Open Access. Powered by Scholars. Published by Universities.®

Series

2022

Discipline
Institution
Keyword
Publication

Articles 1 - 20 of 20

Full-Text Articles in Defense and Security Studies

How Effective Are The Russian Sanctions?, Wesley Peterson Nov 2022

How Effective Are The Russian Sanctions?, Wesley Peterson

Cornhusker Economics

Russia's invasion of Ukraine has led to extensive economic, financial, trade, and other types of sanctions directed at individual Russians and the Russian economy. The long-term negative effects of the war on the Russian economy may be even more severe and the broader impacts of the conflict mean that it will have serious repercussions for future global economic, political, and diplomatic relations.


Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz Nov 2022

Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz

Faculty Publications

Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …


Border Orientation In A Globalizing World, Beth A. Simmons, Michael R. Kenwick Oct 2022

Border Orientation In A Globalizing World, Beth A. Simmons, Michael R. Kenwick

All Faculty Scholarship

Border politics are a salient component of high international politics. States are increasingly building infrastructure to ‘secure’ their borders. We introduce the concept of border orientation to describe the extent to which the State is committed to the spatial display of capacities to control the terms of penetration of its national borders. Border orientation provides a lens through which to analyze resistance to globalization, growing populism, and the consequences of intensified border politics. We measure border orientation using novel, geo-spatial data on the built environment along the world’s borders and theorize that real and perceived pressures of globalization have resulted …


An Empirical Study Of The Evolution Of Homeland Security Definitions And The Public Perception Of Homeland Security, Alexander Siedschlag, Andrea Jerković Jul 2022

An Empirical Study Of The Evolution Of Homeland Security Definitions And The Public Perception Of Homeland Security, Alexander Siedschlag, Andrea Jerković

Publications

Objectives

• To introduce results from a currently conducted empirical study (quantitative systematic review) of the evolution of official homeland security definitions from related federal strategies, frameworks, guidelines, the QHSRs, enterprise agencies’ FY strategic plans, and related documents.

• To identify continuing and changing ingredients of the sprouting public policy and strategy definition of homeland security.

• To compare those findings to the development of the public perception of homeland security and how people would define the term, using the example of Pennsylvania, with our multi-year poll study of residents’ perception of homeland security.

Utility

• While valuable analyses of …


Beyond The High Ground: A Taxonomy For Earth-Moon System Operations, Adam P. Wilmer, Robert A. Bettinger Jul 2022

Beyond The High Ground: A Taxonomy For Earth-Moon System Operations, Adam P. Wilmer, Robert A. Bettinger

Faculty Publications

Situational and space domain awareness in the space domain can no longer be confined to that which is found in geosynchronous orbit. International activities—commercial and military—and threats to the planet itself exist and are increasing across the entire Earth-Moon system. This reality requires a new taxonomy to accurately classify space domain awareness missions and better apply resources to and development of the same. This work presents such a taxonomy for the classification of space domain awareness regions.


Improvised Explosive Device Disposal (Iedd) Operator Search, Daniel Carter May 2022

Improvised Explosive Device Disposal (Iedd) Operator Search, Daniel Carter

Global CWD Repository

Download citation Copy link

Abstract

IEDD Operator Search procedures for use in non and semi-permissive environments. IEDD Operator Search is required to safely approach an IED target area and conduct RSPs so that the IEDD Operator maintains personal safety and reduces the possibility of being targeted by an observing terrorist. I have observed many different approaches to IEDD Operator Search by operators from various countries, and unfortunately found most to be lacking in safety considerations in one way or another. This article aims to familiarise mine action IEDD Operators operating in a VOIED-contaminated environment (permissive/semi-permissive/non-permissive), with the British technique of …


Active Learning With Cybersecurity, Carole Shook May 2022

Active Learning With Cybersecurity, Carole Shook

TFSC Publications and Presentations

A global campus grant was obtained in Spring 2020 to develop modules for Cybersecurity. This presentation encompasses the use of Cyberciege and case studies that require active learning of students.


Keeping One's Friends Close: The Maintenance Of Cooperation In Supposedly Fragmenting Alliances, Ethan M. Ingram Apr 2022

Keeping One's Friends Close: The Maintenance Of Cooperation In Supposedly Fragmenting Alliances, Ethan M. Ingram

Belmont University Research Symposium (BURS)

From the perspective of an outside observer, interactions between sovereign states within the international arena seem to mirror the often paradoxical interpersonal complexities of their populace and those who govern them. Why did the Russian Empire and Poland-Lithuania choose to maintain a cooperative relationship in the early 1700s despite a shared desire to take control of the Baltic for themselves (Masse 1980)? How can one decipher the simultaneous desire of Turkey to stay in good graces with its NATO partners while also foraging ahead in its siding with the authoritarians of the world (Bekdil 2018)? All of these questions play …


The Gray Zone Of Irregular Forces: Politically Sanctioned, Local Defense, And Organized Crime Groups In The Philippines, Jennifer Santiago Oreta Apr 2022

The Gray Zone Of Irregular Forces: Politically Sanctioned, Local Defense, And Organized Crime Groups In The Philippines, Jennifer Santiago Oreta

Political Science Department Faculty Publications

The persistent presence of armed groups in local communities is largely due to ineffective community security management, weak rule of law, and the constant shift in peace and security policy guidelines. Compounding the problem is the limited capacity of local government units and the lack of strong political will of officials to address security issues. Irregular forces offering private security services thrive in this environment. Armed groups gain legitimacy since they fill security service gaps in communities and because they assist government security forces in their counterinsurgency operations. Gray zone activities are activities by armed groups that happen in-between the …


The Australia, United Kingdom, United States (Aukus) Nuclear Submarine Agreement: Potential Implications, Bert Chapman Apr 2022

The Australia, United Kingdom, United States (Aukus) Nuclear Submarine Agreement: Potential Implications, Bert Chapman

FORCES Initiative: Strategy, Security, and Social Systems

The AUKUS Nuclear Submarine Agreement seeks to enhance multinational deterrence against Chinese geopolitical assertiveness by giving Australia nuclear powered submarines.

▶ This agreement will pose considerable cost and technical challenges for the Australia, the United Kingdom, and the United States.

▶ Estimates of when Australia will be able to deploy nuclear submarines range from 2030-2040.

▶ The U.S. and its allies will have to make challenging decisions about where to build AUKUS in Australia.

▶ There is debate as to whether efforts to deter China in the Asia-Pacific should include non-Anglosphere countries in that region.

▶ Consideration should be given …


To Walk The Earth In Safety 21st Edition (Cy2021), U.S. Department Of State Apr 2022

To Walk The Earth In Safety 21st Edition (Cy2021), U.S. Department Of State

Global CWD Repository

The United States is committed to reducing these threats worldwide and is the leading financial supporter of CWD, providing more than $4.2 billion in assistance to more than 100 countries since 1993. This makes the United States the world’s single largest financial supporter of CWD. The Department of State, Department of Defense, and the U.S. Agency for International Development (USAID) work together with foreign governments, private companies, international organizations, and nongovernmental organizations (NGOs) to reduce excess SA/LW and conventional munitions stockpiles (including MANPADS), implement best practices for PSSM at conventional weapons storage sites, and carry out HMA programs.

In 2021, …


Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels Apr 2022

Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels

Student Publications

The global expansion of armed private contractors has led to a revived interest in researching armed private contracting firms, especially investigating how their personnel have functioned as an extension of state foreign policy. However, the literature on the industry contains a confusing diversity of terms when reviewing such firms, whether private military company, private security company, private military security company, or even just mercenary. Using the Singer (2010) ‘tip of the spear’ typology, I analyze the distinctions across armed private contracting firms and discuss the differences between armed private contractors and conventional militaries, armed private contractors and mercenaries, and highlight …


Perils, Pitfalls & Dilemmas In Responding To Transnational Organized Crime Groups., Juan Del Rio Mar 2022

Perils, Pitfalls & Dilemmas In Responding To Transnational Organized Crime Groups., Juan Del Rio

FIU Electronic Theses and Dissertations

Governments employ several approaches to combat Transnational Organized Crime groups. These groups include drug trafficking organizations and armed-insurgent groups. Tactics such as High-Value Target strikes, Peace Accords, and vigilantism have shown to successfully debilitate criminal networks while at the same time sparking unintended negative outcomes. For example, some of these tactics are associated with an increase in cartel-related violence, terrorist attacks, and the lethality of terrorist attacks. What remains unclear is the degree to which these approaches affect these associations and which of these tactics has the most favorable outcomes in combating Transnational Organized Crime groups. The analyses conducted in …


Korean War Biological Warfare Allegations Against The United States: A Playbook For The Current Crisis In Ukraine, Conrad C. Crane Mar 2022

Korean War Biological Warfare Allegations Against The United States: A Playbook For The Current Crisis In Ukraine, Conrad C. Crane

Articles & Editorials

No abstract provided.


Crime, Risk And Resilience In The Countryside: Governing Rural Security, Artur Pytlarz Jan 2022

Crime, Risk And Resilience In The Countryside: Governing Rural Security, Artur Pytlarz

Doctoral

A consequence of globalisation is a growing transport infrastructure which exposes rural communities to a greater risk of crime and increased insecurity. This is compounded by the withdrawal of both market and state in policing, banking, hospitals and postal services leaving rural citizens with what seems to be ontological insecurity. This project is set in Ireland but addresses global themes such as late modernity, risk and globalization and undertakes an intensive qualitative sociological study of how communities build the capacity to manage these changes. These capacities, it is hypothesised, can be found in nascent forms of local informal crime control …


Delegating Climate Authorities, Mark P. Nevitt Jan 2022

Delegating Climate Authorities, Mark P. Nevitt

Faculty Articles

The science is clear: the United States and the world must take dramatic action to address climate change or face irreversible, catastrophic planetary harm. Within the U.S.—the world’s largest historic emitter of greenhouse gas emissions—this will require passing new legislation or turning to existing statutes and authorities to address the climate crisis. Doing so implicates existing and prospective delegations of legislative authority to a large swath of administrative agencies. Yet congressional climate decision-making delegations to any executive branch agency must not dismiss the newly resurgent nondelegation doctrine. Described by some scholars as the “most dangerous idea in American law,” the …


Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff Jan 2022

Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff

Research Projects

In January 2022, the U.S. Department of Justice announced Seditious Conspiracy charges against members of the anti-government extremist group Oath Keepers in connection to the January 6th (2021) siege of the U.S. Capitol Building. Several have entered not guilty pleas and a trial is expected in July 2022.

To provide context, this brief offers an overview of 11 Seditious Conspiracy cases included in the American Terrorism Study (ATS) since 1980. In total, these cases involve nine groups (a.k.a."cells" or "plots") and 78 defendants charged with Seditious Conspiracy (18 USC§ 2384), a relatively rare charge that comprises less than one half …


Brazilian Alliance Perspectives: Towards A Brics Development–Security Alliance?, Zhen 'Arc' Han, Mihaela Papa Jan 2022

Brazilian Alliance Perspectives: Towards A Brics Development–Security Alliance?, Zhen 'Arc' Han, Mihaela Papa

Political Science & Global Affairs Faculty Publications

Scholars studying BRICS (Brazil, Russia, India, China, and South Africa) have traditionally argued that it is a development-focused partnership and not a military/security-based alliance. Yet BRICS members have been deepening their security integration, and Russia and China have been creating an alliance in the background. Although BRICS middle powers have traditionally demonstrated an aversion towards alliances, Brazil actively deepened security cooperation among BRICS members during its BRICS presidency in 2019. How does Brazil view alliances in contemporary power competition? This study examines Brazil’s perceptions by introducing and analysing a new data set of Brazilian expert discourses on alliances since 1990 …


Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia Jan 2022

Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia

Department of Justice Studies Faculty Scholarship and Creative Works

This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …


Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour Jan 2022

Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour

Engineering Management & Systems Engineering Faculty Publications

In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …