Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- Embry-Riddle Aeronautical University (381)
- University of South Florida (8)
- Nova Southeastern University (3)
- Claremont Colleges (2)
- College of Saint Benedict and Saint John's University (2)
-
- College of the Holy Cross (2)
- University of Denver (2)
- University of Massachusetts Boston (2)
- Arcadia University (1)
- Association of Arab Universities (1)
- Brigham Young University (1)
- California State University, Monterey Bay (1)
- St. Mary's University (1)
- Universitas Indonesia (1)
- University of Rhode Island (1)
- Keyword
-
- Terrorism (64)
- Iraq (43)
- Books (28)
- Conferences (28)
- International Nominations (28)
-
- Journals (28)
- Special Services (28)
- Israel (26)
- Security (23)
- United States (19)
- Political Psychology (16)
- Nuclear Weapons (15)
- United Nations (15)
- Intelligence (13)
- Weapons of Mass Destruction (13)
- War (11)
- Aviation Security (9)
- China (8)
- Foreign Policy (8)
- Globalization (8)
- Language (8)
- Palestinian National Authority (8)
- Suicide (8)
- Bush Administration (7)
- Human Rights (7)
- Palestine (7)
- Profiling (7)
- Saddam Hussein (7)
- Sanctions (7)
- Violence (7)
- Publication Year
- Publication
-
- International Bulletin of Political Psychology (381)
- Military Cyber Affairs (6)
- Claremont-UC Undergraduate Research Conference on the European Union (2)
- DU Undergraduate Research Journal Archive (2)
- Genocide Studies and Prevention: An International Journal (2)
-
- New England Journal of Public Policy (2)
- Présence Francophone: Revue internationale de langue et de littérature (2)
- The Journal of Social Encounters (2)
- Culture, Society, and Praxis (1)
- Dignity: A Journal of Analysis of Exploitation and Violence (1)
- Future Journal of Social Science (1)
- Journal of Interdisciplinary Conflict Science (1)
- Journal of Nonprofit Innovation (1)
- Journal of Terrorism Studies (1)
- Peace and Conflict Studies (1)
- Quadrivium: A Journal of Multidisciplinary Scholarship (1)
- The Journal of International Relations, Peace Studies, and Development (1)
- The Scholar: St. Mary's Law Review on Race and Social Justice (1)
Articles 1 - 30 of 409
Full-Text Articles in Psychology
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Nonprofits Should Adopt A User-Centric Change Model To Scale Corporate Environmental Action Faster, Doug Miller
Nonprofits Should Adopt A User-Centric Change Model To Scale Corporate Environmental Action Faster, Doug Miller
Journal of Nonprofit Innovation
Pollution levels and ecosystem degradation continue to worsen, suggesting the insufficiency of current approaches to reverse these problematic trends. For environmental nonprofits, the current theory of change revolves around developing techno-economic analysis about environmental problems and available solutions, building public awareness around this analysis, and motivating decision makers to set goals. Given present environmental realities and the limited success of their current theory of change, environmental nonprofits should transform how they execute their work, what they produce, and how they coordinate with each other. Instead, nonprofits should begin putting the user—business decision makers as well as policymakers—front and center as …
Review Of After Genocide: Memory And Reconciliation In Rwanda, Selina Gallo-Cruz
Review Of After Genocide: Memory And Reconciliation In Rwanda, Selina Gallo-Cruz
The Journal of Social Encounters
No abstract provided.
Role Of Identity In Peace Process: A Re-Interpretation Of The Islamic Heritage, Yasmine Z. Radwan
Role Of Identity In Peace Process: A Re-Interpretation Of The Islamic Heritage, Yasmine Z. Radwan
Future Journal of Social Science
Reviewing the Western theories and ideologies on building and maintaining peace reflected in the conflict management and resolution in practice always indicates an imperative need for another perspective that could play an integral role in the international society. Regardless of the continuing call for an Islamic contribution in this field on the part of some Western scholars, the Muslim society itself based on a specific culture and a distinctive identity requires a different approach with particular tools that could fit its epistemological model. Exploring this approach, which is the main concern and the main aim of this paper, would never …
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Journal of Terrorism Studies
This study delves into the intricacies of power projection strategies and counter-terrorism measures, emphasizing their relevance to small states, with a specific focus on Brunei Darussalam. Using a dual matrix model, the research categorizes various strategies based on risk-reward parameters, offering a structured insight into potential approaches these states can employ against potential aggressors. The counter-terrorism matrix is the initial focal point, recognizing the contemporary significance of terror threats and their unique challenges for small nations. Subsequently, the power projection matrix offers a broader view of defense tactics beyond counter-terrorism. By synthesizing information from primary academic sources, the study aims …
African Ethnopolitical Rivalry In A Public Theological Lens: Building Bridges Between The Luo And Kikuyu, Dan Kidha Kidha
African Ethnopolitical Rivalry In A Public Theological Lens: Building Bridges Between The Luo And Kikuyu, Dan Kidha Kidha
The Journal of Social Encounters
This research explores African ethnopolitical rivalry within a public theological framework, aiming to build bridges between the Luo and Kikuyu communities of Kenya. It argues that as a community enterprise, theology should engage with the public and be concerned about the wellbeing of God's people. Ethnopolitical conflict is a major impediment to human flourishing in sub- Saharan Africa, causing loss of life, displacement, and fractured identity. The paper draws on practical and public theologies to understand the lived contexts of human experience and argues that a robust interdisciplinary approach is necessary to uplift those affected by ethnic conflicts. As an …
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols
Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols
DU Undergraduate Research Journal Archive
DU Undergraduate Showcase: Research, Scholarship, and Creative Works
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
Ukrainian Women Refugees In Italy And Their Risk Of Sexual Violence: An Interview With Luisanna Porcu, Lepa Mladjenović
Ukrainian Women Refugees In Italy And Their Risk Of Sexual Violence: An Interview With Luisanna Porcu, Lepa Mladjenović
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.
Du Undergraduate Showcase: Research, Scholarship, And Creative Works: Abstracts, Emma Aggeler, Elena Arroway, Daisy T. Booker, Justin Bravo, Kyle Bucholtz, Megan Burnham, Nicole Choi, Spencer Cockerell, Rosie Contino, Jackson Garske, Kaitlyn Glover, Caroline Hamilton, Haley Hartmann, Madalyne Heiken, Colin Holter, Leah Huzjak, Alyssa Jeng, Cole Jernigan, Chad Kashiwa, Adelaide Kerenick, Emily King, Abigail Langeberg, Maddie Leake, Meredith Lemons, Alec Mackay, Greer Mckinley, Ori Miller, Guy Milliman, Katherine Miromonti, Audrey Mitchell, Lauren Moak, Megan Morrell, Gelella Nebiyu, Zdenek Otruba, Toni V. Panzera, Kassidy Patarino, Sneha Patil, Alexandra Penney, Kevin Persky, Caitlin Pham, Gabriela Recinos, Mary Ringgenberg, Chase Routt, Olivia Schneider, Roman Shrestha, Arlo Simmerman, Alec Smith, Tessa Smith, Nhi-Lac Thai, Kyle Thurmann, Casey Tindall, Amelia Trembath, Maria Trubetskaya, Zachary Vangelisti, Peter Vo, Abby Walker, David Winter, Grayden Wolfe, Leah York
Du Undergraduate Showcase: Research, Scholarship, And Creative Works: Abstracts, Emma Aggeler, Elena Arroway, Daisy T. Booker, Justin Bravo, Kyle Bucholtz, Megan Burnham, Nicole Choi, Spencer Cockerell, Rosie Contino, Jackson Garske, Kaitlyn Glover, Caroline Hamilton, Haley Hartmann, Madalyne Heiken, Colin Holter, Leah Huzjak, Alyssa Jeng, Cole Jernigan, Chad Kashiwa, Adelaide Kerenick, Emily King, Abigail Langeberg, Maddie Leake, Meredith Lemons, Alec Mackay, Greer Mckinley, Ori Miller, Guy Milliman, Katherine Miromonti, Audrey Mitchell, Lauren Moak, Megan Morrell, Gelella Nebiyu, Zdenek Otruba, Toni V. Panzera, Kassidy Patarino, Sneha Patil, Alexandra Penney, Kevin Persky, Caitlin Pham, Gabriela Recinos, Mary Ringgenberg, Chase Routt, Olivia Schneider, Roman Shrestha, Arlo Simmerman, Alec Smith, Tessa Smith, Nhi-Lac Thai, Kyle Thurmann, Casey Tindall, Amelia Trembath, Maria Trubetskaya, Zachary Vangelisti, Peter Vo, Abby Walker, David Winter, Grayden Wolfe, Leah York
DU Undergraduate Research Journal Archive
Abstracts from the DU Undergraduate Showcase.
Enter The Battleverse: China's Metaverse War, Josh Baughman
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
The Psychological Effects Of Israel’S Security Narrative On Palestinians In The West Bank And Gaza And Its Implications For Conflict Management, Gabrielle Childs
The Psychological Effects Of Israel’S Security Narrative On Palestinians In The West Bank And Gaza And Its Implications For Conflict Management, Gabrielle Childs
The Journal of International Relations, Peace Studies, and Development
Israel began constructing a separation barrier in 2003 in response to increasing terrorism and suicide bombings by the Palestinians during the Second Intifada (Dowty, 2005, p. 171). The separation barrier is an elaborate 400-mile security system of concrete walls, fences, barricades and checkpoints built to protect Israeli citizens (Vick & Arik, 2010). The wall portion of the barrier was constructed of thick reinforced concrete, stands approximately 25 feet tall, and separates the West Bank and Israel boundaries. There is bitter contention over whether the barrier was properly placed along the official partition boundaries. The concrete barriers were built in the …
The Influence Of Information Power Upon The Great Game In Cyberspace: U.S. Wins Over Russian Meddling In The 2018 Elections, Joseph H. Schafer
The Influence Of Information Power Upon The Great Game In Cyberspace: U.S. Wins Over Russian Meddling In The 2018 Elections, Joseph H. Schafer
Military Cyber Affairs
The 2018 U.S. pivot in information and cyberspace degraded Russian operations in the 2018 election. Following pervasive Russian information power operations during the U.S. 2016 elections, the United States progressed from a policy of preparations and defense in information and cyberspace to a policy of forward engagement. U.S recognition of renewed great power competition coupled with Russia’s inability to compete diplomatically, militarily (conventionally), or economically, inspires Russia to continues to concentrate on information power operations. This great game in cyberspace was virtually uncontested by the U.S. prior to 2017. Widespread awareness of Russian aggression in 2016 served as a catalyst …
It Is Time To Get Back To Basics On The Border, Donna Coltharp
It Is Time To Get Back To Basics On The Border, Donna Coltharp
The Scholar: St. Mary's Law Review on Race and Social Justice
Abstract forthcoming.
China’S “Three Warfares”: People’S Liberation Army Influence Operations, Edwin S. Cochran, U.S. Department Of Defense, Retired
China’S “Three Warfares”: People’S Liberation Army Influence Operations, Edwin S. Cochran, U.S. Department Of Defense, Retired
International Bulletin of Political Psychology
The following article—whose author is both a retired US Army officer and retired Department of Defense civilian employee with multiple publications—focuses on Chinese information operations. Readers might wish to speculate on matters such as why the Chinese have organized the way they have, whether the organization leads to optimal integration of tools of national security/political power, and how vulnerable specific populations and even intelligence cultures are to specific types of information operations. One might even conclude that the only thing that has not changed in thousands of years has been the technology available to influence others.
This article examines the …
Torn Apart: A Closer Look At Our Cover Image, Sandra Rios
Torn Apart: A Closer Look At Our Cover Image, Sandra Rios
Culture, Society, and Praxis
No abstract provided.
Experience With And Perceptions Of Immigrants In Italy, Arianna Babraj
Experience With And Perceptions Of Immigrants In Italy, Arianna Babraj
Claremont-UC Undergraduate Research Conference on the European Union
This research explores Italians’ experiences with and perceptions of immigrants, along with their ideas of how the government should formulate immigration policy. Using in person surveys, 117 subjects were interviewed in the northern, central and southern regions of Italy. After accounting for variables like age, gender, and region, the data revealed interesting trends. Overall, the main findings of this study hold that there is a connection between the proximity of a subject’s relationship with immigrants and how positive their experiences are. These experiences can influence how the subject then views immigrants as either an advantage or a disadvantage, however, other …
Three Coins In The Fountain: The Mueller Report And Russian Active Measures, Ibpp Editor
Three Coins In The Fountain: The Mueller Report And Russian Active Measures, Ibpp Editor
International Bulletin of Political Psychology
This article identifies non-political elements of Russian Federation political warfare as inferred from the Report on the Investigation into Russian Interference in the 2016 Presidential Election.
Fatal Attractions, Elective Affinities, And Deadly Epistemologies, Ibpp Editor
Fatal Attractions, Elective Affinities, And Deadly Epistemologies, Ibpp Editor
International Bulletin of Political Psychology
This article cites film, the novel, and news report to underline the deadly seriousness of the quest for knowledge.
Espionage: Why Did Hanssen Do It?, Ibpp Editor
Espionage: Why Did Hanssen Do It?, Ibpp Editor
International Bulletin of Political Psychology
This article describes speculative elements of a post-dictive profile on Robert P. Hanssen’s convictions for espionage and conspiracy.
The Political Psychology Of Crossroads, Ibpp Editor
The Political Psychology Of Crossroads, Ibpp Editor
International Bulletin of Political Psychology
This article elaborates on how the construct of crossroads has situated within political psychological discourse.
A Political Psychology Of Obituary, Ibpp Editor
A Political Psychology Of Obituary, Ibpp Editor
International Bulletin of Political Psychology
This article ascribes political psychological relevance to the recent death of Russian critic and documentarian Maya Turovskaya.
New Terrorism In New Zealand? The Psychology Of Censorship, Ibpp Editor
New Terrorism In New Zealand? The Psychology Of Censorship, Ibpp Editor
International Bulletin of Political Psychology
This article describes the essentialness of information transmission for terrorism and some psychological findings on related censorship.
Popular Culture And The Psychology Of The Insider Threat, Ibpp Editor
Popular Culture And The Psychology Of The Insider Threat, Ibpp Editor
International Bulletin of Political Psychology
This article illustrates an identification between pop culture and an important intelligence, law enforcement, and security issue.
The Political Psychology Of Death: Until It Do Us Part, Ibpp Editor
The Political Psychology Of Death: Until It Do Us Part, Ibpp Editor
International Bulletin of Political Psychology
This article describes interwoven complexities and psychologies of life and death in the lives of political actors.
“I’Ll Be Your Mirror”, The Soul, And Intelligence And Counterintelligence Applications, Ibpp Editor
“I’Ll Be Your Mirror”, The Soul, And Intelligence And Counterintelligence Applications, Ibpp Editor
International Bulletin of Political Psychology
This article describes how the psychological trope of mirroring can explicate mass leadership and betrayals of trust.
When Is Terrorism All In The Family?, Ibpp Editor
When Is Terrorism All In The Family?, Ibpp Editor
International Bulletin of Political Psychology
This article describes putative linkages between family relationships and kinds of terrorism.
Psychologies Of Going Nuclear, Ibpp Editor
Psychologies Of Going Nuclear, Ibpp Editor
International Bulletin of Political Psychology
This article identifies multiple psychologies affecting joining and withdrawing from nuclear weapons agreements.