Open Access. Powered by Scholars. Published by Universities.®

Security

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 101

Full-Text Articles in Defense and Security Studies

Assessing The Threat Of Social Media To National Security: Information Operations In The 21st Century, Brendan M. Cullen Oct 2023

Assessing The Threat Of Social Media To National Security: Information Operations In The 21st Century, Brendan M. Cullen

Senior Theses

The ubiquity of social media has enabled an unprecedented amount of personal data to be accessible to various entities. Social media platforms leverage this data to optimize algorithmic recommendation systems, persuade users to engage, and promote monetization. The social media ecosystem’s business model demands continuous engagement and the relentless collection of user data to grow and scale. Not only is social media massively popular around the world, but it has integrated heavily into users’ daily lives. This integration is driven by social platforms’ deliberate architectures and affordances. The intentionality of social media can be exploited by state and non-state actors …


Middle Eastern Defense: The Role Of The Abraham Accords, Graciela H Phillipps May 2023

Middle Eastern Defense: The Role Of The Abraham Accords, Graciela H Phillipps

Helm's School of Government Conference - American Revival: Citizenship & Virtue

Defense organization in the Middle East North Africa (MENA) region has been historically fraught with instability and conflict, rooted in tensions ranging from centuries-old religious disputes to modern geopolitical power struggles. However, two years ago deep-seated status quos in the area were challenged and successfully overcome through the drafting and signage of agreements in which Arab nations normalized ties with the nation of Israel, popularly known as the Abraham Accords. The Accords emphasized the mutual desire for peace and prosperity in MENA between signees with a pointed reference to maintaining security in the traditionally volatile region. These pivotal feats of …


Thawing Interests: The Arctic In U.S. Grand Strategy, Benjamin S. Murray Jan 2023

Thawing Interests: The Arctic In U.S. Grand Strategy, Benjamin S. Murray

MSU Graduate Theses

The thawing Arctic is subject to increasing activity, attention, and a renewal of interests in the region from around the globe. National interests have compelled strategic planning in the Arctic region and are connected to global geopolitics. A concept of grand strategy is distilled from theories of past authors, understood within the modern context. That concept includes a terminological framework consisting of interests and threats to inform an ends, ways, and means design of strategy, composed of all instruments of state power, blending policy with strategy, and across the peace-war continuum. Then fundamental precepts of existing U.S. grand strategy are …


Strategies And Policies In Enforcement Of Security, Human Rights And Development In Papua, Rudy Syamsir, Syaiful Rohman May 2022

Strategies And Policies In Enforcement Of Security, Human Rights And Development In Papua, Rudy Syamsir, Syaiful Rohman

Journal of Terrorism Studies

Papua always an interesting discussion along with the rampant acts of violence against civilians carried out by the Independent Papua Organization (OPM), which were later labeled with various terms such as the Armed Separatist Group (KSB), Armed Criminal Group (KKB), Armed Separatist Criminal Group (KKSB). KKB carried out acts of violence in killing civilians, government officials vandalizing and burning public facilities. Because of the ways that are similar to acts of terrorism, this group is finally called the Armed Terrorism Group (KTB). The Indonesian National Army (TNI) and Indonesian Republic Police (POLRI) security forces have taken repressive actions with armed …


Terrorism: A Case Study Of The Global Security Threat Of Boko Haram And The Isis Alliance In Nigeria, Emmanuel Ben-Edet May 2022

Terrorism: A Case Study Of The Global Security Threat Of Boko Haram And The Isis Alliance In Nigeria, Emmanuel Ben-Edet

Dissertations (2016-Present)

The literature on terrorism indicates that religion, cultures of origin, and environmental factors play globally critical roles in the emergence of terrorist groups worldwide. Terrorists use violence and threats to strike fear and intimidate people and governments into pursuing their religious, political, and ideological goals. One of the deadliest jihadist groups, Boko Haram, emerged in the early 2000s with a jihadist agenda mainly focused on Nigeria’s Islamization. In 2009, it launched violent attacks in Nigeria, which is Africa’s largest economy, and currently controls a large swathe of territory in its northeastern part. In its desire to create a caliphate, Boko …


Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels Apr 2022

Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels

Student Publications

The global expansion of armed private contractors has led to a revived interest in researching armed private contracting firms, especially investigating how their personnel have functioned as an extension of state foreign policy. However, the literature on the industry contains a confusing diversity of terms when reviewing such firms, whether private military company, private security company, private military security company, or even just mercenary. Using the Singer (2010) ‘tip of the spear’ typology, I analyze the distinctions across armed private contracting firms and discuss the differences between armed private contractors and conventional militaries, armed private contractors and mercenaries, and highlight …


The Softer Sex? Women Legislating War, Shanil Verjee Jan 2021

The Softer Sex? Women Legislating War, Shanil Verjee

CMC Senior Theses

There is a long-standing assumption in feminist international relations theory that women are more peace-oriented than men, and that, therefore, if more women were put in positions of power, there would be less war. This paper explores whether this assumption holds true in the United States federal legislature by examining the voting and congressional records of women in Congress over time, in both the Republican and Democratic parties, and comparing them to the records of male members of Congress to determine whether women exhibit a significantly different legislative approach to war.


Uk Think-Tanks, The War On Terror And The Radicalisation Debate, Hadi Enayat Nov 2020

Uk Think-Tanks, The War On Terror And The Radicalisation Debate, Hadi Enayat

Abdou Filali-Ansary Occasional Paper Series

This paper maps the discursive and ideological habitus in which UK think-tanks operate in connection with the ‘war on terror’. It discusses how UK think-tanks have both shaped and been shaped by this habitus and the impact their work has had on counter-terrorism policy in the UK. It begins by discussing the concept of think-tanks and their role and input into politics. It then sketches the rise of ‘terrorism’ as both an academic object of study, from the mid-1970s onwards, and as an increasingly vital policy area for governments and the military-security establishment, especially after 9/11. The paper then focuses …


Security Threats, American Pressure, And The Role Of Key Personnel: How Nato’S Defence Planning Process Is Alleviating The Burden-Sharing Dilemma, John R. Deni Oct 2020

Security Threats, American Pressure, And The Role Of Key Personnel: How Nato’S Defence Planning Process Is Alleviating The Burden-Sharing Dilemma, John R. Deni

Monographs, Collaborative Studies, & IRPs

In 2017, for the first time since the end of the Cold War, none of the capability targets identified in NATO’s quadrennial NATO Defence Planning Process (NDPP) were left on the negotiating table. Previously, capability targets were identified by the alliance’s secretariat, but they remained unfilled as allies failed to assume responsibility for them.

This monograph examines the 2014–18 iteration of the NDPP, which represented a stunning turnaround in transatlantic burden sharing. The analysis reveals a combination of factors—the changed threat environment, political pressure from Washington, and the role of “policy entrepreneurs” working within NATO—best explain the alliance’s success in …


Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas Sep 2020

Is The Transit Industry Prepared For The Cyber Revolution? Policy Recommendations To Enhance Surface Transit Cyber Preparedness, Scott Belcher, Terri Belcher, Eric Greenwald, Brandon Thomas

Mineta Transportation Institute Publications

The intent of this study is to assess the readiness, resourcing, and structure of public transit agencies to identify, protect from, detect, respond to, and recover from cybersecurity vulnerabilities and threats. Given the multitude of connected devices already in use by the transit industry and the vast amount of data generated (with more coming online soon), the transit industry is vulnerable to malicious cyber-attack and other cybersecurity-related threats. This study reviews the state of best cybersecurity practices in public surface transit; outlines U.S. public surface transit operators’ cybersecurity operations; assesses U.S. policy on cybersecurity in public surface transportation; and provides …


Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards Jan 2020

Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards

Mineta Transportation Institute Publications

Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.

This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …


City Of Camas City Hall Safety And Security Project Plan, Diane Dyra Dec 2019

City Of Camas City Hall Safety And Security Project Plan, Diane Dyra

CUP Undergraduate Research

This proposal is designed for the City of Camas as a means to create a culture of preparedness, improve safety and security, as well as build resilience. The current state of City Hall allows for the threat to the loss of life and property. Through preparation, education, training, crime prevention through environmental design, and structural improvements, a state of safety, security, and continued critical functionality for the community can be met. These improvements allow for the City of Camas to stand by their mission statement, committing to “preserving its heritage, sustaining and enhancing a high quality of life for all …


American Medical Response Active Shooter Project Proposal, Matthew Spong Dec 2019

American Medical Response Active Shooter Project Proposal, Matthew Spong

CUP Undergraduate Research

American Medical Response (AMR) Tukwila is the hub of its Western Washington operations. With over 400 employees and multiple customers and guests at any given time, they must have measures in place to ensure the safety and security of those on the premises. In the summer of 2019, AMR Tukwila experienced a possible active shooter incident. While this is a low occurrence event it proves the need for having a plan and procedures in place. Active shooter situations have steadily risen over the years and can happen without warning. This proposal identifies problems and solutions so that AMR Tukwila employees, …


Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa Nov 2019

Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa

FIU Electronic Theses and Dissertations

This study examines the experiences of 20 women and girls who lived in the Boko Haram camp in 2014-2018 and had varying levels of engagement in the organization's activities. The study employs a qualitative phenomenological in-depth interview methodology. Semi-structured interviews conducted in Nigeria and the United States yielded data on the experiences of the respondents before, during, and after their lives with Boko Haram. Based on the analysis of interview responses and field notes, several themes emerged. Overall findings suggest that family and community dynamics play a significant role in terrorism in Nigeria. The study found that early child marriage …


Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans Sep 2019

Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans

Library Philosophy and Practice (e-journal)

Has transhumanism influenced military thinking? Previous work found that transhumanist terms did not appear widely in military publications. The present work analyzes and improves on previous content analysis of transhumanist terms in military literature using the tools of library and information studies.


Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri Sep 2019

Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri

Publications

This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …


Investment Policy In International Relations: Opportunities And Risks For The Economy Of Uzbekistan, S. A. Voronin, Sh. Sh. Shadmanov Jun 2019

Investment Policy In International Relations: Opportunities And Risks For The Economy Of Uzbekistan, S. A. Voronin, Sh. Sh. Shadmanov

International Relations: Politics, Economics, Law

The article focuses on the investment relationships between China and Central Asian countries to draw conclusions for the economy of Uzbekistan. It sheds light on the opportunities that Uzbekistan can have in relations with China at the same time notes some of the possible risks arising because of this.


India’S Surgical Strikes: Response To Strategic Imperatives, Karthika Sasikumar Apr 2019

India’S Surgical Strikes: Response To Strategic Imperatives, Karthika Sasikumar

Faculty Publications

In September 2016, militants who were allegedly backed by Pakistan attacked an Indian Army camp in Uri. The government in New Delhi was facing important regional elections. It faced intense public pressure to muster a military response. Such a response, however, ran the risk of triggering a nuclear exchange. Ten days after the Uri attack, India reported that it had carried out ‘surgical strikes’ on terrorist training camps in Pakistan-controlled territory. The paper examines this specific episode in India–Pakistan deterrence dynamics, focusing on the nomenclature ‘surgical strikes’. The paper argues that the choice of the term itself is new and …


Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor Jan 2019

Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor

International Bulletin of Political Psychology

There have been reports of a growing number of Transportation Security Administration (TSA) agents calling in sick and refusing to work for no pay (1). The immediate question becomes, what’s the impact on aviation security? The answer is a negative one, but not as negative as one might think, and one only adding to festering, pre-shutdown problems.


A Slight Re-Telling Of The David And Goliath Story: Surprising Power Dynamics In Proxy Relationships, Ruiyang Wang Jan 2019

A Slight Re-Telling Of The David And Goliath Story: Surprising Power Dynamics In Proxy Relationships, Ruiyang Wang

CMC Senior Theses

This thesis discusses how local forces, despite being the weaker actor in a proxy relationship, manipulate external powers’ support to pursue their own objectives. Three factors – practical advantage, relative will, and diverging objectives – explain this counterintuitive power dynamic. First, local forces have better local knowledge, more extensive networks, and greater legitimacy, which give them leverage and make them desirable partners. Second, local forces' involvement is often existential rather than selective; unlike external powers, local forces are thus unconstrained by domestic political vulnerabilities. This enables them to close the significant power gap with external powers. Third, local forces' objectives …


The Challenge Of Securing Kenya: Past Experience, Present Challenges And Future Prospects, Mumo Nzau, Mohammed Guyo Aug 2018

The Challenge Of Securing Kenya: Past Experience, Present Challenges And Future Prospects, Mumo Nzau, Mohammed Guyo

The Journal of Social Encounters

The dynamic nature of insecurity and mitigation strategies cannot be adequately understood without comparing the present conjuncture and the past experiences. This paper provides a temporal assessment of security in Kenya by scanning convergent and divergent insecurity experiences and mitigation strategies of the regimes of Jomo Kenyatta, Daniel Arap Moi, Mwai Kibaki and Uhuru Kenyatta. The security dynamics have been shaped by drivers located at local, national and global levels. The convergence of local insecurity and protracted transitional terrorist attacks has produced a high trajectory of insecurity with a negative impact on the economy, social cohesion and stability. The contradiction …


Natural Disasters: Continued Security In The Aftermath, Victoria Quinones May 2018

Natural Disasters: Continued Security In The Aftermath, Victoria Quinones

Master in Management for Public Safety and Homeland Security Professionals Master's Projects

This paper reviews one of the leading threats that the United States faces: natural disasters. As the rate, strength, and cost of damages increases, so too does the vulnerabilities of the country’s security and that of its people’s. This paper highlights several significant points that surround the topic of natural disasters. First, identifying first the importance of such a topic and the threats that natural disasters pose; and, secondly, how to manage those threats. This paper shows the development of a strategic plan that incorporates a multidisciplinary approach, intelligence gathering, and an assessment of the proposed plan. This strategy identifies …


Strategic Insights: Is The European Union Really That Important To U.S. Security Interests?, John R. Deni Mar 2017

Strategic Insights: Is The European Union Really That Important To U.S. Security Interests?, John R. Deni

Articles & Editorials

No abstract provided.


The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins Feb 2017

The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins

Mineta Transportation Institute Publications

Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can cause high casualties. This report examines the unique attributes of the terrorist threat, how security measures against terrorism have evolved over the years, and their overall effectiveness.

Does security work? Empirical evidence is hard to come by. Terrorist incidents are statistically rare and random, making it difficult to discern effects. The fact that terrorists focus most of their attacks on targets with little …


Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian Jan 2017

Emergent Ai, Social Robots And The Law: Security, Privacy And Policy Issues, Ramesh Subramanian

Journal of International Technology and Information Management

The rapid growth of AI systems has implications on a wide variety of fields. It can prove to be a boon to disparate fields such as healthcare, education, global logistics and transportation, to name a few. However, these systems will also bring forth far-reaching changes in employment, economy and security. As AI systems gain acceptance and become more commonplace, certain critical questions arise: What are the legal and security ramifications of the use of these new technologies? Who can use them, and under what circumstances? What is the safety of these systems? Should their commercialization be regulated? What are the …


A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini Dec 2016

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran Nov 2016

The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran

International Journal of Nuclear Security

In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …


China And Africa’S Peace And Security Agenda: The Burgeoning Appetite, Oita Etyang, Simon Oswan Panyako Sep 2016

China And Africa’S Peace And Security Agenda: The Burgeoning Appetite, Oita Etyang, Simon Oswan Panyako

Journal of African Conflicts and Peace Studies

China and Africa have had contacts since time immemorial. It is, however, in the last two decades that China vastly increased its engagement with Africa, following the first Ministerial Conference of the Forum on China-Africa Cooperation (FOCAC) that took place in 2000 and the Beijing Summit held in 2006. China has skillfully utilized its international strategy of multipolarity and non-interference to champion its economic interests as well as its hegemonic quest. It is undeniable that China has heavily invested in Africa through Foreign Direct Investments (FDI), and infrastructure development. China has also increased its appetite on matters peace and security. …


Geopolitics Of The 2016 Australian Defense White Paper And Its Predecessors, Bert Chapman Apr 2016

Geopolitics Of The 2016 Australian Defense White Paper And Its Predecessors, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Australia released the newest edition of its Defense White Paper, describing Canberra’s current and emerging national security priorities, on February 25, 2016. This continues a tradition of issuing defense white papers since 1976. This work will examine and analyze the contents of this document as well as previous Australian defense white papers, scholarly literature, and political statements assessing their geopolitical significance. It will also examine public input into Australian defense white papers and the emerging role of social media in this public involvement. It concludes by evaluating whether Australia has the political will and economic resources necessary to fulfill its …