Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

2,815 Full-Text Articles 2,013 Authors 777,753 Downloads 117 Institutions

All Articles in Defense and Security Studies

Faceted Search

2,815 full-text articles. Page 5 of 110.

A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani 2018 University of Central Florida

A Content Analysis Of Jihadist Magazines: Theoretical Perspectives, Catalina M. Udani

Honors in the Major Theses

During its violent spread across the Middle East, the Islamic State of Iraq and Sham (ISIS) amassed both a local and international following in large part due to its usage of emergent media distribution. Beginning in 2014, ISIS’s Ministry of Media published an English-language magazine, Dabiq, disseminating its issues through online platforms. Dabiq and its successor Rumiyah both serve as propagandistic recruitment material for ISIS’s international community as well as broadcasting the message of the jihadist movement to ISIS’s enemies. This study analyzed ISIS’s publications using a qualitative content analysis in order to identify jihadist recruitment ...


National Interests And Security Policies In The Arctic Region Among Arctic States, Hilde-Gunn Bye 2018 University of Denver

National Interests And Security Policies In The Arctic Region Among Arctic States, Hilde-Gunn Bye

Electronic Theses and Dissertations

The United States, Canada, Russia, and Norway are all Arctic states; however, they prioritize the region to different degrees in terms of investments of security assets and military presence. What explains why some Arctic countries prioritize the Arctic more than others? This thesis explores this question through using an issue-based approach, which looks at the salience of issues as having implications for foreign policy tools and measures. This thesis finds that having interests and stakes in the region of high overall salience contribute to an explanation of why some countries prioritize the region more, while low overall salience is linked ...


International Post-Conflict Peacebuilding In Bosnia And Herzegovina And Cambodia, Mia Fisher 2018 James Madison University

International Post-Conflict Peacebuilding In Bosnia And Herzegovina And Cambodia, Mia Fisher

Senior Honors Projects, 2010-current

The end of the Cold War brought many changes to the international system, including a rise in intrastate armed conflict and violence against civilians. Consequently, the international community performed increasingly complex and multidimensional peace support operations, and peacebuilding advanced onto the international agenda during the 1990s. Despite the increased attention on peacebuilding in recent decades, most operations have been relatively unsuccessful, and local and international actors continue to struggle with how to implement effective policies to rebuild post-conflict states. The purpose of this research paper is to examine how the international community contributes to post-conflict peacebuilding efforts and to better ...


Airships In U.N. Humanitarian And Peace Operations: Ready For Service?, Walter Dorn, Nic Baird, Robert Owen 2018 Royal Military College of Canada

Airships In U.N. Humanitarian And Peace Operations: Ready For Service?, Walter Dorn, Nic Baird, Robert Owen

Journal of Aviation/Aerospace Education & Research

This study examines whether the United Nations should take steps in the near future to exploit the operational characteristics of lighter-than-air (LTA) and hybrid aircraft in support of its peace and humanitarian operations. Continued progress in the development of LTA transport system makes this a timely issue. At the same time, this progress highlights persistent challenges to the conduct of reliable and safe LTA operations, particularly in the face of bad weather and threats from groups hostile to the UN mission. The report examines this issue in four sections: (1) the potential advantages of LTA operations; (2) their disadvantages; (3 ...


Simple Analytics Of The Impact Of Terror Generation On Attacker-Defender Interactions#3;, Timothy Mathews, Aniruddha Bagchi, Joao R. Faria 2017 Florida Atlantic University

Simple Analytics Of The Impact Of Terror Generation On Attacker-Defender Interactions#3;, Timothy Mathews, Aniruddha Bagchi, Joao R. Faria

Aniruddha Bagchi

A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) will potentially attack a single target in the homeland of a government/state (denoted G). This interaction is modeled as a one-shot sequential move game in which G #12;first chooses how heavily to defend the target, after which T chooses whether or not to stage an attack. T's bene#12;fit from a successful attack is allowed to be increasing in the amount of resources that G allocates to defense. In the context of terrorism, this has multiple reasonable interpretations, including situations in which: (i ...


A Model Of A Multilateral Proxy War With Spillovers, Aniruddha Bagchi, Joao R. Faria, Timothy Mathews 2017 Florida Atlantic University

A Model Of A Multilateral Proxy War With Spillovers, Aniruddha Bagchi, Joao R. Faria, Timothy Mathews

Aniruddha Bagchi

Motivated by the war in Syria and the ascension of ISIS, this paper models a proxy war with three sponsors and three combatants as a dynamic game. Sponsors are leaders that provide resources for combatants to fi#12;ght each other. Sponsors 1 and 2 have strong aversion to sponsor 3's proxy, but not against each other. Three pure strategy equilibria exist in the game. When the ex post value of winning is small, all players #12;fight in equilibrium. However, when the ex post value of winning is large, in equilibrium either sponsors 1 and 2 coordinate their ...


Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism, Aniruddha Bagchi, Tridib Bandyopadhyay 2017 Kennesaw State University

Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism, Aniruddha Bagchi, Tridib Bandyopadhyay

Aniruddha Bagchi

This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the economy. The government assists the infrastructural firm by providing intelligence inputs about an impending attack. We find that subject to some conditions, expenditure on intelligence adds value only when its amount exceeds a threshold level. Also, the nature of the equilibrium ...


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson 2017 Plymouth Hospitals NHS Trust

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological ...


Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté 2017 Somos Environmental Protection Ltd.

Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté

International Journal of Nuclear Security

The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of ...


The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf 2017 Faculty of Sciences University Ibn Tofail

The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf

International Journal of Nuclear Security

Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.

This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.


16th Meeting Of The States Parties To The Anti-Personnel Mine Ban Convention, AP Mine Ban Convention 2017 James Madison University

16th Meeting Of The States Parties To The Anti-Personnel Mine Ban Convention, Ap Mine Ban Convention

Global CWD Repository

The 16MSP is a formal meeting of the 162 States which are parties to the 1997 Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on Their Destruction. The 16MSP is being held in accordance with Article 11 of the Convention and pursuant to decisions of the 2016 Fifteenth Meeting of the States Parties (15MSP).

The 16MSP takes place on the year of the 20th anniversary of the adoption and signature of the Convention and will gather together States Parties and not party to the Convention, interested organisations and members of civil society to ...


An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah van Rossum 2017 Missouri State University

An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah Van Rossum

MSU Graduate Theses

This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. It argues that although North Korea’s cyberspace resources and capabilities have increased and reached a level that represents an advanced persistent threat, its cyberspace operations have remained restrained and regional. It also argues that North Korea’s valuable assets include its ability to control cyberspace within North Korea and its ability to engage in cyberspace activities and operations from abroad. The thesis recommends that the United States government exploit these assets by ...


Czech Cultural Identity: Incompatible With Mass Muslim Immigration And Contributes To Rising European Populism, Alana Thi Vorda 2017 Missouri State University

Czech Cultural Identity: Incompatible With Mass Muslim Immigration And Contributes To Rising European Populism, Alana Thi Vorda

MSU Graduate Theses

This thesis examines the respective successes and failures of the Czech experience with integrating Roma and Vietnamese immigrants, and asserts that, given deeply established historical and cultural narratives, and contemporary domestic political considerations as shown in these two previous cases, the Czech Republic is unlikely to effectively assimilate any new surge in Muslim immigration. Developments in the Czech Republic are likely, therefore, to reflect the accelerating populist momentum that is currently sweeping Central and Eastern European states.


Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel 2017 University of Dhaka

Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel

International Journal of Nuclear Security

In a nuclear power plant, its coolant system is major safety equipment. Coolant system failure causes several accidents in nuclear history. There are so many causes for coolant system failure. One of them is lack of electric power for coolant pumps. In typically NPP there is backup system for power redundancy. In this article, focus on reactor coolant system and its backup power when main grid lines failure. Here discuss about solar backup power for batteries and increases a safety lines for reactor coolant pumps. So, our main goal is providing a battery backup from reliable natural source and ensuring ...


The Illusion Of Parity: Determining Us Policy In The Post-Post Soviet Period, Kyle Sallee 2017 Portland State University

The Illusion Of Parity: Determining Us Policy In The Post-Post Soviet Period, Kyle Sallee

Kyle Sallee

For 70 years, Soviet schoolchildren were taught “Moya rodina — Sovetskiy Soyuz (TheSoviet Union is my motherland),” but the motherland would be brought to her knees in 1991 as the trans-national Soviet identity disappeared with the collapse of the Soviet Empire, taking with it the ruins of the ideological, social, and political institutions that had supported civilization in the USSR and the Eastern Bloc for generations. What remained in the wake, a nuclear apparatus which was second only to that of the United States, would be the cause of an ongoing discourse between the Russian Federation and the United States. This ...


State Sovereignty And Human Security: The Migration-Securitization Nexus In The Global South, Eugene R. Sensenig 2017 Notre Dame University - Lebanon

State Sovereignty And Human Security: The Migration-Securitization Nexus In The Global South, Eugene R. Sensenig

The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy

This paper deals with the issues of state sovereignty and refugee policy in insecure and marginalized regions of the Global South. Using the displaced Syrian populations (UN-recognized and undocumented) in Lebanon as a case in point, the attempt will be made to portray and discuss the responses of underdeveloped host communities to overwhelming increases in the size of their non-national population. Lebanon has faced various waves of refugees since its independence in 1943, making up between 2.5% (Iraqis) and 25% (Syrians) of the entire citizen population, currently estimated to be slightly over 4 million. Almost 500,000 Palestinian refugees ...


Maritime Law Enforcement In Nigeria: The Challenges Of Combatting Piracy And Armed Robbery At Sea, Omovigho Cynthia Brume-Eruagbere 2017 World Maritime University

Maritime Law Enforcement In Nigeria: The Challenges Of Combatting Piracy And Armed Robbery At Sea, Omovigho Cynthia Brume-Eruagbere

World Maritime University Dissertations

No abstract provided.


Maritime Violence In The Cemac Region: Causes, Challenges And Solution Perspectives, Judith Ewo Epse Ndze Akah 2017 World Maritime University

Maritime Violence In The Cemac Region: Causes, Challenges And Solution Perspectives, Judith Ewo Epse Ndze Akah

World Maritime University Dissertations

No abstract provided.


The Geopolitics Of Rare Earth Elements: Emerging Challenge For U.S. National Security And Economics, Bert Chapman 2017 Purdue University

The Geopolitics Of Rare Earth Elements: Emerging Challenge For U.S. National Security And Economics, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Rare earth elements (REE) contain unique chemical and physical properties such as lanthanum, are found in small concentrations, need extensive precise processes to separate, and are critical components of modern technologies such as laser guidance systems, personal electronics such as IPhones, satellites, and military weapons systems as varied as Virginia-class fast attack submarines, DDG- 51 Aegis destroyers, the F-35 Joint Strike Fighter, and precision guided munitions. The U.S. has some rare earth resources, but is heavily dependent on access to them from countries as varied as Afghanistan, Bolivia, and China. Losing access to these resources would have significant adverse ...


Eyes In The Sky, Concerns On The Ground, Siyuan CHEN, Zi En CHOW 2017 Singapore Management University

Eyes In The Sky, Concerns On The Ground, Siyuan Chen, Zi En Chow

Research Collection School Of Law

In the last few years, drones have literally taken flight in our skies, over our parks, our beaches –and even over our homes. Aerial imaging enthusiasts are thrilled about their impact, while thosewho have privacy concerns may have some reservations.But while consumer-level drones do not make the best spies – they’re noisy, conspicuous, have ashort battery-life, are vulnerable to jamming and have limited telephoto capability – this maychange over time. With that in mind, we need to consider whether the existing causes of actionprovide any relief in law and, if they do not, how governments can regulate drones in a ...


Digital Commons powered by bepress