terrorism. This article evaluates the history of women in terrorism and their positions in terror organizations, as well as the tactical mistake of overlooking women's role in global …
Tech And Authoritarianism: How The People’S Republic Of China Is Using Data To Control Hong Kong And Why The U.S. Is Vulnerable, Bryce Neary
Seattle Journal of Technology, Environmental & Innovation Law
The aim of this article is to analyze and compare current events in the People's Republic of China and the United States to discuss the moral dilemmas that arise when establishing the boundary between national security interests and individual privacy rights. As we continue to intertwine our lives with technology, it has become increasingly important to establish clear privacy rights. The question then becomes: at what point should individuals sacrifice their rights for what the government considers the "greater good" of the country?
Further, this article analyzes the development of U.S. privacy law and its relationship to national security, technology, …
Learning From History: Real And Perceived Threats To National Security, David Dupont
Learning From History: Real And Perceived Threats To National Security, David Dupont
CGU Theses & Dissertations
Significant changes in American domestic security policies were generally associated with periods of military conflicts. Laws that would pave the way for legalizing the surveillance and internment of civilian populations have their origin in the Quasi-War. Likewise, the practice of state property seizure under the Office of Alien Property Custodian and limited internment programs were first established during WWI. Mass civilian internment came into existence leading up to WWII. This trajectory continued in modern times with the extensive system of domestic surveillance post-9/11. In this paper, I argue for gaining a historical comprehension of these issues by exploring their origins …
Spies, Sanctions, And Single-Party States: How American Sanctions Influence Intelligence Operations, Anthony J. Anta
Spies, Sanctions, And Single-Party States: How American Sanctions Influence Intelligence Operations, Anthony J. Anta
Honors Undergraduate Theses
States have a diverse and unique set of available mechanisms to deploy when seeking to interact in the international community. Economic sanctions have long been one such tool available for states looking to coerce or incentivize a change in the behavior of another state. Likewise, states have historically sought to influence and gain unknown knowledge on another state or actor. Covert intelligence operations have changed forms, mechanisms, and techniques, especially since the expansive advancements in technology in the 21st century. This paper seeks to understand the influence that economic sanctions have on the ability for single-party states to conduct …
Artificial Intelligence And National Security, Ryan Laverick
Artificial Intelligence And National Security, Ryan Laverick
Williams Honors College, Honors Research Projects
As technology advances at an exponential rate, it is becoming increasingly important to consider the ramifications of that technology in the geopolitical environment, and especially as it pertains to American national security. One of the most important categories of technological innovation that will likely disrupt the global balance of geopolitical power, especially along the US-China axis, is the advent and growing sophistication of artificial intelligence. In order to address the new and evolving national security challenges that will accompany this disruption, this paper seeks to define and explain the disparity in artificial intelligence capabilities between the United States and China. …
Fifth-Dimensional Warfare And National Security In Canada: Situating Microdeviation Theory Within C-59: An Act Respecting National Security Matters, Hayden Slight
Theses and Dissertations (Comprehensive)
In an era of rapid technological change, the growing threat environment in the cyber dimension will continue to influence how a sovereign nation contends with attacks that can occur from any corner of the world. The growing adaptation and expansion of technology belonging to the Internet of Things (IoT) and the increasing prevalence of social media (Facebook, Twitter) has also influenced the spreading of attack surfaces that can become victim to exploitation by motivated parties including foreign states and terrorist groups. Against this backdrop, Canada’s own efforts to modernize and reinforce its own national security agencies resulted in the developing …
Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng
Congressional Oversight Of Modern Warfare: History, Pathologies, And Proposals For Reform, Oona A. Hathaway, Tobias Kuehne, Randi Michel, Nicole Ng
William & Mary Law Review
Despite significant developments in the nature of twenty-first century warfare, Congress continues to employ a twentieth century oversight structure. Modern warfare tactics, including cyber operations, drone strikes, and special operations, do not neatly fall into congressional committee jurisdictions. Counterterrorism and cyber operations, which are inherently multi-jurisdictional and highly classified, illustrate the problem. In both contexts, over the past several years Congress has addressed oversight shortcomings by strengthening its reporting requirements, developing relatively robust oversight regimes. But in solving one problem, Congress has created another: deeply entrenched information silos that inhibit the sharing of information about modern warfare across committees. This …
Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii
Cyber Intelligence In National Security, Dwi Rezki Sri Astarini, Muhammad Syaroni Rofii
Journal of Strategic and Global Studies
Current information has become a very important commodity. Some even say that our society is already in an "information-based society". The ability to access and provide information quickly and accurately is very important for an organization, such as companies, universities, government agencies, and individuals. Once the importance of the value of information causes often the desired information can only be accessed by certain people. The fall of information in the hands of other parties can cause harm to the information owner. Security issues are an important aspect of an information system management. Unfortunately, this security problem often gets less attention …
Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*]
Black Space Versus Blue Space: A Proposed Dichotomy Of Future Space Operations, Robert A. Bettinger, Carl A. Poole [*]
Faculty Publications
This article will examine the proposed space operations structure by first outlining the historical foundations for differences in maritime and air domain military capabilities, specifically brown-water versus blue-water navies, and “local/ regional” versus “global” airpower. Next, the article will present the concept of black space and blue space in terms of an environment-specific definition, as well as an examination of the technical capability requirements, mission types, and national prestige and geopolitical considerations underpinning the proposed operation types. Finally, the article will explore how the USSF might support future space exploration within the black-space and blue-space operations structure.
Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara
Cyber Mutually Assured Destruction & Counterproliferation For The 21st Century: “How I Stopped Worrying And Learned To Love The Software Exploit.”, Peter R. Pattara
Liberty University Journal of Statesmanship & Public Policy
The growth of cyberspace has challenged existing frameworks for strategic competition. As a result, government, private, and academic planners seek to develop a novel framework for integrating cyberspace into diplomatic, military, and intelligence planning. This has been a difficult proposition and continues to be an area of vulnerability for the United States. To date, the United States has threatened nuclear retaliation for large scale cyber-attacks, but a comprehensive strategy has not been made publicly clear. However, this integration challenge has been encountered and solved previously. Nuclear weapons changed warfare in the twentieth century, but the United States used Mutual Assured …