Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2,815 Full-Text Articles 2,013 Authors 777,753 Downloads 117 Institutions

All Articles in Defense and Security Studies

Faceted Search

2,815 full-text articles. Page 4 of 110.

Maritime Governance: How State Capacity Impacts Piracy And Sea Lane Security, Yuito Ishikawa 2018 College of William and Mary

Maritime Governance: How State Capacity Impacts Piracy And Sea Lane Security, Yuito Ishikawa

Undergraduate Honors Theses

Maritime piracy varies from place to place and from age to age. This thesis aims to explain the variation of piracy across time and space by exploring the capability of establishing maritime governance against piracy. The spatial variation in the number of piratical attacks is explained by calculating the state capacity for governing the surrounding seas called Sea Power Index. The thesis argues that pirates particularly target waters near a state with “medium” levels of sea power because such states are not capable of enforcing strict regulations on piracy but can provide enough infrastructure and economy for pirates to have ...


The Geopolitics Of Canadian Defense White Papers: Lofty Rhetoric And Limited Results, Bert Chapman 2018 Purdue University

The Geopolitics Of Canadian Defense White Papers: Lofty Rhetoric And Limited Results, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

As the United States northern neighbor, Canada serves as a NATO ally and a strategic partner with Washington through the North American Aerospace Defense Command (NORAD). Canadian forces have fought honorably and bravely in concert with American forces in many wars. Canada's government, however, has been less consistent in promoting a credible vision of Canadian national security policy and geopolitical interests in its defense white papers. These documents have often contained idealistic rhetoric about adhering to a rules-based international order and defending freedom. In reality, Canadian governments of varying political parties have consistently failed to provide the sustained funding ...


Up In Flames: Criminal Expertise And Far-Left Extremism, Michael K. Logan 2018 University of Nebraska at Omaha

Up In Flames: Criminal Expertise And Far-Left Extremism, Michael K. Logan

Student Research and Creative Activity Fair

This paper examines the decision-making processes of far-left extremists involved in arson and incendiary violence. The paper pays specific attention to the manner in which offenders draw upon prior knowledge and ‘expertise’ in planning and/or execution the attack. Drawing upon a sample of 195 self-reported communiques, the results suggest offenders rely on two types of criminal expertise to inform their decision to become involved in a violent act. First, perceptual expertise describes differential thinking patterns related to the crime setting. Second, procedural expertise involves the knowledge and skills aimed at enacting the offense itself. Overall, findings from this study ...


The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska 2018 NEREC Research Fellow

The "Double Standard" Of Nonproliferation: Regime Type And The U.S. Response To Nuclear Weapons Program, Alina Shymanska

International Journal of Nuclear Security

There is no doubt that the NPT regime is far from being equal for all states involved. As the predominant hegemonic power since WWII, the United States plays a major role in deciding the fates of non-great power proliferators. This article tries to find the logical explanation of the phenomenon whereby some nuclear proliferators are absolved regardless of their active accumulation of nuclear arsenals while others are labeled as “rogue states” and ordered to disarm. The article suggests that a particular proliferator’s political regime could affect the way in which its state is approached by the U.S., known ...


Zimbabwe National Mine Action Strategy 2018-2025, Mine Action Centre Zimbabwe, Geneva International Center for Humanitarian Demining 2018 ZIMAC

Zimbabwe National Mine Action Strategy 2018-2025, Mine Action Centre Zimbabwe, Geneva International Center For Humanitarian Demining

Global CWD Repository

This National Mine Action Strategy, the first of its kind in Zimbabwe, presents the overall vision, mission, goals and objectives of Zimbabwe’s mine action programme for the period 2018-2025. The strategy’s timeline corresponds to Zimbabwe’s Article 5 Extension Request, submitted in March 2017 and its end state is the completion of clearance obligations under Article 5 of the Anti-Personnel Mine Ban Convention (APMBC).

Its vision is for a mine/ERW-free Zimbabwe where women, girls, boys and men safely engage in sustainable livelihood activities and where mine/ERW victims are fully integrated into society. While its mission is ...


Why The United Nations Underperforms At Preventing Mass Atrocities, Edward C. Luck 2018 Columbia University

Why The United Nations Underperforms At Preventing Mass Atrocities, Edward C. Luck

Genocide Studies and Prevention: An International Journal

No abstract provided.


Back Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Back Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Front Matter, ADFSL 2018 Embry-Riddle Aeronautical University

Front Matter, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


Contents, ADFSL 2018 Embry-Riddle Aeronautical University

Contents, Adfsl

Annual ADFSL Conference on Digital Forensics, Security and Law

No abstract provided.


A Comparative Study Of Extreme Religious Nationalist Terrorist Groups In The United States, Colleen Arthur 2018 Virginia Commonwealth University

A Comparative Study Of Extreme Religious Nationalist Terrorist Groups In The United States, Colleen Arthur

Undergraduate Research Posters

The aim of this paper is to conduct a comparative study of Radical Right Wing terrorism and Radical Islamic terrorism both of which are categorized under the Religious Nationalism/Extremism typology of terrorism. In order to compare and contrast the two fairly, I broke down the ideology, motives, methods, and the demographic profile of members of both Radical Right Wing and Radical Islamic terrorism then provided examples of different groups that fall within those categories in order to effectively illustrate the striking similarities of the two categories that have been addressed and condemned differently by the United States. Then I ...


Border Enforcement And Civil Rights Along The Texas-Mexico Border, Esther Reyes 2018 University of Texas at Austin

Border Enforcement And Civil Rights Along The Texas-Mexico Border, Esther Reyes

Latino Public Policy

Over the past two decades, spending on enforcement along the southwestern border of the United States has expanded dramatically. The annual budget of the U.S. Border Patrol, increased from $400 million in fiscal year 1994 to $3.8 billion in fiscal year 2017. During this period, the number of Border Patrol agents stationed along the U.S.Mexico border grew by nearly 450 percent, from 3,747 to over 16,605 agents. Meanwhile, apprehensions of unauthorized migrants along the U.S.-Mexico border declined from 979,101 in 1994 to 303,916 in 2017.

These expansions and the accompanying ...


Studies Of War And Peace: Summary Of An Academic Career, Francis A. Beer 2018 University of Colorado, Boulder

Studies Of War And Peace: Summary Of An Academic Career, Francis A. Beer

Political Science Faculty Contributions

A personal profile that summarizes the academic career and research findings of the author.


Strength Through Diplomacy: A Fundamental Review Of The Relationship Between North Korea And The United States, Benjamin D. Blackstone 2018 Claremont McKenna College

Strength Through Diplomacy: A Fundamental Review Of The Relationship Between North Korea And The United States, Benjamin D. Blackstone

CMC Senior Theses

At the time that this thesis is printed, we are reminded of the tumultuous relationship between North Korea and the United States every day. If we follow the mainstream news regularly, it seems like we are on a steady path to war. Ultimately, this paper is centered around the question: what is the best foreign policy strategy for both countries to achieve respective goals, without descending into armed conflict? Specifically, I evaluated the failures of the last three U.S. Presidents and used their shortcomings to explain limitations in current foreign policy strategy. I also attempted to show North Korean ...


Analysis Of Remote Tripping Command Injection Attacks In Industrial Control Systems Through Statistical And Machine Learning Methods, Charles Timm 2018 University of Central Florida

Analysis Of Remote Tripping Command Injection Attacks In Industrial Control Systems Through Statistical And Machine Learning Methods, Charles Timm

Electronic Theses and Dissertations

In the past decade, cyber operations have been increasingly utilized to further policy goals of state-sponsored actors to shift the balance of politics and power on a global scale. One of the ways this has been evidenced is through the exploitation of electric grids via cyber means. A remote tripping command injection attack is one of the types of attacks that could have devastating effects on the North American power grid. To better understand these attacks and create detection axioms to both quickly identify and mitigate the effects of a remote tripping command injection attack, a dataset comprised of 128 ...


Defence Diplomacy In The Long War Beyond The Aiguillette., Patrick Blannin 2018 Bond University

Defence Diplomacy In The Long War Beyond The Aiguillette., Patrick Blannin

Theses

This thesis investigates the theory and practice of defence diplomacy, a term synonymous with traditional, state-centric diplomacy. Defence diplomacy commonly invokes images of a member of the armed services (man or woman) is full dress uniform among a sea of civilians within an embassy in a foreign country. These people are called Defense Attaché’s (DATT). Despite being a regular feature of diplomatic relations between countries, little is known. The DATT is attached by the sending state he or she represents to an embassy or consulate and charged with the primary responsibility of advising the ambassador on relevant military issues ...


Tweeting Strategy: Military Social Media Use As Strategic Communication, Rupinder Mangat 2018 Wilfrid Laurier University

Tweeting Strategy: Military Social Media Use As Strategic Communication, Rupinder Mangat

Theses and Dissertations (Comprehensive)

Many Western militaries now actively engage with various social media platforms. The starting point for my dissertation research was this question: how does the military use social media? Considering the Canadian Armed Forces’ use of Twitter as a case study, I collected over 14,000 tweets from four Twitter accounts of the Canadian Armed Forces (CAF), the Canadian Army, the Royal Canadian Navy, and the Royal Canadian Air Force with some tweets as old as September 2012 and the most recent tweets from December 2015. I employed Grounded Theory Method to analyze these tweets, which revealed four themes — organization, history ...


Using Communication Theories In Mine-Risk Education Campaigns: The Case Of Vietnam, Duong Trong Hue 2018 James Madison University

Using Communication Theories In Mine-Risk Education Campaigns: The Case Of Vietnam, Duong Trong Hue

Global CWD Repository

In this study, I will look at the problem from a health communication perspective with a focus on the linkage between the theories of attitude and behavioral change in the health communication field and the application of mine-risk education programs in Vietnam. This research will contribute to the field of risk education, specifically in communication campaigns to save lives and limbs in landmine affected communities. It also helps to shed more light on the real impact of mine-risk education campaigns to the mine-affected population.

The paper is organized as follows. First, I will provide a brief introduction of the mine-risk ...


Assessment Of Information Security Culture In Higher Education, Henry Glaspie 2018 University of Central Florida

Assessment Of Information Security Culture In Higher Education, Henry Glaspie

Electronic Theses and Dissertations

Information security programs are instituted by organizations to provide guidance to their users who handle their data and systems. The main goal of these programs is to protect the organization's information assets through the creation and cultivation of a positive information security culture within the organization. As the collection and use of data expands in all economic sectors, the threat of data breach due to human error increases. Employee's behavior towards information security is influenced by the organizations information security programs and the overall information security culture. This study examines the human factors of an information security program ...


Altruistic Punishment Theory And Inter-Group Violence, Clayton Besaw 2018 University of Central Florida

Altruistic Punishment Theory And Inter-Group Violence, Clayton Besaw

Electronic Theses and Dissertations

This dissertation explores the role of altruistic punishment, the act of punishing outsiders perceived to harm members of one's group at a personal cost, in explaining individual motivations to participate in inter-group violence. It first develops a social theory of this type punishment. This theory argues that an egalitarian social logic may be key to understanding motivations of parochial altruism, and that one's social environment may influence thresholds of anger needed to induce punishment behavior. Empirically, it conducts two survey-experimental studies. The first experiment utilizes subject partisan identity in the context of American politics and hypothetical acts of ...


A Case Study Of Veteran And Civilian Student Academic Performance At The University Of Central Florida, Floyd C. Diehl Jr 2018 University of Central Florida

A Case Study Of Veteran And Civilian Student Academic Performance At The University Of Central Florida, Floyd C. Diehl Jr

Honors in the Major Theses

This study seeks to provide a brief overview of academic standards and performance of veterans of the United States military and civilians who attend the University of Central Florida. Whether a student is a veteran or a civilian, he or she must learn how to adapt to the requirements of an academic community in order to be successful in that environment. It may be difficult for some. In able for society to discern the importance of the academic performance of both veterans and civilians alike, research is vital. There are various assumptions about veterans. For example, it can be assumed ...


Digital Commons powered by bepress