Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

5,603 Full-Text Articles 3,553 Authors 2,500,602 Downloads 150 Institutions

All Articles in Defense and Security Studies

Faceted Search

5,603 full-text articles. Page 183 of 186.

Geneva International Centre For Humanitarian Demining 2009 Annual Report, Geneva International Centre for Humanitarian Demining 2010 GICHD

Geneva International Centre For Humanitarian Demining 2009 Annual Report, Geneva International Centre For Humanitarian Demining

Global CWD Repository

Annual narrative report on the work of the GICHD in 2009.


Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein 2010 Henley-Putnam University

Book Reviews, Timothy Hsia, Sheldon Greaves, Donald J. Goldstein

Journal of Strategic Security

No abstract provided.


Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi 2010 University of Central Lancashire, UK

Geographic Trajectories Of Al-Qaida And Taliban Terrorist Groups In Pakistan, Syed Manzar Abbas Zaidi

Journal of Strategic Security

Though Western analysts tend to mention al-Qaida and Taliban in Pakistan in the same context, the dynamics of their relationship are far more complex than a cursory examination would reveal. The context of this relationship is best understood within the overarching paradigm of militant activities of post 9/11 Taliban and al-Qaida remnants in Pakistan's tribal areas, where these groups flourish. The military struggle in Afghanistan has significantly influenced the formation of a loosely structured alQaida/Taliban "nexus" that was forged in Pakistan's Federally Administered Tribal Areas (FATA), particularly Waziristan. In order to survive the ongoing North Atlantic Treaty Organization (NATO) military …


Global Risk Of Nuclear Terrorism, Emily Diez, Terrance Clark, Caroline Zaw-Mon 2010 Akribis Group and the Center for Terrorism and Intelligence Studies

Global Risk Of Nuclear Terrorism, Emily Diez, Terrance Clark, Caroline Zaw-Mon

Journal of Strategic Security

The emergence of nuclear terrorism, a threat that President Obama called "the gravest danger we face," has signaled a paradigm shift in international security. Since the collapse of the Soviet Union, sensitive nuclear technologies and materials have become increasingly available. Globalization and the inadequate enforcement of treaties and export controls have allowed the proliferation of nuclear weapons materials. Today, international terrorist organizations seek to employ weapons of mass destruction (WMD) as a means to influence national policies around the world. AlQaida spokesman Suleiman Abu Gheith declared that in order to balance the injustices that have been inflicted on the Muslim …


Intelligence And Its Role In Protecting Against Terrorism, Richard J. Hughbank, Don Githens 2010 HALO Corporation and U.S. Army

Intelligence And Its Role In Protecting Against Terrorism, Richard J. Hughbank, Don Githens

Journal of Strategic Security

The art and science of gathering critical operational intelligence has been defined in many ways and is beyond our needs for this writing. Throughout the course of history, many wars have been fought depending heavily on various forms of intelligence. During our most recent actions in the War on Terror, intelligence analysis has played a critical role in both offensive and defensive operations in Iraq and Afghanistan. With such varying fact-finding techniques available and utilized in the defense of our country, it has become an arduous task to collect, decipher, package, prioritize, disseminate, and act upon everything that comes down …


Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley 2010 Virginia Military Institute

Toward A New Trilateral Strategic Security Relationship: United States, Canada, And Mexico, Richard J. Kilroy, Jr., Abelardo Rodríguez Sumano, Todd S. Hataley

Journal of Strategic Security

The term "perimeter defense" has come back into vogue recently, with regard to security strategies for North America. The United States' concern primarily with the terrorist threat to its homeland subsequent to September 11, 2001 (9/11) is generating this discussion with its immediate neighbors of Mexico and Canada (and to some extent some Caribbean nations—the "third border"). The concept is simply that by pushing defenses out to the "perimeter" nations, then security will be enhanced, since the United States visions itself as more vulnerable to international terrorism than its neighbors. However, Canada and Mexico have not been very happy about …


Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby 2010 U.S. Army

Strategic Asymmetric Deception And Its Role In The Current Threat Environment, Seth A. Gulsby

Journal of Strategic Security

President Bill Clinton's Secretary of Defense, William Cohen, once stated that the post-Cold War world of the 1990s was a "paradox [where] American military superiority actually increase[d] the threat of... attack against [the U.S.] by creating incentives for adversaries to challenge us asymmetrically." He was alluding to the fact that the Cold War's closure was supposed to bring about a situation that encouraged peace, nation-building, and unilateral comfort for the United States. The reality that America has come to know is quite different, and some might even argue that, given the option, many people would return to a security situation …


Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter 2010 Green Mountain College and United States Marine Corps

Variance, Violence, And Democracy: A Basic Microeconomic Model Of Terrorism, John A. Sautter

Journal of Strategic Security

Much of the debate surrounding contemporary studies of terrorism focuses upon transnational terrorism. However, historical and contemporary evidence suggests that domestic terrorism is a more prevalent and pressing concern. A formal microeconomic model of terrorism is utilized here to understand acts of political violence in a domestic context within the domain of democratic governance.This article builds a very basic microeconomic model of terrorist decision making to hypothesize how a democratic government might influence the sorts of strategies that terrorists use. Mathematical models have been used to explain terrorist behavior in the past. However, the bulk of inquires in this area …


Cover & Front Matter, 2010 University of South Florida

Cover & Front Matter

Journal of Strategic Security

No abstract provided.


Ddasaccident593, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident593, Humanitarian Demining Accident And Incident Database

Global CWD Repository

According to the investigation report the de-miner was using the scraper direct on the top of the detected signal causing it to go off. It was then found that the exploded item was a MUV fuse. As a result of the explosion, [MUV fuze] sustained injuries on his eyes, right side ear, arm and head; the injuries indicate that the de-miner was not using his visor properly.


Ddasaccident678, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident678, Humanitarian Demining Accident And Incident Database

Global CWD Repository

The Deminer was trying to check signal using the heavy rake, the M14 mine was laid in a grassy solid ground full of grass root and stones, the deminer tried to drew the grass by the heavy rake, the roots of the grass push the pressure plate of the mine, that cause the mine to blast.


Ddasaccident666, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident666, Humanitarian Demining Accident And Incident Database

Global CWD Repository

The deminer was trying to clear the AP mine in a cluster, there was no signal due to the depth of the mines, she asked the team leader to help her in finding the signal, he tried and started to excavate until he found signal, he located and excavated over the signal until he reached 20 cm depth at that time he hit the M14 mine and caused the detonation


Ddasaccident653, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident653, Humanitarian Demining Accident And Incident Database

Global CWD Repository

The Deminer today was officiated as a team leader due to the absence of the team leader. He took one deminer tools and started to work himself in one of the remaining cluster in his section. While he was using the grass cutter to cut the grass in front of the base stick he hit the barely covered M14 mine by the grass cutter which caused the mine to initiate.


The Topper (February 2010), Veterans Upward Bound Project, Western Kentucky University 2010 Western Kentucky University

The Topper (February 2010), Veterans Upward Bound Project, Western Kentucky University

Veterans Upward Bound Publications

No abstract provided.


Telemedicine And Advanced Technology Research Center: Quarterly Report, October 18, 2009 To January 17, 2010, Bea Babbitt 2010 University of Nevada, Las Vegas

Telemedicine And Advanced Technology Research Center: Quarterly Report, October 18, 2009 To January 17, 2010, Bea Babbitt

Telemedicine & Advanced Technology Research Center

Development of a P.O.I. and a Blended Learning Ecology for use in Combat Lifesaver Skills Training for the Army.


Linking Mine Action And Development | Guidelines For Mine/Erw Operators, Geneva International Center for Humanitarian Demining 2010 GICHD

Linking Mine Action And Development | Guidelines For Mine/Erw Operators, Geneva International Center For Humanitarian Demining

Global CWD Repository

Mine action programmes often are not linked early and strongly enough with key development actors. Despite the availability of extensive research documenting the need for greater coordination between mine action and development organisations, concrete guidance for practitioners and policy-makers on how to link mine action with development has been lacking. In response, the Geneva International Centre for Humanitarian Development has published guidelines on how to ensure mine action promotes development in mine-affected countries. More specifically, the guidelines seek to:

  • Increase awareness that landmines and other remnants of conflict block development in many affected countries
  • Strengthen coordination between mine action and …


Campus Safety: Assessing And Managing Threats, Mario Scalora, Andre Simons, Shawn VanSlyke 2010 University of Nebraska - Lincoln

Campus Safety: Assessing And Managing Threats, Mario Scalora, Andre Simons, Shawn Vanslyke

Mario Scalora Publications

Since the shootings at Virginia Tech, academic institutions and police departments have dedicated substantial resources to alleviating concerns regarding campus safety. The incident in Blacksburg and the similar tragedy at Northern Illinois University have brought renewed attention to the prevention of violence at colleges and universities.

Campus professionals must assess the risk posed by known individuals, as well as by anonymous writers of threatening communications. The authors offer threat assessment and management strategies to address the increased demands faced by campus law enforcement, mental health, and administration officials who assess and manage threats, perhaps several simultaneously.


Ddasaccident599, Humanitarian Demining Accident and Incident Database 2010 AID

Ddasaccident599, Humanitarian Demining Accident And Incident Database

Global CWD Repository

After I recovered the main mine (AT M19) and AP mine M14 (12 o’clock direction) I started to recover AP mine M14 (3 o’clock direction) and after a while, I heard a signal, then I applied the standard procedures to investigate the signal and during my approach to the centre of the signal by the heavy rake, AP mine blew up and I did not fell down on the ground and I did not feel any type of pain, then I saw the TL coming to my site and I was just waiting for him to come, after TL reached …


Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski 2010 National Defense University

Ssrn As An Initial Revolution In Academic Knowledge Aggregation And Dissemination, David Bray, Sascha Vitzthum, Benn Konsynski

Sascha Vitzthum

Within this paper we consider our results of using the Social Science Research Network (SSRN) over a period of 18 months to distribute our working papers to the research community. Our experiences have been quite positive, with SSRN serving as a platform both to inform our colleagues about our research as well as inform us about related research (through email and telephoned conversations of colleagues who discovered our paper on SSRN). We then discuss potential future directions for SSRN to consider, and how SSRN might well represent an initial revolution in 21st century academic knowledge aggregation and dissemination. Our paper …


“Post-Amnesty Niger Delta And The Promise Of Development: Issues, Prospects And Problems, Omololu Toluwanimi Omololu 2010 Obafemi Awolowo University, Ile-Ife, Nigeria

“Post-Amnesty Niger Delta And The Promise Of Development: Issues, Prospects And Problems, Omololu Toluwanimi Omololu

Omololu Michael FAGBADEBO

The offer of amnesty to militants in the Niger Delta region of Nigeria was premised on the assumption that it would engender an enabling environment for meaningful development of the area. This paper seeks to project into the problems that may likely jeopardize this assumption. It identifies the windows of opportunity for a lasting peace in the region but expresses doubts about positive change in the character of the Nigerian State. As privatized state, political actors exploit the state to pursue personal and parochial interests rather than implementation of policies aimed at improving the development of the Niger Delta area.


Digital Commons powered by bepress