Open Access. Powered by Scholars. Published by Universities.®

Discipline
Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 3830

Full-Text Articles in Defense and Security Studies

Tall Tales Of Danger And Security: How A Critical Human Security Approach Can Address Major Contradictions Revealed Through A Critical Narrative Analysis Of Dominant U.S. Security Strategies, Stephen Schneider Dec 2018

Tall Tales Of Danger And Security: How A Critical Human Security Approach Can Address Major Contradictions Revealed Through A Critical Narrative Analysis Of Dominant U.S. Security Strategies, Stephen Schneider

Master's Theses

Over many generations, humans have developed many perspectives and practices regarding the best ways to recognize and address what they perceive to be dangerous. Stories are used to help shape and narrate perceptions about the world, and they serve to pass on vital information that impacts how a society responds to threats and vulnerabilities. These narratives of danger and security are subjective to the experiences and political intentions of society, and therefore in many ways are partial and biased in their assessments and policies. This results in flawed security practices that may actually exacerbate threats or create new insecurities. What ...


Thoughts And Prayers, Chloe Kardasopoulos Dec 2018

Thoughts And Prayers, Chloe Kardasopoulos

Student Scholar Symposium Abstracts and Posters

Examining the symbolic Gun against its tangible counterpart illuminates abstract attachments of power and superiority this nation associates with the weapon. These elements loaded in the Gun transform the weapon into an object representative of American identity. Analyzing ideological commitments within the Gun guides a critical response to examine disproportionately increasing national gun violence against stagnant federal gun control. The ongoing gun debate must be analyzed in its entirety, beginning at its source - the Second Amendment. Scholars such as Gary Wills dissect the Second Amendment to extract its contextualized intent from modern writers’ manipulated interpretations. It is not the Amendment ...


Psycho-Political Assessment And Making People: What Can We Know?, Editor Dec 2018

Psycho-Political Assessment And Making People: What Can We Know?, Editor

International Bulletin of Political Psychology

This article describes foundational problems in even experts’ knowing people from formal psychological assessment to musings on human nature.


Psychological Profiling Of Political Leaders: Searching For Three White Whales, Editor Nov 2018

Psychological Profiling Of Political Leaders: Searching For Three White Whales, Editor

International Bulletin of Political Psychology

This article describes three types of information crucial to psychological profiling of political leaders.


The Psychology Of Time: When The Political Future Is In The Past Not The Present, Editor Nov 2018

The Psychology Of Time: When The Political Future Is In The Past Not The Present, Editor

International Bulletin of Political Psychology

This article illustrates one of political psychology’s challenges-- to change the hold of the past on the present and future of various human collectives in support of security and intelligence objectives.


When Doing What’S Right Is Wrong: The Psychology Of Personnel Security, Editor Nov 2018

When Doing What’S Right Is Wrong: The Psychology Of Personnel Security, Editor

International Bulletin of Political Psychology

This article describes the psychology behind failed attempts to improve security, regardless of whether the service and product of industry and organization is one of education, health, commodity, process, or security itself.


Building A National Maritime Security Policy, Adriana Avila-Zúñiga Nordfjeld Nov 2018

Building A National Maritime Security Policy, Adriana Avila-Zúñiga Nordfjeld

World Maritime University Ph.D. Dissertations

The issue of port security raised concerns at the highest levels after the terrorist attacks on September 11, 2001 against the United States. Security threats against ports and vessels acquired a new perspective and in 2002 the International Maritime Organization (IMO) adopted amendments to the International Convention for the Safety of Life at Sea (SOLAS), 1974, introducing Chapter XI-2 - Special measures to enhance maritime security. This set of regulations enshrines the International Ship and Port Facilities Security Code (ISPS Code), which entered into force on 1 July 2004.

This Code establishes a set of measures to enhance the security of ...


Enhancing Your Intelligence Agency Information Resource Iq: Pt. 4: National Geospatial Intelligence Agency (Ngia), National Intelligence University (Niu), And National Reconnaissance Office (Nro), Bert Chapman Nov 2018

Enhancing Your Intelligence Agency Information Resource Iq: Pt. 4: National Geospatial Intelligence Agency (Ngia), National Intelligence University (Niu), And National Reconnaissance Office (Nro), Bert Chapman

Libraries Faculty and Staff Presentations

Webinar presentation on publicly accessible information resources produced by the U.S. National Geospatial Intelligence Agency (NGIA), National Intelligence University (NIU), and National Reconnaissance Office. Places significant emphasis on missions of these agencies, their historical accomplishments, coverage of their educational activity, and information on the technologies they have used and are currently using to fulfill their institutional objectives.


The Politics Of Intelligence, Editor Nov 2018

The Politics Of Intelligence, Editor

International Bulletin of Political Psychology

This article describes the politics of the construct and applications of intelligence in the context of adaptation.


A Tale Of Two Administrations: A Comparison Between The George W. Bush And The Barack H. Obama Administrations On Border Security, Marcos L. Misis Oct 2018

A Tale Of Two Administrations: A Comparison Between The George W. Bush And The Barack H. Obama Administrations On Border Security, Marcos L. Misis

The Journal of Economics and Politics

Border security remains a prominent political issue in 2018. During the 2016 presidential campaign, candidates from the Republican and Democratic parties referred to the effectiveness, or lack thereof, of policies about border security that were implemented by the Bush and Obama Administrations. This article analyzes the policies implemented by both administrations and compares them in order to assess the validity of claims about these policies made by presidential candidates from both parties during the 2016 campaign. In addition, this article quantitatively analyzes data from immigration and border enforcement policies for both the Bush and Obama administrations and offers possible policy ...


When Terror Is Not Terrorism: A Political Psychological Analysis, Editor Oct 2018

When Terror Is Not Terrorism: A Political Psychological Analysis, Editor

International Bulletin of Political Psychology

This article differentiates violence and its threat through terrorism and through other psychological means and ends.


Mackinder And The Arctic's Emerging Geopolitics: Recommendations For The U.S. And Its Nato Allies, Bert Chapman Oct 2018

Mackinder And The Arctic's Emerging Geopolitics: Recommendations For The U.S. And Its Nato Allies, Bert Chapman

Libraries Faculty and Staff Presentations

This presentation shows how Halford Mackinder (1861-1947) described Canada and the Arctic region in his geopolitical writings. It goes on to stress how the Arctic is becoming increasingly important in international geopolitical policymaking due to its significant oil and natural gas resources, how warming temperatures are increasing international access to its waters, and the how countries as diverse as Canada, China, Russia, and the U.S. see the Arctic region in their strategic policymaking. It concludes by stressing that the Arctic can no longer be viewed as a region immune from international conflict and presents recommendations for the U.S ...


Jamal Khashoggi: Assassination, Abattoir, And The Law Of Small Numbers, Editor Oct 2018

Jamal Khashoggi: Assassination, Abattoir, And The Law Of Small Numbers, Editor

International Bulletin of Political Psychology

This article describes psychological research on why tragedies of individuals and small numbers of people elicit more global emotional arousal than tragedies of large numbers of people.


Ddas Suggested Training Uses: Management Training, Database Of Demining Accidents Oct 2018

Ddas Suggested Training Uses: Management Training, Database Of Demining Accidents

Global CWD Repository

Increasingly, managers in HD are management specialists with little or no field experience. If so, they usually delegate responsibility for training and operational needs to another person, often an "Ops Manager". The manager or Ops Manager will be in charge of all training and/or refresher training, so they should read the training suggestions for deminers, paramedics and field supervisors as well as those given here.

Because the accident database is a collection of reports covering events when things did not go as planned, the examples drawn from it are usually "negative" - what not to do, rather than what to ...


Ddas: Metal Detector Set-Up, Database Of Demining Accidents Oct 2018

Ddas: Metal Detector Set-Up, Database Of Demining Accidents

Global CWD Repository

There must always be absolute confidence in the metal-detector’s ability to locate the target device at the required depth before Metal-detector clearance drills are applied. It is important to set-up the metal-detector appropriately for two main reasons. First it gives the Supervisors confidence that the ground can be cleared to the required depth. Second, it gives the deminers confidence that they can and will find every mine.

What follows is a basic procedure for use with all the current models of metal-detector that I know. It is intended to provide a basis that you can edit and refine to ...


Ddas Suggested Training Uses: Supervisor/Field Management Training, Database Of Demining Accidents Oct 2018

Ddas Suggested Training Uses: Supervisor/Field Management Training, Database Of Demining Accidents

Global CWD Repository

Field supervisors or managers should also read the suggested training needs for deminers because they will often be in charge of the deminers' training and/or refresher training. When they have any training concerns, they must report this in writing to the Senior Management in order to avoid censure if accidents result from inadequate training.

Because the accident database is a collection of reports covering events when things did not go as planned, the examples drawn from it are usually "negative" - what not to do, rather than what to do. They can be useful to explain the need for rules ...


Ddas Suggested Training Uses: Deminer Training, Database Of Demining Accidents Oct 2018

Ddas Suggested Training Uses: Deminer Training, Database Of Demining Accidents

Global CWD Repository

The database provides real-world examples that can be used as training aids. This will often reinforce what is considered to be common sense. Be aware that the database records prove (beyond reasonable doubt) that some commonsense wisdom is incorrect.

For example, it is a myth that the most dangerous time for deminers is shortly after their initial training. On the contrary, there is some evidence to suggest that deminers actually become more likely to have an accident the longer they work as a deminer.


Ddas: Introduction, Database Of Demining Accidents Oct 2018

Ddas: Introduction, Database Of Demining Accidents

Global CWD Repository

The DDAS software was designed by me in 1998 using the Microsoft Access engine and a Visual Basic front-end. This was revised and became a relational database in 2003. The software can be used to display existing datasets or to record your own. Field names can be edited and replaced with names in another language and the content of dropdown pick-lists is easily customised. Originally distributed on CD, it is not generally given out any more but despite being dated and cludgy, it can still be used many later operating systems.


Ddas: Metal Detector Search, Database Of Demining Accidents Oct 2018

Ddas: Metal Detector Search, Database Of Demining Accidents

Global CWD Repository

What follows are basic procedures for use with all the current models of metal detector that I know. It is intended to provide a basis that you can edit and refine to suit your equipment and working preferences.


Ddas: Using The Database Of Demining Accidents, Database Of Demining Accidents Oct 2018

Ddas: Using The Database Of Demining Accidents, Database Of Demining Accidents

Global CWD Repository

The author has maintained a database of demining accidents for four years. It contains records of many of the explosive accidents that deminers suffer while going about their work. This article explains the uses and limitations of the database and the software developed to contain it.


Ddas: Suggested Training Uses, Database Of Demining Accidents Oct 2018

Ddas: Suggested Training Uses, Database Of Demining Accidents

Global CWD Repository

The most common use of these records in training is to provide an example of what happens when things are done in the wrong way. This can be a powerful reinforcement of a lesson about doing things the right way. The database can also be a training aid for paramedics and for field and office managers.


Ddas Suggested Training Uses: Paramedic Training, Database Of Demining Accidents Oct 2018

Ddas Suggested Training Uses: Paramedic Training, Database Of Demining Accidents

Global CWD Repository

The examples of medical treatment in the database are rarely well detailed. When they are, they provide examples of both "positive" and "negative" responses to accidents. some of the worst negative responses are not the responsibility of the medic - who were simply not provided with the equipment or ambulance that they need. Parts of the reports may be used in lectures or presentations or they can be distributed for critical discussion.


Ddas Or Rapid?, Database Of Demining Accidents Oct 2018

Ddas Or Rapid?, Database Of Demining Accidents

Global CWD Repository

In 2015, Tajikistan became the first country to make all of its demining accident data available. Congratulations to the Tajikistan National Mine Action Centre (TNMAC), a government controlled body that has set an international standard for transparency.

Despite its popularity, and the frequent reference made to the database when updating international and national Mine Action standards, the DDAS has no formal support.

The nominal Humanitarian Mine Action industry leader is the United Nations Mine Action Service (UNMAS). UNMAS make no effort to collect and study accident records but, in 2011 when I left the IMAS Review Board, they began to ...


Ddas: Crunching Data From The Database Of Demining Accidents, Database Of Demining Accidents Oct 2018

Ddas: Crunching Data From The Database Of Demining Accidents, Database Of Demining Accidents

Global CWD Repository

In the database of demining accidents, injuries are classed as either Severe or Minor. Injuries likely to be life threatening, to require surgery or to result in permanent disability are rated as Severe. All others are rated as Minor. This distinction is for convenience and is not intended to reflect on the discomfort and/or hardship associated with the injury. In some cases, injuries were not recorded in detail but I have resisted the temptation to infer detail. Note that, in very severe injuries, only the most severe injury is generally recorded.


Ddas: "Accidents" Or "Incidents", Database Of Demining Accidents Oct 2018

Ddas: "Accidents" Or "Incidents", Database Of Demining Accidents

Global CWD Repository

When I started writing about demining accidents I tried to form a sensible distinction between the terms "accident" and "incident". I decided to call an unintended explosive event (or an intended explosive event that resulted in injury) an "incident". This was because an "Incident report" would be generated from which lessons that might prevent repetition of the event might be derived. I noted that the word "accident" was used for all unintended occurrences, from dropping the kettle to a car crash, but did not always apply to an intentional event that resulted in an injury. So, at that time, the ...


Ddas: Manual Demining Handtool Design Criteria, Database Of Demining Accidents Oct 2018

Ddas: Manual Demining Handtool Design Criteria, Database Of Demining Accidents

Global CWD Repository

The research I have carried out on tool development has been based on accident studies, field trials and my experience in both demining and in manufacturing in small workshops. The research led to the evolution of the following criteria and constraints. I believe that these are essential requirements when designing hand-tools for use when excavating anti-personnel blast mines. Tools used during other demining activities may not have the same requirements.


Ddas: Investigating A Metal Detector Reading, Database Of Demining Accidents Oct 2018

Ddas: Investigating A Metal Detector Reading, Database Of Demining Accidents

Global CWD Repository

What follows are basic procedures that you can edit and refine to suit your equipment and working preferences. They presume that deminers operate in a "One-man procedure ", with the same deminer performing all tasks during a working shift. When there is not enough equipment for each deminer to be issued with a detector and tools, two-man teams can be deployed. In a two-man team, a one-man procedure is still used. One person works while the other rests, and each individual performs all the tasks required for clearance during his/her shift.


North Korea And The Nucleus Of Denuclearization, Editor Oct 2018

North Korea And The Nucleus Of Denuclearization, Editor

International Bulletin of Political Psychology

This article describes common operant conditioning principles contributing to the seeming intractability of ‘denuclearizing’ the Democratic People’s Republic of North Korea.


Praxites And Mal-Praxites In Psychological Research: Hoaxes, Editor Oct 2018

Praxites And Mal-Praxites In Psychological Research: Hoaxes, Editor

International Bulletin of Political Psychology

This article describes intrinsic problems with the pursuit of psychological knowledge in a socio-political world.


More On The Fakeness Of Fake News, Editor Oct 2018

More On The Fakeness Of Fake News, Editor

International Bulletin of Political Psychology

This article identifies occurrences within the process of news production and also examples of psychological research which mitigate against the construct of fake news.