Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

3,966 Full-Text Articles 2,183 Authors 777,753 Downloads 119 Institutions

All Articles in Defense and Security Studies

Faceted Search

3,966 full-text articles. Page 2 of 118.

Hilton Garden Inn Emergency Operations Analysis And Proposal, Mikaela McDaniel 2018 Concordia University - Portland

Hilton Garden Inn Emergency Operations Analysis And Proposal, Mikaela Mcdaniel

HSEM 494 Practicum/Capstone Project

This project is assigned as a senior practicum by Concordia University for seniors to demonstrate the knowledge and skills acquired throughout their college education in pursuit of a degree in Homeland Security. The ability to identify and assess threat and risk in a company’s emergency operations is a definite demonstration of a student’s acquired knowledge and skill. Such an assessment was done for the Hilton Garden Inn located in Corvallis, Oregon. Through assessment of their current emergency operations, concerns were found regarding their lack of employee training, updates to the emergency operations plan, and documents. This project outlines ...


Marion County, Oregon Integration Of School Emergency Preparedness, Mitch Sechler 2018 Concordia University - Portland

Marion County, Oregon Integration Of School Emergency Preparedness, Mitch Sechler

HSEM 494 Practicum/Capstone Project

Collaboration between schools and emergency managers is paramount in addressing the whole community approach to emergency management for increasing preparedness (FEMA, 2011). As every disaster is local, a unified and collaborative approach should be taken to ensure schools are not a hindrance but rather an asset for preparedness, response and recovery efforts. Schools must have ownership and accountability for ensuring they are prepared for emergencies. Additionally, local emergency management agencies with their capabilities, capacity and knowledge must take action in response to the opportunity to build partnerships and expanded their efforts to create a resilient community.


To Walk The Earth In Safety 2018, PM WRA 2018 U.S. Department of State

To Walk The Earth In Safety 2018, Pm Wra

Global CWD Repository

This 17th Edition of To Walk the Earth In Safety summarizes the United States’ CWD programs in 2017. CWD assistance provides the United States with a powerful and flexible tool to help partner countries manage their stockpiles of munitions, destroy excess small arms and light weapons (SA/LW) and clear explosive hazards such as landmines, improvised explosive devices (IEDs), and UXO. Our assistance also helps countries destroy or enhance security of their man-portable air defense systems (MANPADS) and their threat to civilian aviation, in addition to other weapons and munitions.

The United States is committed to reducing these threats worldwide ...


Risk-Based Performance Metrics For Critical Infrastructure Protection? A Framework For Research And Analysis, Eric F. Taquechel, Marina Saitgalina 2018 Old Dominion University

Risk-Based Performance Metrics For Critical Infrastructure Protection? A Framework For Research And Analysis, Eric F. Taquechel, Marina Saitgalina

School of Public Service Faculty Publications

Measuring things that do not occur, such as “deterred” or “prevented” terrorist attacks, can be difficult. Efforts to establish meaningful risk-based performance metrics and performance evaluation frameworks based on such metrics, for government agencies with counterterrorism missions, are arguably in a nascent state. However, by studying program theory, logic models, and performance evaluation theory, as well as studying how risk, deterrence, and resilience concepts may be leveraged to support antiterrorism efforts, one may propose a framework for a logic model or other performance evaluation approach. Such a framework may integrate these concepts to help proxy performance measurement for agencies with ...


Psychological Profiling Of Political Leaders: Searching For Three White Whales, Editor 2018 Embry-Riddle Aeronautical University

Psychological Profiling Of Political Leaders: Searching For Three White Whales, Editor

International Bulletin of Political Psychology

This article describes three types of information crucial to psychological profiling of political leaders.


The Psychology Of Time: When The Political Future Is In The Past Not The Present, Editor 2018 Embry-Riddle Aeronautical University

The Psychology Of Time: When The Political Future Is In The Past Not The Present, Editor

International Bulletin of Political Psychology

This article illustrates one of political psychology’s challenges-- to change the hold of the past on the present and future of various human collectives in support of security and intelligence objectives.


When Doing What’S Right Is Wrong: The Psychology Of Personnel Security, Editor 2018 Embry-Riddle Aeronautical University

When Doing What’S Right Is Wrong: The Psychology Of Personnel Security, Editor

International Bulletin of Political Psychology

This article describes the psychology behind failed attempts to improve security, regardless of whether the service and product of industry and organization is one of education, health, commodity, process, or security itself.


Building A National Maritime Security Policy, Adriana Avila-Zúñiga Nordfjeld 2018 World Maritime University

Building A National Maritime Security Policy, Adriana Avila-Zúñiga Nordfjeld

World Maritime University Ph.D. Dissertations

The issue of port security raised concerns at the highest levels after the terrorist attacks on September 11, 2001 against the United States. Security threats against ports and vessels acquired a new perspective and in 2002 the International Maritime Organization (IMO) adopted amendments to the International Convention for the Safety of Life at Sea (SOLAS), 1974, introducing Chapter XI-2 - Special measures to enhance maritime security. This set of regulations enshrines the International Ship and Port Facilities Security Code (ISPS Code), which entered into force on 1 July 2004.

This Code establishes a set of measures to enhance the security of ...


Enhancing Your Intelligence Agency Information Resource Iq: Pt. 4: National Geospatial Intelligence Agency (Ngia), National Intelligence University (Niu), And National Reconnaissance Office (Nro), Bert Chapman 2018 Purdue University

Enhancing Your Intelligence Agency Information Resource Iq: Pt. 4: National Geospatial Intelligence Agency (Ngia), National Intelligence University (Niu), And National Reconnaissance Office (Nro), Bert Chapman

Libraries Faculty and Staff Presentations

Webinar presentation on publicly accessible information resources produced by the U.S. National Geospatial Intelligence Agency (NGIA), National Intelligence University (NIU), and National Reconnaissance Office. Places significant emphasis on missions of these agencies, their historical accomplishments, coverage of their educational activity, and information on the technologies they have used and are currently using to fulfill their institutional objectives.


The Politics Of Intelligence, Editor 2018 Embry-Riddle Aeronautical University

The Politics Of Intelligence, Editor

International Bulletin of Political Psychology

This article describes the politics of the construct and applications of intelligence in the context of adaptation.


A Tale Of Two Administrations: A Comparison Between The George W. Bush And The Barack H. Obama Administrations On Border Security, Marcos L. Misis 2018 Northern Kentucky University

A Tale Of Two Administrations: A Comparison Between The George W. Bush And The Barack H. Obama Administrations On Border Security, Marcos L. Misis

The Journal of Economics and Politics

Border security remains a prominent political issue in 2018. During the 2016 presidential campaign, candidates from the Republican and Democratic parties referred to the effectiveness, or lack thereof, of policies about border security that were implemented by the Bush and Obama Administrations. This article analyzes the policies implemented by both administrations and compares them in order to assess the validity of claims about these policies made by presidential candidates from both parties during the 2016 campaign. In addition, this article quantitatively analyzes data from immigration and border enforcement policies for both the Bush and Obama administrations and offers possible policy ...


When Terror Is Not Terrorism: A Political Psychological Analysis, Editor 2018 Embry-Riddle Aeronautical University

When Terror Is Not Terrorism: A Political Psychological Analysis, Editor

International Bulletin of Political Psychology

This article differentiates violence and its threat through terrorism and through other psychological means and ends.


Mackinder And The Arctic's Emerging Geopolitics: Recommendations For The U.S. And Its Nato Allies, Bert Chapman 2018 Purdue University

Mackinder And The Arctic's Emerging Geopolitics: Recommendations For The U.S. And Its Nato Allies, Bert Chapman

Libraries Faculty and Staff Presentations

This presentation shows how Halford Mackinder (1861-1947) described Canada and the Arctic region in his geopolitical writings. It goes on to stress how the Arctic is becoming increasingly important in international geopolitical policymaking due to its significant oil and natural gas resources, how warming temperatures are increasing international access to its waters, and the how countries as diverse as Canada, China, Russia, and the U.S. see the Arctic region in their strategic policymaking. It concludes by stressing that the Arctic can no longer be viewed as a region immune from international conflict and presents recommendations for the U.S ...


Jamal Khashoggi: Assassination, Abattoir, And The Law Of Small Numbers, Editor 2018 Embry-Riddle Aeronautical University

Jamal Khashoggi: Assassination, Abattoir, And The Law Of Small Numbers, Editor

International Bulletin of Political Psychology

This article describes psychological research on why tragedies of individuals and small numbers of people elicit more global emotional arousal than tragedies of large numbers of people.


Ddas Suggested Training Uses: Supervisor/Field Management Training, Humanitarian Demining Accident and Incident Database 2018 AID

Ddas Suggested Training Uses: Supervisor/Field Management Training, Humanitarian Demining Accident And Incident Database

Global CWD Repository

Field supervisors or managers should also read the suggested training needs for deminers because they will often be in charge of the deminers' training and/or refresher training. When they have any training concerns, they must report this in writing to the Senior Management in order to avoid censure if accidents result from inadequate training.

Because the accident database is a collection of reports covering events when things did not go as planned, the examples drawn from it are usually "negative" - what not to do, rather than what to do. They can be useful to explain the need for rules ...


Ddas: Using The Database Of Demining Accidents, Humanitarian Demining Accident and Incident Database 2018 AID

Ddas: Using The Database Of Demining Accidents, Humanitarian Demining Accident And Incident Database

Global CWD Repository

The author has maintained a database of demining accidents for four years. It contains records of many of the explosive accidents that deminers suffer while going about their work. This article explains the uses and limitations of the database and the software developed to contain it.


Ddas: Investigating A Metal Detector Reading, Humanitarian Demining Accident and Incident Database 2018 AID

Ddas: Investigating A Metal Detector Reading, Humanitarian Demining Accident And Incident Database

Global CWD Repository

What follows are basic procedures that you can edit and refine to suit your equipment and working preferences. They presume that deminers operate in a "One-man procedure ", with the same deminer performing all tasks during a working shift. When there is not enough equipment for each deminer to be issued with a detector and tools, two-man teams can be deployed. In a two-man team, a one-man procedure is still used. One person works while the other rests, and each individual performs all the tasks required for clearance during his/her shift.


Ddas: Metal Detector Search, Humanitarian Demining Accident and Incident Database 2018 AID

Ddas: Metal Detector Search, Humanitarian Demining Accident And Incident Database

Global CWD Repository

What follows are basic procedures for use with all the current models of metal detector that I know. It is intended to provide a basis that you can edit and refine to suit your equipment and working preferences.


Ddas: Crunching Data From The Database Of Demining Accidents, Humanitarian Demining Accident and Incident Database 2018 AID

Ddas: Crunching Data From The Database Of Demining Accidents, Humanitarian Demining Accident And Incident Database

Global CWD Repository

In the database of demining accidents, injuries are classed as either Severe or Minor. Injuries likely to be life threatening, to require surgery or to result in permanent disability are rated as Severe. All others are rated as Minor. This distinction is for convenience and is not intended to reflect on the discomfort and/or hardship associated with the injury. In some cases, injuries were not recorded in detail but I have resisted the temptation to infer detail. Note that, in very severe injuries, only the most severe injury is generally recorded.


Ddas: Suggested Training Uses, Humanitarian Demining Accident and Incident Database 2018 AID

Ddas: Suggested Training Uses, Humanitarian Demining Accident And Incident Database

Global CWD Repository

The most common use of these records in training is to provide an example of what happens when things are done in the wrong way. This can be a powerful reinforcement of a lesson about doing things the right way. The database can also be a training aid for paramedics and for field and office managers.


Digital Commons powered by bepress