Open Access. Powered by Scholars. Published by Universities.®
Policy Design, Analysis, and Evaluation Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cyber Operations (3)
- Cyber defense (3)
- Nukes (3)
- Austerity (2)
- Conflict (2)
-
- Cyber (2)
- Cyber operations (2)
- Deterrence (2)
- Nuclear (2)
- Security Studies (2)
- Sequestration (2)
- 2nd term (1)
- A Brief Analysis (1)
- Al Qaeda’s (1)
- Armed forces (1)
- Articles (1)
- Budget (1)
- Center for Governance and Sustainability (1)
- Counter cyber (1)
- Cyber Deterrence (1)
- Cyber Operations in Space (1)
- Cyber defense workforce (1)
- Cyber deterrence (1)
- Cyber space (1)
- Cyber terrorism (1)
- Cyberwar (1)
- Defense-growth relationship (1)
- Digital Missile Gap (1)
- Education (1)
- Environmental sustainability (1)
- Publication
- Publication Type
Articles 1 - 12 of 12
Full-Text Articles in Policy Design, Analysis, and Evaluation
Security By Contractor: Outsourcing In Peace And Stability Operations, Volker Franke
Security By Contractor: Outsourcing In Peace And Stability Operations, Volker Franke
Volker C. Franke
No abstract provided.
The Korean Conflict And The United States National Security, Matthew Smith
The Korean Conflict And The United States National Security, Matthew Smith
Pepperdine Policy Review
The United States has a substantial interest in the Korean Conflict concerning its own national security. It is based primarily on the potential outcomes of the policies deriving from North Korea. The United States must maintain its relationship with South Korea in order to address any situation that arises on the Korean peninsula.
No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo
No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo
Pepperdine Policy Review
State Department officials stated at the end of 2011 that after a careful review of year's events concerning the terror group Al Qaeda, the threat of terrorism was now greatly diminished with little chance of retunring. Less than four months later, Al Qaeda affiliate group Al Qaeda in the Islamic Maghreb (AQIM) staged a coup in the West African country of Mali, effectively splitting the country in half. The article will analyze the conflict in Mali as an example of how Islamic fundamentalism and global terrorism of Al Qaeda has not dissipated, despite the best hopes of American foreign policymakers. …
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Jan Kallberg
In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
Homeland Security Grant Program: An Analysis Of The Determinants Of Federal Homeland Security Funding To States, Michaela Miles
Homeland Security Grant Program: An Analysis Of The Determinants Of Federal Homeland Security Funding To States, Michaela Miles
MPA/MPP/MPFM Capstone Projects
Ever since the devastating attacks of 9/11, America has made terrorism prevention a top priority, and the Department of Homeland Security has transferred billions of dollars to states in Domestic Preparedness and Anti-Terrorism programs. However, there has been much debate on how these funds are allocated, many speculating that some states receive more funding than others as “pork.”
Basing an analysis of funding on a variety of determinants, it can be concluded that this speculation might very well be the case. An analysis of allocation of federal Homeland Security funds to states was conducted, hypothesizing the following variables were determinants …
Activities And Achievements: Progress Report 2011-2013, Center For Governance And Sustainability, University Of Massachusetts Boston, Maria Ivanova, Craig Murphy, James Gustave Speth, Christiana Figueres, Alice Odingo
Activities And Achievements: Progress Report 2011-2013, Center For Governance And Sustainability, University Of Massachusetts Boston, Maria Ivanova, Craig Murphy, James Gustave Speth, Christiana Figueres, Alice Odingo
Center for Governance and Sustainability Publications
We joined the University of Massachusetts Boston in the fall of 2010 to develop a new doctoral program in global governance and human security, the first of its kind in the United States. In the spring of 2011, we launched the Center for Governance and Sustainability in an effort to bring academic rigor to real-world policy challenges in environment, development, and sustainability governance.
The Center is housed at the John W. McCormack Graduate School of Policy and Global Studies, which takes pride in offering a world-class interdisciplinary education and engaging in values-driven research, demonstrating a deep commitment to making a …
The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen
The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen
Pepperdine Policy Review
Over the past two decades, the ubiquitousness of the internet has created new reals in which artistic expression, dialogue, and commerce have flourished. Yet the same technologies which bring about the conveniences of the modern age also carry the greatest threats to international security over the next few decades. Defense strategies and security protocols have failed to evolve at the same rate at which internet technologies have grown. While the eminence and complexity of cyber-attacks continues to be debatable, the fact remains that networks are vulnerable to attack by both foreign governments and non-state actors. Unless definitive and aggressive steps …
What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii
What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii
Bruce D. McDonald, III
The relationship between defense spending and economic growth has been a major topic of research and political debate for more than one hundred years. Although the relationship of interest is economically oriented, its theoretical underpinning has relied upon the social spillovers of the defense sector. This includes programs on community health, education, and access to technology. Despite this reliance, little is known about what social spillovers. This paper furthers our understanding of the defense-growth relationship by introducing the social spillovers that exist and clarifying how those spillovers occur. The author concludes with a discussion about the direction of future research …