Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies

2020

Institution
Keyword
Publication
Publication Type
File Type

Articles 181 - 207 of 207

Full-Text Articles in Social and Behavioral Sciences

Farmer And Herder Conflict Dynamics In Ghana: The Role Of Environmental Scarcity, Daniel Kofi Banini Jan 2020

Farmer And Herder Conflict Dynamics In Ghana: The Role Of Environmental Scarcity, Daniel Kofi Banini

Africa Western Collaborations Day 2020 Abstracts

No abstract provided.


Political Dialogue, Intra-Afghan Stability And Regional Security Of Central Asia, I. Bobukulov Jan 2020

Political Dialogue, Intra-Afghan Stability And Regional Security Of Central Asia, I. Bobukulov

International Relations: Politics, Economics, Law

The current article is dedicated to the analysis of political dialogue between Washington and the Taliban, also, problems and perspectives of establishment of direct intra-afghan talks in the context of ensuring the regional security in Central Asia.


Penn State’S School Of Public Affairs Security-Related Academic Programs Amid The Novel Coronavirus Catastrophe, Alexander Siedschlag Jan 2020

Penn State’S School Of Public Affairs Security-Related Academic Programs Amid The Novel Coronavirus Catastrophe, Alexander Siedschlag

Publications

Due to its large OL student population, Penn State’s School of Public Affairs had (unintended) applicable crisis contingency protocols in place prior to the COVID-19 outbreak. With the support of our college’s Center for Teaching Excellence, many traditional F2F residential courses had already been set up on our learning management system (LMS), Canvas. As a result, many of our school’s traditional students and faculty had a handle on using Canvas and remote learning technology. The center enhanced and focused its services to faculty as COVID-19 evolved (Center for Teaching Excellence, 2020). As the COVID-19 crisis hit Penn State during the …


Iraq Programme Report 2020, Unmas Jan 2020

Iraq Programme Report 2020, Unmas

Global CWD Repository

In 2020, UNMAS Iraq prioritised the following areas of support:

  • Support government and national mine action entities with managing, regulating, and coordinating a mine action response through Technical Support (TS) initiatives;
  • Deliver Explosive Ordnance Risk Education (EORE) at the community and national level; and
  • Provide Explosive Hazard Management (EHM) response in support of humanitarian and stabilization efforts.

Due to the nature of threats posed by EO, UNMAS and its implementing partners are among the first responders allowing the humanitarian community and local authorities to intervene quickly and efficiently to help civilians.

A significant mine action capacity gap remains in Iraq. …


Landmine Monitor 2020, Icbl-Cmc Jan 2020

Landmine Monitor 2020, Icbl-Cmc

Global CWD Repository

This is the 22nd annual Landmine Monitor report. It is the sister publication to the Cluster Munition Monitor report, first published in November 2010.

Landmine Monitor 2020 provides a global overview of the landmine situation. Chapters on developments in specific countries and other areas are available in online Country Profiles at www.the-monitor.org/cp.

Landmine Monitor covers mine ban policy, use, production, trade, and stockpiling; includes information on developments and challenges in assessing and addressing the impact of mine contamination and casualties through clearance, risk education, and victim assistance; and documents international and national support for mine action. This report focuses on …


Towards An Experimental Testbed To Study Cyber Worm Behaviors In Large Scale Networks, Harish Kunta, Bhavya Induri, Anu G. Bourgeois, David Maimon, Ashwin Ashok Jan 2020

Towards An Experimental Testbed To Study Cyber Worm Behaviors In Large Scale Networks, Harish Kunta, Bhavya Induri, Anu G. Bourgeois, David Maimon, Ashwin Ashok

EBCS Presentations

A worm is a malicious agent that propagates across networks of devices creating negative impacts on the devices it is able to reach and infect. Currently, there is very limited information in cybersecurity research regarding worm behavior across real networks of devices, particularly in large scale networks (e.g. campus networks, office networks, IoT etc.). This paper positions an experimental testbed that can be used for studying worm behaviors in large scale networks. In particular, this research aims to setup an infrastructure to empirically study worm generation, propagation, attacks, policies and antidote (intervention) mechanisms through a unified experimental testbed. As a …


National Security Vs. Human Rights: A Game Theoretic Analysis Of The Tension Between These Objectives, Aniruddha Bagchi, Jomon Aliyas Paul Jan 2020

National Security Vs. Human Rights: A Game Theoretic Analysis Of The Tension Between These Objectives, Aniruddha Bagchi, Jomon Aliyas Paul

Faculty and Research Publications

We explore why human rights violations take place in the midst of a rebellion. Authoritarian governments may not care for human rights but surprisingly several democratic governments have also condoned such violations. We show that the primary cause of such violations is faulty intelligence. There are two type of defective intelligence that can occur viz., missed alarm and false alarm. We consider each of these cases and determine the optimal human rights standard of the government. We then examine the effect of a decrease in the human rights standard on the probability of quelling the rebellion. In our theoretical model, …


From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia Jan 2020

From The Legal Literature: Criminalizing Propaganda: J. Remy Green’S Argument To Digitize Brandenburg, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: Automating Police, Francesca Laguardia Jan 2020

From The Legal Literature: Automating Police, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia Jan 2020

From The Legal Literature: Disentangling Prison And Punishment, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia Jan 2020

From The Legal Literature: The Threat And Promise Of Police Use Of Dna Databases, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

No abstract provided.


Food, Familiarity, And Forecasting: Modeling Coups With Computational Methods, Joshua Lambert Jan 2020

Food, Familiarity, And Forecasting: Modeling Coups With Computational Methods, Joshua Lambert

Electronic Theses and Dissertations, 2020-

Military coups are the most consequential breakdown of civil-military relations. This dissertation contributes to the explanation and prediction of coups through three independent quantitative analyses. First, I argue that food insecurity is an important determinant of coups. The presence of hunger can generate discontent in society and subsequently alter coup plotter opportunities. Furthermore, I show that the presence of chronic hunger can condition the effect of increasing development. While increasing levels of development have been shown to limit coup proclivity, a state experiencing chronic hunger will recognize the fundamental failure of basic needs provision. As development increases, the presence of …


Improving Foreign Militaries -- The Effects Of U.S. Military Aid In The Form Of International Military Education And Training Programs, Sandor Fabian Jan 2020

Improving Foreign Militaries -- The Effects Of U.S. Military Aid In The Form Of International Military Education And Training Programs, Sandor Fabian

Electronic Theses and Dissertations, 2020-

Great powers have often sought to achieve their strategic goals through the allocation of military aid. The United States is no exception, as it has frequently used military aid to influence the policies and military capacity of its allies and partners. However, our understanding of the effects of US military aid on the conflict behavior of recipient states - and especially the mechanisms underlying these effects - remains poorly understood. The results of previous studies of U.S. military aid are often contradictory, and are mostly based on over-aggregated, country-level data. In this dissertation, I argue that examining the individual-level effects …


A Persistent Danger: Unexploded Ordnance In Populated Areas, Npa, Mines Advisory Group, Humanity And Inclusion Jan 2020

A Persistent Danger: Unexploded Ordnance In Populated Areas, Npa, Mines Advisory Group, Humanity And Inclusion

Global CWD Repository

The United Nations, the International Committee of the Red Cross, and the International Network on Explosive Weapons have convincingly documented that the use of explosive weapons (especially those with wide area effects) in populated areas (EWIPA) creates an unacceptably high risk of indiscriminate harm. As humanitarian mine action organizations working in urban environments, we see this harm being done in numerous conflict zones every day.

Discussion of the harm caused by EWIPA typically focuses on the immediate effects of these weapons when they explode, as well as reverberating effects leading to displacement; damage to vital services such as healthcare, water, …


Palestine Programme Eore Portfolion 2019-2020, Unmas Jan 2020

Palestine Programme Eore Portfolion 2019-2020, Unmas

Global CWD Repository

The persistent conflict faced by the Palestinian population has resulted in large areas of the Palestine being contaminated by various ERW. The key threats differ regionally between Gaza and the West Bank Areas A, B and C. Whereas Gaza has been continually exposed to ERW including Israeli Aerial Bombs; the West Bank is contaminated with a mixture of mines. ERW and Riot Control Agents such as tear gas.

The UNMAS Palestine programme has worked hard to mitigate the impact of the Palestine Israel conflict in Gaza. Unfortunately, the presence of ERW is indiscriminate in Gaza and there is a possibility …


On Environmental Law, Climate Change, And National Security Law, Mark P. Nevitt Jan 2020

On Environmental Law, Climate Change, And National Security Law, Mark P. Nevitt

Faculty Articles

This Article offers a new way to think about climate change. Two new climate change assessments—the 2018 Fourth National Climate Assessment (“NCA”) and the United Nations Intergovernmental Panel on Climate Change’s Special Report on Climate Change— prominently highlight climate change’s multifaceted national security risks. Indeed, not only is climate change an environmental problem, it also accelerates existing national security threats, acting as both a “threat accelerant” and “catalyst for conflict.” Further, climate change increases the intensity and frequency of extreme weather events while threatening nations’ territorial integrity and sovereignty through rising sea levels. It causes both internal displacement within nations …


Solidarity In Action: Norwegian People's Aid Annual Report 2019, Npa Jan 2020

Solidarity In Action: Norwegian People's Aid Annual Report 2019, Npa

Global CWD Repository

Norwegian People’s Aid is an important agency in terms of global efforts for a mine-free world, carrying out humanitarian clearance of mines and explosives in 24 countries in 2019.

In the autumn of 2019, many countries around the world, including those in Latin America and the Middle East,

were witness to mass popular demonstrations. In many places, Norwegian People’s Aid partner organisations

played a leading role. We had 221 partner organisations in 19 countries in 2019 and it becomes clearer each

day how important our partners are as agents of social change. They are at the forefront of popular mobilisation, …


United States Department Of Defense Acquisition Of Leading-Edge Information Technology Services And The Impact Of Public Market Research On Efficiency And Effectiveness, Thomas Denning Jan 2020

United States Department Of Defense Acquisition Of Leading-Edge Information Technology Services And The Impact Of Public Market Research On Efficiency And Effectiveness, Thomas Denning

West Chester University Doctoral Projects

This dissertation examines the acquisition of leading-edge IT services (LEITS), like those associated with cyber, agile software development, and cloud migration. In an effort to build on previous research, the purpose of this dissertation is twofold: to examine how Public Market Research impacts the LEITS acquisition process in the DoD and to discover strengths and value-added components that exist in the current government acquisition process leading to greater efficiency and effectiveness. Through a mixed methods approach, this dissertation provides recommendations for how to conduct the most efficient and effective LEITS acquisitions, striving to maximize a constrained budget, minimize time to …


A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener Jan 2020

A Relentless War: America, Israel, And The Fight Against Terrorism, Elyse Keener

Senior Honors Theses

For Israel, terrorism has plagued the nation since its beginning. Terrorism rears its ugly head in a variety of ways and for a variety of reasons; however, in both the United States and Israel, Islamic extremism has presented itself as the largest threat. Since its birth as a nation, the United States has been involved in numerous conflicts, from the Revolutionary War to World War II and beyond. These wars were fought between nation-states and traditional powers, but since the attacks on 9/11, the United States finds itself in a new kind of conflict against a different kind of enemy. …


Systemic Methodology For Cyber Offense And Defense, C. Ariel Pinto, Matthew Zurasky Jan 2020

Systemic Methodology For Cyber Offense And Defense, C. Ariel Pinto, Matthew Zurasky

Engineering Management & Systems Engineering Faculty Publications

This paper describes a systemic method towards standardization of a cyber weapon effectiveness and effectiveness prediction process to promote consistency and improve cyber weapon system evaluation accuracy – for both offensive and defensive postures. The approach included theoretical examination of existing effectiveness prediction processes for kinetic and directed energy weapons, complemented with technical and social aspects of cyber realm. The examination highlighted several paradigm-shifts needed to transition from purely kinetic-based processes and transition into the realm of combined kinetic and cyber weapons. Components of the new method for cyber weapons are cyber payload assessment, effects identification, and target assessment. The …


No Soldiers Left Behind: An Iot-Based Low-Power Military Mobile Health System Design, James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, Paul Haskell-Dowland Jan 2020

No Soldiers Left Behind: An Iot-Based Low-Power Military Mobile Health System Design, James Jin Kang, Wencheng Yang, Gordana Dermody, Mohammadreza Ghasemian, Sasan Adibi, Paul Haskell-Dowland

Research outputs 2014 to 2021

© 2013 IEEE. There has been an increasing prevalence of ad-hoc networks for various purposes and applications. These include Low Power Wide Area Networks (LPWAN) and Wireless Body Area Networks (WBAN) which have emerging applications in health monitoring as well as user location tracking in emergency settings. Further applications can include real-Time actuation of IoT equipment, and activation of emergency alarms through the inference of a user's situation using sensors and personal devices through a LPWAN. This has potential benefits for military networks and applications regarding the health of soldiers and field personnel during a mission. Due to the wireless …


Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm Jan 2020

Quantifying The Need For Supervised Machine Learning In Conducting Live Forensic Analysis Of Emergent Configurations (Eco) In Iot Environments, Victor R. Kebande, Richard A. Ikuesan, Nickson M. Karie, Sadi Alawadi, Kim-Kwang Raymond Choo, Arafat Al-Dhaqm

Research outputs 2014 to 2021

© 2020 The Author(s) Machine learning has been shown as a promising approach to mine larger datasets, such as those that comprise data from a broad range of Internet of Things devices, across complex environment(s) to solve different problems. This paper surveys existing literature on the potential of using supervised classical machine learning techniques, such as K-Nearest Neigbour, Support Vector Machines, Naive Bayes and Random Forest algorithms, in performing live digital forensics for different IoT configurations. There are also a number of challenges associated with the use of machine learning techniques, as discussed in this paper.


Unmas Annual Report 2020, Unmas Jan 2020

Unmas Annual Report 2020, Unmas

Global CWD Repository

UNMAS colleagues in the field and at Headquarters drew on their reserves of resilience and empathy to deliver life-saving programmes with innovative approaches - such as the early inclusion of COVID messaging in risk education campaigns. We relied on and deepened our partnerships. Working closely with national authorities, donors and implementing partners we managed to maintain and eventually resume operations and serve communities that live with the constant threat of explosive ordnance.

Allow me to highlight some of our accomplishments of 2020:

UNMAS responded to a request from the Ethiopian government to assess the threat in parts of that country, …


A Marriage Of Intersecting Needs: The Procurement Of The Canadian Patrol Frigates By The Pierre Trudeau Government, 1977-1983, Garison Ma Jan 2020

A Marriage Of Intersecting Needs: The Procurement Of The Canadian Patrol Frigates By The Pierre Trudeau Government, 1977-1983, Garison Ma

Theses and Dissertations (Comprehensive)

In December 1977, the Liberal government of Pierre Elliot Trudeau authorized the Department of National Defence to begin the acquisition of new warships for the navy. The decision to acquire fully combat capable warships was a shocking decision which marked the conclusion of a remarkable turnaround in Canadian defence policy. The navy, which had grown into a substantial and capable force during the early Cold War in the 1950s, had been in a steady decline since the mid-1960s as a result of the shifts in defence policy, cuts in personnel, and still deeper cuts to the capital funding needed to …


Cute Panda Or Evil Dragon? Market Economy, Conflict Behavior And China's Peaceful Rise, Xiongwei Cao Jan 2020

Cute Panda Or Evil Dragon? Market Economy, Conflict Behavior And China's Peaceful Rise, Xiongwei Cao

Electronic Theses and Dissertations, 2020-

China has two contrasting images in the West: a cute panda and an evil dragon. In recent years, a near-consensus seems to be forming among policy makers in Washington that the People's Republic of China (PRC) is more of an evil dragon than a cute panda, using "sharp power" to threaten U.S. interests and world peace. The PRC is regarded by the current U.S. administration as a "strategic competitor," and a new Cold War seems to be looming between the world's two largest economies. Is the rise of China destined to cause conflicts or even war? After analyzing the conflict …


Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards Jan 2020

Transportation, Terrorism And Crime: Deterrence, Disruption And Resilience, Daniel C. Goodrich, Frances L. Edwards

Mineta Transportation Institute

Abstract: Terrorists likely have adopted vehicle ramming as a tactic because it can be carried out by an individual (or “lone wolf terrorist”), and because the skills required are minimal (e.g. the ability to drive a car and determine locations for creating maximum carnage). Studies of terrorist activities against transportation assets have been conducted to help law enforcement agencies prepare their communities, create mitigation measures, conduct effective surveillance and respond quickly to attacks.

This study reviews current research on terrorist tactics against transportation assets, with an emphasis on vehicle ramming attacks. It evaluates some of the current attack strategies, and …


Enemy Combatants And Unitary Executives: Presidential Power In Theory And Practice During The War On Terror, Rohini Kurup Jan 2020

Enemy Combatants And Unitary Executives: Presidential Power In Theory And Practice During The War On Terror, Rohini Kurup

Honors Projects

In the wake of the September 11 attacks, the Bush administration decided that suspected terrorists and those determined to have aided terrorists would be detained and classified as “enemy combatants.” This was a largely new category of prisoners who were neither prisoners of war protected under international law nor civilians. They included noncitizens and citizens—those captured on foreign battlefields and on American soil. They would be detained by the United States, held indefinitely without charge or access to a lawyer, and subject to trial by military commission. The administration’s enemy combatant policies were based on a theory of inherent executive …