Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

2022

Security

Discipline
Institution
Publication
Publication Type

Articles 1 - 26 of 26

Full-Text Articles in Social and Behavioral Sciences

Security Implications Of Arctic Climate Change In Russia And The United States, Elaina Meyer Dec 2022

Security Implications Of Arctic Climate Change In Russia And The United States, Elaina Meyer

Political Science

Climate change is altering the world in an unprecedented way which brings about difficulties for world leaders. The Arctic is one particular region where major climate change consequences are being felt. As climate change grows more severe in this region not only will accessibility to the Arctic grow, but interest in the Arctic will grow as interest in Arctic resources heighten. As a result of these changes countries with Arctic borders and interests are going to face a variety of economic and security concerns in the region. This paper specifically looks at the way Russia has and is likely to …


Strategic Petroleum Reserve: Origins And Evolution, Bert Chapman Dec 2022

Strategic Petroleum Reserve: Origins And Evolution, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

The U.S. Strategic Petroleum Reserve (SPR) is located on the Texas and Louisiana Gulf Coasts and has served as a national emergency petroleum supply resource since 1975. Contents of this report include:

  • Information on the historical origins of U.S. national petroleum reserves dating back to 1910.
  • The U.S.’ increasing growth as a petroleum consumer and its energy policy interactions with other countries.
  • How the 1973 Arab Oil Embargo forced drastic changes in U.S. energy policy leading to the SPR’s establishment.
  • The SPR’s legal purpose being creating and maintaining a strategic oil reserve to mitigate against future oil import interruptions or …


Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha Oct 2022

Security Of Information Resources In Academic Libraries In Kwara State, Nigeria, Abdrahman Atanda Moustapha

Library Philosophy and Practice (e-journal)

This study was on the security of information resources in academic libraries in Kwara State, Nigeria. Academic libraries in Kwara State include both private and public institutions. The libraries were predominantly selected for academic purposes, such as Kwara State University, University of Ilorin, Al-Hikmah University, and Kwara State Polytechnic Ilorin. Four research questions and four corresponding objectives of the study were framed. The case study design was approved for research. Targeted sampling was used to select 25 respondents from a pool of 115 professionals in all four academic libraries in Kwara State. Semi-structured interview guides were used to collect data …


Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari Oct 2022

Awareness Of Social Media Privacy & Security: A Study Among Engineering Students In Spsr Nellore Dist., A.P., Nagaraju Kuppugari

Library Philosophy and Practice (e-journal)

This paper presents the results of a study conducted on the engineering student’s awareness of social media privacy and security issues. For this purpose, the survey method was adopted and a questionnaire was administered among the engineering students. The results revealed that majority of the respondents (60.8 percent) are reading the privacy policies on social media Majority of the respondents (76.31 percent) are avoiding friend requests from unknown persons. The study recommends that the users of social media should not assume that all privacy policies are identical; they vary from one platform to another; also, they do not provide sufficient …


Multi-Functional Job Roles To Support Operations In A Multi-Faceted Jewel Enabled By Ai And Digital Transformation, Steven M. Miller Oct 2022

Multi-Functional Job Roles To Support Operations In A Multi-Faceted Jewel Enabled By Ai And Digital Transformation, Steven M. Miller

Research Collection School Of Computing and Information Systems

In this story, we highlight the way in which the use of AI enabled support systems, together with work process digital transformation and innovative approaches to job redesign, have combined to dramatically change the nature of the work of the front-line service staff who protect and support the facility and visitors at the world’s most iconic airport mall and lifestyle destination.


Leader Type And Responses To State-Sponsored Terrorism, Arjun Banerjee Aug 2022

Leader Type And Responses To State-Sponsored Terrorism, Arjun Banerjee

Doctoral Dissertations

State-sponsored terrorism (SST) has for long been used as a tool by countries to inflict costs on rival states without direct confrontation, as the latter risks inviting limited to full-scale war. The literature on SST has so far focused primarily on the motivations, facilitating factors, and the timing of state sponsorship. What has been insufficiently studied, however, are the responses of victim states to SST. Why does state response to SST vary spatio-temporally in different countries, under different governments, and even under different leaders of the same ruling political dispensation in a country? Under what conditions does a state respond …


Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori Jul 2022

Relevance Of Digital Libraries In The Promotion Of Security Through Community Policing Strategies In Rivers State, Nigeria, Adaobi Nwoye, Judith Ugwueke, Chinyere Anigbogu, Christian Olori

Library Philosophy and Practice (e-journal)

No abstract provided.


Online Privacy Challenges And Their Forensic Solutions, Bandr Fakiha Jun 2022

Online Privacy Challenges And Their Forensic Solutions, Bandr Fakiha

Journal of the Arab American University مجلة الجامعة العربية الامريكية للبحوث

In the digital age, internet users are exposed to privacy issues online. Few rarely know when someone else is eavesdropping or about to scam them. Companies, governments, and individual internet users are all vulnerable to security breaches due to the challenges of online privacy ranging from trust and hierarchical control to financial losses. As systems advance, people are optimistic that forensic science will provide long-term interventions that surpass the current solutions, including setting stronger passwords and firewall protection. The future of online privacy is changing, and more practical interventions, such as email, malware, mobile, and network forensics, must be integrated, …


Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa Jun 2022

Security Problems Of Academic Libraries In Nigeria, Angelyna Mindapa

Library Philosophy and Practice (e-journal)

Abstract

Librarians across Nigeria are gradually more concerned with the safety and physical integrity of important intellectual property or properties. Security and prevention of crimes in libraries more specifically academic libraries are necessary library duties for librarians to accomplish. Due to security breaches in university libraries, users at times are not able to get the information resources needed and this makes the library ineffective in satisfying users’ information needs. The security of collections in a library embraces a large number of responsibilities. The cost of acquiring processing, and maintaining collections are soaring. If information materials are stolen or damaged or …


Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He May 2022

Towards Practicalization Of Blockchain-Based Decentralized Applications, Songlin He

Dissertations

Blockchain can be defined as an immutable ledger for recording transactions, maintained in a distributed network of mutually untrusting peers. Blockchain technology has been widely applied to various fields beyond its initial usage of cryptocurrency. However, blockchain itself is insufficient to meet all the desired security or efficiency requirements for diversified application scenarios. This dissertation focuses on two core functionalities that blockchain provides, i.e., robust storage and reliable computation. Three concrete application scenarios including Internet of Things (IoT), cybersecurity management (CSM), and peer-to-peer (P2P) content delivery network (CDN) are utilized to elaborate the general design principles for these two main …


Strategies And Policies In Enforcement Of Security, Human Rights And Development In Papua, Rudy Syamsir, Syaiful Rohman May 2022

Strategies And Policies In Enforcement Of Security, Human Rights And Development In Papua, Rudy Syamsir, Syaiful Rohman

Journal of Terrorism Studies

Papua always an interesting discussion along with the rampant acts of violence against civilians carried out by the Independent Papua Organization (OPM), which were later labeled with various terms such as the Armed Separatist Group (KSB), Armed Criminal Group (KKB), Armed Separatist Criminal Group (KKSB). KKB carried out acts of violence in killing civilians, government officials vandalizing and burning public facilities. Because of the ways that are similar to acts of terrorism, this group is finally called the Armed Terrorism Group (KTB). The Indonesian National Army (TNI) and Indonesian Republic Police (POLRI) security forces have taken repressive actions with armed …


Whose Peace? Grappling With Local Ownership In Sierra Leone, Oscar Mateos, Andreu Solà-Martín May 2022

Whose Peace? Grappling With Local Ownership In Sierra Leone, Oscar Mateos, Andreu Solà-Martín

Peace and Conflict Studies

Local ownership has become a basic tenet of post-conflict peacebuilding strategies sponsored by the International Community. However, research on peacebuilding underlines a gap between policy discourse and actual practice. This paper illustrates the challenges and opportunities posed by the promotion of local ownership by assessing the case of Sierra Leone. This West African country is often labelled as one of the most successful peacebuilding interventions thus far. However, by analysing the interaction between insiders and outsiders during the initial post-conflict phase (1996-2007), this paper concludes that stakeholders perceived differently the meaning and policies associated with the concept of local ownership. …


Terrorism: A Case Study Of The Global Security Threat Of Boko Haram And The Isis Alliance In Nigeria, Emmanuel Ben-Edet May 2022

Terrorism: A Case Study Of The Global Security Threat Of Boko Haram And The Isis Alliance In Nigeria, Emmanuel Ben-Edet

Dissertations (2016-Present)

The literature on terrorism indicates that religion, cultures of origin, and environmental factors play globally critical roles in the emergence of terrorist groups worldwide. Terrorists use violence and threats to strike fear and intimidate people and governments into pursuing their religious, political, and ideological goals. One of the deadliest jihadist groups, Boko Haram, emerged in the early 2000s with a jihadist agenda mainly focused on Nigeria’s Islamization. In 2009, it launched violent attacks in Nigeria, which is Africa’s largest economy, and currently controls a large swathe of territory in its northeastern part. In its desire to create a caliphate, Boko …


Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk May 2022

Law Enforcement Policy And Personnel Responses To Terrorism: Do Prior Attacks Predict Current Preparedness?, Bryce Kirk

Graduate Theses and Dissertations

Terrorism has been on the mind of the American people and politicians alike since the 9/11 attacks over two decades ago. In the years since, there has been a massive shift in law enforcement priorities from community-oriented policing (COP) to homeland security-oriented policing. This was especially evident in the establishment of the Department of Homeland Security (DHS) shortly after the attacks on the World Trade Center and Pentagon in 2001, which was established to aid law enforcement entities with terrorism preparedness. While prior literature has addressed a variety of factors that have contributed to terrorism preparedness, very little research has …


Protecting Our Community From The Hidden Vulnerabilities Of Today’S Intelligent Transportation Systems, Shahab Tayeb May 2022

Protecting Our Community From The Hidden Vulnerabilities Of Today’S Intelligent Transportation Systems, Shahab Tayeb

Mineta Transportation Institute

The ever-evolving technology interwoven into the transportation industry leaves it frequently at risk for cyber-attacks. This study analyzes the security of a common in-vehicle network, the Controller Area Network (CAN), standard in most vehicles being manufactured today. Like many other networks, CAN comes with inherent vulnerabilities that leave CAN implementations at risk of being targeted by cybercriminals. Such vulnerabilities range from eavesdropping, where the attacker can read the raw data traversing the vehicle, to spoofing, where the attacker can place fabricated traffic on the network. The research team initially performed a simulation of CAN traffic generation followed by hardware implementation …


Indicators And Warnings Of Russian Military Offensives, Evan Essex May 2022

Indicators And Warnings Of Russian Military Offensives, Evan Essex

Legacy Theses & Dissertations (2009 - 2024)

Russia’s invasion of Ukraine on February 24, 2022 was the only Russian military offensive that had adequate warning that the Russians would invade. The four previous instances of Russian military operations including intervention in Moldova (1992), invasion of Georgia (2008), annexation of Crimea (2014), and support for separatists in Eastern Ukraine (2014) all occurred without warning that Russia was going to invade and consequently, those target countries had no time to prepare. If NATO, allied combatant commanders, as well as their respective intelligence organizations want to be able to prepare and effectively respond in the future to Russian military operations, …


Digital Privacy In The Home, Kelley Flannery Rowan Apr 2022

Digital Privacy In The Home, Kelley Flannery Rowan

Works of the FIU Libraries

This workshop covers how to stay safe in a digital environment while using the many conveniences a smart home offers. The first half focuses on understanding where the risks are in the digital environment and how to stay safe by creating secure networks and employing strong security tactics with biometrics, passwords, and other available features. The second half focuses on the Internet of Things, covering everything you are likely to find in a smart home. The presentation offers tips on how to reduce the risk of hackers invading your privacy through smart speakers and TVs, as well as addressing the …


Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels Apr 2022

Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels

Student Publications

The global expansion of armed private contractors has led to a revived interest in researching armed private contracting firms, especially investigating how their personnel have functioned as an extension of state foreign policy. However, the literature on the industry contains a confusing diversity of terms when reviewing such firms, whether private military company, private security company, private military security company, or even just mercenary. Using the Singer (2010) ‘tip of the spear’ typology, I analyze the distinctions across armed private contracting firms and discuss the differences between armed private contractors and conventional militaries, armed private contractors and mercenaries, and highlight …


Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law Mar 2022

Law Library Blog (March 2022): Legal Beagle's Blog Archive, Roger Williams University School Of Law

Law Library Newsletters/Blog

No abstract provided.


From Moral Panic To Permanent War: Rhetoric And The Road To Invading Iraq, Kai Philippe Jan 2022

From Moral Panic To Permanent War: Rhetoric And The Road To Invading Iraq, Kai Philippe

Honors Papers

This thesis seeks to understand the conditions in the United States post-9/11 that enabled the Bush administration to pursue a wide-ranging and all-encompassing “War on Terror,” with substantial support from the general public. I am principally focused on two significant facets of the War on Terror: the invasion of Iraq and the establishment of a permanent security state (and the interrelated creation of a new state of exception). I ask why the George W. Bush administration was so successful in generating support for both the invasion and occupation of Iraq, and for policies that violated fundamental civil liberties; I argue …


Taiwanese Perceptions Of China, Taiwan, And Us Relations From 2016 To 2021, Wan-Ling Liao, Armand Christopher C. Rola Jan 2022

Taiwanese Perceptions Of China, Taiwan, And Us Relations From 2016 To 2021, Wan-Ling Liao, Armand Christopher C. Rola

Journal of Public Affairs and Development

In 2016, a dramatic shift in Taiwan's politics caught China's attention. After the inauguration of President Tsai Ing-wen, Beijing increased the pressure on Taiwan. Aside from limiting Taiwan's international space, Beijing had taken other steps. This study aims to review the policy regarding the relationship among Taiwan, the US, and China. The primary data were gathered through interviews with Taiwanese key informants of different age groups. Secondary data were gathered from official documents, online sources, journal and news articles, and books. Based on the analysis of informants' opinions on this issue, the study found that the majority of informants prefer …


Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz Jan 2022

Human Ergonomic Simulation To Support The Design Of An Exoskeleton For Lashing/De-Lashing Operations Of Containers Cargo, Francesco Longo, Antonio Padovano, Vittorio Solina, Virginia D' Augusta, Stefan Venzl, Roberto Calbi, Michele Bartuni, Ornella Anastasi, Rafael Diaz

VMASC Publications

Lashing and de-lashing operations of containers cargo on board containerships are considered as quite strenuous activities in which operators are required to work continuously over a 6 or 8 hours shift with very limited break. This is mostly because containerships need to leave the port as soon as possible and containers loading and unloading operations must be executed with very high productivity (stay moored in a port is a totally unproductive time for a ship and a loss-making business for a shipping company). Operators performing lashing and de-lashing operations are subjected to intense ergonomic stress and uncomfortable working postures. To …


Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai Jan 2022

Relevance Of Internet Of Things To Health Institutions In Clinical Data Management: Implication For Librarians, Faith O. Mesagan, Moses Elechi, Francis O. Adurota, Chinedu Obinna Ejimonye, Onyinyechi G. Ossai

Library Philosophy and Practice (e-journal)

The Internet of Things (IoT) is the internetworking of physical devices which consists of an embedded system with sensors, actuators and network connectivity that enable collection and exchange of data. Each day, we are witnessing the emergence of new technologies that have the capability to embed into our environment and measure the physical, social and contextual phenomenon. The technology behind IOT is driven by various technological forces such as smart devices, wireless network, and pervasive connectivity among others. Data collection, management and accessibility are made easy with Internet of Things IOT. The Internet of Things (IoT) is aimed at formulating …


The Intersection Of Decentralized Security And Decentralized Governance: The Offloading Of State Responsibility In Northern Mali, Max Ober Jan 2022

The Intersection Of Decentralized Security And Decentralized Governance: The Offloading Of State Responsibility In Northern Mali, Max Ober

Pomona Senior Theses

Since democratization in the 1990s, Mali has pursued governmental decentralization policies, ranging from administrative deconcentration to fiscal devolution. In many cases, governmental decentralization is seen as a post-conflict tool aimed at promoting various goals such as development or greater autonomy for some groups and regions. In Mali, several Tuareg rebellions in the northern regions of the country have been a major impetus for decentralization debates. To date, however, governmental decentralization has failed to bring peace and sustained development to the region. Under former Presidents Amadou Toumani Touré (ATT) and Ibrahim Boubacar Keïta (IBK), the central government has used decentralization as …


The Gulf Cooperation Council's Policies Towards Iran, Mohammed Ahmed Al Sayed Jan 2022

The Gulf Cooperation Council's Policies Towards Iran, Mohammed Ahmed Al Sayed

Graduate Research Theses & Dissertations

As the world moves forward in its efforts towards maintaining global security and peace, we witness that many nations face challenges while forming alliances as they encounter threats from neighboring states. The study of alliance formation in the field of international relations is mostly centered around the concept of security, however this thesis will highlight the importance of considering other factors that influence alliance formation such as religion and economy. The thesis will discuss the case of the member states of the Gulf Cooperation Council in dealing with the neighboring Islamic Republic of Iran which is considered a threat to …


Testing The Limits Of International Society? Trust, Aukus And Indo-Pacific Security, Jamal Barnes, Samuel M. Makinda Jan 2022

Testing The Limits Of International Society? Trust, Aukus And Indo-Pacific Security, Jamal Barnes, Samuel M. Makinda

Research outputs 2022 to 2026

When Australia reneged on a AUD$90 billion submarine contract with France in 2021 as it joined AUKUS, a new trilateral military partnership between Australia, the UK and the US, it was accused of lying and breaching France's trust. This perceived act of betrayal not only led to a deterioration in the diplomatic relationship between Australia and France, but it also drew attention to the consequences of violating the norm of pacta sunt servanda—agreements must be kept. Although it is recognized that breaches of trust undermine relationships, what has been underexplored is how a violation of norms can also undermine the …