Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2019

Security

Discipline
Institution
Publication
Publication Type

Articles 1 - 29 of 29

Full-Text Articles in Social and Behavioral Sciences

City Of Camas City Hall Safety And Security Project Plan, Diane Dyra Dec 2019

City Of Camas City Hall Safety And Security Project Plan, Diane Dyra

CUP Undergraduate Research

This proposal is designed for the City of Camas as a means to create a culture of preparedness, improve safety and security, as well as build resilience. The current state of City Hall allows for the threat to the loss of life and property. Through preparation, education, training, crime prevention through environmental design, and structural improvements, a state of safety, security, and continued critical functionality for the community can be met. These improvements allow for the City of Camas to stand by their mission statement, committing to “preserving its heritage, sustaining and enhancing a high quality of life for all …


American Medical Response Active Shooter Project Proposal, Matthew Spong Dec 2019

American Medical Response Active Shooter Project Proposal, Matthew Spong

CUP Undergraduate Research

American Medical Response (AMR) Tukwila is the hub of its Western Washington operations. With over 400 employees and multiple customers and guests at any given time, they must have measures in place to ensure the safety and security of those on the premises. In the summer of 2019, AMR Tukwila experienced a possible active shooter incident. While this is a low occurrence event it proves the need for having a plan and procedures in place. Active shooter situations have steadily risen over the years and can happen without warning. This proposal identifies problems and solutions so that AMR Tukwila employees, …


Dronescape:Distributed Rapid On-Site Network Self-Deploying Cellular Advanced Phone Environment, Daryl Johnson, Bill Stackpole Dec 2019

Dronescape:Distributed Rapid On-Site Network Self-Deploying Cellular Advanced Phone Environment, Daryl Johnson, Bill Stackpole

Presentations and other scholarship

When disasters happen, the speed with which first responders and emergency personnel can contact and be contacted by the people affected by the disaster during the first minutes or hours is critical. Early communications can make the difference between life and death. During a disaster communications infrastructure of the affected area is likely to be compromised. This project proposes an inexpensive, rapidly deployable cloud of autonomous drones, each coupled with a micro-cellular base station that deploys from a transportable deployment module. The goal is to temporarily restore communications for both first responders to communicate amongst themselves as well as for …


Refugee Resettlement In The U.S.: The Hidden Realities Of The U.S. Refugee Integration Process, Bienvenue Konsimbo Dec 2019

Refugee Resettlement In The U.S.: The Hidden Realities Of The U.S. Refugee Integration Process, Bienvenue Konsimbo

Master of Science in Conflict Management Final Projects

From the 1946 to the 1980 Act, more than two million refugees have resettled in the U.S. (Eby, Iverson, Smyers, & Kekic, 2011p.). This has made the U.S. the largest of the 10 resettlement countries (Xu, 2007, p. 38). The U.S. department of state (DOS)’ hope is to give “the refugee a leg up on their journey to self-sufficiency” (Darrow, 2015, p. 92). For these millions of refugees, their expectations are to find “employment, education, to provide a better environment for their children, and to integrate into the community” (Xu, 2007p.38).

However, this pre-package deal is not without repercussions or …


Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa Nov 2019

Understanding The Motivations And Pathways Of Women And Girls' Involvement In Terrorism In Nigeria, Peculiar M. Awa

FIU Electronic Theses and Dissertations

This study examines the experiences of 20 women and girls who lived in the Boko Haram camp in 2014-2018 and had varying levels of engagement in the organization's activities. The study employs a qualitative phenomenological in-depth interview methodology. Semi-structured interviews conducted in Nigeria and the United States yielded data on the experiences of the respondents before, during, and after their lives with Boko Haram. Based on the analysis of interview responses and field notes, several themes emerged. Overall findings suggest that family and community dynamics play a significant role in terrorism in Nigeria. The study found that early child marriage …


The Future Of Security, Yesterday: All About Authentication, Authorization And More…, Rachel S. Evans Sep 2019

The Future Of Security, Yesterday: All About Authentication, Authorization And More…, Rachel S. Evans

Articles, Chapters and Online Publications

Rachel Evans crafts a summary of useful terminology aimed at other new CS-SIS members and attempts to demystify by way of definitions and explanations the tangled concepts of authentication and authorization.

The CS-SIS Blog Committee is charged with providing CS-SIS members with timely and useful information through an official yet informal medium about relevant subjects for the membership, including the activities of the members, committees, and Executive Board.


Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans Sep 2019

Transhumanism (Dot) Mil: A Bibliometric Analysis Of Technoprogressive Terms In Military Publications, K. Durwood Evans

Library Philosophy and Practice (e-journal)

Has transhumanism influenced military thinking? Previous work found that transhumanist terms did not appear widely in military publications. The present work analyzes and improves on previous content analysis of transhumanist terms in military literature using the tools of library and information studies.


Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri Sep 2019

Current Trends In Small Unmanned Aircraft Systems: Implications For U.S. Special Operations Forces, J. Philip Craiger, Diane Maye Zorri

Publications

This paper assesses current trends in small unmanned aircraft systems (sUAS) technology and its applications to the Special Operations Forces (SOF) community. Of critical concern to SOF is that commercial-off-the-shelf (COTS) sUAS technologies are relatively inexpensive, improving at a dramatic rate, and widely available throughout the world. Insurgents, terrorists, violent extremist organizations (VEOs) and other nefarious actors have used COTS sUAS to conduct offensive attacks as well as to develop battlefield situation awareness; these technological improvements combined with their widespread availability will require enhanced and rapidly adaptive counter-sUAS measures in the future. To understand the most current trends in the …


Pipeline Or Pipe Dream: The Potential Of Peace Pipelines As A Solution To Fragmentation And Energy Insecurity In The European Union, Afton J. Apodaca, Julia Greensfelder Aug 2019

Pipeline Or Pipe Dream: The Potential Of Peace Pipelines As A Solution To Fragmentation And Energy Insecurity In The European Union, Afton J. Apodaca, Julia Greensfelder

Claremont-UC Undergraduate Research Conference on the European Union

In recent years, the European Union (EU) has developed its energy policy to adapt to an evolving global market calling for cleaner energy while maintaining and enhancing its energy security as consumption has remained constant. While the EU works towards this goal, it also seeks to reduce Russian dominance in its energy markets. The EU’s internal politics have become more fragmented with the Eurozone and refugee crises, which has made the coordination of Union policies difficult as leaders are unable to form strong domestic policy alone to counter Russian presence in the energy market. Lacking a united energy policy against …


Investment Policy In International Relations: Opportunities And Risks For The Economy Of Uzbekistan, S. A. Voronin, Sh. Sh. Shadmanov Jun 2019

Investment Policy In International Relations: Opportunities And Risks For The Economy Of Uzbekistan, S. A. Voronin, Sh. Sh. Shadmanov

International Relations: Politics, Economics, Law

The article focuses on the investment relationships between China and Central Asian countries to draw conclusions for the economy of Uzbekistan. It sheds light on the opportunities that Uzbekistan can have in relations with China at the same time notes some of the possible risks arising because of this.


The Concepts Of Force And Peace In Foreign Policy Of The Republic Of Uzbekistan, Khamrayev Bekhzod May 2019

The Concepts Of Force And Peace In Foreign Policy Of The Republic Of Uzbekistan, Khamrayev Bekhzod

Uzbekistan Journal of Oriental Studies

In this article, the conceptual and doctrinal foundations of the ideas of non-use of force and ensuring peace in the foreign policy of Uzbekistan are investigated in chronological order. The foreign policy of Uzbekistan is, first of all, a course aimed at ensuring vital tasks, primarily for the state and society. Uzbekistan's foreign policy strategy is primarily aimed at ensuring integration into the world community. The deepening of the country's integration into the world community in the current difficult conditions of international relations is an important task facing the foreign policy of Uzbekistan. The conceptual idea of foreign policy and …


The Use Of Ict For Security And Theft Prevention In Two University Libraries In Nigeria, Akor Usman Philip, Justina N. Ekere Dr, Solomon O. Akor Mr May 2019

The Use Of Ict For Security And Theft Prevention In Two University Libraries In Nigeria, Akor Usman Philip, Justina N. Ekere Dr, Solomon O. Akor Mr

Library Philosophy and Practice (e-journal)

The study investigated the use of ICT for security and theft prevention in two university libraries in Nigeria. Population of the study is made up of 80 library staff of the two universities, 40 library staff from Umaru Musa Yar’adua University, Katsina and 40 library staff from Al-Qalam University Katsina. Five research questions guided the study. The data was analyzed with the use of simple statistical tools like frequencies and percentages. Findings of the study revealed that maximum security in the libraries will prevent theft mutilation. It also revealed that a video surveillance system working in conjunction with a barcode …


The Role Of Women In Terrorism, Zeynep Bayar May 2019

The Role Of Women In Terrorism, Zeynep Bayar

Dissertations, Theses, and Capstone Projects

The main purpose of this paper is to understand what motivate women to join terrorist groups and why these organizations prefer to work with female terrorists. Although each woman has different reasons to involve in terrorist groups, this research demonstrates 'religious, political and personal' reasons as the major motivating factors. This study also focuses on the question of why women are the targets of terror recruiters. In order to answer these, the research analysis examines 'psychological, gender, and media' factors as major recruitment reasons of terrorist organizations. This study also analyzes the similarities and differences between female terrorists' profiles of …


The Categorized And Invisible: The Effects Of The ‘Border’ On Women Migrant Transit Flows In Mexico, Carla Angulo-Pasel May 2019

The Categorized And Invisible: The Effects Of The ‘Border’ On Women Migrant Transit Flows In Mexico, Carla Angulo-Pasel

Political Science Faculty Publications and Presentations

In an increasingly globalized world, border control is continuously changing. Nation-states grapple with ‘migration management’ and maintain secure borders against ‘illegal’ flows. In Mexico, borders are elusive; internal and external security is blurred, and policies create legal categories of people whether it is a ‘trusted’ tourist or an ‘unauthorized’ migrant. For the ‘unauthorized’ Central American woman migrant trying to achieve safe passage to the United States (U.S.), the ‘border’ is no longer only a physical line to be crossed but a category placed on an individual body, which exists throughout her migration journey producing vulnerability as soon as the Mexico–Guatemala …


India’S Surgical Strikes: Response To Strategic Imperatives, Karthika Sasikumar Apr 2019

India’S Surgical Strikes: Response To Strategic Imperatives, Karthika Sasikumar

Faculty Publications

In September 2016, militants who were allegedly backed by Pakistan attacked an Indian Army camp in Uri. The government in New Delhi was facing important regional elections. It faced intense public pressure to muster a military response. Such a response, however, ran the risk of triggering a nuclear exchange. Ten days after the Uri attack, India reported that it had carried out ‘surgical strikes’ on terrorist training camps in Pakistan-controlled territory. The paper examines this specific episode in India–Pakistan deterrence dynamics, focusing on the nomenclature ‘surgical strikes’. The paper argues that the choice of the term itself is new and …


Silenced Bodies: (En)Gendering Syrian Refugee Insecurity In Lebanon, Jessy Abouarab Mar 2019

Silenced Bodies: (En)Gendering Syrian Refugee Insecurity In Lebanon, Jessy Abouarab

FIU Electronic Theses and Dissertations

While there has been a shift in security studies from the security of states to that of people, realpolitik still takes place under the banner of an emerging discourse of ‘refugee crisis.’ Refugee insecurities are (en)gendered and experienced where their depth and breadth pose significant challenges to asylum seekers, neighboring host-states, and humanitarian agencies. To this end, this research captures the unique dynamics of a South-South refugee crisis in Lebanon, in which Syrians residents make up nearly one-third of its population. It applies a transnational feminist framework to trace how refugee security norms get defined, are managed, and how they …


Shanghai Cooperation Organization - The Main Factor In The Regional Policy Of Pakistan, Ramatullayev Muhammad Rozimbetovich Mar 2019

Shanghai Cooperation Organization - The Main Factor In The Regional Policy Of Pakistan, Ramatullayev Muhammad Rozimbetovich

Uzbekistan Journal of Oriental Studies

The article discusses the participation of the Islamic Republic of Pakistan in the Shanghai Cooperation Organization (SCO) and the influence of the organization as the main factor of regional cooperation in today's context. Today Pakistan considers membership in the SCO as a cornerstone of its regional policy. Participation in the Shanghai organization allows Islamabad to strengthen its international position, facilitate the realization of geostrategic and geo-economic potential, develop relations with the Russian Federation, People's Republic of China, Central Asian countries, strengthen its positions in the field of regional security, and also “restrain” its traditional opponent – India. The effectiveness of …


Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe Mar 2019

Frameup: An Incriminatory Attack On Storj: A Peer To Peer Blockchain Enabled Distributed Storage System, Xiaolu Zhang, Justin Grannis, Ibrahim Baggili, Nicole Lang Beebe

Electrical & Computer Engineering and Computer Science Faculty Publications

In this work we present a primary account of frameup, an incriminatory attack made possible because of existing implementations in distributed peer to peer storage. The frameup attack shows that an adversary has the ability to store unencrypted data on the hard drives of people renting out their hard drive space. This is important to forensic examiners as it opens the door for possibly framing an innocent victim. Our work employs Storj as an example technology, due to its popularity and market size. Storj is a blockchain enabled system that allows people to rent out their hard drive space …


Police Reform In Ukraine Since The Euromaidan: Police Reform In Transition And Institutional Crisis, Nicholas Pehlman Feb 2019

Police Reform In Ukraine Since The Euromaidan: Police Reform In Transition And Institutional Crisis, Nicholas Pehlman

Dissertations, Theses, and Capstone Projects

Why does reform of law enforcement remain so elusive in post-communist countries like Ukraine, despite political upheaval, a public mandate for reform and substantial international assistance? Which components contribute to the success and sustainability of a police reform and which factors produce political will from political leaders to implement the difficulties of police reform? This dissertation argues that in addition to massive corruption and the politics of insecurity, the greatest challenges to reform of Ukraine’s law enforcement system is political competition, resulting in the politicization of law enforcement institutions and law enforcement policy. Political competition is based in Ukraine’s fractured …


Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor Jan 2019

Do Government Shut Downs Shut Down Aviation Security?, Ibpp Editor

International Bulletin of Political Psychology

There have been reports of a growing number of Transportation Security Administration (TSA) agents calling in sick and refusing to work for no pay (1). The immediate question becomes, what’s the impact on aviation security? The answer is a negative one, but not as negative as one might think, and one only adding to festering, pre-shutdown problems.


Disaster And Security Preparedness Of Libraries In India, Sandip Pathak Jan 2019

Disaster And Security Preparedness Of Libraries In India, Sandip Pathak

Library Philosophy and Practice (e-journal)

Academic libraries are the “heart” of the learning community, providing a place for Users and advance their knowledge. Simmonds, (2001). Libraries must be safe from security threats and physical weakness. To secure and protectthe collections will facilitate to libraries give an efficient service in response to theinformation required of the university community


Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger Jan 2019

Inception: Virtual Space In Memory Space In Real Space, Peter Casey, Rebecca Lindsay-Decusati, Ibrahim Baggili, Frank Breitinger

Electrical & Computer Engineering and Computer Science Faculty Publications

Virtual Reality (VR) has become a reality. With the technology's increased use cases, comes its misuse. Malware affecting the Virtual Environment (VE) may prevent an investigator from ascertaining virtual information from a physical scene, or from traditional “dead” analysis. Following the trend of antiforensics, evidence of an attack may only be found in memory, along with many other volatile data points. Our work provides the primary account for the memory forensics of Immersive VR systems, and in specific the HTC Vive. Our approach is capable of reconstituting artifacts from memory that are relevant to the VE, and is also capable …


Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias Jan 2019

Analyzing Small Businesses' Adoption Of Big Data Security Analytics, Henry Mathias

Walden Dissertations and Doctoral Studies

Despite the increased cost of data breaches due to advanced, persistent threats from malicious sources, the adoption of big data security analytics among U.S. small businesses has been slow. Anchored in a diffusion of innovation theory, the purpose of this correlational study was to examine ways to increase the adoption of big data security analytics among small businesses in the United States by examining the relationship between small business leaders' perceptions of big data security analytics and their adoption. The research questions were developed to determine how to increase the adoption of big data security analytics, which can be measured …


Crisis Communication Systems Among K-12 School Principals, Tomicka Nicole Williams Jan 2019

Crisis Communication Systems Among K-12 School Principals, Tomicka Nicole Williams

Walden Dissertations and Doctoral Studies

Crisis communication systems (CCS) in educational settings have been challenged by mass casualty events including shootings, natural disasters, and health outbreaks in the United States. The U.S. federal government and the U.S. Department of Education have created safety and security instructions to manage these complex and diverse security issues, yet they do not address the role of school leaders within a CCS. Using complex adaptive systems as the theoretical construct, the purpose of this qualitative case study was to examine CCSs utilized by school leaders within a single public school district in the United States. The research questions are focused …


“Insignificant Exceptions”: Confronting Sexism In Armed Conflict Through Gender-Aware Disarmament, Demobilization, And Reintegration, Payson A. Ruhl Jan 2019

“Insignificant Exceptions”: Confronting Sexism In Armed Conflict Through Gender-Aware Disarmament, Demobilization, And Reintegration, Payson A. Ruhl

CMC Senior Theses

This thesis examines the intersection between sex, gender, and armed conflict through an analysis of the female combatant experience. It combines anecdotal evidence and quantitative data from various armed conflicts within the past 50 years to reveal how sexism and gendered conceptions of war influence virtually all aspects of the experience of women and girl combatants. Recognizing sexism as a major player in the recruitment, wartime treatment, demobilization, and reintegration of women and girl combatants, it identifies disarmament, demobilization, and reintegration programs as intervention points where gender-aware planning and implementation can improve outcomes for female combatants in the transition to …


A Slight Re-Telling Of The David And Goliath Story: Surprising Power Dynamics In Proxy Relationships, Ruiyang Wang Jan 2019

A Slight Re-Telling Of The David And Goliath Story: Surprising Power Dynamics In Proxy Relationships, Ruiyang Wang

CMC Senior Theses

This thesis discusses how local forces, despite being the weaker actor in a proxy relationship, manipulate external powers’ support to pursue their own objectives. Three factors – practical advantage, relative will, and diverging objectives – explain this counterintuitive power dynamic. First, local forces have better local knowledge, more extensive networks, and greater legitimacy, which give them leverage and make them desirable partners. Second, local forces' involvement is often existential rather than selective; unlike external powers, local forces are thus unconstrained by domestic political vulnerabilities. This enables them to close the significant power gap with external powers. Third, local forces' objectives …


Airport Policing In Pakistan: Structure, Training, And Issue, Muhammad Israr, Muhammad Abrar Jan 2019

Airport Policing In Pakistan: Structure, Training, And Issue, Muhammad Israr, Muhammad Abrar

International Journal of Aviation, Aeronautics, and Aerospace

Airports are strategically and economically important installations of any country. Airports are the gateway of any country and any incidents at these gateways may harm the very aspects of a country in the comity of nations. What are the types of unlawful interferences that are faced by the aviation industry? The establishment as well as preparedness of the airport security force in Pakistan is described in the detail. The airports security is of prime importance in Pakistan because of the wave of terrorism and security situations all around the country. Airport Security Force (ASF) established in 1976, due to the …


Data Disparity: Tiered Pricing As An Alternative To Consumer Iot Data Privacy Regulations, Matthew Lostocco Jan 2019

Data Disparity: Tiered Pricing As An Alternative To Consumer Iot Data Privacy Regulations, Matthew Lostocco

Honors Theses and Capstones

In recent years, Internet of Things (IoT) devices have exploded on the consumer scene. These emerging products bring new technological capabilities into our everyday lives. IoT is projected to contribute anywhere from $4-11 trillion to the global economy and companies are investing billions of dollars into the technology. However, with the vast amount of data that IoT devices collect, consumers are burdening the risk of having their personal data breached or sold to third parties. This paper first identifies why consumers may be weary or willing towards providing their personal data and how unconscious biases in the purchasing process cause …


The Corporate Security Stratum Of Work: Occupational Ceilings, Progression, And Career Success, Codee Roy Ludbey Jan 2019

The Corporate Security Stratum Of Work: Occupational Ceilings, Progression, And Career Success, Codee Roy Ludbey

Theses: Doctorates and Masters

To meet the challenges of modern society organisations are becoming more complex, and so too are the occupations that support them, including the Corporate Security occupation. Within this complexity progression is a changing security environment that impacts business opportunity and societal expectations due to a shift away from risk acceptance (Beck, 1992). Subsequently, the study investigated the Corporate Security stratum of work within large organisations in order to understand career opportunity, complexity, and influence within the context of the socio-organisational literature. By grounding the study in the underlying theory of Jaques’ (1996) work into General Managerial Hierarchies, the study took …