Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

3,830 Full-Text Articles 2,126 Authors 777,753 Downloads 120 Institutions

All Articles in Defense and Security Studies

Faceted Search

3,830 full-text articles. Page 7 of 117.

Here Comes The Sun: Constraining Russian Aggression And Ambition In The Arctic Through The Analysis Of Structural Realism, Samantha Battey 2018 University of Colorado, Boulder

Here Comes The Sun: Constraining Russian Aggression And Ambition In The Arctic Through The Analysis Of Structural Realism, Samantha Battey

Undergraduate Honors Theses

This paper is a broad case study attempting to reconcile how structural realism can use different liberal theories and concepts to accomplish realist ends. That being said, the current situation in the Arctic has real-world significance that draws equal importance with the theoretical implications of this thesis. As climate change is opening the Arctic to economic exploitation in the near future, this paper addresses the rising importance of the Arctic and the issue of how the U.S. and its allies should respond to Russian militarization of the Arctic while ensuring their own interests. By the utilization of structural realism ...


Altruistic Punishment Theory And Inter-Group Violence, Clayton Besaw 2018 University of Central Florida

Altruistic Punishment Theory And Inter-Group Violence, Clayton Besaw

Electronic Theses and Dissertations

This dissertation explores the role of altruistic punishment, the act of punishing outsiders perceived to harm members of one's group at a personal cost, in explaining individual motivations to participate in inter-group violence. It first develops a social theory of this type punishment. This theory argues that an egalitarian social logic may be key to understanding motivations of parochial altruism, and that one's social environment may influence thresholds of anger needed to induce punishment behavior. Empirically, it conducts two survey-experimental studies. The first experiment utilizes subject partisan identity in the context of American politics and hypothetical acts of ...


Analysis Of Remote Tripping Command Injection Attacks In Industrial Control Systems Through Statistical And Machine Learning Methods, Charles Timm 2018 University of Central Florida

Analysis Of Remote Tripping Command Injection Attacks In Industrial Control Systems Through Statistical And Machine Learning Methods, Charles Timm

Electronic Theses and Dissertations

In the past decade, cyber operations have been increasingly utilized to further policy goals of state-sponsored actors to shift the balance of politics and power on a global scale. One of the ways this has been evidenced is through the exploitation of electric grids via cyber means. A remote tripping command injection attack is one of the types of attacks that could have devastating effects on the North American power grid. To better understand these attacks and create detection axioms to both quickly identify and mitigate the effects of a remote tripping command injection attack, a dataset comprised of 128 ...


Assessment Of Information Security Culture In Higher Education, Henry Glaspie 2018 University of Central Florida

Assessment Of Information Security Culture In Higher Education, Henry Glaspie

Electronic Theses and Dissertations

Information security programs are instituted by organizations to provide guidance to their users who handle their data and systems. The main goal of these programs is to protect the organization's information assets through the creation and cultivation of a positive information security culture within the organization. As the collection and use of data expands in all economic sectors, the threat of data breach due to human error increases. Employee's behavior towards information security is influenced by the organizations information security programs and the overall information security culture. This study examines the human factors of an information security program ...


Simple Analytics Of The Impact Of Terror Generation On Attacker-Defender Interactions#3;, Timothy Mathews, Aniruddha Bagchi, Joao R. Faria 2017 Florida Atlantic University

Simple Analytics Of The Impact Of Terror Generation On Attacker-Defender Interactions#3;, Timothy Mathews, Aniruddha Bagchi, Joao R. Faria

Aniruddha Bagchi

A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) will potentially attack a single target in the homeland of a government/state (denoted G). This interaction is modeled as a one-shot sequential move game in which G #12;first chooses how heavily to defend the target, after which T chooses whether or not to stage an attack. T's bene#12;fit from a successful attack is allowed to be increasing in the amount of resources that G allocates to defense. In the context of terrorism, this has multiple reasonable interpretations, including situations in which: (i ...


A Model Of A Multilateral Proxy War With Spillovers, Aniruddha Bagchi, Joao R. Faria, Timothy Mathews 2017 Florida Atlantic University

A Model Of A Multilateral Proxy War With Spillovers, Aniruddha Bagchi, Joao R. Faria, Timothy Mathews

Aniruddha Bagchi

Motivated by the war in Syria and the ascension of ISIS, this paper models a proxy war with three sponsors and three combatants as a dynamic game. Sponsors are leaders that provide resources for combatants to fi#12;ght each other. Sponsors 1 and 2 have strong aversion to sponsor 3's proxy, but not against each other. Three pure strategy equilibria exist in the game. When the ex post value of winning is small, all players #12;fight in equilibrium. However, when the ex post value of winning is large, in equilibrium either sponsors 1 and 2 coordinate their ...


Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism, Aniruddha Bagchi, Tridib Bandyopadhyay 2017 Kennesaw State University

Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism, Aniruddha Bagchi, Tridib Bandyopadhyay

Aniruddha Bagchi

This article examines the role of espionage in defending against cyber-attacks on infrastructural firms. We analyze the problem using a game between a government, an infrastructural firm and an attacker. If the attacker successfully breaches the IT security defenses of the infrastructural firm, primary losses accrue to that firm while widespread collateral losses accrue to the rest of the economy. The government assists the infrastructural firm by providing intelligence inputs about an impending attack. We find that subject to some conditions, expenditure on intelligence adds value only when its amount exceeds a threshold level. Also, the nature of the equilibrium ...


The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson 2017 Plymouth Hospitals NHS Trust

The Future Of Nuclear Security: A Medical Physicist’S Perspective, Katharine E. Thomson

International Journal of Nuclear Security

Planning for the future of nuclear security is a vital and complex task, requiring cooperation and contribution from many disciplines and industries. This diversity of expertise should include the medical sector, which faces many of the same challenges as the nuclear industry: controlling access to dangerous material, creating a strong security culture, cooperating with the wider world and engaging the public.

Medical physicists, of which the author is one, oversee all aspects of small-scale radiation use. This paper discusses three key areas increasingly important to both medical and nuclear uses of radioactive materials: public engagement, prevention of nuclear and radiological ...


Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté 2017 Somos Environmental Protection Ltd.

Assessing And Enhancing Nuclear Safety And Security Culture For Small Facilities That Handle Radioactive Material, Solymosi Máté

International Journal of Nuclear Security

The use of radioactive sources is expanding all over the world and abreast the necessity of the enhancement of its safe and secure application is increasing too. In the nuclear industry, the safety and security are top priorities since decades. They share the same goal, to protect humans from the negative affect of the ionizing radiation. The human component of them is a significant factor and technical solutions can protect us so far and thus the culture for safety and security become a major focus. On the other hand, there are still some contradiction between recommendations and international guidance of ...


The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf 2017 Faculty of Sciences University Ibn Tofail

The Future Of Nuclear Security In Moroccan Territory After The Creation Of The New Moroccan Agency Of Nuclear And Radiological Safety And Security: Opportunities And Challenges, Amal Touarsi, Amina Kharchaf

International Journal of Nuclear Security

Nowadays, a security regime for protecting nuclear and radiological material—providing an intelligent national regulatory institution and establishing national security laws—is necessary in order for a state to ensure security of nuclear and radiological materials used within its borders.

This paper focuses on discussing the opportunities and challenges facing the future of nuclear security after the creation of the new Moroccan Agency of Nuclear and Radiological Safety and Security.


16th Meeting Of The States Parties To The Anti-Personnel Mine Ban Convention, AP Mine Ban Convention 2017 James Madison University

16th Meeting Of The States Parties To The Anti-Personnel Mine Ban Convention, Ap Mine Ban Convention

Global CWD Repository

The 16MSP is a formal meeting of the 162 States which are parties to the 1997 Convention on the Prohibition of the Use, Stockpiling, Production and Transfer of Anti-Personnel Mines and on Their Destruction. The 16MSP is being held in accordance with Article 11 of the Convention and pursuant to decisions of the 2016 Fifteenth Meeting of the States Parties (15MSP).

The 16MSP takes place on the year of the 20th anniversary of the adoption and signature of the Convention and will gather together States Parties and not party to the Convention, interested organisations and members of civil society to ...


An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah van Rossum 2017 Missouri State University

An Assessment Of North Korean Threats And Vulnerabilities In Cyberspace, Jeremiah Van Rossum

MSU Graduate Theses

This thesis answers the fundamental questions of what North Korean capabilities and intent in cyberspace are and what North Korean threats and vulnerabilities are associated with these. It argues that although North Korea’s cyberspace resources and capabilities have increased and reached a level that represents an advanced persistent threat, its cyberspace operations have remained restrained and regional. It also argues that North Korea’s valuable assets include its ability to control cyberspace within North Korea and its ability to engage in cyberspace activities and operations from abroad. The thesis recommends that the United States government exploit these assets by ...


Czech Cultural Identity: Incompatible With Mass Muslim Immigration And Contributes To Rising European Populism, Alana Thi Vorda 2017 Missouri State University

Czech Cultural Identity: Incompatible With Mass Muslim Immigration And Contributes To Rising European Populism, Alana Thi Vorda

MSU Graduate Theses

This thesis examines the respective successes and failures of the Czech experience with integrating Roma and Vietnamese immigrants, and asserts that, given deeply established historical and cultural narratives, and contemporary domestic political considerations as shown in these two previous cases, the Czech Republic is unlikely to effectively assimilate any new surge in Muslim immigration. Developments in the Czech Republic are likely, therefore, to reflect the accelerating populist momentum that is currently sweeping Central and Eastern European states.


Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel 2017 University of Dhaka

Solar System Battery Backups For Reactor Coolant Pumps During Electricity Outages Resulting From Natural Disasters, Md. Shamsul Huda Sohel

International Journal of Nuclear Security

In a nuclear power plant, its coolant system is major safety equipment. Coolant system failure causes several accidents in nuclear history. There are so many causes for coolant system failure. One of them is lack of electric power for coolant pumps. In typically NPP there is backup system for power redundancy. In this article, focus on reactor coolant system and its backup power when main grid lines failure. Here discuss about solar backup power for batteries and increases a safety lines for reactor coolant pumps. So, our main goal is providing a battery backup from reliable natural source and ensuring ...


The Illusion Of Parity: Determining Us Policy In The Post-Post Soviet Period, Kyle Sallee 2017 Portland State University

The Illusion Of Parity: Determining Us Policy In The Post-Post Soviet Period, Kyle Sallee

Kyle Sallee

For 70 years, Soviet schoolchildren were taught “Moya rodina — Sovetskiy Soyuz (TheSoviet Union is my motherland),” but the motherland would be brought to her knees in 1991 as the trans-national Soviet identity disappeared with the collapse of the Soviet Empire, taking with it the ruins of the ideological, social, and political institutions that had supported civilization in the USSR and the Eastern Bloc for generations. What remained in the wake, a nuclear apparatus which was second only to that of the United States, would be the cause of an ongoing discourse between the Russian Federation and the United States. This ...


State Sovereignty And Human Security: The Migration-Securitization Nexus In The Global South, Eugene R. Sensenig 2017 Notre Dame University - Lebanon

State Sovereignty And Human Security: The Migration-Securitization Nexus In The Global South, Eugene R. Sensenig

The Social Practice of Human Rights: Charting the Frontiers of Research and Advocacy

This paper deals with the issues of state sovereignty and refugee policy in insecure and marginalized regions of the Global South. Using the displaced Syrian populations (UN-recognized and undocumented) in Lebanon as a case in point, the attempt will be made to portray and discuss the responses of underdeveloped host communities to overwhelming increases in the size of their non-national population. Lebanon has faced various waves of refugees since its independence in 1943, making up between 2.5% (Iraqis) and 25% (Syrians) of the entire citizen population, currently estimated to be slightly over 4 million. Almost 500,000 Palestinian refugees ...


Maritime Law Enforcement In Nigeria: The Challenges Of Combatting Piracy And Armed Robbery At Sea, Omovigho Cynthia Brume-Eruagbere 2017 World Maritime University

Maritime Law Enforcement In Nigeria: The Challenges Of Combatting Piracy And Armed Robbery At Sea, Omovigho Cynthia Brume-Eruagbere

World Maritime University Dissertations

No abstract provided.


Maritime Violence In The Cemac Region: Causes, Challenges And Solution Perspectives, Judith Ewo Epse Ndze Akah 2017 World Maritime University

Maritime Violence In The Cemac Region: Causes, Challenges And Solution Perspectives, Judith Ewo Epse Ndze Akah

World Maritime University Dissertations

No abstract provided.


Eyes In The Sky, Concerns On The Ground, Siyuan CHEN, Zi En CHOW 2017 Singapore Management University

Eyes In The Sky, Concerns On The Ground, Siyuan Chen, Zi En Chow

Research Collection School Of Law

In the last few years, drones have literally taken flight in our skies, over our parks, our beaches –and even over our homes. Aerial imaging enthusiasts are thrilled about their impact, while thosewho have privacy concerns may have some reservations.But while consumer-level drones do not make the best spies – they’re noisy, conspicuous, have ashort battery-life, are vulnerable to jamming and have limited telephoto capability – this maychange over time. With that in mind, we need to consider whether the existing causes of actionprovide any relief in law and, if they do not, how governments can regulate drones in a ...


The Geopolitics Of Rare Earth Elements: Emerging Challenge For U.S. National Security And Economics, Bert Chapman 2017 Purdue University

The Geopolitics Of Rare Earth Elements: Emerging Challenge For U.S. National Security And Economics, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

Rare earth elements (REE) contain unique chemical and physical properties such as lanthanum, are found in small concentrations, need extensive precise processes to separate, and are critical components of modern technologies such as laser guidance systems, personal electronics such as IPhones, satellites, and military weapons systems as varied as Virginia-class fast attack submarines, DDG- 51 Aegis destroyers, the F-35 Joint Strike Fighter, and precision guided munitions. The U.S. has some rare earth resources, but is heavily dependent on access to them from countries as varied as Afghanistan, Bolivia, and China. Losing access to these resources would have significant adverse ...


Digital Commons powered by bepress