Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Cybersecurity (2)
- Special Operations Forces (2)
- Supply chains (2)
- Civic security culture (1)
- Emergency management (1)
-
- Fentanyl (1)
- Government regulations (1)
- Information dissemination (1)
- Intelligence gathering (1)
- Internet (1)
- Maritime transportation (1)
- National preparedness (1)
- Navigation (1)
- Networked structures (1)
- Opinion-mining (1)
- Opioid crisis (1)
- Propaganda (1)
- Public Heath Preparedness (1)
- Public decision-making (1)
- Risk management (1)
- Satellites (1)
- Social media (1)
- Social networks (1)
- Tabletop excise (1)
- Whole of government. (1)
Articles 1 - 6 of 6
Full-Text Articles in Defense and Security Studies
Civic Homeland Security Culture: A Poll Study Approach And The Example Of Pennsylvania, Alexander Siedschlag
Civic Homeland Security Culture: A Poll Study Approach And The Example Of Pennsylvania, Alexander Siedschlag
Publications
COVID-19 response experience around the world has demonstrated that it is indispensable to understand the public understanding of, and needs during, risk, hazards, and crisis in public policy, in particular related to the security of society as a whole. The ultimate goal of homeland security and broader civil (or sometimes referred to as societal) security alike, as well as of related security science research, is to accomplish resilient societies through a culture of preparedness. Civic security culture is a necessary ingredient to such a culture of preparedness. The security culture perspective also helps understand how a resilient society and nation …
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Cross Domain Iw Threats To Sof Maritime Missions: Implications For U.S. Sof, Gary C. Kessler, Diane M. Zorri
Publications
As cyber vulnerabilities proliferate with the expansion of connected devices, wherein security is often forsaken for ease of use, Special Operations Forces (SOF) cannot escape the obvious, massive risk that they are assuming by incorporating emerging technologies into their toolkits. This is especially true in the maritime sector where SOF operates nearshore in littoral zones. As SOF—in support to the U.S. Navy— increasingly operate in these contested maritime environments, they will gradually encounter more hostile actors looking to exploit digital vulnerabilities. As such, this monograph comes at a perfect time as the world becomes more interconnected but also more vulnerable.
Whole-Community Response Planning For Pennsylvania’S Ongoing Opioid Emergency, Alexander Siedschlag
Whole-Community Response Planning For Pennsylvania’S Ongoing Opioid Emergency, Alexander Siedschlag
Publications
The Penn State Center for Security Research and Education (CSRE), in collaboration with Penn State Homeland Security Programs and the Pennsylvania Emergency Management Agency (PEMA), held a tabletop exercise that addressed first-responder and whole-community response and resilience to the ongoing opioid crisis. The exercise, which took place Sept. 24, 2019, at PEMA headquarters in Harrisburg, Pa., also was supported by the Governor’s Office for Homeland Security and the Pennsylvania Department of Health’s Bureau of Public Health Preparedness. The Dickinson School of Law and Immaculata University were academic contributors. This article summarizes the main outcome in the current COVID-19 context.
Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri
Cyber Supply Chain Risk Management: Implications For The Sof Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, Diane M. Zorri
Publications
The emerging Cyber Supply Chain Risk Management (C-SCRM) concept assists at all levels of the supply chain in managing and mitigating risks, and the authors define C-SCRM as the process of identifying, assessing, and mitigating the risks associated with the distributed and interconnected nature of information and operational technology products and service supply chains. As Special Operations Forces increasingly rely on sophisticated hardware and software products, this quick, well-researched monograph provides a detailed accounting of C-SCRM associated laws, regulations, instructions, tools, and strategies meant to mitigate vulnerabilities and risks—and how we might best manage the evolving and ever-changing array of …
Ethical, Legal, And Social Issues (Elsi), Andrea Jerkovic´, Alexander Siedschlag
Ethical, Legal, And Social Issues (Elsi), Andrea Jerkovic´, Alexander Siedschlag
Publications
This chapter introduces the concept of ethical, legal, and social issues – known as ELSI – as it is relevant to security science research and security science-informed practice. After defining ethical, legal, and social issues, the chapter addresses main ELSI domains and discusses how to address those in security science. Arguments are illustrated using examples from domains such as critical infrastructure protection and novel coronavirus pandemic (COVID-19) response. Subsequently, the chapter demonstrates the relevance of ELSI analysis in security science for risk assessment and vulnerability analysis. It argues for a comprehensive approach to ELSI assessment and consideration in security science …
The Role Of The Internet In Intelligence Gathering And Spreading Propaganda, Leila Halawi
The Role Of The Internet In Intelligence Gathering And Spreading Propaganda, Leila Halawi
Publications
The analysis of American intelligence as an academic discipline exhibits an excellent level of integration regarding subject matter and methods from military history and strategic studies. The knowledge and information revolution steered a different online culture of sharing and oversharing. While the study of intelligence has primarily been associated with historical methods thus far, opportunities for innovation are also afforded by advances in theoretical and conceptual thinking about intelligence. Such revolutions can help intelligence history while concurrently enlightening the disputes on intelligence in the twentyfirst century. The takings from the information age consist of low cost for access to data …