Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

3,831 Full-Text Articles 2,126 Authors 777,753 Downloads 120 Institutions

All Articles in Defense and Security Studies

Faceted Search

3,831 full-text articles. Page 1 of 117.

Tall Tales Of Danger And Security: How A Critical Human Security Approach Can Address Major Contradictions Revealed Through A Critical Narrative Analysis Of Dominant U.S. Security Strategies, Stephen Schneider 2018 The University of San Francisco

Tall Tales Of Danger And Security: How A Critical Human Security Approach Can Address Major Contradictions Revealed Through A Critical Narrative Analysis Of Dominant U.S. Security Strategies, Stephen Schneider

Master's Theses

Over many generations, humans have developed many perspectives and practices regarding the best ways to recognize and address what they perceive to be dangerous. Stories are used to help shape and narrate perceptions about the world, and they serve to pass on vital information that impacts how a society responds to threats and vulnerabilities. These narratives of danger and security are subjective to the experiences and political intentions of society, and therefore in many ways are partial and biased in their assessments and policies. This results in flawed security practices that may actually exacerbate threats or create new insecurities. What ...


Thoughts And Prayers, Chloe Kardasopoulos 2018 Chapman University

Thoughts And Prayers, Chloe Kardasopoulos

Student Scholar Symposium Abstracts and Posters

Examining the symbolic Gun against its tangible counterpart illuminates abstract attachments of power and superiority this nation associates with the weapon. These elements loaded in the Gun transform the weapon into an object representative of American identity. Analyzing ideological commitments within the Gun guides a critical response to examine disproportionately increasing national gun violence against stagnant federal gun control. The ongoing gun debate must be analyzed in its entirety, beginning at its source - the Second Amendment. Scholars such as Gary Wills dissect the Second Amendment to extract its contextualized intent from modern writers’ manipulated interpretations. It is not the Amendment ...


Psycho-Political Assessment And Making People: What Can We Know?, Editor 2018 Embry-Riddle Aeronautical University

Psycho-Political Assessment And Making People: What Can We Know?, Editor

International Bulletin of Political Psychology

This article describes foundational problems in even experts’ knowing people from formal psychological assessment to musings on human nature.


Psychological Profiling Of Political Leaders: Searching For Three White Whales, Editor 2018 Embry-Riddle Aeronautical University

Psychological Profiling Of Political Leaders: Searching For Three White Whales, Editor

International Bulletin of Political Psychology

This article describes three types of information crucial to psychological profiling of political leaders.


The Psychology Of Time: When The Political Future Is In The Past Not The Present, Editor 2018 Embry-Riddle Aeronautical University

The Psychology Of Time: When The Political Future Is In The Past Not The Present, Editor

International Bulletin of Political Psychology

This article illustrates one of political psychology’s challenges-- to change the hold of the past on the present and future of various human collectives in support of security and intelligence objectives.


When Doing What’S Right Is Wrong: The Psychology Of Personnel Security, Editor 2018 Embry-Riddle Aeronautical University

When Doing What’S Right Is Wrong: The Psychology Of Personnel Security, Editor

International Bulletin of Political Psychology

This article describes the psychology behind failed attempts to improve security, regardless of whether the service and product of industry and organization is one of education, health, commodity, process, or security itself.


Building A National Maritime Security Policy, Adriana Avila-Zúñiga Nordfjeld 2018 World Maritime University

Building A National Maritime Security Policy, Adriana Avila-Zúñiga Nordfjeld

World Maritime University Ph.D. Dissertations

The issue of port security raised concerns at the highest levels after the terrorist attacks on September 11, 2001 against the United States. Security threats against ports and vessels acquired a new perspective and in 2002 the International Maritime Organization (IMO) adopted amendments to the International Convention for the Safety of Life at Sea (SOLAS), 1974, introducing Chapter XI-2 - Special measures to enhance maritime security. This set of regulations enshrines the International Ship and Port Facilities Security Code (ISPS Code), which entered into force on 1 July 2004.

This Code establishes a set of measures to enhance the security of ...


Enhancing Your Intelligence Agency Information Resource Iq: Pt. 4: National Geospatial Intelligence Agency (Ngia), National Intelligence University (Niu), And National Reconnaissance Office (Nro), Bert Chapman 2018 Purdue University

Enhancing Your Intelligence Agency Information Resource Iq: Pt. 4: National Geospatial Intelligence Agency (Ngia), National Intelligence University (Niu), And National Reconnaissance Office (Nro), Bert Chapman

Libraries Faculty and Staff Presentations

Webinar presentation on publicly accessible information resources produced by the U.S. National Geospatial Intelligence Agency (NGIA), National Intelligence University (NIU), and National Reconnaissance Office. Places significant emphasis on missions of these agencies, their historical accomplishments, coverage of their educational activity, and information on the technologies they have used and are currently using to fulfill their institutional objectives.


The Politics Of Intelligence, Editor 2018 Embry-Riddle Aeronautical University

The Politics Of Intelligence, Editor

International Bulletin of Political Psychology

This article describes the politics of the construct and applications of intelligence in the context of adaptation.


A Tale Of Two Administrations: A Comparison Between The George W. Bush And The Barack H. Obama Administrations On Border Security, Marcos L. Misis 2018 Northern Kentucky University

A Tale Of Two Administrations: A Comparison Between The George W. Bush And The Barack H. Obama Administrations On Border Security, Marcos L. Misis

The Journal of Economics and Politics

Border security remains a prominent political issue in 2018. During the 2016 presidential campaign, candidates from the Republican and Democratic parties referred to the effectiveness, or lack thereof, of policies about border security that were implemented by the Bush and Obama Administrations. This article analyzes the policies implemented by both administrations and compares them in order to assess the validity of claims about these policies made by presidential candidates from both parties during the 2016 campaign. In addition, this article quantitatively analyzes data from immigration and border enforcement policies for both the Bush and Obama administrations and offers possible policy ...


When Terror Is Not Terrorism: A Political Psychological Analysis, Editor 2018 Embry-Riddle Aeronautical University

When Terror Is Not Terrorism: A Political Psychological Analysis, Editor

International Bulletin of Political Psychology

This article differentiates violence and its threat through terrorism and through other psychological means and ends.


Mackinder And The Arctic's Emerging Geopolitics: Recommendations For The U.S. And Its Nato Allies, Bert Chapman 2018 Purdue University

Mackinder And The Arctic's Emerging Geopolitics: Recommendations For The U.S. And Its Nato Allies, Bert Chapman

Libraries Faculty and Staff Presentations

This presentation shows how Halford Mackinder (1861-1947) described Canada and the Arctic region in his geopolitical writings. It goes on to stress how the Arctic is becoming increasingly important in international geopolitical policymaking due to its significant oil and natural gas resources, how warming temperatures are increasing international access to its waters, and the how countries as diverse as Canada, China, Russia, and the U.S. see the Arctic region in their strategic policymaking. It concludes by stressing that the Arctic can no longer be viewed as a region immune from international conflict and presents recommendations for the U.S ...


Jamal Khashoggi: Assassination, Abattoir, And The Law Of Small Numbers, Editor 2018 Embry-Riddle Aeronautical University

Jamal Khashoggi: Assassination, Abattoir, And The Law Of Small Numbers, Editor

International Bulletin of Political Psychology

This article describes psychological research on why tragedies of individuals and small numbers of people elicit more global emotional arousal than tragedies of large numbers of people.


Ddas Suggested Training Uses: Management Training, Database of Demining Accidents 2018 DDAS

Ddas Suggested Training Uses: Management Training, Database Of Demining Accidents

Global CWD Repository

Increasingly, managers in HD are management specialists with little or no field experience. If so, they usually delegate responsibility for training and operational needs to another person, often an "Ops Manager". The manager or Ops Manager will be in charge of all training and/or refresher training, so they should read the training suggestions for deminers, paramedics and field supervisors as well as those given here.

Because the accident database is a collection of reports covering events when things did not go as planned, the examples drawn from it are usually "negative" - what not to do, rather than what to ...


Ddas: Metal Detector Set-Up, Database of Demining Accidents 2018 DDAS

Ddas: Metal Detector Set-Up, Database Of Demining Accidents

Global CWD Repository

There must always be absolute confidence in the metal-detector’s ability to locate the target device at the required depth before Metal-detector clearance drills are applied. It is important to set-up the metal-detector appropriately for two main reasons. First it gives the Supervisors confidence that the ground can be cleared to the required depth. Second, it gives the deminers confidence that they can and will find every mine.

What follows is a basic procedure for use with all the current models of metal-detector that I know. It is intended to provide a basis that you can edit and refine to ...


Ddas Suggested Training Uses: Supervisor/Field Management Training, Database of Demining Accidents 2018 DDAS

Ddas Suggested Training Uses: Supervisor/Field Management Training, Database Of Demining Accidents

Global CWD Repository

Field supervisors or managers should also read the suggested training needs for deminers because they will often be in charge of the deminers' training and/or refresher training. When they have any training concerns, they must report this in writing to the Senior Management in order to avoid censure if accidents result from inadequate training.

Because the accident database is a collection of reports covering events when things did not go as planned, the examples drawn from it are usually "negative" - what not to do, rather than what to do. They can be useful to explain the need for rules ...


Ddas Suggested Training Uses: Deminer Training, Database of Demining Accidents 2018 DDAS

Ddas Suggested Training Uses: Deminer Training, Database Of Demining Accidents

Global CWD Repository

The database provides real-world examples that can be used as training aids. This will often reinforce what is considered to be common sense. Be aware that the database records prove (beyond reasonable doubt) that some commonsense wisdom is incorrect.

For example, it is a myth that the most dangerous time for deminers is shortly after their initial training. On the contrary, there is some evidence to suggest that deminers actually become more likely to have an accident the longer they work as a deminer.


Ddas: Introduction, Database of Demining Accidents 2018 DDAS

Ddas: Introduction, Database Of Demining Accidents

Global CWD Repository

The DDAS software was designed by me in 1998 using the Microsoft Access engine and a Visual Basic front-end. This was revised and became a relational database in 2003. The software can be used to display existing datasets or to record your own. Field names can be edited and replaced with names in another language and the content of dropdown pick-lists is easily customised. Originally distributed on CD, it is not generally given out any more but despite being dated and cludgy, it can still be used many later operating systems.


Ddas: Metal Detector Search, Database of Demining Accidents 2018 DDAS

Ddas: Metal Detector Search, Database Of Demining Accidents

Global CWD Repository

What follows are basic procedures for use with all the current models of metal detector that I know. It is intended to provide a basis that you can edit and refine to suit your equipment and working preferences.


Ddas: Using The Database Of Demining Accidents, Database of Demining Accidents 2018 DDAS

Ddas: Using The Database Of Demining Accidents, Database Of Demining Accidents

Global CWD Repository

The author has maintained a database of demining accidents for four years. It contains records of many of the explosive accidents that deminers suffer while going about their work. This article explains the uses and limitations of the database and the software developed to contain it.


Digital Commons powered by bepress