Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Strategy (2)
- Activists (1)
- Agreements (1)
- Armed forces officers (1)
- Case studies (1)
-
- Decision-making (1)
- Insurgency (1)
- Media coverage (1)
- Military (1)
- Military contractors (1)
- Military education (1)
- Military research (1)
- Missing in action (1)
- Nonviolence (1)
- OR in Defense (1)
- Palestinians (1)
- Persian Gulf War (1)
- Political activism (1)
- Political leadership (1)
- Prisoners of war (1)
- Private military companies (1)
- Professionalism (1)
- Security contractors (1)
- Tactics (1)
Articles 1 - 10 of 10
Full-Text Articles in Defense and Security Studies
National Security Vs. Human Rights: A Game Theoretic Analysis Of The Tension Between These Objectives, Aniruddha Bagchi, Jomon Aliyas Paul
National Security Vs. Human Rights: A Game Theoretic Analysis Of The Tension Between These Objectives, Aniruddha Bagchi, Jomon Aliyas Paul
Faculty and Research Publications
We explore why human rights violations take place in the midst of a rebellion. Authoritarian governments may not care for human rights but surprisingly several democratic governments have also condoned such violations. We show that the primary cause of such violations is faulty intelligence. There are two type of defective intelligence that can occur viz., missed alarm and false alarm. We consider each of these cases and determine the optimal human rights standard of the government. We then examine the effect of a decrease in the human rights standard on the probability of quelling the rebellion. In our theoretical model, …
Simple Analytics Of The Impact Of Terror Generation On Attacker-Defender Interactions, Timothy Mathews, Aniruddha Bagchi, Joao Faria
Simple Analytics Of The Impact Of Terror Generation On Attacker-Defender Interactions, Timothy Mathews, Aniruddha Bagchi, Joao Faria
Faculty and Research Publications
A simple Attacker-Defender interaction is analyzed, in which a single terrorist (denoted T) will potentially attack a single target in the homeland of a government/state (denoted G). This interaction is modeled as a one-shot sequential move game in which G first chooses how heavily to defend the target, after which T chooses whether or not to stage an attack. T's benefit from a successful attack is allowed to be increasing in the amount of resources that G allocates to defense. In the context of terrorism, this has multiple reasonable interpretations, including situations in which: (i) citizens of the target country …
A Model Of A Multilateral Proxy War With Spillovers, Aniruddha Bagchi, Joao Faria, Timothy Mathews
A Model Of A Multilateral Proxy War With Spillovers, Aniruddha Bagchi, Joao Faria, Timothy Mathews
Faculty and Research Publications
Motivated by the war in Syria and the ascension of ISIS, this paper models a proxy war with three sponsors and three combatants as a dynamic game. Sponsors are leaders that provide resources for combatants to fight each other. Sponsors 1 and 2 have strong aversion to sponsor 3's proxy, but not against each other. Three pure strategy equilibria exist in the game. When the ex post value of winning is small, all players fight in equilibrium. However, when the ex post value of winning is large, in equilibrium either sponsors 1 and 2 coordinate their actions, with one of …
Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism, Aniruddha Bagchi
Role Of Intelligence Inputs In Defending Against Cyber Warfare And Cyber Terrorism, Aniruddha Bagchi
Faculty and Research Publications
No abstract provided.
Espionage And The Optimal Standard Of The C-Tpat Program In Port Security, Aniruddha Bagchi, Jomon Aliyas Paul
Espionage And The Optimal Standard Of The C-Tpat Program In Port Security, Aniruddha Bagchi, Jomon Aliyas Paul
Faculty and Research Publications
No abstract provided.
Armor All: The Self-Conception Of Private Security Contractors, Volker C. Franke
Armor All: The Self-Conception Of Private Security Contractors, Volker C. Franke
Faculty and Research Publications
Whereas the values, attitudes and motivations of soldiers serving in their countries’ armed forces have been widely studied, to date we know very little about the motivations and self-conception of individuals working for the private security industry. Using data obtained through an online survey, this article explores the values, attitudes and identity of more than 200 private security contractors with law enforcement backgrounds and operational experience with a security firm in Iraq. Contrary to media dominating images of ruthless, money-grabbing mercenaries, respondents in this sample adhered to attitudes and values very similar to those of professional soldiers serving in Western …
Pursuing "Peace" In Israel/Palestine, Maia Hallward
Pursuing "Peace" In Israel/Palestine, Maia Hallward
Faculty and Research Publications
Nine years after the outbreak of the second intifada (uprising) in September 2000 and sixteen years after the signing of the Oslo Accords in September 1993, Israelis and Palestinians seem as far as ever from a final status agreement. Diplomatic efforts by the George W. Bush administration - notably the Performance-Based Road Map to Peace and the 2007 Annapolis Conference - avoided the core conflict issues, and delayed such negotiations by emphasizing "provisional" borders. Not only do such tactics allow more time for consolidating "facts on the ground" that can prejudice final status negotiations, but the lack of a political …
Decision-Making Under Uncertainty: Using Case Studies For Teaching Strategy In Complex Environments, Volker C. Franke
Decision-Making Under Uncertainty: Using Case Studies For Teaching Strategy In Complex Environments, Volker C. Franke
Faculty and Research Publications
Decision-makers today respond to a security environment characterized by volatility, uncertainty, complexity and ambiguity. Decisions cut across a wide range of social, political and cultural domestic and global issues and demand cognitive flexibility, adaptability and the ability to make decisions “on the fly.” While the U.S. military excels in preparing its soldiers and officers for the operational demands and tactical requirements of a wide array of increasingly complex contingency missions, a number of observers have pointed to the need for teaching strategy more effectively as part of professional military education. The purpose of this article is to analyze some of …
Security By Contractor: Outsourcing In Peace And Stability Operations, Volker Franke
Security By Contractor: Outsourcing In Peace And Stability Operations, Volker Franke
Faculty and Research Publications
No abstract provided.
Contractors As Military Professionals?, Gary Schaub, Jr., Volker Franke
Contractors As Military Professionals?, Gary Schaub, Jr., Volker Franke
Faculty and Research Publications
The article presents information on a research study which compared the mindsets of military officers and private security contractors. The results are discussed in terms of U.S. military professionalism. The study indicated a need for better clarification of legal responsibilities in terms of contractor relations with the military. The study is also said to support the view that military combat roles should not be outsourced.