Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Peace and Conflict Studies (8)
- International and Area Studies (4)
- Political Science (4)
- Business (3)
- Computer Sciences (3)
-
- International Relations (3)
- Law (3)
- Physical Sciences and Mathematics (3)
- Public Policy (3)
- Sociology (3)
- Terrorism Studies (3)
- Criminology (2)
- Engineering (2)
- Geography (2)
- Information Security (2)
- Military and Veterans Studies (2)
- Policy Design, Analysis, and Evaluation (2)
- Policy History, Theory, and Methods (2)
- Public Affairs (2)
- Social Policy (2)
- Soviet and Post-Soviet Studies (2)
- Administrative Law (1)
- Aerospace Engineering (1)
- Agricultural Economics (1)
- Agriculture (1)
- Asian Studies (1)
- Business Intelligence (1)
- Institution
-
- James Madison University (2)
- Purdue University (2)
- University of Arkansas, Fayetteville (2)
- Air Force Institute of Technology (1)
- Ateneo de Manila University (1)
-
- Belmont University (1)
- Embry-Riddle Aeronautical University (1)
- Emory University School of Law (1)
- Florida International University (1)
- Gettysburg College (1)
- Montclair State University (1)
- Old Dominion University (1)
- Sacred Heart University (1)
- Technological University Dublin (1)
- US Army War College (1)
- University of Nebraska - Lincoln (1)
- University of Pennsylvania Carey Law School (1)
- Keyword
-
- Civil liberties (2)
- Cybersecurity (2)
- 21st edition (1)
- Active Learning (1)
- Administrative agencies (1)
-
- Administrative law (1)
- Advocacy and International Law (1)
- Alliance (1)
- Alliances (1)
- Australia (1)
- BRICS (1)
- Biological warfare (1)
- Blockchain (1)
- Border Security (1)
- Border Walls (1)
- Borders (1)
- Brazil (1)
- Budgeting (1)
- CISR (1)
- CY2021 (1)
- Centers and Organizations (1)
- China (1)
- Civic security cultures (1)
- Clearance (1)
- Climate change (1)
- Climate regulatory action (1)
- Coalition (1)
- Computer simulation (1)
- Congress (1)
- Constitution (1)
- Publication
-
- Faculty Publications (2)
- Global CWD Repository (2)
- All Faculty Scholarship (1)
- Articles & Editorials (1)
- Belmont University Research Symposium (BURS) (1)
-
- Cornhusker Economics (1)
- Department of Justice Studies Faculty Scholarship and Creative Works (1)
- Doctoral (1)
- Engineering Management & Systems Engineering Faculty Publications (1)
- FIU Electronic Theses and Dissertations (1)
- FORCES Initiative: Strategy, Security, and Social Systems (1)
- Faculty Articles (1)
- Political Science & Global Affairs Faculty Publications (1)
- Political Science Department Faculty Publications (1)
- Publications (1)
- Research Projects (1)
- Student Publications (1)
- TFSC Publications and Presentations (1)
Articles 1 - 20 of 20
Full-Text Articles in Defense and Security Studies
How Effective Are The Russian Sanctions?, Wesley Peterson
How Effective Are The Russian Sanctions?, Wesley Peterson
Cornhusker Economics
Russia's invasion of Ukraine has led to extensive economic, financial, trade, and other types of sanctions directed at individual Russians and the Russian economy. The long-term negative effects of the war on the Russian economy may be even more severe and the broader impacts of the conflict mean that it will have serious repercussions for future global economic, political, and diplomatic relations.
Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz
Optimizing Cybersecurity Budgets With Attacksimulation, Alexander Master, George Hamilton, J. Eric Dietz
Faculty Publications
Modern organizations need effective ways to assess cybersecurity risk. Successful cyber attacks can result in data breaches, which may inflict significant loss of money, time, and public trust. Small businesses and non-profit organizations have limited resources to invest in cybersecurity controls and often do not have the in-house expertise to assess their risk. Cyber threat actors also vary in sophistication, motivation, and effectiveness. This paper builds on the previous work of Lerums et al., who presented an AnyLogic model for simulating aspects of a cyber attack and the efficacy of controls in a generic enterprise network. This paper argues that …
Border Orientation In A Globalizing World, Beth A. Simmons, Michael R. Kenwick
Border Orientation In A Globalizing World, Beth A. Simmons, Michael R. Kenwick
All Faculty Scholarship
Border politics are a salient component of high international politics. States are increasingly building infrastructure to ‘secure’ their borders. We introduce the concept of border orientation to describe the extent to which the State is committed to the spatial display of capacities to control the terms of penetration of its national borders. Border orientation provides a lens through which to analyze resistance to globalization, growing populism, and the consequences of intensified border politics. We measure border orientation using novel, geo-spatial data on the built environment along the world’s borders and theorize that real and perceived pressures of globalization have resulted …
An Empirical Study Of The Evolution Of Homeland Security Definitions And The Public Perception Of Homeland Security, Alexander Siedschlag, Andrea Jerković
An Empirical Study Of The Evolution Of Homeland Security Definitions And The Public Perception Of Homeland Security, Alexander Siedschlag, Andrea Jerković
Publications
Objectives
• To introduce results from a currently conducted empirical study (quantitative systematic review) of the evolution of official homeland security definitions from related federal strategies, frameworks, guidelines, the QHSRs, enterprise agencies’ FY strategic plans, and related documents.
• To identify continuing and changing ingredients of the sprouting public policy and strategy definition of homeland security.
• To compare those findings to the development of the public perception of homeland security and how people would define the term, using the example of Pennsylvania, with our multi-year poll study of residents’ perception of homeland security.
Utility
• While valuable analyses of …
Beyond The High Ground: A Taxonomy For Earth-Moon System Operations, Adam P. Wilmer, Robert A. Bettinger
Beyond The High Ground: A Taxonomy For Earth-Moon System Operations, Adam P. Wilmer, Robert A. Bettinger
Faculty Publications
Situational and space domain awareness in the space domain can no longer be confined to that which is found in geosynchronous orbit. International activities—commercial and military—and threats to the planet itself exist and are increasing across the entire Earth-Moon system. This reality requires a new taxonomy to accurately classify space domain awareness missions and better apply resources to and development of the same. This work presents such a taxonomy for the classification of space domain awareness regions.
Improvised Explosive Device Disposal (Iedd) Operator Search, Daniel Carter
Improvised Explosive Device Disposal (Iedd) Operator Search, Daniel Carter
Global CWD Repository
Download citation Copy link
Abstract
IEDD Operator Search procedures for use in non and semi-permissive environments. IEDD Operator Search is required to safely approach an IED target area and conduct RSPs so that the IEDD Operator maintains personal safety and reduces the possibility of being targeted by an observing terrorist. I have observed many different approaches to IEDD Operator Search by operators from various countries, and unfortunately found most to be lacking in safety considerations in one way or another. This article aims to familiarise mine action IEDD Operators operating in a VOIED-contaminated environment (permissive/semi-permissive/non-permissive), with the British technique of …Active Learning With Cybersecurity, Carole Shook
Active Learning With Cybersecurity, Carole Shook
TFSC Publications and Presentations
A global campus grant was obtained in Spring 2020 to develop modules for Cybersecurity. This presentation encompasses the use of Cyberciege and case studies that require active learning of students.
Keeping One's Friends Close: The Maintenance Of Cooperation In Supposedly Fragmenting Alliances, Ethan M. Ingram
Keeping One's Friends Close: The Maintenance Of Cooperation In Supposedly Fragmenting Alliances, Ethan M. Ingram
Belmont University Research Symposium (BURS)
From the perspective of an outside observer, interactions between sovereign states within the international arena seem to mirror the often paradoxical interpersonal complexities of their populace and those who govern them. Why did the Russian Empire and Poland-Lithuania choose to maintain a cooperative relationship in the early 1700s despite a shared desire to take control of the Baltic for themselves (Masse 1980)? How can one decipher the simultaneous desire of Turkey to stay in good graces with its NATO partners while also foraging ahead in its siding with the authoritarians of the world (Bekdil 2018)? All of these questions play …
The Gray Zone Of Irregular Forces: Politically Sanctioned, Local Defense, And Organized Crime Groups In The Philippines, Jennifer Santiago Oreta
The Gray Zone Of Irregular Forces: Politically Sanctioned, Local Defense, And Organized Crime Groups In The Philippines, Jennifer Santiago Oreta
Political Science Department Faculty Publications
The persistent presence of armed groups in local communities is largely due to ineffective community security management, weak rule of law, and the constant shift in peace and security policy guidelines. Compounding the problem is the limited capacity of local government units and the lack of strong political will of officials to address security issues. Irregular forces offering private security services thrive in this environment. Armed groups gain legitimacy since they fill security service gaps in communities and because they assist government security forces in their counterinsurgency operations. Gray zone activities are activities by armed groups that happen in-between the …
The Australia, United Kingdom, United States (Aukus) Nuclear Submarine Agreement: Potential Implications, Bert Chapman
The Australia, United Kingdom, United States (Aukus) Nuclear Submarine Agreement: Potential Implications, Bert Chapman
FORCES Initiative: Strategy, Security, and Social Systems
The AUKUS Nuclear Submarine Agreement seeks to enhance multinational deterrence against Chinese geopolitical assertiveness by giving Australia nuclear powered submarines.
▶ This agreement will pose considerable cost and technical challenges for the Australia, the United Kingdom, and the United States.
▶ Estimates of when Australia will be able to deploy nuclear submarines range from 2030-2040.
▶ The U.S. and its allies will have to make challenging decisions about where to build AUKUS in Australia.
▶ There is debate as to whether efforts to deter China in the Asia-Pacific should include non-Anglosphere countries in that region.
▶ Consideration should be given …
To Walk The Earth In Safety 21st Edition (Cy2021), U.S. Department Of State
To Walk The Earth In Safety 21st Edition (Cy2021), U.S. Department Of State
Global CWD Repository
The United States is committed to reducing these threats worldwide and is the leading financial supporter of CWD, providing more than $4.2 billion in assistance to more than 100 countries since 1993. This makes the United States the world’s single largest financial supporter of CWD. The Department of State, Department of Defense, and the U.S. Agency for International Development (USAID) work together with foreign governments, private companies, international organizations, and nongovernmental organizations (NGOs) to reduce excess SA/LW and conventional munitions stockpiles (including MANPADS), implement best practices for PSSM at conventional weapons storage sites, and carry out HMA programs.
In 2021, …
Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels
Strategic Concealment: Locating Armed Private Contractors In State Foreign Policy, Jared A. Michaels
Student Publications
The global expansion of armed private contractors has led to a revived interest in researching armed private contracting firms, especially investigating how their personnel have functioned as an extension of state foreign policy. However, the literature on the industry contains a confusing diversity of terms when reviewing such firms, whether private military company, private security company, private military security company, or even just mercenary. Using the Singer (2010) ‘tip of the spear’ typology, I analyze the distinctions across armed private contracting firms and discuss the differences between armed private contractors and conventional militaries, armed private contractors and mercenaries, and highlight …
Perils, Pitfalls & Dilemmas In Responding To Transnational Organized Crime Groups., Juan Del Rio
Perils, Pitfalls & Dilemmas In Responding To Transnational Organized Crime Groups., Juan Del Rio
FIU Electronic Theses and Dissertations
Governments employ several approaches to combat Transnational Organized Crime groups. These groups include drug trafficking organizations and armed-insurgent groups. Tactics such as High-Value Target strikes, Peace Accords, and vigilantism have shown to successfully debilitate criminal networks while at the same time sparking unintended negative outcomes. For example, some of these tactics are associated with an increase in cartel-related violence, terrorist attacks, and the lethality of terrorist attacks. What remains unclear is the degree to which these approaches affect these associations and which of these tactics has the most favorable outcomes in combating Transnational Organized Crime groups. The analyses conducted in …
Korean War Biological Warfare Allegations Against The United States: A Playbook For The Current Crisis In Ukraine, Conrad C. Crane
Korean War Biological Warfare Allegations Against The United States: A Playbook For The Current Crisis In Ukraine, Conrad C. Crane
Articles & Editorials
No abstract provided.
Crime, Risk And Resilience In The Countryside: Governing Rural Security, Artur Pytlarz
Crime, Risk And Resilience In The Countryside: Governing Rural Security, Artur Pytlarz
Doctoral
A consequence of globalisation is a growing transport infrastructure which exposes rural communities to a greater risk of crime and increased insecurity. This is compounded by the withdrawal of both market and state in policing, banking, hospitals and postal services leaving rural citizens with what seems to be ontological insecurity. This project is set in Ireland but addresses global themes such as late modernity, risk and globalization and undertakes an intensive qualitative sociological study of how communities build the capacity to manage these changes. These capacities, it is hypothesised, can be found in nascent forms of local informal crime control …
Delegating Climate Authorities, Mark P. Nevitt
Delegating Climate Authorities, Mark P. Nevitt
Faculty Articles
The science is clear: the United States and the world must take dramatic action to address climate change or face irreversible, catastrophic planetary harm. Within the U.S.—the world’s largest historic emitter of greenhouse gas emissions—this will require passing new legislation or turning to existing statutes and authorities to address the climate crisis. Doing so implicates existing and prospective delegations of legislative authority to a large swath of administrative agencies. Yet congressional climate decision-making delegations to any executive branch agency must not dismiss the newly resurgent nondelegation doctrine. Described by some scholars as the “most dangerous idea in American law,” the …
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Seditious Conspiracy Charges In The American Terrorism Study (Ats), Katie Ratcliff
Research Projects
In January 2022, the U.S. Department of Justice announced Seditious Conspiracy charges against members of the anti-government extremist group Oath Keepers in connection to the January 6th (2021) siege of the U.S. Capitol Building. Several have entered not guilty pleas and a trial is expected in July 2022.
To provide context, this brief offers an overview of 11 Seditious Conspiracy cases included in the American Terrorism Study (ATS) since 1980. In total, these cases involve nine groups (a.k.a."cells" or "plots") and 78 defendants charged with Seditious Conspiracy (18 USC§ 2384), a relatively rare charge that comprises less than one half …
Brazilian Alliance Perspectives: Towards A Brics Development–Security Alliance?, Zhen 'Arc' Han, Mihaela Papa
Brazilian Alliance Perspectives: Towards A Brics Development–Security Alliance?, Zhen 'Arc' Han, Mihaela Papa
Political Science & Global Affairs Faculty Publications
Scholars studying BRICS (Brazil, Russia, India, China, and South Africa) have traditionally argued that it is a development-focused partnership and not a military/security-based alliance. Yet BRICS members have been deepening their security integration, and Russia and China have been creating an alliance in the background. Although BRICS middle powers have traditionally demonstrated an aversion towards alliances, Brazil actively deepened security cooperation among BRICS members during its BRICS presidency in 2019. How does Brazil view alliances in contemporary power competition? This study examines Brazil’s perceptions by introducing and analysing a new data set of Brazilian expert discourses on alliances since 1990 …
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Cannibalizing The Constitution: On Terrorism, The Second Amendment, And The Threat To Civil Liberties, Francesca Laguardia
Department of Justice Studies Faculty Scholarship and Creative Works
This article explores the links between internet radicalization, access to weapons, and the current threat from terrorists who have been radicalized online. The prevalence of domestic terrorism, domestic hate groups, and online incitement and radicalization have led to considerable focus on the tension between counterterror efforts and the First Amendment. Many scholars recommend rethinking the extent of First Amendment protection, as well as Fourth, Fifth, and Sixth Amendment protections, and some judges appear to be listening. Yet the Second Amendment has avoided this consideration, despite the fact that easy access to weapons is a necessary ingredient for the level of …
Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour
Exploring Blockchain Adoption Supply Chains: Opportunities And Challenges, Adrian V. Gheorghe, Omer F. Keskin, Farinaz Sabz Ali Pour
Engineering Management & Systems Engineering Faculty Publications
In modern supply chains, acquisition often occurs with the involvement of a network of organizations. The resilience, efficiency, and effectiveness of supply networks are crucial for the viability of acquisition. Disruptions in the supply chain require adequate communication infrastructure to ensure resilience. However, supply networks do not have a shared information technology infrastructure that ensures effective communication. Therefore decision-makers seek new methodologies for supply chain management resilience. Blockchain technology offers new decentralization and service delegation methods that can transform supply chains and result in a more flexible, efficient, and effective supply chain. This report presents a framework for the application …