Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Political Science (65)
- International Relations (48)
- Peace and Conflict Studies (37)
- Other Political Science (33)
- Psychology (31)
-
- Other Psychology (30)
- International and Area Studies (24)
- Law (22)
- Terrorism Studies (22)
- American Politics (15)
- Military and Veterans Studies (13)
- Arts and Humanities (12)
- Physical Sciences and Mathematics (10)
- Personality and Social Contexts (9)
- Public Policy (9)
- Near and Middle Eastern Studies (8)
- Engineering (7)
- International Law (7)
- Philosophy (7)
- Science and Technology Studies (7)
- Transportation (6)
- Business (5)
- Communication (5)
- Comparative Politics (5)
- Human Rights Law (5)
- Policy Design, Analysis, and Evaluation (5)
- Political Theory (5)
- Institution
-
- Embry-Riddle Aeronautical University (43)
- SelectedWorks (6)
- Claremont Colleges (4)
- Edith Cowan University (4)
- San Jose State University (4)
-
- Florida International University (3)
- Old Dominion University (3)
- Selected Works (3)
- University of Denver (3)
- University of Tennessee, Knoxville (3)
- Concordia University St. Paul (2)
- James Madison University (2)
- Nova Southeastern University (2)
- US Army War College (2)
- Aga Khan University (1)
- California State University, San Bernardino (1)
- College of Saint Benedict and Saint John's University (1)
- Eastern Kentucky University (1)
- Gettysburg College (1)
- Liberty University (1)
- Ministry of Higher and Secondary Specialized Education of the Republic of Uzbekistan (1)
- Missouri State University (1)
- Pace University (1)
- Purdue University (1)
- Texas Southern University (1)
- Universitas Indonesia (1)
- University of Kentucky (1)
- University of Nebraska - Lincoln (1)
- University of South Carolina (1)
- University of South Florida (1)
- Publication Year
- Publication
-
- International Bulletin of Political Psychology (42)
- CMC Senior Theses (3)
- FIU Electronic Theses and Dissertations (3)
- Graduate Program in International Studies Theses & Dissertations (3)
- Human Rights & Human Welfare (3)
-
- International Journal of Nuclear Security (3)
- Mineta Transportation Institute Publications (3)
- Research outputs pre 2011 (3)
- CUP Undergraduate Research (2)
- Department of Conflict Resolution Studies Theses and Dissertations (2)
- George Dimitriu (2)
- Global CWD Repository (2)
- Prof. Elizabeth Burleson (2)
- Abdou Filali-Ansary Occasional Paper Series (1)
- Articles & Editorials (1)
- Australian Security and Intelligence Conference (1)
- CGU Faculty Publications and Research (1)
- Carter Matherly PhD (1)
- Dissertations (2016-Present) (1)
- Dr Ozy B.Orluwene,JP (1)
- Emmanuel Wekem Kotia (1)
- Ex-Patt Magazine (1)
- Faculty Publications (1)
- Helm's School of Government Conference - American Revival: Citizenship & Virtue (1)
- International Relations: Politics, Economics, Law (1)
- Journal of African Conflicts and Peace Studies (1)
- Journal of International Technology and Information Management (1)
- Journal of Terrorism Studies (1)
- Libraries Faculty and Staff Scholarship and Research (1)
- Library Philosophy and Practice (e-journal) (1)
- Publication Type
- File Type
Articles 1 - 30 of 101
Full-Text Articles in Defense and Security Studies
Assessing The Threat Of Social Media To National Security: Information Operations In The 21st Century, Brendan M. Cullen
Assessing The Threat Of Social Media To National Security: Information Operations In The 21st Century, Brendan M. Cullen
Senior Theses
The ubiquity of social media has enabled an unprecedented amount of personal data to be accessible to various entities. Social media platforms leverage this data to optimize algorithmic recommendation systems, persuade users to engage, and promote monetization. The social media ecosystem’s business model demands continuous engagement and the relentless collection of user data to grow and scale. Not only is social media massively popular around the world, but it has integrated heavily into users’ daily lives. This integration is driven by social platforms’ deliberate architectures and affordances. The intentionality of social media can be exploited by state and non-state actors …
Middle Eastern Defense: The Role Of The Abraham Accords, Graciela H Phillipps
Middle Eastern Defense: The Role Of The Abraham Accords, Graciela H Phillipps
Helm's School of Government Conference - American Revival: Citizenship & Virtue
Defense organization in the Middle East North Africa (MENA) region has been historically fraught with instability and conflict, rooted in tensions ranging from centuries-old religious disputes to modern geopolitical power struggles. However, two years ago deep-seated status quos in the area were challenged and successfully overcome through the drafting and signage of agreements in which Arab nations normalized ties with the nation of Israel, popularly known as the Abraham Accords. The Accords emphasized the mutual desire for peace and prosperity in MENA between signees with a pointed reference to maintaining security in the traditionally volatile region. These pivotal feats of …
Thawing Interests: The Arctic In U.S. Grand Strategy, Benjamin S. Murray
Thawing Interests: The Arctic In U.S. Grand Strategy, Benjamin S. Murray
MSU Graduate Theses
The thawing Arctic is subject to increasing activity, attention, and a renewal of interests in the region from around the globe. National interests have compelled strategic planning in the Arctic region and are connected to global geopolitics. A concept of grand strategy is distilled from theories of past authors, understood within the modern context. That concept includes a terminological framework consisting of interests and threats to inform an ends, ways, and means design of strategy, composed of all instruments of state power, blending policy with strategy, and across the peace-war continuum. Then fundamental precepts of existing U.S. grand strategy are …
Strategies And Policies In Enforcement Of Security, Human Rights And Development In Papua, Rudy Syamsir, Syaiful Rohman
Strategies And Policies In Enforcement Of Security, Human Rights And Development In Papua, Rudy Syamsir, Syaiful Rohman
Journal of Terrorism Studies
Papua always an interesting discussion along with the rampant acts of violence against civilians carried out by the Independent Papua Organization (OPM), which were later labeled with various terms such as the Armed Separatist Group (KSB), Armed Criminal Group (KKB), Armed Separatist Criminal Group (KKSB). KKB carried out acts of violence in killing civilians, government officials vandalizing and burning public facilities. Because of the ways that are similar to acts of terrorism, this group is finally called the Armed Terrorism Group (KTB). The Indonesian National Army (TNI) and Indonesian Republic Police (POLRI) security forces have taken repressive actions with armed …
Terrorism: A Case Study Of The Global Security Threat Of Boko Haram And The Isis Alliance In Nigeria, Emmanuel Ben-Edet
Terrorism: A Case Study Of The Global Security Threat Of Boko Haram And The Isis Alliance In Nigeria, Emmanuel Ben-Edet
Dissertations (2016-Present)
The literature on terrorism indicates that religion, cultures of origin, and environmental factors play globally critical roles in the emergence of terrorist groups worldwide. Terrorists use violence and threats to strike fear and intimidate people and governments into pursuing their religious, political, and ideological goals. One of the deadliest jihadist groups, Boko Haram, emerged in the early 2000s with a jihadist agenda mainly focused on Nigeria’s Islamization. In 2009, it launched violent attacks in Nigeria, which is Africa’s largest economy, and currently controls a large swathe of territory in its northeastern part. In its desire to create a caliphate, Boko …
Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels
Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels
Student Publications
The global expansion of armed private contractors has led to a revived interest in researching armed private contracting firms, especially investigating how their personnel have functioned as an extension of state foreign policy. However, the literature on the industry contains a confusing diversity of terms when reviewing such firms, whether private military company, private security company, private military security company, or even just mercenary. Using the Singer (2010) ‘tip of the spear’ typology, I analyze the distinctions across armed private contracting firms and discuss the differences between armed private contractors and conventional militaries, armed private contractors and mercenaries, and highlight …
The Softer Sex? Women Legislating War, Shanil Verjee
The Softer Sex? Women Legislating War, Shanil Verjee
CMC Senior Theses
There is a long-standing assumption in feminist international relations theory that women are more peace-oriented than men, and that, therefore, if more women were put in positions of power, there would be less war. This paper explores whether this assumption holds true in the United States federal legislature by examining the voting and congressional records of women in Congress over time, in both the Republican and Democratic parties, and comparing them to the records of male members of Congress to determine whether women exhibit a significantly different legislative approach to war.
Uk Think-Tanks, The War On Terror And The Radicalisation Debate, Hadi Enayat
Uk Think-Tanks, The War On Terror And The Radicalisation Debate, Hadi Enayat
Abdou Filali-Ansary Occasional Paper Series
This paper maps the discursive and ideological habitus in which UK think-tanks operate in connection with the ‘war on terror’. It discusses how UK think-tanks have both shaped and been shaped by this habitus and the impact their work has had on counter-terrorism policy in the UK. It begins by discussing the concept of think-tanks and their role and input into politics. It then sketches the rise of ‘terrorism’ as both an academic object of study, from the mid-1970s onwards, and as an increasingly vital policy area for governments and the military-security establishment, especially after 9/11. The paper then focuses …
Security Threats, American Pressure, And The Role Of Key Personnel: How Nato’S Defence Planning Process Is Alleviating The Burden-Sharing Dilemma, John R. Deni
Monographs, Collaborative Studies, & IRPs
In 2017, for the first time since the end of the Cold War, none of the capability targets identified in NATO’s quadrennial NATO Defence Planning Process (NDPP) were left on the negotiating table. Previously, capability targets were identified by the alliance’s secretariat, but they remained unfilled as allies failed to assume responsibility for them.
This monograph examines the 2014–18 iteration of the NDPP, which represented a stunning turnaround in transatlantic burden sharing. The analysis reveals a combination of factors—the changed threat environment, political pressure from Washington, and the role of “policy entrepreneurs” working within NATO—best explain the alliance’s success in …
Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas
Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas
Mineta Transportation Institute Publications
The intent of this study is to assess the readiness, resourcing, and structure of public transit agencies to identify, protect from, detect, respond to, and recover from cybersecurity vulnerabilities and threats. Given the multitude of connected devices already in use by the transit industry and the vast amount of data generated (with more coming online soon), the transit industry is vulnerable to malicious cyber-attack and other cybersecurity-related threats. This study reviews the state of best cybersecurity practices in public surface transit; outlines U.S. public surface transit operators’ cybersecurity operations; assesses U.S. policy on cybersecurity in public surface transportation; and provides …
Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards
Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards
Mineta Transportation Institute Publications
Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.
This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …
City Of Camas City Hall Safety And Security Project Plan, Diane Dyra
City Of Camas City Hall Safety And Security Project Plan, Diane Dyra
CUP Undergraduate Research
This proposal is designed for the City of Camas as a means to create a culture of preparedness, improve safety and security, as well as build resilience. The current state of City Hall allows for the threat to the loss of life and property. Through preparation, education, training, crime prevention through environmental design, and structural improvements, a state of safety, security, and continued critical functionality for the community can be met. These improvements allow for the City of Camas to stand by their mission statement, committing to “preserving its heritage, sustaining and enhancing a high quality of life for all …
American Medical Response Active Shooter Project Proposal, Matthew Spong
American Medical Response Active Shooter Project Proposal, Matthew Spong
CUP Undergraduate Research
American Medical Response (AMR) Tukwila is the hub of its Western Washington operations. With over 400 employees and multiple customers and guests at any given time, they must have measures in place to ensure the safety and security of those on the premises. In the summer of 2019, AMR Tukwila experienced a possible active shooter incident. While this is a low occurrence event it proves the need for having a plan and procedures in place. Active shooter situations have steadily risen over the years and can happen without warning. This proposal identifies problems and solutions so that AMR Tukwila employees, …
Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa
Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa
FIU Electronic Theses and Dissertations
This study examines the experiences of 20 women and girls who lived in the Boko Haram camp in 2014-2018 and had varying levels of engagement in the organization's activities. The study employs a qualitative phenomenological in-depth interview methodology. Semi-structured interviews conducted in Nigeria and the United States yielded data on the experiences of the respondents before, during, and after their lives with Boko Haram. Based on the analysis of interview responses and field notes, several themes emerged. Overall findings suggest that family and community dynamics play a significant role in terrorism in Nigeria. The study found that early child marriage …
Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans
Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans
Library Philosophy and Practice (e-journal)
Has transhumanism influenced military thinking? Previous work found that transhumanist terms did not appear widely in military publications. The present work analyzes and improves on previous content analysis of transhumanist terms in military literature using the tools of library and information studies.
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri
Publications
This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …
Investment Policy In International Relations: Opportunities And Risks For The Economy Of Uzbekistan, S. A. Voronin, Sh. Sh. Shadmanov
Investment Policy In International Relations: Opportunities And Risks For The Economy Of Uzbekistan, S. A. Voronin, Sh. Sh. Shadmanov
International Relations: Politics, Economics, Law
The article focuses on the investment relationships between China and Central Asian countries to draw conclusions for the economy of Uzbekistan. It sheds light on the opportunities that Uzbekistan can have in relations with China at the same time notes some of the possible risks arising because of this.
India’S Surgical Strikes: Response To Strategic Imperatives, Karthika Sasikumar
India’S Surgical Strikes: Response To Strategic Imperatives, Karthika Sasikumar
Faculty Publications
In September 2016, militants who were allegedly backed by Pakistan attacked an Indian Army camp in Uri. The government in New Delhi was facing important regional elections. It faced intense public pressure to muster a military response. Such a response, however, ran the risk of triggering a nuclear exchange. Ten days after the Uri attack, India reported that it had carried out ‘surgical strikes’ on terrorist training camps in Pakistan-controlled territory. The paper examines this specific episode in India–Pakistan deterrence dynamics, focusing on the nomenclature ‘surgical strikes’. The paper argues that the choice of the term itself is new and …
Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor
Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor
International Bulletin of Political Psychology
There have been reports of a growing number of Transportation Security Administration (TSA) agents calling in sick and refusing to work for no pay (1). The immediate question becomes, what’s the impact on aviation security? The answer is a negative one, but not as negative as one might think, and one only adding to festering, pre-shutdown problems.
A Slight Re-Telling Of The David And Goliath Story: Surprising Power Dynamics In Proxy Relationships, Ruiyang Wang
A Slight Re-Telling Of The David And Goliath Story: Surprising Power Dynamics In Proxy Relationships, Ruiyang Wang
CMC Senior Theses
This thesis discusses how local forces, despite being the weaker actor in a proxy relationship, manipulate external powers’ support to pursue their own objectives. Three factors – practical advantage, relative will, and diverging objectives – explain this counterintuitive power dynamic. First, local forces have better local knowledge, more extensive networks, and greater legitimacy, which give them leverage and make them desirable partners. Second, local forces' involvement is often existential rather than selective; unlike external powers, local forces are thus unconstrained by domestic political vulnerabilities. This enables them to close the significant power gap with external powers. Third, local forces' objectives …
The Challenge Of Securing Kenya: Past Experience, Present Challenges And Future Prospects, Mumo Nzau, Mohammed Guyo
The Challenge Of Securing Kenya: Past Experience, Present Challenges And Future Prospects, Mumo Nzau, Mohammed Guyo
The Journal of Social Encounters
The dynamic nature of insecurity and mitigation strategies cannot be adequately understood without comparing the present conjuncture and the past experiences. This paper provides a temporal assessment of security in Kenya by scanning convergent and divergent insecurity experiences and mitigation strategies of the regimes of Jomo Kenyatta, Daniel Arap Moi, Mwai Kibaki and Uhuru Kenyatta. The security dynamics have been shaped by drivers located at local, national and global levels. The convergence of local insecurity and protracted transitional terrorist attacks has produced a high trajectory of insecurity with a negative impact on the economy, social cohesion and stability. The contradiction …
Natural Disasters: Continued Security In The Aftermath, Victoria Quinones
Natural Disasters: Continued Security In The Aftermath, Victoria Quinones
Master in Management for Public Safety and Homeland Security Professionals Master's Projects
This paper reviews one of the leading threats that the United States faces: natural disasters. As the rate, strength, and cost of damages increases, so too does the vulnerabilities of the country’s security and that of its people’s. This paper highlights several significant points that surround the topic of natural disasters. First, identifying first the importance of such a topic and the threats that natural disasters pose; and, secondly, how to manage those threats. This paper shows the development of a strategic plan that incorporates a multidisciplinary approach, intelligence gathering, and an assessment of the proposed plan. This strategy identifies …
Strategic Insights: Is The European Union Really That Important To U.S. Security Interests?, John R. Deni
Strategic Insights: Is The European Union Really That Important To U.S. Security Interests?, John R. Deni
Articles & Editorials
No abstract provided.
The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins
The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins
Mineta Transportation Institute Publications
Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can cause high casualties. This report examines the unique attributes of the terrorist threat, how security measures against terrorism have evolved over the years, and their overall effectiveness.
Does security work? Empirical evidence is hard to come by. Terrorist incidents are statistically rare and random, making it difficult to discern effects. The fact that terrorists focus most of their attacks on targets with little …
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian
Journal of International Technology and Information Management
The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini
International Journal of Nuclear Security
The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
International Journal of Nuclear Security
In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …
China And Africa’S Peace And Security Agenda: The Burgeoning Appetite, Oita Etyang, Simon Oswan Panyako
China And Africa’S Peace And Security Agenda: The Burgeoning Appetite, Oita Etyang, Simon Oswan Panyako
Journal of African Conflicts and Peace Studies
China and Africa have had contacts since time immemorial. It is, however, in the last two decades that China vastly increased its engagement with Africa, following the first Ministerial Conference of the Forum on China-Africa Cooperation (FOCAC) that took place in 2000 and the Beijing Summit held in 2006. China has skillfully utilized its international strategy of multipolarity and non-interference to champion its economic interests as well as its hegemonic quest. It is undeniable that China has heavily invested in Africa through Foreign Direct Investments (FDI), and infrastructure development. China has also increased its appetite on matters peace and security. …
Geopolitics Of The 2016 Australian Defense White Paper And Its Predecessors, Bert Chapman
Geopolitics Of The 2016 Australian Defense White Paper And Its Predecessors, Bert Chapman
Libraries Faculty and Staff Scholarship and Research
Australia released the newest edition of its Defense White Paper, describing Canberra’s current and emerging national security priorities, on February 25, 2016. This continues a tradition of issuing defense white papers since 1976. This work will examine and analyze the contents of this document as well as previous Australian defense white papers, scholarly literature, and political statements assessing their geopolitical significance. It will also examine public input into Australian defense white papers and the emerging role of social media in this public involvement. It concludes by evaluating whether Australia has the political will and economic resources necessary to fulfill its …