Open Access. Powered by Scholars. Published by Universities.®
Military and Veterans Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Defense and Security Studies (10)
- Political Science (10)
- International Relations (9)
- Public Policy (8)
- Policy Design, Analysis, and Evaluation (7)
-
- Peace and Conflict Studies (6)
- Public Affairs (6)
- Business (5)
- Computer Sciences (5)
- Databases and Information Systems (5)
- Engineering (5)
- Management Information Systems (5)
- Organizational Behavior and Theory (5)
- Other Computer Sciences (5)
- Other Political Science (5)
- Physical Sciences and Mathematics (5)
- Political Theory (5)
- Risk Analysis (5)
- Arts and Humanities (2)
- Economic Policy (2)
- History (2)
- Law (2)
- Military History (2)
- Education (1)
- Geriatrics (1)
- Higher Education (1)
- Information Literacy (1)
- Institution
- Keyword
-
- Cyber Operations (3)
- Cyber defense (3)
- Nukes (3)
- Articles (2)
- Austerity (2)
-
- Cyber (2)
- Cyber operations (2)
- Deterrence (2)
- International Affairs (2)
- Nuclear (2)
- Security Studies (2)
- Sequestration (2)
- 2nd term (1)
- Academic libraries (1)
- Analysis (1)
- Armed forces (1)
- Assassination (1)
- Book Reviews (1)
- Budget (1)
- Counter cyber (1)
- Cyber Deterrence (1)
- Cyber Operations in Space (1)
- Cyber defense workforce (1)
- Cyber deterrence (1)
- Cyber space (1)
- Cyber terrorism (1)
- Cyberwar (1)
- Debrief (1)
- Debriefing (1)
- Defense-growth relationship (1)
Articles 1 - 14 of 14
Full-Text Articles in Military and Veterans Studies
Who Should Uphold International Law, And Why Do Syrians Support The Regime?, Ahmed E. Souaiaia
Who Should Uphold International Law, And Why Do Syrians Support The Regime?, Ahmed E. Souaiaia
Ahmed E SOUAIAIA
Answering a reporter’s question if bombing Syria is needed in order to preserve his credibility since he was the one who set a red line, President Obama replied: “First of all, I didn't set a red line. The world set a red line. The world set a red line when governments representing 98 percent of the world's population said the use of chemical weapons are abhorrent and passed a treaty forbidding their use even when countries are engaged in war. Congress set a red line when it ratified that treaty..."
It is true that international law and treaties have prohibited …
Serving Those Who Serve: Outreach And Instruction For Student Cadets And Veterans, Nancy E. Fawley, Nikki Kyrsak
Serving Those Who Serve: Outreach And Instruction For Student Cadets And Veterans, Nancy E. Fawley, Nikki Kyrsak
Nancy Fawley
Student cadets and veterans new to college have unique academic needs, and the abrupt switch from civilian to Corps life for new students at a military university can be challenging. Likewise, transitioning from military life to civilian life as a veteran student can be overwhelming. The libraries at Norwich University and The University of Alabama are supporting programs to assist new students in the transition from civilian to Corps life and from military to civilian life, respectively. While these students are at different stages of their military careers, cadets and veterans have common attributes that inform library support and instruction, …
Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa
Lessons Learned From Pakistan: A Dissertation On The Bush-Obama Drone Doctrine, Michael A. Pipa
Michael A Pipa
The first use of the modern day attack drone by the United States was in Afghanistan in mid 2002, and for the past 11 years attack drones have been used by the United States in as many countries as Pakistan, Yemen and Somalia. When considering the alternatives to using drones, such as sending marines on the ground to complete a mission or flying a piloted jet over enemy territory to gather intelligence, as well as the military power that the use of these vehicles projects, the attack drone has become the weapon of choice in the war on terror for …
Book Review: The Generals By Thomas E. Ricks, Robert Weaver
Book Review: The Generals By Thomas E. Ricks, Robert Weaver
Robert Weaver
No abstract provided.
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Jan Kallberg
In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …
Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern
Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern
Kevin H. Govern
In this chapter I take the killing of Osama bin Laden as a test case for considering the moral and legal status of intentionally killing individuals deemed a threat to national security, under conditions in which the object of the targeted attack is offered little or no opportunity to surrender to attacking forces. The target in such operations, in short, is treated as though he were a belligerent: a person placed on a kill list may be targeted in a way that would be legitimate if he were an enemy combatant. In such cases, we think of him as having …
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
Informing Lone-Offender Investigations, Randy Borum
Informing Lone-Offender Investigations, Randy Borum
Randy Borum
This article examines the current research on targeted violence by lone offenders to inform intelligence and criminal investigations. It begins by analyzing the definitions and nature of lone offender attacks, discusses the role of "radicalization," and the ways in which mental illnesses may or may not be relevant.
Spillovers Of Veterans Hospice Care: The Economic And Social Impact Of Palliative Care, Maximiliano Mendieta, Bruce D. Mcdonald Iii
Spillovers Of Veterans Hospice Care: The Economic And Social Impact Of Palliative Care, Maximiliano Mendieta, Bruce D. Mcdonald Iii
Bruce D. McDonald, III
In exchange for military service in the United States, soldiers are promised a benefits package inclusive of health and education after the completion of their service. While the economic effects of the defense-growth relationship are well known, this study takes a unique approach to understanding the relationship between veterans and society by investigating the social and economic spillovers of veterans hospice care. This study shows that as an early adopter of hospice care, the U.S. Department of Veterans Affairs maximized its efficiency through sponsoring innovative research on geriatric care, introducing competition into the health sector, and legitimizing death and dying …
What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii
What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii
Bruce D. McDonald, III
The relationship between defense spending and economic growth has been a major topic of research and political debate for more than one hundred years. Although the relationship of interest is economically oriented, its theoretical underpinning has relied upon the social spillovers of the defense sector. This includes programs on community health, education, and access to technology. Despite this reliance, little is known about what social spillovers. This paper furthers our understanding of the defense-growth relationship by introducing the social spillovers that exist and clarifying how those spillovers occur. The author concludes with a discussion about the direction of future research …
Post Mission, Red Teaming The Details Of The Devil., Carter Matherly
Post Mission, Red Teaming The Details Of The Devil., Carter Matherly
Carter Matherly PhD
Red Teaming is an analytical process that will reduce threat by identifying previously unobserved or unrecognized threats through visualization of the battlefield from the enemy’s point of view, via synthesization of the enemies’ decision making processes while removing relatively common analytical bias and perceptions. Despite the invaluable data these teams are able to produce there is little guidance available to assist Red teams in exploiting their gained knowledge of threats. This has ultimately led to these teams being under employed as simple OPFOR (opposing forces) with little thought to post mission analysis or applications. Could a post mission analytical review …