Open Access. Powered by Scholars. Published by Universities.®

Law Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Law

Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk May 2022

Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk

Graduate Theses and Dissertations

Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …


Refugee Resettlement In The U.S.: The Hidden Realities Of The U.S. Refugee Integration Process, Bienvenue Konsimbo Dec 2019

Refugee Resettlement In The U.S.: The Hidden Realities Of The U.S. Refugee Integration Process, Bienvenue Konsimbo

Master of Science in Conflict Management Final Projects

From the 1946 to the 1980 Act, more than two million refugees have resettled in the U.S. (Eby, Iverson, Smyers, & Kekic, 2011p.). This has made the U.S. the largest of the 10 resettlement countries (Xu, 2007, p. 38). The U.S. department of state (DOS)’ hope is to give “the refugee a leg up on their journey to self-sufficiency” (Darrow, 2015, p. 92). For these millions of refugees, their expectations are to find “employment, education, to provide a better environment for their children, and to integrate into the community” (Xu, 2007p.38).

However, this pre-package deal is not without repercussions or …


The Role Of Women In Terrorism, Zeynep Bayar May 2019

The Role Of Women In Terrorism, Zeynep Bayar

Dissertations, Theses, and Capstone Projects

The main purpose of this paper is to understand what motivate women to join terrorist groups and why these organizations prefer to work with female terrorists. Although each woman has different reasons to involve in terrorist groups, this research demonstrates 'religious, political and personal' reasons as the major motivating factors. This study also focuses on the question of why women are the targets of terror recruiters. In order to answer these, the research analysis examines 'psychological, gender, and media' factors as major recruitment reasons of terrorist organizations. This study also analyzes the similarities and differences between female terrorists' profiles of …


Data Disparity: Tiered Pricing As An Alternative To Consumer Iot Data Privacy Regulations, Matthew Lostocco Jan 2019

Data Disparity: Tiered Pricing As An Alternative To Consumer Iot Data Privacy Regulations, Matthew Lostocco

Honors Theses and Capstones

In recent years, Internet of Things (IoT) devices have exploded on the consumer scene. These emerging products bring new technological capabilities into our everyday lives. IoT is projected to contribute anywhere from $4-11 trillion to the global economy and companies are investing billions of dollars into the technology. However, with the vast amount of data that IoT devices collect, consumers are burdening the risk of having their personal data breached or sold to third parties. This paper first identifies why consumers may be weary or willing towards providing their personal data and how unconscious biases in the purchasing process cause …


An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh Apr 2018

An Analysis Of International Agreements Over Cybersecurity, Lucas Ashbaugh

Electronic Theses and Dissertations

Research into the international agreements that increase cooperation over cybersecurity challenges is severely lacking. This is a necessary next step for bridging diplomatic challenges over cybersecurity. This work aspires to be push the bounds of research into these agreements and offer a tool that future researchers can rely on. For this research I created, and made publicly available, the International Cybersecurity Cooperation Dataset (ICCD), which contains over 350 international cybersecurity agreements and pertinent metadata. Each agreement is marked per which subtopics within cybersecurity related agreements it covers. These typologies are:

  • Discussion and Dialogue

  • Research

  • Confidence Building Measures

  • Incident Response

  • Crime …


The International Community's Response To The Hypothetical Emergence Of Superheroes, Brittany Nicole Woods Jan 2016

The International Community's Response To The Hypothetical Emergence Of Superheroes, Brittany Nicole Woods

CMC Senior Theses

In a golden era for comic based media, this paper uses the hypothetical emergence of superheroes to analyze the assumptions and predictions of three international relations theories: realism, liberalism, and constructivism. Comics consistently reflect the real world, paralleling events and concepts discussed in foreign affairs dialogues. The thought experiment, and the comic genre itself, provides a vehicle for thinking broadly about the political and social ramifications of successful or failed problem solving, state interaction, and scientific advances.


East European Security Revisited: Institutions, Power, And Security, Blagovest Tashev Apr 2002

East European Security Revisited: Institutions, Power, And Security, Blagovest Tashev

Graduate Program in International Studies Theses & Dissertations

Drawing on the literatures on democratization, security studies, and small states this dissertation explores the relationship of small states' domestic and international institutionalization and their security. Small states have limited power not only to affect their environment but also to guarantee national security. Small states, it is hypothesized, enhance their security through the consolidation of domestic institutions and the accumulation of capacities provided by their participation in capacity-reach international institutions.

The dissertation tests the hypothesis by applying the comparative method to the post-communist states of Bulgaria, the Czech Republic, and Lithuania. The three case studies analyze the effects of domestic …


Evolution And Devolution: The Dynamics Of Sovereignty And Security In Post-Cold War Europe, Thomas M. Lansford Apr 1999

Evolution And Devolution: The Dynamics Of Sovereignty And Security In Post-Cold War Europe, Thomas M. Lansford

Graduate Program in International Studies Theses & Dissertations

At a time when individual defense outlays are being significantly diminished, the national governments of Western Europe are confronted with the necessity of reforming and adapting their militaries to address new security concerns and undertake new missions. This study will examine multinational military integration as one possible approach whereby national governments can limit defense spending and still maintain military capabilities to meet the contemporary security threats faced by the nation states of the continent. The first three chapters of the work will explore the broad patterns of change in the international system which have propelled states to reexamine how they …