Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Security

Discipline
Institution
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 568

Full-Text Articles in Social and Behavioral Sciences

Japanese Foreign Security: Why Japan Increased Its Defense Budget And Why It Matters, Mary K. Roark May 2024

Japanese Foreign Security: Why Japan Increased Its Defense Budget And Why It Matters, Mary K. Roark

Chancellor’s Honors Program Projects

No abstract provided.


Securing Securities: Political Risk, Sovereign Debt, And The Anglo-American Financial Power Transition, Michael Lee Apr 2024

Securing Securities: Political Risk, Sovereign Debt, And The Anglo-American Financial Power Transition, Michael Lee

Publications and Research

Under what conditions do countries lose their status as the leading global financial center? Some scholars argue that such shifts follow shortly after transitions in the distribution of other key capabilities (e.g. GDP), while others argue that path dependence or other more bespoke capabilities might be able to sustain financial leadership long after decline in other capabilities. This paper aims to understand the causes of the Anglo-American financial transition. I argue that the ability to manage political risk for investors is critical to the position of countries as financial entrepôts. In the case of British financial leadership, I argue that …


Book Discussion "Innovations In Peace And Security In Africa" Mar 2024

Book Discussion "Innovations In Peace And Security In Africa"

The Journal of Social Encounters

No abstract provided.


Protecting The Integrity Of Archives, Sean Daigle Jan 2024

Protecting The Integrity Of Archives, Sean Daigle

School of Information Sciences Student Scholarship

This article examines the problem of fraudulent and stolen materials being introduced into archives. If these issues become common enough, people will not trust archives or history itself. Archivists can fight these problems by learning how to spot potential sellers of stolen or fraudulent items. They can also catalog unique aspects of their collections and share them on the internet, dedicate more resources to security, and hire experts when items’ authenticity is called into question. The most helpful step they can take, however, is being so diligent about establishing provenance that provenance becomes a security measure in itself. Ultimately, resources …


التجربة الأردنية في تطبيق مفهوم الشرطة المجتمعية المعاصرة, Mahmoud Saleh B. Al Sheyyab, Mahmoud Abdul Kareem Muffarrej Alzyod Jan 2024

التجربة الأردنية في تطبيق مفهوم الشرطة المجتمعية المعاصرة, Mahmoud Saleh B. Al Sheyyab, Mahmoud Abdul Kareem Muffarrej Alzyod

Journal of the Association of Arab Universities for Research in Higher Education (مجلة اتحاد الجامعات العربية (للبحوث في التعليم العالي

هدف المقال التعرف إلى التجربة الأردنية في تطبيق مفهوم الشرطة المجتمعية المعاصرة. تم استخدام المنهج الوصفي التحليلي لتحقيق أهداف الدراسة، وقد أشارت النتائج إلى أن تجربة الشرطة المجتمعية في مديرية الأمن العام في المملكة الأردنية الهاشمية مبنية على توجيهات ملكية سامية ومتابعة مباشرة ومستمرة من قيادة مديرية الأمن العام بناء على الاطلاع على تجارب دولية وإدراك أهمية الشرطة المجتمعية في نجاح إستراتيجية الأمن العام، كما أثبتت الدراسة أن المملكة الأردنية الهاشمية نجحت في تطبيق معاصر ونموذجي للشرطة المجتمعية ويؤكد ذلك المرتبة المميزة التي حققها الأردن في عدد من التقارير الدولية من مؤسسات عريقة ومحايدة والإحصائيات الرسمية الصادرة بخصوص معدل الجريمة …


Police And Civilians Fractured Relationship In The Northern Region Of Ghana: A Search For A Common Ground For Internal Security, Mohammed Gadafi Ibrahim Jan 2024

Police And Civilians Fractured Relationship In The Northern Region Of Ghana: A Search For A Common Ground For Internal Security, Mohammed Gadafi Ibrahim

Journal of African Conflicts and Peace Studies

This study investigates the fractured relationship between Police and Civilians in Ghana's Northern Region, leading to a breakdown of trust and cooperation in maintaining internal security. The theoretical basis for this study rests on the Social Dominance Theory (SDT) and the Contact Theory (CT). Through a qualitative approach involving purposive sampling, in-depth interviews, and focus group discussions, the study examines the structural factors contributing to this fractured relationship. Analysis using the constant comparative technique revealed that the legitimacy of the Ghana Police Service, public perceptions, police conduct, youth indiscipline, and low level of knowledge on the Rule of Law are …


Serving With Pride: Analyzing Lgbtq+ Personnel Policy In The U.S. Military, Sonja Woolley Jan 2024

Serving With Pride: Analyzing Lgbtq+ Personnel Policy In The U.S. Military, Sonja Woolley

CMC Senior Theses

This thesis examines the evolution of LGBTQ+ personnel policies in the U.S. military, analyzing how these changes reflect broader social transformations and the military’s role as both a mirror and catalyst in societal shifts. It traces the historical roots of discriminatory practices against queer and transgender servicemembers, identifying key periods of reform and resistance. Using institutional theory to dissect the mechanisms of policy adaptation, this paper focuses on coercive, mimetic, and normative isomorphism, which illustrate the complex interplay between external societal pressures, internal demands for legitimacy, and the professionalization of the military. Through detailed case studies, the thesis highlights how …


Citizen Empowerment As A Police Force Multiplier: Reproducing Social Domination Through A 21st Century Personal Safety App, Justin Turner, Travis Milburn Jan 2024

Citizen Empowerment As A Police Force Multiplier: Reproducing Social Domination Through A 21st Century Personal Safety App, Justin Turner, Travis Milburn

Faculty Publications—Sociology and Anthropology

Citizen is a digital mapping platform and personal safety app that boasts over 10 million users in the United States. Through the platform, users can report crimes, map safe routes, or rely on the app’s other functions to protect themselves from dangerous situations. Sold on a promise of empowerment, Citizen markets itself as a 21st century technology capable of repairing the ills of our social world. In this article we analyze how Citizen taps into the desire for control and safety and urges its users to actively protect their own communities. As such, we suggest that while surveillant in nature, …


Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley Jan 2024

Attitudes And Perceptions Towards Privacy And Surveillance In Australia, Aleatha J. Shanley

Theses: Doctorates and Masters

Understanding attitudes towards privacy and surveillance technologies used to enhance security objectives is a complex, but crucial aspect for policy makers to consider. Historically, terrorism-related incidents justified the uptake of surveillance practices. More recently however, biosecurity concerns have motivated nation-states to adopt more intrusive surveillance measures. There is a growing body of literature that supports the public’s desire to maintain privacy despite fears of biological or physical threats.

This research set out to explore attitudes towards privacy and surveillance in an Australian context. Throughout the course of this endeavour, the COVID-19 pandemic emerged bringing with it a variety of track …


Venue Safety Strategies: Guardrails And The Line-Of-Sight Exemption, Gil Fried, Aneurin Grant Dec 2023

Venue Safety Strategies: Guardrails And The Line-Of-Sight Exemption, Gil Fried, Aneurin Grant

Journal of Applied Sport Management

This piece represents a focused article on safety issues connected to railings at sporting events and why there needs to be considerable action taken to protect fans. Specifically, the authors believe the current line-of-sight exception (minimum 26") allows for railings that are dangerously inadequate to protect fans. It is argued that if sport facility managers and or venues do not proactively address this railing height issue, then architects, building inspectors, and others should seek to change the building code to eliminate the fans continued exposure to unnecessary hazards.


Exploring The Biblical And Theological Foundations Of Security Decisions By Church Leaders, John M. Tuohy Dec 2023

Exploring The Biblical And Theological Foundations Of Security Decisions By Church Leaders, John M. Tuohy

Doctoral Dissertations and Projects

This qualitative phenomenological multi-case study explored the practical, ethical, theological, and biblical foundations of decisions regarding an active security strategy at church gatherings by a cross-section of mainline and nondenominational churches. For the purposes of this study, an active security strategy was defined as a formal plan for site security based on the use of security personnel. This definition included any combination of volunteer personnel, contracted private security personnel, or sworn police officers acting in an official or off-duty capacity while providing security for the gathered congregation. The theory of shepherd leadership, as defined by Laniak (2006), and which related …


Assessing The Threat Of Social Media To National Security: Information Operations In The 21st Century, Brendan M. Cullen Oct 2023

Assessing The Threat Of Social Media To National Security: Information Operations In The 21st Century, Brendan M. Cullen

Senior Theses

The ubiquity of social media has enabled an unprecedented amount of personal data to be accessible to various entities. Social media platforms leverage this data to optimize algorithmic recommendation systems, persuade users to engage, and promote monetization. The social media ecosystem’s business model demands continuous engagement and the relentless collection of user data to grow and scale. Not only is social media massively popular around the world, but it has integrated heavily into users’ daily lives. This integration is driven by social platforms’ deliberate architectures and affordances. The intentionality of social media can be exploited by state and non-state actors …


Decentralized Multimedia Data Sharing In Iov: A Learning-Based Equilibrium Of Supply And Demand, Jiani Fan, Minrui Xu, Jiale Guo, Lwin Khin Shar, Jiawen Kang, Dusit Niyato, Kwok-Yan Lam Oct 2023

Decentralized Multimedia Data Sharing In Iov: A Learning-Based Equilibrium Of Supply And Demand, Jiani Fan, Minrui Xu, Jiale Guo, Lwin Khin Shar, Jiawen Kang, Dusit Niyato, Kwok-Yan Lam

Research Collection School Of Computing and Information Systems

The Internet of Vehicles (IoV) has great potential to transform transportation systems by enhancing road safety, reducing traffic congestion, and improving user experience through onboard infotainment applications. Decentralized data sharing can improve security, privacy, reliability, and facilitate infotainment data sharing in IoVs. However, decentralized data sharing may not achieve the expected efficiency if there are IoV users who only want to consume the shared data but are not willing to contribute their own data to the community, resulting in incomplete information observed by other vehicles and infrastructure, which can introduce additional transmission latency. Therefore, in this paper, by modeling the …


Nuclear Security: Making Gender Equality A Working Reality, Muhammed Ali Alkış, Polina Sinovets Oct 2023

Nuclear Security: Making Gender Equality A Working Reality, Muhammed Ali Alkış, Polina Sinovets

International Journal of Nuclear Security

Gender equality is an indispensable part of both democracy and justice, and it is fundamental to peace and security worldwide. As various research on gender equality has shown, teams with diversity, equity, and inclusion achieve the best outcomes. Having gender equality and women’s presence in the workforce in nuclear fields is a requirement to contribute to peace and security discussions, adding value and sustaining policies and long-lasting positive outcomes. In this regard, the paper will discuss the importance of gender equality and why the Odesa Center for Nonproliferation has committed itself to this issue. The article also details the Odesa …


Nato Cyber Defence, 2000-2022, Ryan J. Atkinson Aug 2023

Nato Cyber Defence, 2000-2022, Ryan J. Atkinson

Electronic Thesis and Dissertation Repository

The emergence of more devastating and organized cyber attacks by non-attributable threat actors internationally raises questions about whether classical deterrence theory in its contemporary form has assisted important military defence alliances, like the North Atlantic Treaty Organization (NATO), to adapt to the changing threat landscape. The timeline of the NATO Alliance's adaptation to external cyber threats is examined at critical historical junctures. Changes and adaptation within internal policy-making processes at NATO headquarters and its affiliated centres, think tanks, and military bases are analysed with input from informed decision-makers. The research project demonstrates that NATO policy substantively changed over the period …


Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe Aug 2023

Introduction To The Special Issue On Secrecy And Technologies, Clare Stevens, Sam Forsythe

Secrecy and Society

Many scholars have treated the inscrutability of technologies, secrecy, and other unknowns as moral and ethical challenges that can be resolved through transparency and openness. This paper, and the special issue it introduces, instead wants to explore how we can understand the productive, strategic but also emancipatory potential of secrecy and ignorance in the development of security and technologies. This paper argues that rather than just being mediums or passive substrates, technologies are making a difference to how secrecy, disclosure, and transparency work. This special issue will show how technologies and time mediate secrecy and disclosure, and vice versa. This …


An Undesired Implication From Globalization: Isis, An Adaptive Threat In A Dormant Phase, Abel Josafat Manullang, Raden Ap Wicaksono, Arfin Sudirman Jul 2023

An Undesired Implication From Globalization: Isis, An Adaptive Threat In A Dormant Phase, Abel Josafat Manullang, Raden Ap Wicaksono, Arfin Sudirman

Global: Jurnal Politik Internasional

Globalization has brought about numerous changes to the world. However, those changes and advances have also been enjoyed by terrorist groups, one of them is ISIS which uses those things in its terror acts. This article seeks to explain how ISIS has adapted and enhanced its capacity as a result of globalization. Apart from employing the qualitative research method, this article also uses concepts and theories like terrorism, globalization, and James D. Kiras's theory on how globalization enhances terrorism. This article would then proceed to the three matters of ISIS as a threat to national and international security, how ISIS …


Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra Jun 2023

Ethical Implications Of Artificial Intelligence And Machine Learning In Libraries And Information Centers: A Frameworks, Challenges, And Best Practices, Sudhakar Mishra

Library Philosophy and Practice (e-journal)

The use of artificial intelligence (AI) and machine learning (ML) is increasingly becoming prevalent in libraries and information centres, promising to improve service delivery and efficiency. However, the use of these technologies also poses significant ethical challenges and risks, including bias and discrimination, privacy and security, automation and job displacement, and the lack of human interaction in service delivery. This conceptual paper provides an overview of the key ethical frameworks and principles relevant to the use of AI and ML in libraries and information centres, and analyses how these frameworks can be applied to this specific context. The paper also …


Peace And Security Challenges: Sadc And Mozambique Conflict Management, Thamsanqa Dangazela Jun 2023

Peace And Security Challenges: Sadc And Mozambique Conflict Management, Thamsanqa Dangazela

Journal of African Conflicts and Peace Studies

Abstract

The purpose of this article is to investigate peace and security challenges in Mozambique. The paper wants to contribute to research recurrent political conflicts should be evaluated and how their effectiveness can be measured on how peace-making interventions by the Southern Africa Development Committee (SADC) in member states experiencing. Peace-making is understood as a varied approach to resolving conflicts, encompassing negotiation, diplomatic engagement, and mediation. Mediation refers to third party facilitation aimed at resolving conflicts. The main argument is that SADC mediation– which forms the core of its approach to peace-making – is not oriented towards transforming conflicts. Most, …


Algorithmic Sovereignty: Machine Learning, Ground Truth, And The State Of Exception, Matthew Martin Jun 2023

Algorithmic Sovereignty: Machine Learning, Ground Truth, And The State Of Exception, Matthew Martin

Dissertations, Theses, and Capstone Projects

This thesis examines the influence of algorithmic security technology on political theories of sovereignty and the state of exception. In computer science, an exception is a special circumstance that prevents a program from terminating normally. In political theory, the state of exception, as theorized by Carl Schmitt and Giorgio Agamben, cannot be encoded within the normal liberal legal order. With states’ increasing turn toward algorithmic answers to questions of ‘security,’ which, per Agamben, is the long-term form of the political state of exception, the relationship between the concept of the exception in these two disciplines comes to the fore. In …


Middle Eastern Defense: The Role Of The Abraham Accords, Graciela H Phillipps May 2023

Middle Eastern Defense: The Role Of The Abraham Accords, Graciela H Phillipps

Helm's School of Government Conference - American Revival: Citizenship & Virtue

Defense organization in the Middle East North Africa (MENA) region has been historically fraught with instability and conflict, rooted in tensions ranging from centuries-old religious disputes to modern geopolitical power struggles. However, two years ago deep-seated status quos in the area were challenged and successfully overcome through the drafting and signage of agreements in which Arab nations normalized ties with the nation of Israel, popularly known as the Abraham Accords. The Accords emphasized the mutual desire for peace and prosperity in MENA between signees with a pointed reference to maintaining security in the traditionally volatile region. These pivotal feats of …


Effects Of Witnessing Terrorist Attacks On Perceived Causes Of Terrorism And Support For Security Measures, Austin Trevor Sullivan May 2023

Effects Of Witnessing Terrorist Attacks On Perceived Causes Of Terrorism And Support For Security Measures, Austin Trevor Sullivan

Open Access Theses & Dissertations

The following research aims to understand how individuals who were aware of, and affected by, terrorist attacks at the time they took place perceive the causes of terrorism and support security measures. It is hypothesized that the extent to which one â??witnessedâ?? attacks characterized by more traditional forms of terrorism, such as bombings and religiously motivated and affiliated perpetrators (Wave four), versus new forms of terrorism, such as shootings and lone wolves (Wave five), would be affected by the age of the witness. This research proposes an indirect pathway from age to "witnessing" terrorist attacks to attributions for the attacks …


The Impact Of Gender On The Acceptance Of Surveillance Technology, Jody Messick Apr 2023

The Impact Of Gender On The Acceptance Of Surveillance Technology, Jody Messick

Sigma: Journal of Political and International Studies

A classic dilemma facing governments and citizens alike is the trade-off between privacy and security. This concept is found in the Constitution’s Fourth Amendment, which implies that citizens have a right to be protected against “unreasonable searches and seizures by the government” (FindLaw 2019). The technological revolution, and its implications for privacy, has complicated the nature of this right. Different types of data require different approaches to the privacy versus security tradeoff. A 2003 panel by Wright et. al asks how “sensor data,” data that is collected through technology that tracks a user’s online or real-world movements, should be approached, …


The Privacy Librarian Is In!: How Privacy Issues Affect Researchers And Libraries, John Felts, Heather Staines, Tim Lloyd, Beth Bernhardt, Russell Palmer Mar 2023

The Privacy Librarian Is In!: How Privacy Issues Affect Researchers And Libraries, John Felts, Heather Staines, Tim Lloyd, Beth Bernhardt, Russell Palmer

Library Faculty Presentations

Faced with an increasingly complex online environment through which libraries provide access to scholarly resources, librarians have found it difficult to educate users in protecting their personal information and online behaviors from inappropriate and sometimes unauthorized use while promoting the personalization services that users find beneficial. Modeled after the long-running Peanuts cartoon with Lucy offering advice for 5 cents, this interactive session will tackle key privacy issues in the researcher, vendor, and library framework. It will kick off with John Felts of Coastal Carolina staffing his post as "Privacy Librarian" while training a new library employee.


After this tour through …


The Conflict Among African American Penal Interests: Rethinking Racial Equity In Criminal Procedure, Trevor George Gardner Jan 2023

The Conflict Among African American Penal Interests: Rethinking Racial Equity In Criminal Procedure, Trevor George Gardner

Scholarship@WashULaw

This Article argues that neither the criminal justice reform platform nor the penal abolition platform shows the ambition necessary to advance each of the primary African American interests in penal administration. It contends, first, that abolitionists have rightly called for a more robust conceptualization of racial equity in criminal procedure. Racial equity in criminal procedure should be considered in terms of both process at the level of the individual, and the number of criminal procedures at the level of the racial group—in terms of both the quality and “quantity” of stops, arrests, convictions, and the criminal sentencings that result in …


Thawing Interests: The Arctic In U.S. Grand Strategy, Benjamin S. Murray Jan 2023

Thawing Interests: The Arctic In U.S. Grand Strategy, Benjamin S. Murray

MSU Graduate Theses

The thawing Arctic is subject to increasing activity, attention, and a renewal of interests in the region from around the globe. National interests have compelled strategic planning in the Arctic region and are connected to global geopolitics. A concept of grand strategy is distilled from theories of past authors, understood within the modern context. That concept includes a terminological framework consisting of interests and threats to inform an ends, ways, and means design of strategy, composed of all instruments of state power, blending policy with strategy, and across the peace-war continuum. Then fundamental precepts of existing U.S. grand strategy are …


The Security Dimensions Of Religious Life In Ukraine: A Focus On Orthodoxy In The Cross-Border Chernivtsi Region, Oleksandr Brodestkyi, Iryna Horokholinska Jan 2023

The Security Dimensions Of Religious Life In Ukraine: A Focus On Orthodoxy In The Cross-Border Chernivtsi Region, Oleksandr Brodestkyi, Iryna Horokholinska

Occasional Papers on Religion in Eastern Europe

The article analyzes the modern tendencies in the religious space of Ukraine with a focus on the processes that are taking place in Orthodoxy in the context of transformations in the self-identification of the faithful. Changes in the jurisdictional affiliation of the Orthodox communities in Ukraine are taken into account. The dynamics of these processes are analyzed against the background of the full-scale war that Russia has unleashed and is waging against Ukraine. Special attention is paid to the situation in Chernivtsi border region, in particular, from the point of view of the Ukrainian-Romanian geopolitical and church relationships. A number …


Strengthening Urban Resilience: Understanding The Interdependencies Of Outer Space And Strategic Planning For Sustainable Smart Environments, Ulpia-Elena Botezatu, Olga Bucovetchi, Adrian V. Gheorghe, Radu D. Stanciu Jan 2023

Strengthening Urban Resilience: Understanding The Interdependencies Of Outer Space And Strategic Planning For Sustainable Smart Environments, Ulpia-Elena Botezatu, Olga Bucovetchi, Adrian V. Gheorghe, Radu D. Stanciu

Engineering Management & Systems Engineering Faculty Publications

The conventional approach to urban planning has predominantly focused on horizontal dimensions, disregarding the potential risks originating from outer space. This paper aims to initiate a discourse on the vertical dimension of cities, which is influenced by outer space, as an essential element of strategic urban planning. Through an examination of a highly disruptive incident in outer space involving a collision between the Iridium 33 and Cosmos 2251 satellites, this article elucidates the intricate interdependencies between urban areas and outer space infrastructure and services. Leveraging the principles of critical infrastructure protection, which bridge the urban and outer space domains, and …


An Equality Of Security. Bentham, Thompson, And The Principles Subsidiary To Utility, Mark J. Kaswan Jan 2023

An Equality Of Security. Bentham, Thompson, And The Principles Subsidiary To Utility, Mark J. Kaswan

Political Science Faculty Publications and Presentations

In the “Principles of the Civil Code,” Jeremy Bentham identifies four “principles subsidiary to utility”: subsistence, abundance, equality, and security. Whereas these subsidiary principles form part of the bedrock of classical liberalism, in this essay I show that in the hands of his friend and disciple William Thompson, they are transformed into the foundations for socialism. Where Bentham prioritizes security over equality, and security of property takes a preeminent role, Thompson shows that the system of individual competition and private property—his way of describing capitalism—is best characterized by the “inequality of security.” Based on the labor theory of property, Thompson …


Transfer Learning Using Infrared And Optical Full Motion Video Data For Gender Classification, Alexander M. Glandon, Joe Zalameda, Khan M. Iftekharuddin, Gabor F. Fulop (Ed.), David Z. Ting (Ed.), Lucy L. Zheng (Ed.) Jan 2023

Transfer Learning Using Infrared And Optical Full Motion Video Data For Gender Classification, Alexander M. Glandon, Joe Zalameda, Khan M. Iftekharuddin, Gabor F. Fulop (Ed.), David Z. Ting (Ed.), Lucy L. Zheng (Ed.)

Electrical & Computer Engineering Faculty Publications

This work is a review and extension of our ongoing research in human recognition analysis using multimodality motion sensor data. We review our work on hand crafted feature engineering for motion capture skeleton (MoCap) data, from the Air Force Research Lab for human gender followed by depth scan based skeleton extraction using LIDAR data from the Army Night Vision Lab for person identification. We then build on these works to demonstrate a transfer learning sensor fusion approach for using the larger MoCap and smaller LIDAR data for gender classification.