Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

3,830 Full-Text Articles 2,126 Authors 777,753 Downloads 120 Institutions

All Articles in Defense and Security Studies

Faceted Search

3,830 full-text articles. Page 2 of 117.

Ddas: Suggested Training Uses, Database of Demining Accidents 2018 DDAS

Ddas: Suggested Training Uses, Database Of Demining Accidents

Global CWD Repository

The most common use of these records in training is to provide an example of what happens when things are done in the wrong way. This can be a powerful reinforcement of a lesson about doing things the right way. The database can also be a training aid for paramedics and for field and office managers.


Ddas Suggested Training Uses: Paramedic Training, Database of Demining Accidents 2018 DDAS

Ddas Suggested Training Uses: Paramedic Training, Database Of Demining Accidents

Global CWD Repository

The examples of medical treatment in the database are rarely well detailed. When they are, they provide examples of both "positive" and "negative" responses to accidents. some of the worst negative responses are not the responsibility of the medic - who were simply not provided with the equipment or ambulance that they need. Parts of the reports may be used in lectures or presentations or they can be distributed for critical discussion.


Ddas Or Rapid?, Database of Demining Accidents 2018 DDAS

Ddas Or Rapid?, Database Of Demining Accidents

Global CWD Repository

In 2015, Tajikistan became the first country to make all of its demining accident data available. Congratulations to the Tajikistan National Mine Action Centre (TNMAC), a government controlled body that has set an international standard for transparency.

Despite its popularity, and the frequent reference made to the database when updating international and national Mine Action standards, the DDAS has no formal support.

The nominal Humanitarian Mine Action industry leader is the United Nations Mine Action Service (UNMAS). UNMAS make no effort to collect and study accident records but, in 2011 when I left the IMAS Review Board, they began to ...


Ddas: Crunching Data From The Database Of Demining Accidents, Database of Demining Accidents 2018 DDAS

Ddas: Crunching Data From The Database Of Demining Accidents, Database Of Demining Accidents

Global CWD Repository

In the database of demining accidents, injuries are classed as either Severe or Minor. Injuries likely to be life threatening, to require surgery or to result in permanent disability are rated as Severe. All others are rated as Minor. This distinction is for convenience and is not intended to reflect on the discomfort and/or hardship associated with the injury. In some cases, injuries were not recorded in detail but I have resisted the temptation to infer detail. Note that, in very severe injuries, only the most severe injury is generally recorded.


Ddas: "Accidents" Or "Incidents", Database of Demining Accidents 2018 DDAS

Ddas: "Accidents" Or "Incidents", Database Of Demining Accidents

Global CWD Repository

When I started writing about demining accidents I tried to form a sensible distinction between the terms "accident" and "incident". I decided to call an unintended explosive event (or an intended explosive event that resulted in injury) an "incident". This was because an "Incident report" would be generated from which lessons that might prevent repetition of the event might be derived. I noted that the word "accident" was used for all unintended occurrences, from dropping the kettle to a car crash, but did not always apply to an intentional event that resulted in an injury. So, at that time, the ...


Ddas: Manual Demining Handtool Design Criteria, Database of Demining Accidents 2018 DDAS

Ddas: Manual Demining Handtool Design Criteria, Database Of Demining Accidents

Global CWD Repository

The research I have carried out on tool development has been based on accident studies, field trials and my experience in both demining and in manufacturing in small workshops. The research led to the evolution of the following criteria and constraints. I believe that these are essential requirements when designing hand-tools for use when excavating anti-personnel blast mines. Tools used during other demining activities may not have the same requirements.


Ddas: Investigating A Metal Detector Reading, Database of Demining Accidents 2018 DDAS

Ddas: Investigating A Metal Detector Reading, Database Of Demining Accidents

Global CWD Repository

What follows are basic procedures that you can edit and refine to suit your equipment and working preferences. They presume that deminers operate in a "One-man procedure ", with the same deminer performing all tasks during a working shift. When there is not enough equipment for each deminer to be issued with a detector and tools, two-man teams can be deployed. In a two-man team, a one-man procedure is still used. One person works while the other rests, and each individual performs all the tasks required for clearance during his/her shift.


North Korea And The Nucleus Of Denuclearization, Editor 2018 Embry-Riddle Aeronautical University

North Korea And The Nucleus Of Denuclearization, Editor

International Bulletin of Political Psychology

This article describes common operant conditioning principles contributing to the seeming intractability of ‘denuclearizing’ the Democratic People’s Republic of North Korea.


Praxites And Mal-Praxites In Psychological Research: Hoaxes, Editor 2018 Embry-Riddle Aeronautical University

Praxites And Mal-Praxites In Psychological Research: Hoaxes, Editor

International Bulletin of Political Psychology

This article describes intrinsic problems with the pursuit of psychological knowledge in a socio-political world.


More On The Fakeness Of Fake News, Editor 2018 Embry-Riddle Aeronautical University

More On The Fakeness Of Fake News, Editor

International Bulletin of Political Psychology

This article identifies occurrences within the process of news production and also examples of psychological research which mitigate against the construct of fake news.


Ddas: The Database Of Demining Accidents - A Driving Force In Hma, Database of Demining Accidents 2018 DDAS

Ddas: The Database Of Demining Accidents - A Driving Force In Hma, Database Of Demining Accidents

Global CWD Repository

I started the Database of Demining Accidents (DDAS) in 1998 using public data gathered for the United States Army Communications-Electronics Command, Night Vision & Electronic Sensors Directorate. When they declined to publish and update the database, I did so with their tacit approval but no funding support. I did this in the hope of improving safety for deminers. The database is an easy-to use system containing the original demining accident reports overlaid with easy-search summaries.


Organizational Psychology: The Entrance To, Residing In, And Exit From Sensitive Positions, Editor 2018 Embry-Riddle Aeronautical University

Organizational Psychology: The Entrance To, Residing In, And Exit From Sensitive Positions, Editor

International Bulletin of Political Psychology

This article identifies psychological problems and promise in identifying those in sensitive positions within organizations who may betray, are betraying, and have betrayed trust.


Israelis And Palestinians: Does Bringing Them Together Keep Them Apart?, Editor 2018 Embry-Riddle Aeronautical University

Israelis And Palestinians: Does Bringing Them Together Keep Them Apart?, Editor

International Bulletin of Political Psychology

This article identifies psychological complexities when interaction and cooperation among adversaries are presumed to reduce conflict.


Writing The Official History Of The Joint Intelligence Committee, Michael Goodman 2018 King's College London

Writing The Official History Of The Joint Intelligence Committee, Michael Goodman

Secrecy and Society

This article recounts the experience of a professional historian in being given the keys to the kingdom: access to the classified vaults of Britain’s Joint Intelligence Committee. This article includes some of the problems in having access, but complying with the sensitivities around official accounts, difficulties in writing a global history, or trying to make the work of a committee interesting and accessible, and of trying to determine the impact of intelligence on policy.



Historical Amnesia: British And U.S. Intelligence, Past And Present, Calder Walton 2018 Kennedy School of Government, Harvard University

Historical Amnesia: British And U.S. Intelligence, Past And Present, Calder Walton

Secrecy and Society

Many intelligence scandals in the news today seem unprecedented - from Russian meddling in the 2016 U.S. Presidential election, to British and U.S. intelligence agencies monitoring activities of their citizens. They seem new largely because, traditionally, intelligence agencies on both sides of the Atlantic were excessively secretive about their past activities: even the names “GCHQ” and “NSA” were airbrushed from declassified records, and thus missing from major historical works and scholarship on on post-war international relations. The resulting secrecy about British and U.S. intelligence has led to misunderstandings and conspiracy theories in societies about them. Newly opened secret ...


Collaboration And Research Practice In Intelligence, Minna Räsänen 2018 Södertörn University, Stockholm

Collaboration And Research Practice In Intelligence, Minna Räsänen

Secrecy and Society

Close, intensive research collaboration between universities, companies, and the public sector can open up new and different opportunities for qualitative research, and provide analytic and empirical insights that otherwise might be difficult to obtain. The aim of this paper is to explore collaboration as a means of doing research with the intelligence community. Experiences from a research project concerning dilemmas the practitioners face in their organization within the Swedish Armed Forces, serve as a starting point for this reflective discussion. It is argued here that collaboration is suitable when change is required. The mutual learning between the actors feeds into ...


Ethnographic Research In The U.S. Intelligence Community: Opportunities And Challenges, Bridget Nolan 2018 University of Texas at El Paso

Ethnographic Research In The U.S. Intelligence Community: Opportunities And Challenges, Bridget Nolan

Secrecy and Society

This article considers lessons learned from conducting research inside the intelligence community. Drawing on a year of ethnographic field work and interviews at the National Counterterrorism Center, I show that “boundary personnel”- people who navigate between the worlds of academia and national security - provide value added in the form of tacit knowledge that outside researchers would not be able to deliver. At the same time, these people face delays, challenges to freedom of information, and ethical considerations that are unique to their positions. Despite setbacks, social scientists must continue their engagement with national security organizations to further our understanding of ...


Secrecy Vs. Disclosure Of The Intelligence Community Budget: An Enduring Debate, Anne Daugherty Miles 2018 Intelligence and Security Academy

Secrecy Vs. Disclosure Of The Intelligence Community Budget: An Enduring Debate, Anne Daugherty Miles

Secrecy and Society

Little known U.S. congressional documents, dating from the 1970s, debate public disclosure of Intelligence Community (IC) budget. The documents offer a rich repository of the arguments on both sides of the debate and shine a light on the thoughtful, measured congressional oversight practiced in formative years of the House and Senate intelligence committees.


Do Voters Vote Against Their Interests?, Editor 2018 Embry-Riddle Aeronautical University

Do Voters Vote Against Their Interests?, Editor

International Bulletin of Political Psychology

This article describes some basic psychological constructs which may help ‘explain’ why some voters seem to vote against their own interests.


The Challenge Of Securing Kenya: Past Experience, Present Challenges And Future Prospects, Mumo Nzau, Mohammed Guyo 2018 University of Nairobi

The Challenge Of Securing Kenya: Past Experience, Present Challenges And Future Prospects, Mumo Nzau, Mohammed Guyo

The Journal of Social Encounters

The dynamic nature of insecurity and mitigation strategies cannot be adequately understood without comparing the present conjuncture and the past experiences. This paper provides a temporal assessment of security in Kenya by scanning convergent and divergent insecurity experiences and mitigation strategies of the regimes of Jomo Kenyatta, Daniel Arap Moi, Mwai Kibaki and Uhuru Kenyatta. The security dynamics have been shaped by drivers located at local, national and global levels. The convergence of local insecurity and protracted transitional terrorist attacks has produced a high trajectory of insecurity with a negative impact on the economy, social cohesion and stability. The contradiction ...


Digital Commons powered by bepress