Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2722 Full-Text Articles 1920 Authors 621572 Downloads 96 Institutions

All Articles in Defense and Security Studies

Faceted Search

2722 full-text articles. Page 1 of 112.

Social Psychology Of Public Defenders: A Qualitative Study, Michael W. Firmin, Kari E. Barnhill, Hannah W. Foster, Ying-Ruey Chuang, D. Elise Lawrence 2017 Cedarville University

Social Psychology Of Public Defenders: A Qualitative Study, Michael W. Firmin, Kari E. Barnhill, Hannah W. Foster, Ying-Ruey Chuang, D. Elise Lawrence

Michael W. Firmin, Ph.D.

The right to an attorney is a one to which all U.S. citizens are entitled, in conjunction with the constitution's sixth amendment. Difficulty arose when people who were unable to provide necessary funds to hire a lawyer and, subsequently, went into trial pro se. Resolution was met with the creation of the public defense system -- a system which is unfortunately understudied, and sometimes regarded in a negative light, including a negative perception that public defense is a broken system. This belief sometimes bleeds into the minds of potential clients who may believe a public defender is not sufficiently ...


The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins 2017 National Transportation Safety and Security Center, Mineta Transportation Institute

The Challenge Of Protecting Transit And Passenger Rail: Understanding How Security Works Against Terrorism, Brian Michael Jenkins

Mineta Transportation Institute Publications

Terrorists see transit and passenger rail as an attractive target. Designed for public convenience, trains and stations offer terrorists easy access to crowds of people in confined environments where there are minimal security risks and attacks can cause high casualties. This report examines the unique attributes of the terrorist threat, how security measures against terrorism have evolved over the years, and their overall effectiveness.

Does security work? Empirical evidence is hard to come by. Terrorist incidents are statistically rare and random, making it difficult to discern effects. The fact that terrorists focus most of their attacks on targets with little ...


Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland 2017 U.S. Department of Homeland Security

Thriving In The Online Environment: Creating Structures To Promote Technology And Civil Liberties, Daniel W. Sutherland

Catholic University Journal of Law and Technology

No abstract provided.


U.S.-China Economic And Security Review Commission: Emerging Factor In Western Pacific Strategic Policy Analysis, Bert Chapman 2017 Purdue University

U.S.-China Economic And Security Review Commission: Emerging Factor In Western Pacific Strategic Policy Analysis, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Those studying and analyzing Western Pacific strategic trends and develop- ments have access to multiple unclassified analyses of security trends in this region covering these waters and adjacent countries. These information resources are produced by military and government agencies from multiple countries, multinational public policy research institutions, popular and scholarly journals, and Internet resources featuring text, data, webcasts, and imagery. One of these resources is the U.S.–China Economic and Security Review Commission established in the 2001 National Defense Authorization Act. This article argues that this organization’s analyses should be considered essential reading by civilian and military policymakers ...


Table Of Contents, 2016 University of Tennessee, Knoxville

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor, 2016 University of Tennessee, Knoxville

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene 2016 Advanced Technology Insights, LLC (ATI)

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall 2016 Institute of Nuclear Security, University of Tennessee - Knoxville

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier II, Howard L. Hall 2016 University of Tennessee, Knoxville

Modern Advancements In Post-Detonation Nuclear Forensic Analysis, S. Adam Stratz, Jonathan A. Gill, John D. Auxier Ii, Howard L. Hall

International Journal of Nuclear Security

Deterring nuclear terrorism is a critical national asset to support the preclusion of non-state actors from initiating a nuclear attack on the United States. Successful attribution of a detonated nuclear weapon allows for timely responsive measures that prove essential in the period following a nuclear event. In conjunction with intelligence and law enforcement evidence, the technical nuclear forensics (TNF) post-detonation community supports this mission through the development and advancement of expertise to characterize weapon debris through a rapid, accurate, and detailed approach. Though the TNF field is young, numerous strides have been made in recent years toward a more robust ...


Student Competition Cover, 2016 University of Tennessee, Knoxville

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini 2016 American Academy of Arts and Sciences

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are ...


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame 2016 University of Tennessee

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed 2016 University of Dhaka

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen 2016 Korea Advanced Institute of Science and Technology

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan 2016 Middlebury Institute of International Studies (MIIS)

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein 2016 University of Tennessee, Knoxville

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Table Of Contents, 2016 University of Tennessee, Knoxville

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk, 2016 University of Tennessee, Knoxville

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa 2016 Department of Nuclear Engineering and Engineering Physics, Universitas Gadjah Mada, Yogyakarta, Indonesia

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to ...


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr 2016 The University of the Witwatersrand, Johannesburg

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Digital Commons powered by bepress