Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2786 Full-Text Articles 2001 Authors 718469 Downloads 106 Institutions

All Articles in Defense and Security Studies

Faceted Search

2786 full-text articles. Page 113 of 115.

A Question Of Investment: Is Prevention Worth The Price?, Scott B. Smith, Christine G. Springer 2010 University of Nevada, Las Vegas

A Question Of Investment: Is Prevention Worth The Price?, Scott B. Smith, Christine G. Springer

Public Policy and Leadership Faculty Publications

In today’s calculus of public and private budgeting, an ounce of prevention may no longer be worth a pound of “cure.”

“Prevention” takes many forms: Preparing one’s family for an emergency. Buying life and property insurance. Buying corporate insurance. Having a sufficiently-sized and well-trained security workforce at your workplace. Supporting law enforcement efforts to get one step ahead of the bad guy (whether a criminal or a terrorist). Supporting entities like UNLV’s Institute for Security Studies whose sole raison d’etre is to make Las Vegas and Nevada a safe and secure place to live, work and ...


Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel 2010 Embry Riddle Aeronautical University

Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel

Department of Applied Aviation Sciences - Daytona Beach

As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the ...


Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel A. Cutrer, Robert Raffel 2010 Embry-Riddle Aeronautical University

Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel A. Cutrer, Robert Raffel

Department of Security Studies and International Affairs - Daytona Beach

As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the ...


A Technique For Evaluating Complex System Of Systems Designs, Stephen Blanchette, Steven Crosson 2010 Software Engineering Institute

A Technique For Evaluating Complex System Of Systems Designs, Stephen Blanchette, Steven Crosson

Stephen Blanchette Jr.

No abstract provided.


Cia And The Cold War Era, Mary E. Byers 2010 Liberty University

Cia And The Cold War Era, Mary E. Byers

Senior Honors Theses

The purpose of this thesis is to explore the creation of the Central Intelligence Agency and its role in the Cold War. Great detail highlights the timeliness of the CIA’s creation and dynamic role over the years that followed its founding. For half a century, attempts to understand the Union of Soviet Socialist Republics dominated the CIA’s agenda. Thus, careful study of this era is important to understanding the progression of intelligence within the United States. The avenue of research for this thesis was a collaboration of published books, online journals, credible websites, and personal interviews. The development ...


The Final Fight: The 2008 Battle Of Sadr City, Geoffrey Ensby 2010 Bryant University

The Final Fight: The 2008 Battle Of Sadr City, Geoffrey Ensby

Honors Projects in History and Social Sciences

Iraq following the US invasion in March of 2003 was a dangerous place, and one in which the national government struggled to maintain control while unsanctioned and unauthorized strongmen and their militias controlled wide swaths of territory. This analysis will thus look at the 2008 Battle of Sadr City between the militia of radical Shi’ite cleric Moqtada al-Sadr and the military forces of Iraq and the US conducting the operation in concert. Utilizing a number of newspaper accounts and editorials, journal articles, recent books, and freelance journalists’ writings, several key aspects will be considered regarding how Iraq was changed ...


Eu Defence Integration And Nuclear Weapons: A Common Deterrent For Europe?, Ursula Jasper, Clara PORTELA 2010 University of St Gallen

Eu Defence Integration And Nuclear Weapons: A Common Deterrent For Europe?, Ursula Jasper, Clara Portela

Research Collection School of Social Sciences

Nuclear weapons remain the unquestioned core of the defence postures of both France and the United Kingdom. At the same time, the European Union is progressively enhancing its Common Foreign and Security Policy (CFSP), notably through the establishment of a European Security and Defence Policy (ESDP). Yet, despite evident progress in the CFSP, whose ultimate purpose is to lead to a ‘common defence policy’, EU member-states still deal with nuclear issues on a predominantly national basis. What is the alleged purpose of European nuclear forces? How is the raison d’être of the French and British nuclear deterrents conceptualized against ...


Global Logistics And Warfighter Focus, Loren M. Reno 2010 Cedarville University

Global Logistics And Warfighter Focus, Loren M. Reno

Business Administration Faculty Publications

No abstract provided.


Border Conflict And Tibet: The Asian Giants And Their History Of Power Struggle, Evan Towt 2010 SIT Study Abroad

Border Conflict And Tibet: The Asian Giants And Their History Of Power Struggle, Evan Towt

Independent Study Project (ISP) Collection

The South Asian world is dominated by India and China, their combined populations equaling almost a full half of humankind. In 1962, the two countries clashed over their border. The main reason for the war was the contest over large areas of territory claimed by both countries. The border still has not been adequately defined. This essay examines the border dispute from its roots in history, through the 20th century and into the present. It was the goal of this work to give an unbiased account of the dispute, though the weight of evidence in favor of the Indian claim ...


The Illogic Of The Biological Weapons Taboo., Phillip M. McCauley, Rodger A. Payne 2010 University of Louisville

The Illogic Of The Biological Weapons Taboo., Phillip M. Mccauley, Rodger A. Payne

Faculty Scholarship

No abstract provided.


Quality Attribute-Focused Architecture Trade Study Process For Risk Mitigation, Stephen Kowalski, T Hinners, Ethan Stein, Stephen Blanchette 2010 Software Engineering Institute

Quality Attribute-Focused Architecture Trade Study Process For Risk Mitigation, Stephen Kowalski, T Hinners, Ethan Stein, Stephen Blanchette

Stephen Blanchette Jr.

No abstract provided.


Advancing Architecture-Centric Practices In Us Army Acquisition, Stephen Blanchette, John Bergey 2010 Software Engineering Institute

Advancing Architecture-Centric Practices In Us Army Acquisition, Stephen Blanchette, John Bergey

Stephen Blanchette Jr.

No abstract provided.


Engineering Safety- And Security-Related Requirements For Software-Intensive Systems, Donald Firesmith, Terry Roberts, Stephen Blanchette 2010 Software Engineering Institute

Engineering Safety- And Security-Related Requirements For Software-Intensive Systems, Donald Firesmith, Terry Roberts, Stephen Blanchette

Stephen Blanchette Jr.

No abstract provided.


El Choque De Ignorancias- Samuel Huntington, Hasan Turk 2010 Universidad de Antioquia

El Choque De Ignorancias- Samuel Huntington, Hasan Turk

Hasan Turk Mg.

No abstract provided.


Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby 2010 U.S. Army

Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby

Journal of Strategic Security

President Bill Clinton's Secretary of Defense, William Cohen, once stated that the post-Cold War world of the 1990s was a "paradox [where] American military superiority actually increase[d] the threat of... attack against [the U.S.] by creating incentives for adversaries to challenge us asymmetrically." He was alluding to the fact that the Cold War's closure was supposed to bring about a situation that encouraged peace, nation-building, and unilateral comfort for the United States. The reality that America has come to know is quite different, and some might even argue that, given the option, many people would return ...


Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein 2010 Henley-Putnam University

Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein

Journal of Strategic Security

No abstract provided.


Cover & Front Matter, 2010 University of South Florida

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi 2010 University of Central Lancashire, UK

Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi

Journal of Strategic Security

Though Western analysts tend to mention al-Qaida and Taliban in Pakistan in the same context, the dynamics of their relationship are far more complex than a cursory examination would reveal. The context of this relationship is best understood within the overarching paradigm of militant activities of post 9/11 Taliban and al-Qaida remnants in Pakistan's tribal areas, where these groups flourish. The military struggle in Afghanistan has significantly influenced the formation of a loosely structured alQaida/Taliban "nexus" that was forged in Pakistan's Federally Administered Tribal Areas (FATA), particularly Waziristan. In order to survive the ongoing North Atlantic ...


Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley 2010 Virginia Military Institute

Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley

Journal of Strategic Security

The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11) is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border"). The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very ...


Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter 2010 Green Mountain College and United States Marine Corps

Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter

Journal of Strategic Security

Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this ...


Digital Commons powered by bepress