Open Access. Powered by Scholars. Published by Universities.®

Defense and Security Studies Commons

Open Access. Powered by Scholars. Published by Universities.®

4,241 Full-Text Articles 2,268 Authors 994,764 Downloads 126 Institutions

All Articles in Defense and Security Studies

Faceted Search

4,241 full-text articles. Page 7 of 125.

Project Proposal: The Jentay Group, Edward Vasquez 2018 Concordia University - Portland

Project Proposal: The Jentay Group, Edward Vasquez

HSEM 494 Practicum/Capstone Project

The following document contains material that connects to the emergency preparedness side of homeland security. The Jentay Group is a small company that brings advanced composites to the industrial market. Their work can be seen in the aerospace and unmanned vehicle industry, the automotive industry and the medical industry (Jentay, 2018). The team of 11 works out of a 4500 ft2 building located in Beaverton, Oregon. Beaverton is located in the Portland metropolitan area, which boasts a population of approximately 2.4 million (Beaverton Oregon, 2018). These statistics place the headquarters in a heavily populated area, which could bring ...


More On The Fakeness Of Fake News, Editor 2018 Embry-Riddle Aeronautical University

More On The Fakeness Of Fake News, Editor

International Bulletin of Political Psychology

This article identifies occurrences within the process of news production and also examples of psychological research which mitigate against the construct of fake news.


Ddas: The Database Of Demining Accidents - A Driving Force In Hma, Humanitarian Demining Accident and Incident Database 2018 AID

Ddas: The Database Of Demining Accidents - A Driving Force In Hma, Humanitarian Demining Accident And Incident Database

Global CWD Repository

I started the Database of Demining Accidents (DDAS) in 1998 using public data gathered for the United States Army Communications-Electronics Command, Night Vision & Electronic Sensors Directorate. When they declined to publish and update the database, I did so with their tacit approval but no funding support. I did this in the hope of improving safety for deminers. The database is an easy-to use system containing the original demining accident reports overlaid with easy-search summaries.


Ddasaccident813, Database of Demining Accidents 2018 AID

Ddasaccident813, Database Of Demining Accidents

Global CWD Repository

The report of this accident is compiled from press reports, edited for anonymity. Text in square brackets [ ] is editorial.

In a land mine clearance operation along the China-Vietnam boarder in Yunnan Province, Southwest China on October 11, [the Victim] chose to handle the complex situation by himself after asking his partner to step back. The explosion took [the Victim]'s both hands and eyes.

The Victim was defusing a mine when the accident occurred. Although no particular mine is mentioned, a Chinese Type 58 anti-personnel blast mine is inferred because it is shown in photographs and a fragmentation mine would ...


Organizational Psychology: The Entrance To, Residing In, And Exit From Sensitive Positions, Editor 2018 Embry-Riddle Aeronautical University

Organizational Psychology: The Entrance To, Residing In, And Exit From Sensitive Positions, Editor

International Bulletin of Political Psychology

This article identifies psychological problems and promise in identifying those in sensitive positions within organizations who may betray, are betraying, and have betrayed trust.


Israelis And Palestinians: Does Bringing Them Together Keep Them Apart?, Editor 2018 Embry-Riddle Aeronautical University

Israelis And Palestinians: Does Bringing Them Together Keep Them Apart?, Editor

International Bulletin of Political Psychology

This article identifies psychological complexities when interaction and cooperation among adversaries are presumed to reduce conflict.


Writing The Official History Of The Joint Intelligence Committee, Michael Goodman 2018 King's College London

Writing The Official History Of The Joint Intelligence Committee, Michael Goodman

Secrecy and Society

This article recounts the experience of a professional historian in being given the keys to the kingdom: access to the classified vaults of Britain’s Joint Intelligence Committee. This article includes some of the problems in having access, but complying with the sensitivities around official accounts, difficulties in writing a global history, or trying to make the work of a committee interesting and accessible, and of trying to determine the impact of intelligence on policy.



Historical Amnesia: British And U.S. Intelligence, Past And Present, Calder Walton 2018 Kennedy School of Government, Harvard University

Historical Amnesia: British And U.S. Intelligence, Past And Present, Calder Walton

Secrecy and Society

Many intelligence scandals in the news today seem unprecedented - from Russian meddling in the 2016 U.S. Presidential election, to British and U.S. intelligence agencies monitoring activities of their citizens. They seem new largely because, traditionally, intelligence agencies on both sides of the Atlantic were excessively secretive about their past activities: even the names “GCHQ” and “NSA” were airbrushed from declassified records, and thus missing from major historical works and scholarship on on post-war international relations. The resulting secrecy about British and U.S. intelligence has led to misunderstandings and conspiracy theories in societies about them. Newly opened secret ...


Collaboration And Research Practice In Intelligence, Minna Räsänen 2018 Södertörn University, Stockholm

Collaboration And Research Practice In Intelligence, Minna Räsänen

Secrecy and Society

Close, intensive research collaboration between universities, companies, and the public sector can open up new and different opportunities for qualitative research, and provide analytic and empirical insights that otherwise might be difficult to obtain. The aim of this paper is to explore collaboration as a means of doing research with the intelligence community. Experiences from a research project concerning dilemmas the practitioners face in their organization within the Swedish Armed Forces, serve as a starting point for this reflective discussion. It is argued here that collaboration is suitable when change is required. The mutual learning between the actors feeds into ...


Ethnographic Research In The U.S. Intelligence Community: Opportunities And Challenges, Bridget Nolan 2018 University of Texas at El Paso

Ethnographic Research In The U.S. Intelligence Community: Opportunities And Challenges, Bridget Nolan

Secrecy and Society

This article considers lessons learned from conducting research inside the intelligence community. Drawing on a year of ethnographic field work and interviews at the National Counterterrorism Center, I show that “boundary personnel”- people who navigate between the worlds of academia and national security - provide value added in the form of tacit knowledge that outside researchers would not be able to deliver. At the same time, these people face delays, challenges to freedom of information, and ethical considerations that are unique to their positions. Despite setbacks, social scientists must continue their engagement with national security organizations to further our understanding of ...


Secrecy Vs. Disclosure Of The Intelligence Community Budget: An Enduring Debate, Anne Daugherty Miles 2018 Intelligence and Security Academy

Secrecy Vs. Disclosure Of The Intelligence Community Budget: An Enduring Debate, Anne Daugherty Miles

Secrecy and Society

Little known U.S. congressional documents, dating from the 1970s, debate public disclosure of Intelligence Community (IC) budget. The documents offer a rich repository of the arguments on both sides of the debate and shine a light on the thoughtful, measured congressional oversight practiced in formative years of the House and Senate intelligence committees.


Do Voters Vote Against Their Interests?, Editor 2018 Embry-Riddle Aeronautical University

Do Voters Vote Against Their Interests?, Editor

International Bulletin of Political Psychology

This article describes some basic psychological constructs which may help ‘explain’ why some voters seem to vote against their own interests.


A Taxonomy Framework For Maritime Cybersecurity: A Demonstration Using The Automatic Identification System, G. C. Kessler, J. P. Craiger, J. C. Haass 2018 Embry-Riddle Aeronautical University

A Taxonomy Framework For Maritime Cybersecurity: A Demonstration Using The Automatic Identification System, G. C. Kessler, J. P. Craiger, J. C. Haass

Publications

The maritime transportation system is increasingly a target of cyber attacks. This paper describes a taxonomy that supports the creation of adversarial cyber models, risk mitigation, and resiliency plans as applied to the maritime industry, using the Automatic Identification System as a specific illustration of the approach. This method has already been applied to the aviation sector; retooling it for a maritime example demonstrates its broad applicability to the transportation sector, in general.


Identifying Criteria To Predict Army Rifle Marksmanship Proficiency, Katlin Makina Anglin 2018 Embry-Riddle Aeronautical University

Identifying Criteria To Predict Army Rifle Marksmanship Proficiency, Katlin Makina Anglin

Dissertations and Theses

The United States Army requires each Soldier to develop marksmanship proficiency in an effort to achieve combat readiness. Soldiers currently develop marksmanship proficiency through Basic Rifle Marksmanship (BRM) training, but significant skill deficiencies are apparent at the end of training. These skill deficiencies remain throughout training because instructors rarely assess Soldiers objectively before the final qualification, reducing the opportunity for instructors to diagnose skill deficiencies until it is too late. Therefore, the goal of the current research is to identify individual differences and sensor-based performance measures for inclusion in a formative assessment during BRM training. The results of the current ...


The Challenge Of Securing Kenya: Past Experience, Present Challenges And Future Prospects, Mumo Nzau, Mohammed Guyo 2018 University of Nairobi

The Challenge Of Securing Kenya: Past Experience, Present Challenges And Future Prospects, Mumo Nzau, Mohammed Guyo

The Journal of Social Encounters

The dynamic nature of insecurity and mitigation strategies cannot be adequately understood without comparing the present conjuncture and the past experiences. This paper provides a temporal assessment of security in Kenya by scanning convergent and divergent insecurity experiences and mitigation strategies of the regimes of Jomo Kenyatta, Daniel Arap Moi, Mwai Kibaki and Uhuru Kenyatta. The security dynamics have been shaped by drivers located at local, national and global levels. The convergence of local insecurity and protracted transitional terrorist attacks has produced a high trajectory of insecurity with a negative impact on the economy, social cohesion and stability. The contradiction ...


A Triadic Approach To Deception In Strategic Counterintelligence Operations, Editor 2018 Embry-Riddle Aeronautical University

A Triadic Approach To Deception In Strategic Counterintelligence Operations, Editor

International Bulletin of Political Psychology

This article describes a model for inducing deception in strategic counterintelligence operations based on the psychology of communications and influence.


Commentary On The Investigation: The April 20, 2001 Peruvian Shootdown Accident, Editor 2018 Embry-Riddle Aeronautical University

Commentary On The Investigation: The April 20, 2001 Peruvian Shootdown Accident, Editor

International Bulletin of Political Psychology

This article critiques an investigative report officially intended (1) to establish the facts and circumstances contributing to the April 20, 2001 interdiction of a United States (US) missionary floatplane and the death of two US citizens and (2) to make recommendations to minimize another such accident. The report was issued by the US Department of State Bureau for International Narcotics and Law Enforcement Affairs.


The Politics Of Wounds, Jonathan Nash 2018 The University of Western Ontario

The Politics Of Wounds, Jonathan Nash

Electronic Thesis and Dissertation Repository

What configuration of strategies and discourses enable the white male and settler body politic to render itself as simultaneously wounded and invulnerable? I contextualize this question by reading the discursive continuities between Euro-America’s War on Terror post-9/11 and Algeria’s War for Independence. By interrogating political-philosophical responses to September 11, 2001 beside American rhetoric of a wounded nation, I argue that white nationalism, as a mode of settler colonialism, appropriates the discourses of political wounding to imagine and legitimize a narrative of white hurt and white victimhood; in effect, reproducing and hardening the borders of the nation-state. Additionally ...


Global Media Wars: The Ironic Prescience Of George Orwell, Editor 2018 Embry-Riddle Aeronautical University

Global Media Wars: The Ironic Prescience Of George Orwell, Editor

International Bulletin of Political Psychology

This article describes similar psychologies among people who intend to tell the truth and those who intend to lie. It posits the writings of George Orwell on political communication as relevant today as back in the 1940s.


Tortured Policies On Torture: Notes From The House Of The Dead?, Editor 2018 Embry-Riddle Aeronautical University

Tortured Policies On Torture: Notes From The House Of The Dead?, Editor

International Bulletin of Political Psychology

This article describes issues needing to be resolved before policies on the use of enhanced interrogation techniques including torture are developed, implemented, and assessed.


Digital Commons powered by bepress