Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2,737 Full-Text Articles 1,973 Authors 777,753 Downloads 111 Institutions

All Articles in Defense and Security Studies

Faceted Search

2,737 full-text articles. Page 3 of 108.

Strength Through Diplomacy: A Fundamental Review Of The Relationship Between North Korea And The United States, Benjamin D. Blackstone 2018 Claremont McKenna College

Strength Through Diplomacy: A Fundamental Review Of The Relationship Between North Korea And The United States, Benjamin D. Blackstone

CMC Senior Theses

At the time that this thesis is printed, we are reminded of the tumultuous relationship between North Korea and the United States every day. If we follow the mainstream news regularly, it seems like we are on a steady path to war. Ultimately, this paper is centered around the question: what is the best foreign policy strategy for both countries to achieve respective goals, without descending into armed conflict? Specifically, I evaluated the failures of the last three U.S. Presidents and used their shortcomings to explain limitations in current foreign policy strategy. I also attempted to show North Korean ...


Border Enforcement And Civil Rights Along The Texas-Mexico Border, Esther Reyes 2018 University of Texas at Austin

Border Enforcement And Civil Rights Along The Texas-Mexico Border, Esther Reyes

Latino Public Policy

Over the past two decades, spending on enforcement along the southwestern border of the United States has expanded dramatically. The annual budget of the U.S. Border Patrol, increased from $400 million in fiscal year 1994 to $3.8 billion in fiscal year 2017. During this period, the number of Border Patrol agents stationed along the U.S.Mexico border grew by nearly 450 percent, from 3,747 to over 16,605 agents. Meanwhile, apprehensions of unauthorized migrants along the U.S.-Mexico border declined from 979,101 in 1994 to 303,916 in 2017.

These expansions and the accompanying ...


A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani 2018 University of Central Florida

A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani

Honors in the Major Theses

During its violent spread across the Middle East, the Islamic State of Iraq and Sham (ISIS) amassed both a local and international following in large part due to its usage of emergent media distribution. Beginning in 2014, ISIS’s Ministry of Media published an English-language magazine, Dabiq, disseminating its issues through online platforms. Dabiq and its successor Rumiyah both serve as propagandistic recruitment material for ISIS’s international community as well as broadcasting the message of the jihadist movement to ISIS’s enemies. This study analyzed ISIS’s publications using a qualitative content analysis in order to identify jihadist recruitment ...


Airships In U.N. Humanitarian And Peace Operations: Ready For Service?, Walter Dorn, Nic Baird, Robert Owen 2018 Royal Military College of Canada

Airships In U.N. Humanitarian And Peace Operations: Ready For Service?, Walter Dorn, Nic Baird, Robert Owen

Journal of Aviation/Aerospace Education & Research

This study examines whether the United Nations should take steps in the near future to exploit the operational characteristics of lighter-than-air (LTA) and hybrid aircraft in support of its peace and humanitarian operations. Continued progress in the development of LTA transport system makes this a timely issue. At the same time, this progress highlights persistent challenges to the conduct of reliable and safe LTA operations, particularly in the face of bad weather and threats from groups hostile to the UN mission. The report examines this issue in four sections: (1) the potential advantages of LTA operations; (2) their disadvantages; (3 ...


Simple Analytics Of The Impact Of Terror Generation On Attacker-Defender Interactions#3;, Timothy Mathews, Aniruddha Bagchi, Joao R. Faria 2017 Florida Atlantic University

Simple Analytics Of The Impact Of Terror Generation On Attacker-Defender Interactions#3;, Timothy Mathews, Aniruddha Bagchi, Joao R. Faria

Aniruddha Bagchi

A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) will potentially attack a single target in the homeland of a government/state (denoted G). This interaction is modeled as a one-shot sequential move game in which G #12;first chooses how heavily to defend the target, after which T chooses whether or not to stage an attack. T's bene#12;fit from a successful attack is allowed to be increasing in the amount of resources that G allocates to defense. In the context of terrorism, this has multiple reasonable interpretations, including situations in which: (i ...


A Model Of A Multilateral Proxy War With Spillovers, Aniruddha Bagchi, Joao R. Faria, Timothy Mathews 2017 Florida Atlantic University

A Model Of A Multilateral Proxy War With Spillovers, Aniruddha Bagchi, Joao R. Faria, Timothy Mathews

Aniruddha Bagchi

Motivated by the war in Syria and the ascension of ISIS, this paper models a proxy war with three sponsors and three combatants as a dynamic game. Sponsors are leaders that provide resources for combatants to fi#12;ght each other. Sponsors 1 and 2 have strong aversion to sponsor 3's proxy, but not against each other. Three pure strategy equilibria exist in the game. When the ex post value of winning is small, all players #12;fight in equilibrium. However, when the ex post value of winning is large, in equilibrium either sponsors 1 and 2 coordinate their ...


Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism, Aniruddha Bagchi, Tridib Bandyopadhyay 2017 Kennesaw State University

Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism, Aniruddha Bagchi, Tridib Bandyopadhyay

Aniruddha Bagchi

This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the economy. The government assists the infrastructural firm by providing intelligence inputs about an impending attack. We find that subject to some conditions, expenditure on intelligence adds value only when its amount exceeds a threshold level. Also, the nature of the equilibrium ...


International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson 2017 Roosevelt University

International Journal Of Information Privacy, Security And Integrity, James Stewart, Maurice Dawson

Maurice Dawson

Research on cyber security related to social engineering has expanded from its purely technological orientation into explaining the role of human behavior in detecting deception. In the broadest definition, social engineering, in the context of information security, is the manipulation of individuals to perform actions that cause harm or increase the probability of causing future harm. Human personality traits significantly contribute to the probability that an individual is susceptible to manipulation related to social engineering deception attacks and exploits (Maurya, 2013). The outcome of the attacks and objective is the alteration of normal and rational decision making as described in ...


A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson 2017 University of Missouri - St Louis

A Brief Review Of New Threats And Countermeasures In Digital Crime And Cyber Terrorism, Maurice Dawson

Maurice Dawson

Cyber security is becoming the cornerstone of national security policies in many countries around the world as it is an interest to many stakeholders, including utilities, regulators, energy markets, government entities, and even those that wish to exploit the cyber infrastructure. Cyber warfare is quickly becoming the method of warfare and the tool of military strategists. Additionally, it is has become a tool for governments to aid or exploit for their own personal benefits. For cyber terrorists there has been an overwhelmingly abundance of new tools and technologies available that have allowed criminal acts to occur virtually anywhere in the ...


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson 2017 Plymouth Hospitals NHS Trust

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological ...


Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté 2017 Somos Environmental Protection Ltd.

Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté

International Journal of Nuclear Security

The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of ...


The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf 2017 Faculty of Sciences University Ibn Tofail

The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf

International Journal of Nuclear Security

Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.

This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.


An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah van Rossum 2017 Missouri State University

An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah Van Rossum

MSU Graduate Theses

This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. It argues that although North Korea’s cyberspace resources and capabilities have increased and reached a level that represents an advanced persistent threat, its cyberspace operations have remained restrained and regional. It also argues that North Korea’s valuable assets include its ability to control cyberspace within North Korea and its ability to engage in cyberspace activities and operations from abroad. The thesis recommends that the United States government exploit these assets by ...


Czech Cultural Identity: Incompatible With Mass Muslim Immigration And Contributes To Rising European Populism, Alana Thi Vorda 2017 Missouri State University

Czech Cultural Identity: Incompatible With Mass Muslim Immigration And Contributes To Rising European Populism, Alana Thi Vorda

MSU Graduate Theses

This thesis examines the respective successes and failures of the Czech experience with integrating Roma and Vietnamese immigrants, and asserts that, given deeply established historical and cultural narratives, and contemporary domestic political considerations as shown in these two previous cases, the Czech Republic is unlikely to effectively assimilate any new surge in Muslim immigration. Developments in the Czech Republic are likely, therefore, to reflect the accelerating populist momentum that is currently sweeping Central and Eastern European states.


16th Meeting Of The States Parties To The Anti-Personnel Mine Ban Convention, AP Mine Ban Convention 2017 James Madison University

16th Meeting Of The States Parties To The Anti-Personnel Mine Ban Convention, Ap Mine Ban Convention

Global CWD Repository

The 16MSP is a formal meeting of the 162 States which are parties to the 1997 Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on Their Destruction. The 16MSP is being held in accordance with Article 11 of the Convention and pursuant to decisions of the 2016 Fifteenth Meeting of the States Parties (15MSP).

The 16MSP takes place on the year of the 20th anniversary of the adoption and signature of the Convention and will gather together States Parties and not party to the Convention, interested organisations and members of civil society to ...


Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel 2017 University of Dhaka

Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel

International Journal of Nuclear Security

In a nuclear power plant, its coolant system is major safety equipment. Coolant system failure causes several accidents in nuclear history. There are so many causes for coolant system failure. One of them is lack of electric power for coolant pumps. In typically NPP there is backup system for power redundancy. In this article, focus on reactor coolant system and its backup power when main grid lines failure. Here discuss about solar backup power for batteries and increases a safety lines for reactor coolant pumps. So, our main goal is providing a battery backup from reliable natural source and ensuring ...


The Illusion Of Parity: Determining Us Policy In The Post-Post Soviet Period, Kyle Sallee 2017 Portland State University

The Illusion Of Parity: Determining Us Policy In The Post-Post Soviet Period, Kyle Sallee

Kyle Sallee

For 70 years, Soviet schoolchildren were taught “Moya rodina — Sovetskiy Soyuz (TheSoviet Union is my motherland),” but the motherland would be brought to her knees in 1991 as the trans-national Soviet identity disappeared with the collapse of the Soviet Empire, taking with it the ruins of the ideological, social, and political institutions that had supported civilization in the USSR and the Eastern Bloc for generations. What remained in the wake, a nuclear apparatus which was second only to that of the United States, would be the cause of an ongoing discourse between the Russian Federation and the United States. This ...


State Sovereignty And Human Security: The Migration-Securitization Nexus In The Global South, Eugene R. Sensenig 2017 Notre Dame University - Lebanon

State Sovereignty And Human Security: The Migration-Securitization Nexus In The Global South, Eugene R. Sensenig

The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy

This paper deals with the issues of state sovereignty and refugee policy in insecure and marginalized regions of the Global South. Using the displaced Syrian populations (UN-recognized and undocumented) in Lebanon as a case in point, the attempt will be made to portray and discuss the responses of underdeveloped host communities to overwhelming increases in the size of their non-national population. Lebanon has faced various waves of refugees since its independence in 1943, making up between 2.5% (Iraqis) and 25% (Syrians) of the entire citizen population, currently estimated to be slightly over 4 million. Almost 500,000 Palestinian refugees ...


Maritime Law Enforcement In Nigeria: The Challenges Of Combatting Piracy And Armed Robbery At Sea, Omovigho Cynthia Brume-Eruagbere 2017 World Maritime University

Maritime Law Enforcement In Nigeria: The Challenges Of Combatting Piracy And Armed Robbery At Sea, Omovigho Cynthia Brume-Eruagbere

World Maritime University Dissertations

No abstract provided.


Maritime Violence In The Cemac Region: Causes, Challenges And Solution Perspectives, Judith Ewo Epse Ndze Akah 2017 World Maritime University

Maritime Violence In The Cemac Region: Causes, Challenges And Solution Perspectives, Judith Ewo Epse Ndze Akah

World Maritime University Dissertations

No abstract provided.


Digital Commons powered by bepress