Open Access. Powered by Scholars. Published by Universities.®

Psychology Commons

Open Access. Powered by Scholars. Published by Universities.®

International Relations

Journal

Institution
Keyword
Publication Year
Publication

Articles 1 - 30 of 409

Full-Text Articles in Psychology

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie May 2024

Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie

Military Cyber Affairs

Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.


Nonprofits Should Adopt A User-Centric Change Model To Scale Corporate Environmental Action Faster, Doug Miller Mar 2024

Nonprofits Should Adopt A User-Centric Change Model To Scale Corporate Environmental Action Faster, Doug Miller

Journal of Nonprofit Innovation

Pollution levels and ecosystem degradation continue to worsen, suggesting the insufficiency of current approaches to reverse these problematic trends. For environmental nonprofits, the current theory of change revolves around developing techno-economic analysis about environmental problems and available solutions, building public awareness around this analysis, and motivating decision makers to set goals. Given present environmental realities and the limited success of their current theory of change, environmental nonprofits should transform how they execute their work, what they produce, and how they coordinate with each other. Instead, nonprofits should begin putting the user—business decision makers as well as policymakers—front and center as …


Review Of After Genocide: Memory And Reconciliation In Rwanda, Selina Gallo-Cruz Mar 2024

Review Of After Genocide: Memory And Reconciliation In Rwanda, Selina Gallo-Cruz

The Journal of Social Encounters

No abstract provided.


Role Of Identity In Peace Process: A Re-Interpretation Of The Islamic Heritage, Yasmine Z. Radwan Dec 2023

Role Of Identity In Peace Process: A Re-Interpretation Of The Islamic Heritage, Yasmine Z. Radwan

Future Journal of Social Science

Reviewing the Western theories and ideologies on building and maintaining peace reflected in the conflict management and resolution in practice always indicates an imperative need for another perspective that could play an integral role in the international society. Regardless of the continuing call for an Islamic contribution in this field on the part of some Western scholars, the Muslim society itself based on a specific culture and a distinctive identity requires a different approach with particular tools that could fit its epistemological model. Exploring this approach, which is the main concern and the main aim of this paper, would never …


Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms Dec 2023

Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms

Journal of Terrorism Studies

This study delves into the intricacies of power projection strategies and counter-terrorism measures, emphasizing their relevance to small states, with a specific focus on Brunei Darussalam. Using a dual matrix model, the research categorizes various strategies based on risk-reward parameters, offering a structured insight into potential approaches these states can employ against potential aggressors. The counter-terrorism matrix is the initial focal point, recognizing the contemporary significance of terror threats and their unique challenges for small nations. Subsequently, the power projection matrix offers a broader view of defense tactics beyond counter-terrorism. By synthesizing information from primary academic sources, the study aims …


African Ethnopolitical Rivalry In A Public Theological Lens: Building Bridges Between The Luo And Kikuyu, Dan Kidha Kidha Aug 2023

African Ethnopolitical Rivalry In A Public Theological Lens: Building Bridges Between The Luo And Kikuyu, Dan Kidha Kidha

The Journal of Social Encounters

This research explores African ethnopolitical rivalry within a public theological framework, aiming to build bridges between the Luo and Kikuyu communities of Kenya. It argues that as a community enterprise, theology should engage with the public and be concerned about the wellbeing of God's people. Ethnopolitical conflict is a major impediment to human flourishing in sub- Saharan Africa, causing loss of life, displacement, and fractured identity. The paper draws on practical and public theologies to understand the lived contexts of human experience and argues that a robust interdisciplinary approach is necessary to uplift those affected by ethnic conflicts. As an …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols May 2023

Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols

DU Undergraduate Research Journal Archive

DU Undergraduate Showcase: Research, Scholarship, and Creative Works


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Ukrainian Women Refugees In Italy And Their Risk Of Sexual Violence: An Interview With Luisanna Porcu, Lepa Mladjenović Jan 2023

Ukrainian Women Refugees In Italy And Their Risk Of Sexual Violence: An Interview With Luisanna Porcu, Lepa Mladjenović

Dignity: A Journal of Analysis of Exploitation and Violence

No abstract provided.


Du Undergraduate Showcase: Research, Scholarship, And Creative Works: Abstracts, Emma Aggeler, Elena Arroway, Daisy T. Booker, Justin Bravo, Kyle Bucholtz, Megan Burnham, Nicole Choi, Spencer Cockerell, Rosie Contino, Jackson Garske, Kaitlyn Glover, Caroline Hamilton, Haley Hartmann, Madalyne Heiken, Colin Holter, Leah Huzjak, Alyssa Jeng, Cole Jernigan, Chad Kashiwa, Adelaide Kerenick, Emily King, Abigail Langeberg, Maddie Leake, Meredith Lemons, Alec Mackay, Greer Mckinley, Ori Miller, Guy Milliman, Katherine Miromonti, Audrey Mitchell, Lauren Moak, Megan Morrell, Gelella Nebiyu, Zdenek Otruba, Toni V. Panzera, Kassidy Patarino, Sneha Patil, Alexandra Penney, Kevin Persky, Caitlin Pham, Gabriela Recinos, Mary Ringgenberg, Chase Routt, Olivia Schneider, Roman Shrestha, Arlo Simmerman, Alec Smith, Tessa Smith, Nhi-Lac Thai, Kyle Thurmann, Casey Tindall, Amelia Trembath, Maria Trubetskaya, Zachary Vangelisti, Peter Vo, Abby Walker, David Winter, Grayden Wolfe, Leah York May 2022

Du Undergraduate Showcase: Research, Scholarship, And Creative Works: Abstracts, Emma Aggeler, Elena Arroway, Daisy T. Booker, Justin Bravo, Kyle Bucholtz, Megan Burnham, Nicole Choi, Spencer Cockerell, Rosie Contino, Jackson Garske, Kaitlyn Glover, Caroline Hamilton, Haley Hartmann, Madalyne Heiken, Colin Holter, Leah Huzjak, Alyssa Jeng, Cole Jernigan, Chad Kashiwa, Adelaide Kerenick, Emily King, Abigail Langeberg, Maddie Leake, Meredith Lemons, Alec Mackay, Greer Mckinley, Ori Miller, Guy Milliman, Katherine Miromonti, Audrey Mitchell, Lauren Moak, Megan Morrell, Gelella Nebiyu, Zdenek Otruba, Toni V. Panzera, Kassidy Patarino, Sneha Patil, Alexandra Penney, Kevin Persky, Caitlin Pham, Gabriela Recinos, Mary Ringgenberg, Chase Routt, Olivia Schneider, Roman Shrestha, Arlo Simmerman, Alec Smith, Tessa Smith, Nhi-Lac Thai, Kyle Thurmann, Casey Tindall, Amelia Trembath, Maria Trubetskaya, Zachary Vangelisti, Peter Vo, Abby Walker, David Winter, Grayden Wolfe, Leah York

DU Undergraduate Research Journal Archive

Abstracts from the DU Undergraduate Showcase.


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


The Psychological Effects Of Israel’S Security Narrative On Palestinians In The West Bank And Gaza And Its Implications For Conflict Management, Gabrielle Childs Aug 2021

The Psychological Effects Of Israel’S Security Narrative On Palestinians In The West Bank And Gaza And Its Implications For Conflict Management, Gabrielle Childs

The Journal of International Relations, Peace Studies, and Development

Israel began constructing a separation barrier in 2003 in response to increasing terrorism and suicide bombings by the Palestinians during the Second Intifada (Dowty, 2005, p. 171). The separation barrier is an elaborate 400-mile security system of concrete walls, fences, barricades and checkpoints built to protect Israeli citizens (Vick & Arik, 2010). The wall portion of the barrier was constructed of thick reinforced concrete, stands approximately 25 feet tall, and separates the West Bank and Israel boundaries. There is bitter contention over whether the barrier was properly placed along the official partition boundaries. The concrete barriers were built in the …


The Influence Of Information Power Upon The Great Game In Cyberspace: U.S. Wins Over Russian Meddling In The 2018 Elections, Joseph H. Schafer Dec 2020

The Influence Of Information Power Upon The Great Game In Cyberspace: U.S. Wins Over Russian Meddling In The 2018 Elections, Joseph H. Schafer

Military Cyber Affairs

The 2018 U.S. pivot in information and cyberspace degraded Russian operations in the 2018 election. Following pervasive Russian information power operations during the U.S. 2016 elections, the United States progressed from a policy of preparations and defense in information and cyberspace to a policy of forward engagement. U.S recognition of renewed great power competition coupled with Russia’s inability to compete diplomatically, militarily (conventionally), or economically, inspires Russia to continues to concentrate on information power operations. This great game in cyberspace was virtually uncontested by the U.S. prior to 2017. Widespread awareness of Russian aggression in 2016 served as a catalyst …


It Is Time To Get Back To Basics On The Border, Donna Coltharp Oct 2020

It Is Time To Get Back To Basics On The Border, Donna Coltharp

The Scholar: St. Mary's Law Review on Race and Social Justice

Abstract forthcoming.


China’S “Three Warfares”: People’S Liberation Army Influence Operations, Edwin S. Cochran, U.S. Department Of Defense, Retired Sep 2020

China’S “Three Warfares”: People’S Liberation Army Influence Operations, Edwin S. Cochran, U.S. Department Of Defense, Retired

International Bulletin of Political Psychology

The following article—whose author is both a retired US Army officer and retired Department of Defense civilian employee with multiple publications—focuses on Chinese information operations. Readers might wish to speculate on matters such as why the Chinese have organized the way they have, whether the organization leads to optimal integration of tools of national security/political power, and how vulnerable specific populations and even intelligence cultures are to specific types of information operations. One might even conclude that the only thing that has not changed in thousands of years has been the technology available to influence others.

This article examines the …


Torn Apart: A Closer Look At Our Cover Image, Sandra Rios Dec 2019

Torn Apart: A Closer Look At Our Cover Image, Sandra Rios

Culture, Society, and Praxis

No abstract provided.


Experience With And Perceptions Of Immigrants In Italy, Arianna Babraj Aug 2019

Experience With And Perceptions Of Immigrants In Italy, Arianna Babraj

Claremont-UC Undergraduate Research Conference on the European Union

This research explores Italians’ experiences with and perceptions of immigrants, along with their ideas of how the government should formulate immigration policy. Using in person surveys, 117 subjects were interviewed in the northern, central and southern regions of Italy. After accounting for variables like age, gender, and region, the data revealed interesting trends. Overall, the main findings of this study hold that there is a connection between the proximity of a subject’s relationship with immigrants and how positive their experiences are. These experiences can influence how the subject then views immigrants as either an advantage or a disadvantage, however, other …


Three Coins In The Fountain: The Mueller Report And Russian Active Measures, Ibpp Editor Apr 2019

Three Coins In The Fountain: The Mueller Report And Russian Active Measures, Ibpp Editor

International Bulletin of Political Psychology

This article identifies non-political elements of Russian Federation political warfare as inferred from the Report on the Investigation into Russian Interference in the 2016 Presidential Election.


Fatal Attractions, Elective Affinities, And Deadly Epistemologies, Ibpp Editor Apr 2019

Fatal Attractions, Elective Affinities, And Deadly Epistemologies, Ibpp Editor

International Bulletin of Political Psychology

This article cites film, the novel, and news report to underline the deadly seriousness of the quest for knowledge.


Espionage: Why Did Hanssen Do It?, Ibpp Editor Apr 2019

Espionage: Why Did Hanssen Do It?, Ibpp Editor

International Bulletin of Political Psychology

This article describes speculative elements of a post-dictive profile on Robert P. Hanssen’s convictions for espionage and conspiracy.


The Political Psychology Of Crossroads, Ibpp Editor Mar 2019

The Political Psychology Of Crossroads, Ibpp Editor

International Bulletin of Political Psychology

This article elaborates on how the construct of crossroads has situated within political psychological discourse.


A Political Psychology Of Obituary, Ibpp Editor Mar 2019

A Political Psychology Of Obituary, Ibpp Editor

International Bulletin of Political Psychology

This article ascribes political psychological relevance to the recent death of Russian critic and documentarian Maya Turovskaya.


New Terrorism In New Zealand? The Psychology Of Censorship, Ibpp Editor Mar 2019

New Terrorism In New Zealand? The Psychology Of Censorship, Ibpp Editor

International Bulletin of Political Psychology

This article describes the essentialness of information transmission for terrorism and some psychological findings on related censorship.


Popular Culture And The Psychology Of The Insider Threat, Ibpp Editor Mar 2019

Popular Culture And The Psychology Of The Insider Threat, Ibpp Editor

International Bulletin of Political Psychology

This article illustrates an identification between pop culture and an important intelligence, law enforcement, and security issue.


The Political Psychology Of Death: Until It Do Us Part, Ibpp Editor Feb 2019

The Political Psychology Of Death: Until It Do Us Part, Ibpp Editor

International Bulletin of Political Psychology

This article describes interwoven complexities and psychologies of life and death in the lives of political actors.


“I’Ll Be Your Mirror”, The Soul, And Intelligence And Counterintelligence Applications, Ibpp Editor Feb 2019

“I’Ll Be Your Mirror”, The Soul, And Intelligence And Counterintelligence Applications, Ibpp Editor

International Bulletin of Political Psychology

This article describes how the psychological trope of mirroring can explicate mass leadership and betrayals of trust.


When Is Terrorism All In The Family?, Ibpp Editor Feb 2019

When Is Terrorism All In The Family?, Ibpp Editor

International Bulletin of Political Psychology

This article describes putative linkages between family relationships and kinds of terrorism.


Psychologies Of Going Nuclear, Ibpp Editor Feb 2019

Psychologies Of Going Nuclear, Ibpp Editor

International Bulletin of Political Psychology

This article identifies multiple psychologies affecting joining and withdrawing from nuclear weapons agreements.