Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2972 Full-Text Articles 2075 Authors 777753 Downloads 107 Institutions

All Articles in Defense and Security Studies

Faceted Search

2972 full-text articles. Page 115 of 120.

Operation Opera: An Ambiguous Success, Joshua Kirschenbaum 2010 University of South Florida

Operation Opera: An Ambiguous Success, Joshua Kirschenbaum

Journal of Strategic Security

To assess the efficacy of Israel's strike on Osirak, one must determine Israel's strategic objectives and their material effects on Iraqi capabilities. The capacity of the facilities to produce fissionable material without detection remains in dispute. So, too, does the timeline—and therefore the imminence—of Iraqi acquisition of a nuclear option. The political cost-benefit equation in this case requires a fair dose of subjective judgment. How much did the Israelis delay the program? How much did Iraqi motivation increase post facto? Is military counter-proliferation a viable strategy? Was the potential Iraqi bomb worth risking a bold, unprovoked ...


Beyond Technology Readiness Levels For Software: U.S. Army Workshop Report, Stephen Blanchette Jr., Cecilia Albert, Suzanne Garcia-Miller 2010 Software Engineering Institute

Beyond Technology Readiness Levels For Software: U.S. Army Workshop Report, Stephen Blanchette Jr., Cecilia Albert, Suzanne Garcia-Miller

Stephen Blanchette Jr.

No abstract provided.


Inlichtingenondersteuning In Het Kader Van Bevordering En Handhaving Van De Internationale Rechtsorde, George Dimitriu 2010 Netherlands Defence Academy

Inlichtingenondersteuning In Het Kader Van Bevordering En Handhaving Van De Internationale Rechtsorde, George Dimitriu

George Dimitriu

De auteurs beschrijven de ontwikkeling van de rol van inlichtingen bij militaire operaties in de periode 1992 - 2010.


U.S. Army Workshop On Exploring Enterprise, System Of Systems, System, And Software Architectures, John K. Bergey, Stephen Blanchette Jr., Paul C. Clements, Michael J. Gagliardi, John Klein, Rob Wojcik, William Wood 2010 Carnegie Mellon University

U.S. Army Workshop On Exploring Enterprise, System Of Systems, System, And Software Architectures, John K. Bergey, Stephen Blanchette Jr., Paul C. Clements, Michael J. Gagliardi, John Klein, Rob Wojcik, William Wood

Stephen Blanchette Jr.

This report summarizes a U.S. Army workshop on architecture that was held at the Carnegie Mellon Software Engineering Institute (SEI) in September of 2008, under the auspices of the Army Strategic Software Improvement Program (ASSIP). The workshop organizers invited accomplished practitioners from government, academia, and industry to discuss the various "genres" of architecture: Enterprise Architecture, system of systems architecture, system architecture, and software architecture. The goal of the workshop was to clarify the relationships among the different genres, explore and identify areas of commonality and difference, and to discuss the role of the Department of Defense Architecture Framework (DoDAF ...


Progress Toward An Organic Software Architecture Capability In The U.S. Army, Stephen Blanchette Jr., John K. Bergey 2010 Carnegie Mellon University

Progress Toward An Organic Software Architecture Capability In The U.S. Army, Stephen Blanchette Jr., John K. Bergey

Stephen Blanchette Jr.

The goal of the United States Army Strategic Software Improvement Program is to dramatically improve the acquisition of software-intensive systems. One of the initiatives undertaken by the program is to begin building a level of technical expertise in modern software architecture practices within the Army acquisition community. This report describes the Software Architecture Initiative of the Army Strategic Software Improvement Program. Results to date are encouraging and serve as a guide for other acquisition organizations seeking to strengthen their technical competencies.


Impact Of Army Architecture Evaluations, Robert Nord, John K. Bergey, Stephen Blanchette Jr., Mark H. Klein 2010 Carnegie Mellon University

Impact Of Army Architecture Evaluations, Robert Nord, John K. Bergey, Stephen Blanchette Jr., Mark H. Klein

Stephen Blanchette Jr.

The Army Strategic Software Improvement Program (ASSIP) is a multiyear effort targeted at improving the way in which the Army acquires software-intensive systems. The ASSIP has funded a number of programs, in conjunction with the Carnegie Mellon Software Engineering Institute (SEI), to conduct software architecture evaluations using the Architecture Tradeoff Analysis Method (ATAM). Additionally, in cases when a system's architecture did not exist or was not ready to evaluate, the ASSIP sponsored Quality Attribute Workshops (QAWs). During the period of this effort, several other programs funded their own ATAM evaluations and QAWs. The goal of this study was to ...


Evaluating The Software Design Of A Complex System Of Systems, Stephen Blanchette Jr., Steven Crossen, Barry Boehm 2010 Carnegie Mellon University

Evaluating The Software Design Of A Complex System Of Systems, Stephen Blanchette Jr., Steven Crossen, Barry Boehm

Stephen Blanchette Jr.

Schedule- or event-driven reviews are a crucial element of any major software development project. Such reviews tend to focus on different aspects of development, and different types of reviews provide different benefits. The sum of these reviews, however, is inadequate to address the needs of software development in a complex system of systems (SoS) environment. What is needed is a true, evidence-driven, SoS-level evaluation capable of providing an overall assessment of, and insight into, the software development effort in that context. This report discusses the application of the Lifecycle Architecture (LCA) event to what was an enormously complex SoS program ...


The Chief Software Architect In U.S. Army Acquisition, Stephen Blanchette, John Bergey 2010 Software Engineering Institute

The Chief Software Architect In U.S. Army Acquisition, Stephen Blanchette, John Bergey

Stephen Blanchette Jr.

No abstract provided.


Preventing Conflict And Building Peace – What Is The Role Of Decentralization?, Robert Nickson 2010 University of Birmingham

Preventing Conflict And Building Peace – What Is The Role Of Decentralization?, Robert Nickson

Robert Andrew Nickson

Conflict prevention and peace-building are now high on today's global development agenda. The issue of "state-building" has been paramount here - a recognition that weak state institutions have often been an underlying cause of the emergence of conflict and that only by strengthening state institutions will a lasting peace be assured. Yet the focus of donor concern for '"state-building" has usually been on national state institutions such as central government ministries, the judiciary, the legislature and security services. The experience of many countries that have recently experienced or prevented major domestic conflict supports these theoretical arguments in favor of a ...


From Normaltaktik To Auftragstaktik: Lessons For Safety In The Military, Gwendolyn Bakx, James Nyce, Sidney Dekker 2010 Ball State University

From Normaltaktik To Auftragstaktik: Lessons For Safety In The Military, Gwendolyn Bakx, James Nyce, Sidney Dekker

Gwendolyn C.H. Bakx

In their initiatives to achieve organizational safety goals, managers, but also members of safety institutes – such as regulators – often seem to follow what in the military might be called “normaltaktik” or “order-type tactics”. Also military attitudes towards safety seem to resemble and reinforce normaltaktik. This is somewhat ironic since the military has been forced more and more in the past decennium towards non-conventional warfare – and thus away from the application of normaltaktik. If we would approach safety not from a normaltaktiker but from an auftragstaktiker perspective, not only could this reduce accidents, it could give us a strategic advantage.

www ...


"Telemedicine And Advanced Technology Research Center: Quarterly Report, July 18, 2010 To October 17, 2010, Bea Babbitt 2010 University of Nevada, Las Vegas

"Telemedicine And Advanced Technology Research Center: Quarterly Report, July 18, 2010 To October 17, 2010, Bea Babbitt

Telemedicine & Advanced Technology Research Center

Development of a P.O.I. and a Blended Learning Ecology for use in
Combat Lifesaver Skills Training for the Army.


Combat Lifesaver Course, Telemedicine and Advanced Technology Research Center 2010 University of Nevada, Las Vegas

Combat Lifesaver Course, Telemedicine And Advanced Technology Research Center

Telemedicine & Advanced Technology Research Center

No abstract provided.


Understanding The Appeal Of The Taliban In Pakistan, Syed Manzar Abbas Zaidi 2010 National Counter Terrorism Authority of Pakistan

Understanding The Appeal Of The Taliban In Pakistan, Syed Manzar Abbas Zaidi

Journal of Strategic Security

This article briefly explores the economics of the "Talibanization" of Pakistan within descriptive and contextual paradigms, while attempting to find a best solution to counter rising militancy in the context of realities facing the population on the ground. One such solution is the National Pakistani Counter Terrorism and Extremism Strategy (NACTES), designed to curb Taliban financing in Pakistan. The strategy is being drafted by National Counter Terrorism Authority (NACTA), the nascent homeland security coordination body set up by the state as the primary public organ entrusted with counterterrorism, counter-extremism, and de-radicalization efforts of the state.


Conceptualizing Terrorist Violence And Suicide Bombing, Murad Ismayilov 2010 Azerbaijan Diplomatic Academy

Conceptualizing Terrorist Violence And Suicide Bombing, Murad Ismayilov

Journal of Strategic Security

This article presents an analysis of different approaches to terrorist violence, with a particular focus on suicide terrorism, using the above mentioned levels of analysis as a conceptual framework to organize this study. In doing so, the article focuses primarily on four selected studies: Khashan's theory of collective Palestinian frustration operating at individual and structural levels; Pape's strategic theory of suicide terrorism, Devji's notion of global jihad, and Hammes' conceptualization of suicide terrorism as one of the strategies of Fourth Generation Warfare, all studied at a strategic level. Drawing on these analyses, as well as on Tilly ...


Eriksonian Identity Theory In Counterterrorism, Cally O'Brien 2010 University of South Florida

Eriksonian Identity Theory In Counterterrorism, Cally O'Brien

Journal of Strategic Security

Certain terrorists come from unexpected backgrounds. They give up comfortable lives and opportunities in order to wage jihad. Their existence has puzzled various theorists since they came to light. This article will explain how a theory of psychosocial identity formation created by Erik Erikson and his student James Marcia may explain this phenomenon. It will also explain how Erikson's theoretical legacy has contributed to current attempts at increasing moderation in the Middle East through education. Many of those attempts reflect ideas that are drawn from Eriksonian theory, although they are not typically described in Eriksonian terms. Meanwhile, while some ...


Social Cohesion And Islamic Radicalization: Implications From The Uighur Insurgency, Tong Zhao 2010 Georgia Tech

Social Cohesion And Islamic Radicalization: Implications From The Uighur Insurgency, Tong Zhao

Journal of Strategic Security

This article starts with a critical review of the current literature on the Islamic radicalization and Uighur insurgency in Xinjiang, pointing out that existing literature focuses too narrowly on certain aspects of the Uighur insurgency, and is insufficient to explain the causal mechanism of the insurgency and Islamic radicalization. Built upon historical evidence, this article uses sociological analysis to explore the structural changes in the Uighur community over the past decades, and demonstrates the importance and effectiveness of social cohesion theory in identifying the key causal variables which underlie and determine the course of Uighur insurgency and Islamic radicalization. The ...


Political Terrorism: An Historical Case Study Of The Italian Red Brigades, Major Victor H. Sundquist 2010 U.S. Army

Political Terrorism: An Historical Case Study Of The Italian Red Brigades, Major Victor H. Sundquist

Journal of Strategic Security

As the world's governments become increasingly engulfed in economic and political strife, international leaders should step back and understand what historical realities enabled political extremism to surface in particular regions of the world. More important, these leaders need to recognize what past governments did to counter these movements. Global communities are currently witnessing a dynamic trend of populous uprisings that in some cases, like Greece and the United States, have the potential to severely disrupt the activities of local governments. Consequently, it behooves leaders to reflect upon historical precedence in order to avoid repeating the same mistakes of our ...


Book Reviews, Edward M. Roche, John Coale, Keely M. Fahoum, Leland Erickson, Mark J. Roberts, Millard E. Moon, Ed.D., Colonel (ret.) 2010 Henley-Putnam University

Book Reviews, Edward M. Roche, John Coale, Keely M. Fahoum, Leland Erickson, Mark J. Roberts, Millard E. Moon, Ed.D., Colonel (Ret.)

Journal of Strategic Security

No abstract provided.


Cover & Front Matter, 2010 University of South Florida

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


The People Part Of Enabling Logistics, Loren M. Reno 2010 Cedarville University

The People Part Of Enabling Logistics, Loren M. Reno

Business Administration Faculty Publications

No abstract provided.


Digital Commons powered by bepress