Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- University of South Florida (108)
- University of Tennessee, Knoxville (40)
- US Army War College (11)
- Purdue University (7)
- Embry-Riddle Aeronautical University (5)
-
- Air Force Institute of Technology (2)
- Loyola Marymount University and Loyola Law School (2)
- SelectedWorks (2)
- Augustana College (1)
- Brigham Young University Law School (1)
- Bryant University (1)
- Liberty University (1)
- Maurer School of Law: Indiana University (1)
- Pace University (1)
- Singapore Management University (1)
- Swarthmore College (1)
- University of Maryland Francis King Carey School of Law (1)
- University of Nevada, Las Vegas (1)
- University of Pennsylvania Carey Law School (1)
- University of Pittsburgh School of Law (1)
- West Chester University (1)
- Keyword
-
- Terrorism / counterterrorism (27)
- Radicalization (17)
- Al-Qaida (15)
- Counterterrorism (15)
- Homeland security (14)
-
- Islamic culture and politics (13)
- National security (12)
- Violent extremism (12)
- History (11)
- Asymmetric warfare (10)
- Nonstate actors (10)
- Security studies (10)
- Conflict studies (9)
- Fundamentalism (9)
- Political violence (9)
- Religious violence (9)
- Russia (9)
- Security policy (9)
- Foreign policy (8)
- Ideology (8)
- Intelligence analysis (8)
- Intelligence studies/education (8)
- Sociocultural dynamics in security (8)
- Strategy (8)
- China (7)
- International relations (7)
- Security management (7)
- Threat assessment (7)
- Cybersecurity (6)
- International law (6)
- Publication Year
- Publication
-
- Journal of Strategic Security (108)
- International Journal of Nuclear Security (40)
- The US Army War College Quarterly: Parameters (11)
- Libraries Faculty and Staff Presentations (4)
- Faculty Publications (2)
-
- International Bulletin of Political Psychology (2)
- Libraries Faculty and Staff Scholarship and Research (2)
- Space Traffic Management Conference (2)
- All Faculty Scholarship (1)
- Articles (1)
- Articles by Maurer Faculty (1)
- Brigham Young University International Law & Management Review (1)
- FORCES Initiative: Strategy, Security, and Social Systems (1)
- Global Public Health (1)
- Honors Projects in Mathematics (1)
- International Conference on Gambling & Risk Taking (1)
- Jeremy Straub (1)
- Journal of Aviation/Aerospace Education & Research (1)
- Journal of Business & Technology Law (1)
- Lawrence J. Trautman Sr. (1)
- Loyola of Los Angeles International and Comparative Law Review (1)
- Loyola of Los Angeles Law Review (1)
- Pace International Law Review (1)
- Perspectives@SMU (1)
- Senior Honors Theses (1)
- Swarthmore Undergraduate History Journal (1)
- West Chester University Doctoral Projects (1)
- Publication Type
- File Type
Articles 31 - 60 of 190
Full-Text Articles in Business
Will War's Nature Change In The Seventh Military Revolution?, F. G. Hoffman
Will War's Nature Change In The Seventh Military Revolution?, F. G. Hoffman
The US Army War College Quarterly: Parameters
This article examines the potential implications of the combinations of robotics, artificial intelligence, and deep learning systems on the character and nature of war. The author employs Carl von Clausewitz’s trinity concept to discuss how autonomous weapons will impact the essential elements of war. The essay argues war’s essence, as politically directed violence fraught with friction, will remain its most enduring aspect, even if more intelligent machines are involved at every level.
The Myth Of Strategic And Tactical Airlift, Jacob D. Maywald, Adam D. Reiman, Alan A. Johnson, Robert E. Overstreet
The Myth Of Strategic And Tactical Airlift, Jacob D. Maywald, Adam D. Reiman, Alan A. Johnson, Robert E. Overstreet
Faculty Publications
In the 21st century, our ability to quickly and decisively deliver combat forces and equipment is of the utmost importance in achieving our national security objectives. The swiftness and flexibility of the US Air Force’s mobility airlift fleet is the key to executing a rapid global mobility strategy. The operational effectiveness and efficiency of military air transportation relies on the expertise and intuition of Air Mobility Command’s (AMC) mobility planners. Working in coordination with the United States Transportation Command (USTRANSCOM) and geographic combatant commands (GCC), AMC is responsible for the tasking and tracking of almost 900 daily mobility sorties worldwide. …
Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.
Finding The Balance Between Price And Protection: Establishing A Surface-To-Air Fire Risk-Reduction Training Policy For Air-Carrier Pilots, Earl W. Burress Jr., Ph.D.
Journal of Aviation/Aerospace Education & Research
Currently, U.S. air carriers do not provide equipment or training necessary to mitigate the risk posed by surface-to-air fire (SAFIRE) threats. These threats consist of self-guided weapons (infrared shoulder-fired surface-to-air missiles), manually-aimed threats (small arms, recoilless grenade launchers, rockets, and light anti-aircraft artillery), and hand-held lasers. Technological solutions to counter infrared shoulder-fired missiles have been explored, but were rejected due to prohibitive equipment and maintenance costs. A lower cost option, providing air-carrier pilots with SAFIRE risk-reduction training, has not been formally addressed by the air-carrier industry or the U.S. federal government. This effort will use a business concept, the Cost-Benefit …
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame
International Journal of Nuclear Security
The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.
Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …
Letter From The Editor
International Journal of Nuclear Security
No abstract provided.
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene
International Journal of Nuclear Security
Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …
Student Competition Cover
International Journal of Nuclear Security
No abstract provided.
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed
International Journal of Nuclear Security
No abstract provided.
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen
International Journal of Nuclear Security
No abstract provided.
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan
International Journal of Nuclear Security
No abstract provided.
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein
International Journal of Nuclear Security
No abstract provided.
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga
International Journal of Nuclear Security
Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa
International Journal of Nuclear Security
Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).
The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan
International Journal of Nuclear Security
Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.
From The Editor’S Desk
International Journal of Nuclear Security
No abstract provided.
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath
International Journal of Nuclear Security
This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr
International Journal of Nuclear Security
Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.
Letter From The Editor - Frahi-Amroun, Akila Frahi-Amroun
Letter From The Editor - Frahi-Amroun, Akila Frahi-Amroun
International Journal of Nuclear Security
No abstract provided.
Letter From The Editor - Choe, Kwan Kyoo Choe
Letter From The Editor - Choe, Kwan Kyoo Choe
International Journal of Nuclear Security
No abstract provided.
Letter From The Editor - Hirst, Russel K. Hirst
Letter From The Editor - Hirst, Russel K. Hirst
International Journal of Nuclear Security
No abstract provided.
Call For The Student Writing Competition
Call For The Student Writing Competition
International Journal of Nuclear Security
No abstract provided.
Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed
Status Of Nuclear Security Education And Research In Bangladesh And Looking Forward, Md. Shafiqul Islam, Md. Mobasher Ahmed
International Journal of Nuclear Security
Bangladesh uses category I of nuclear materials and category 1-5 of radioactive materials in the field of research, medical and industries. The Government is going to implement its first nuclear power plant under an IGA between the Bangladesh and Russian Governments. With the emerging global nuclear and radiological terrorism by potential adversaries, enhancing nuclear security is the paramount importance for the country. The paper has found no established communication channels among stakeholders in order to work in a coordinated and collaborative manner for strengthening the nuclear security. This has resulted lacking importance of education, research, training and knowledge management initiatives …
Nuclear Security Education At Pakistan Institute Of Engineering And Applied Sciences (Pieas): Current Status, Future Prospects And The Lessons Learnt, Tariq Majeed Dr.
Nuclear Security Education At Pakistan Institute Of Engineering And Applied Sciences (Pieas): Current Status, Future Prospects And The Lessons Learnt, Tariq Majeed Dr.
International Journal of Nuclear Security
In this paper, the details of nuclear security education at Pakistan Institute of Engineering and Applied Sciences (PIEAS) have been discussed. Nuclear Security education was initiated at PIEAS as a sub-specialty of its MS Nuclear Engineering Program in October 2009. Two courses, Nuclear Security (NE-581) and Physical Protection Systems (NE-582) have been offered on regular basis in the 3rd and 4th semesters. To date, 72 students have been graduated with this sub-specialty. The most important lesson learnt is that introduction of nuclear security related courses in nuclear engineering program has opened up new venues of applications of nuclear …
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
The Utility Of Table-Top Exercises In Teaching Nuclear Security, Christopher Hobbs, Luca Lentini, Matthew Moran
International Journal of Nuclear Security
In the emerging field of nuclear security, those responsible for education and training are constantly seeking to identify and engage with tools and approaches that provide for a constructive learning environment. In this context, this paper explores the nature and value of Tabletop exercises (TTX) and how they can be applied in the nuclear security context. On the one hand, the paper dissects the key components of the TTX and considers the broader pedagogical benefits of this teaching method. On the other hand, the paper draws lessons from the authors’ experience of running TTXs as part of nuclear security professional …
Building The Education And Training Pillar Of The University Of Tennessee’S Institute For Nuclear Security, Howard Lewis Hall
Building The Education And Training Pillar Of The University Of Tennessee’S Institute For Nuclear Security, Howard Lewis Hall
International Journal of Nuclear Security
The University of Tennessee (UT) developed its first formal and coordinated efforts in nuclear security education in 2008-2009 with its graduate certificate program in nuclear security in the Department of Nuclear Engineering. Building on this work, in 2011 UT established the UT Institute for Nuclear Security (INS) as a collaborative center at the university to expand its curricular impact as well as foster research and partnerships with nearby major governmental facilities engaged in nuclear security work. Oak Ridge National Laboratory (ORNL), the Y-12 National Security Complex (Y-12), and Oak Ridge Associated Universities (ORAU) have joined with UT as charter members …