The Word On Terrorism Threat As Terrorism Threat,
2010
Embry-Riddle Aeronautical University
The Word On Terrorism Threat As Terrorism Threat, Ibpp Editor
International Bulletin of Political Psychology
The author discusses terrorism (and terms associated with it), considering the social rhetoric surrounding the terms as well as other potential meanings. The constraints of the words used to define these terms of terror are considered.
Ddasaccident747,
2010
AID
Ddasaccident747, Humanitarian Demining Accident And Incident Database
Global CWD Repository
Deminers reported that the Victim was in a particularly happy mood that day. The Victim went to the grenade without telling anyone and began to dismantle it. His actions can be reliably inferred because the black cap of the grenade was undamaged at the site (and featured in the first site photographs after the accident). So it seems that the Victim got some way into the grenade before it went off in his hands. Severe hand (amputated fingers), arm, and upper body injury resulted - with bubbling blood and air from open chest wounds. From this it is inferred that …
Under The Volcano: Emergency Management And The Eyjafjallajokull Eruptions,
2010
Embry-Riddle Aeronautical University
Under The Volcano: Emergency Management And The Eyjafjallajokull Eruptions, Ibpp Editor
International Bulletin of Political Psychology
Iceland’s Eyjafjallajokull eruptions that began on April 14th, 2010 have exemplified challenges for transportation in a world of globalization, and ever-present need for preparation for emergencies.
Ddasaccident594,
2010
AID
Ddasaccident594, Humanitarian Demining Accident And Incident Database
Global CWD Repository
On 04 May 2010 at 08:45 am while [the Victim] the de-miner was excavating a detected signal in his clearance lane, his bayonet hit top of an anti-personnel PMN mine and caused it to go off. According to the investigation report, it seems that the de-miner started excavation directly from the pinpointed spot with his bayonet and caused the explosion and accident. Unfortunately improper use of PPE caused catastrophic injuries to the face and eyes of the victim deminer. He has lost his right eye, traumatic amputation of right-hand fingers and sustained some superficial injures on different parts of his …
Peace Agreements And International Peace Operations: The Case Of Sierra Leone,
2010
Seton Hall University
Peace Agreements And International Peace Operations: The Case Of Sierra Leone, Haruyuki Irie
Seton Hall University Dissertations and Theses (ETDs)
.
Telemedicine And Advanced Technology Research Center: Quarterly Report, January 18, 2010 To April 17, 2010,
2010
University of Nevada, Las Vegas
Telemedicine And Advanced Technology Research Center: Quarterly Report, January 18, 2010 To April 17, 2010, Bea Babbitt
Telemedicine & Advanced Technology Research Center
Development of a P.O.I. and a Blended Learning Ecology for use in Combat Lifesaver Skills Training for the Army.
Ballistic Missile Defense: New Plans, Old Challenges,
2010
Project on National Security Reform Case Studies Working Group
Ballistic Missile Defense: New Plans, Old Challenges, Elizabeth Zolotukhina
Journal of Strategic Security
On September 17, 2009—the 70th anniversary of the Soviet invasion of Poland in 1939 that marked the beginning of World War II—the Obama Administration announced its intention to shelve plans for the U.S. Ballistic Missile Defense (BMD) that had been developed under former President George W. Bush. Pointing to a new intelligence assessment, President Obama argued that his predecessor's plan to deploy an X-band radar station outside of Prague, Czech Republic, and 10 two-stage interceptor missiles in Poland would not adequately protect America and its European allies from the Iranian threat and reiterated his opposition to utilizing unproven technology in …
Book Reviews,
2010
USAF Air Command and
Staff College
Book Reviews, Edward J. Hagerty, Daniel Masters, Mark J. Roberts, Leland Ericson
Journal of Strategic Security
No abstract provided.
A Question Of Investment: Is Prevention Worth The Price?,
2010
University of Nevada, Las Vegas
A Question Of Investment: Is Prevention Worth The Price?, Scott B. Smith, Christine G. Springer
Public Policy and Leadership Faculty Publications
In today’s calculus of public and private budgeting, an ounce of prevention may no longer be worth a pound of “cure.”
“Prevention” takes many forms: Preparing one’s family for an emergency. Buying life and property insurance. Buying corporate insurance. Having a sufficiently-sized and well-trained security workforce at your workplace. Supporting law enforcement efforts to get one step ahead of the bad guy (whether a criminal or a terrorist). Supporting entities like UNLV’s Institute for Security Studies whose sole raison d’etre is to make Las Vegas and Nevada a safe and secure place to live, work and visit.
Sida Ddg Evaluation,
2010
Geneva International Centre for Humanitarian Demining
Sida Ddg Evaluation, Kennet Korayi, Tim Lardner, Anna Wood
Global CWD Repository
On 1 March 2008 Danish Demining Group (DDG) entered into a two-year agreement with the Swedish International Development Agency (Sida) to implement the project "Survey, Explosive Ordinance Disposal (EOD) and Mine Risk Education in Southern Sudan". The project aims to support the repatriation process for refugees and IDPs in South Sudan by providing a safe environment for the returnees and communities, and facilitating the work of humanitarian organisations. As the project is scheduled to end in 2010, Sida and DDG decided to commission an evaluation to inform the decision concerning a possible extension. The evaluation was conducted by a team …
Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security,
2010
Embry Riddle Aeronautical University
Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel Cutrer, Robert Raffel
Applied Aviation Sciences - Daytona Beach
As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the …
Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security,
2010
Embry-Riddle Aeronautical University
Development Of An Outcomes-Based Undergraduate Curriculum In Homeland Security, James D. Ramsay, Daniel A. Cutrer, Robert Raffel
Security Studies & International Affairs - Daytona Beach
As a professional discipline, homeland security is complex, dynamic, and interdisciplinary and not given to facile definition. As an academic discipline, homeland security is relatively new and growing, and its workforce aging. As such, there is an acknowledged need to develop academic homeland security programs to try and meet anticipated workforce needs. However, the lack of an accreditation system or a set of available published outcomes (or standards) have complicated efforts towards homeland security program development. At present, determining which courses to teach and which outcomes in each course to pursue must be left to anecdotal conversations, reviews of the …
The Multiple Faces Of Effective Grand Strategy,
2010
United States Military Academy
The Multiple Faces Of Effective Grand Strategy, Bryan N. Groves
Journal of Strategic Security
Effective national leaders throughout history have deliberately developed grand strategies and successfully implemented them to attain their political goals, while also integrating and accomplishing economic, social, defense, and sometimes religious objectives. Not all leaders have been successful, however, as this process is immensely complex and can be adversely affected by the actions of other leaders around their region and the world. It bears examination, then, to determine what factors contribute to successful grand strategies and why many leaders fail to reach their stated ends. This article utilizes a historic case study approach and explores three key areas of grand strategy: …
Indian Involvement In Afghanistan In The Context Of The South Asian Security System,
2010
German Institute of Global and Area Studies
Indian Involvement In Afghanistan In The Context Of The South Asian Security System, Melanie Hanif
Journal of Strategic Security
This article focuses on the regional requirements for a pacification of Afghanistan. For this purpose, Afghanistan is analytically "reframed" as part of South Asia. The hypothesis is that India is the only regional actor that might possess both the incentives and the capabilities to deal with the negative security externalities emanating from Afghanistan.In South Asia, material characteristics such as the delineation of the region and its power polarity are unclear. India's role within the region is even more controversial. By examining India's role within its security environment, this paper will suggest how this lack of clarity could be remedied. In …
U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign,
2010
University of South Florida
U.S. Response To Terrorism: A Strategic Analysis Of The Afghanistan Campaign, Valentina Taddeo
Journal of Strategic Security
This article examines the U.S. response to global terrorism and its campaign in Afghanistan from 2001 to today. The aim of this article is first to understand the fallacies, missteps, and misunderstandings of the U.S. approach in Afghanistan. Second, the analysis evaluates the lessons learnt and some possible strategies for achieving long-term stability and security in Afghanistan. In particular, the analysis focuses on the different strategies adopted by the United States and their achievements. Despite a first victory over the Taliban regime, the initial approach was focused on the enemy only and it lacked long-term planning, paving the way to …
North Korea And Support To Terrorism: An Evolving History,
2010
U.S.
Marine Corps Command and Staff College
North Korea And Support To Terrorism: An Evolving History, Bruce E. Bechtol, Jr.
Journal of Strategic Security
The DPRK's (Democratic People's Republic of Korea or North Korea) support for terrorism began as an ideologically-based policy financed by the Soviet Union that eventually led to a policy designed to put money into the coffers of the elite in Pyongyang—in short, a "proliferation for hire" policy. This article articulates a brief history of the North Korean regime, the rise to power of Kim Il-sung and his son, Kim Jong-il, and North Korea's persistent support to terrorist groups around the globe.
Small To Mid-Size Sporting Events: Are We Prepared To Recover From An Attack?,
2010
University of South Florida
Small To Mid-Size Sporting Events: Are We Prepared To Recover From An Attack?, Brian M. Harrell, Konrad Crockford, Pierre Boisrond, Sarah Tharp-Hernandez, Suzanne Parker
Journal of Strategic Security
This article describes a fictional deadly attack by a lone-wolf terrorist during a high school football event in a small town, here in the United States. The authors begin by describing an attack and then focus on the response from the medical community, city, county, state, and federal government officials. Next, the authors make several recommendations on what actions are needed to develop an effective plan to combat terrorist activities during a small- to mid-size sports event. Among the actions needed, the authors focus on the following: response planning, emergency action plan, incident command, policies and procedures, and security staff …
The Weakest Link: The Risks Associated With Social Networking Websites,
2010
New York Police Department
The Weakest Link: The Risks Associated With Social Networking Websites, Yosef Lehrman
Journal of Strategic Security
The relatively rapid rise in popularity of social networking services is now well known. MySpace, Twitter, and Facebook have become well known sites and terms. According to the Web traffic tracking site Alexa.com, as of December 2009, Facebook had 350 million registered users, MySpace just under 475 million, and Twitter 44.5 million. Many people think very little of posting prodigious amounts of personal information on social networking sites, not realizing that this information puts them at risk. Specifically, those in the law enforcement and military communities may not realize that information posted on these sites can compromise operational security and …
The Politics Of Immigration: A Representation Of The Unconscious Mind,
2010
Embry-Riddle Aeronautical University
The Politics Of Immigration: A Representation Of The Unconscious Mind, Ibpp Editor
International Bulletin of Political Psychology
This article discusses the concept of an illegal immigrant from different psychological perspectives.
Terrorism And The Law: Show Trials And Why The Show Must Go On,
2010
Embry-Riddle Aeronautical University
Terrorism And The Law: Show Trials And Why The Show Must Go On, Ibpp Editor
International Bulletin of Political Psychology
The author discusses the nature and meaning of terrorism trials during the United States’ war on terror.