438 results
Search Results
2. Moorman Center Releases First Tranche of 'Presidential Transition Issue Paper Series'
- Subjects
National security ,Presidents -- Transition periods ,Business ,News, opinion and commentary - Abstract
WASHINGTON, Aug. 16, 2024 /PRNewswire/ -- The Moorman Center for Space Studies, the independent think tank within the National Security Space Association, today released the first tranche of its 'Presidential [...]
- Published
- 2024
3. Paper ‘turned radical after Lai US trip’; Staff were excited about high-level Washington meeting, ex-publisher says
- Author
-
Wong, Brian
- Subjects
National security ,Publishing industry ,Publishing industry ,News, opinion and commentary - Abstract
The now-defunct Apple Daily tabloid newspaper turned “radical” after its founder Jimmy Lai Chee-ying met top US leaders such as Mike Pence and Mike Pompeo to seek their support for [...]
- Published
- 2024
4. Court Papers Offer Glimpse of Trump’s Defense in Classified Documents Case
- Author
-
Feuer, Alan
- Subjects
National security ,Public prosecutors -- Planning ,Ex-presidents -- Planning ,Company business planning ,News, opinion and commentary - Abstract
The former president’s lawyers may question whether the documents he took from the White House were related to national defense and whether the country’s security was damaged. Lawyers for former [...]
- Published
- 2024
5. Tycoon ‘started English paper to win U.S. support’; Court told how Lai wanted American politicians to subscribe to digital outlet as this would offer ‘political protection’ against Beijing crackdown
- Author
-
Wong, Brian and Wong, Natalie
- Subjects
National security ,Security guards ,News, opinion and commentary - Abstract
An English language edition of the now-closed Apple Daily tabloid was created at founder Jimmy Lai Chee-ying’s request in a bid to drum up international support and head off a [...]
- Published
- 2024
6. Peter Dutton backs release of Iraq war papers after Morrison government failure; Department claims key documents outlining reasoning behind joining US-led invasion were not included in an 'apparent administrative oversight'
- Subjects
National security ,Prime ministers ,News, opinion and commentary - Abstract
Byline: Sarah Basford Canales and Amy Remeikis Peter Dutton has thrown his support behind the release of documents relating to Australia's decision to join the Iraq war following the failure [...]
- Published
- 2024
7. Exposing the Dangers of the Influence of Foreign Adversaries on College Campuses. Hearing before the Subcommittee on Higher Education and Workforce Development of the Committee on Education and the Workforce. U.S. House of Representative, One Hundred Eighteenth Congress, First Session (July 13, 2023). Serial No. 118-17
- Author
-
US House of Representatives. Committee on Education and the Workforce, Subcommittee on Higher Education and Workforce Development
- Abstract
This document records testimony from a hearing before the Subcommittee on Higher Education and Workforce Development of the Committee on Education and the Workforce exposing the dangers of the influence of foreign adversaries on college campuses. Opening statements were provided by: (1) Honorable Burgess Owens, Chairman, Subcommittee on Higher Education and Workforce Development; and (2) Honorable Frederica Wilson, Ranking Member, Subcommittee on Higher Education and Workforce Development. Witness statements were provided by: (1) Paul R. Moore, Senior Counsel, Defense of Freedom Institute; (2) John C. Yang, President and Executive Director, Asian Americans Advancing Justice--AAJC; and (3) Craig Singleton, China Program Deputy Director and Senior Fellow, Foundation for Defense of Democracies. Additional submissions include: (1) Honorable Mark Takano, a Representative in Congress from the State of California: Article dated April 15, 2020, from Politico; and (2) Honorable Pramila Jayapal, a Representative in Congress from the State of Washington: Article dated January 18, 2023 from The Daily Pennsylvanian.
- Published
- 2024
8. International passengers can ditch paper and go digital: The New Zealand Traveller Declaration (NZTD) is now in full use for both air and maritime travellers arriving in New Zealand, including passengers and crew of international cruise ships.
- Subjects
ELECTRONIC paper ,CRUISE ships ,CHIEF executive officers ,WEATHER ,NATIONAL security ,PASSPORTS - Abstract
The New Zealand Traveller Declaration (NZTD) is now fully implemented for both air and maritime travelers arriving in New Zealand, including passengers and crew of international cruise ships. The NZTD system collects individuals' travel, customs, immigration, and biosecurity information to improve the safety and security of New Zealand. Travelers can submit their declaration 24 hours before their trip, and the declaration is linked to their passport and automatically assessed upon arrival. The NZTD can be accessed and completed online or through the NZTD app, and there are exemptions for certain individuals such as those who have been medically evacuated or are transiting through New Zealand. [Extracted from the article]
- Published
- 2024
9. Government Cloud Computing and National Security
- Author
-
Abd Al Ghaffar, Hedaia-t-Allah Nabil
- Published
- 2024
- Full Text
- View/download PDF
10. Multi-faceted US uncertainty connectedness with domestic and global geopolitical risk
- Author
-
Kyriazis, Nikolaos A. and Economou, Emmanouil M.L.
- Published
- 2024
- Full Text
- View/download PDF
11. Wargaming for Learning: How Educational Gaming Supports Student Learning and Perspectives
- Author
-
Amanda M. Rosen and Lisa Kerr
- Abstract
To what extent does educational gaming add value to more traditional instructional models in learning core concepts of national security and warfighting? This paper presents the results from a quasi-experimental, cross-sectional, and longitudinal study of students taking two standardized courses in the Joint Military Operations department at the US Naval War College. Split into wargaming and non-wargaming sections by instructor preference, subject learning is measured through self-reported and objective measures at three points: prior to the start of the content block on "Operational Art"; after the case study of the WW2 battle of Leyte Gulf but prior to any wargaming; and for subjects in wargaming course sections, after participating in the Leyte Gulf scenario of the "War at Sea" wargame. The results support the hypotheses that wargaming increases learning and alter student preferences in favor of learning through gaming but fail to find evidence that students recognize the value of the debriefing phase of educational gaming. This article adds to existing studies by focusing on an understudied practitioner population--graduate-level career military officers at a professional military education (PME) institution--and mitigating several of the methodological challenges facing many scholarly projects in the study of educational gaming in political science.
- Published
- 2024
- Full Text
- View/download PDF
12. Religious Dynamics of Secrecy in Cold War American Life
- Author
-
King, Shelby Lynn
- Subjects
Religion ,American history ,Religious history ,American Religious History ,Brainwashing ,Cold War ,National Security ,Pentagon Papers ,Secrecy - Abstract
“Religious Dynamics of Secrecy in Cold War American Life,” explores the role religion has played in conceptualizations, imaginations, and rituals of secrecy in twentieth-century American history. I examine these articulations of secrecy and religion in two case studies from the 1950s and mid-1970s, which highlight how Americans have recruited the language and conceptual schema of religion to convey the gravity and internal logic of secrecy, as well as to negotiate the limits of its acceptability in American democracy. In so doing, I demonstrate how secrecy is not only a matter for religion, but also a matter of religion. My first case study addresses the entanglement of secrecy and religion in Cold War constructions of “brainwashing.” I take as my starting point the influential representation of brainwashing found in Richard Condon’s classic 1959 novel, The Manchurian Candidate. I then trace the history of this icon of Cold War popular culture to its origins in the U.S. intelligence community following the scandalous false confessions of bacteriological warfare issued by American POWs in the Korean War. In addition to traditional historical analysis, I aim to shed new light on the relevance of religion in early Cold War American culture and politics by redeploying the ancient politico-religious category of maleficium as a framework to highlight brainwashing’s early associations with diabolical magic, secret influence, and perceived transgressions of normative gender roles and sexuality. Through these historical and cultural analyses, I situate the history of brainwashing at the nexus of Cold War religion and politics, illuminating the religious significance of fears and fantasies of secret influence in the spheres of domestic life and foreign policy. My second case study examines debates surrounding the expanding national security state through close attention to the 1971-1973 Pentagon Papers trial, in which co-defendants Daniel Ellsberg and Anthony Russo were indicted on espionage charges for conspiring to leak classified documents pertaining to the Vietnam War. Here, I focus on material manifestations of “sacred” national secrets, from official prohibitions against their disclosure to the spectacle of their presentation throughout the course of the trial. In this case, I build on a courtroom reporter’s reflection on the striking significance of an otherwise everyday object—namely, a cardboard box. This, of course, was no ordinary box, but rather a vessel containing the TOP-SECRET documents known colloquially as the “Pentagon Papers.” This reporter’s description rendered this ordinary cardboard box an emblem with religious significance: a “totem of the age of information.” Using this courtroom description as an entry point into a wider analysis of Cold War religion and politics, I demonstrate the analytical import of ascriptions of sacred value to classified information. This material analysis of religion provides a new avenue for re-examining the sacred significance attributed to state secrets, bringing into focus the socio-cultural meanings underpinning and shaping the politics of secrecy in American history. In my concluding epilogue, I address the legacy of these Cold War developments in contemporary American politics in view of recent speculations surrounding the impending rise of a “New Cold War.” As this study will demonstrate, exploring the origins and historical transformations of these Cold War entanglements of secrecy, religion, and politics can provide a new lens onto current manifestations of these entanglements in the press headlines and cultural debates shaping American society today.
- Published
- 2024
13. Risk Monitoring Can be Enhanced as U.S. Businesses Face Challenges Competing.
- Subjects
LETTING of contracts ,GOVERNMENT accountability ,NATIONAL security ,RECYCLED paper ,JOB descriptions ,AUDITING standards ,AUDITING ,PUBLIC contracts - Abstract
This report from the Government Accountability Office (GAO) examines the challenges faced by U.S. businesses when competing for contracts awarded by World Bank borrowers. The report found that borrowers often prioritize the lowest cost when evaluating proposals, which raises concerns about the consideration of quality. Businesses also raised concerns about the World Bank's oversight of procurement and implementation, as well as transparency and integrity issues. The GAO recommends that the Treasury develop formal processes for monitoring World Bank borrower projects. The report discusses the World Bank's procurement process, the involvement of U.S. businesses and government agencies, and the need for improved guidance and processes for monitoring projects and supporting U.S. businesses. [Extracted from the article]
- Published
- 2024
14. Navigating the Economic Impacts of Migration in Africa: A Comprehensive Review.
- Author
-
Mlambo, Victor H.
- Subjects
POLITICAL stability ,SOCIAL integration ,LITERARY sources ,ECONOMIC development ,NATIONAL security - Abstract
Migration in post-colonial Africa has become an essential source of economic development. However, for some countries, it has also threatened national security. This paper examines the challenges preventing Africa from harnessing migration for economic development. The paper contends that while one cannot ignore migration's economic potential, African countries struggle to leverage migration for economic development. Reviewing literature as a data source, this paper found that a lack of political will, national vs continental interests, and the lack of social integration policies coupled with widespread political instability are significant problems that give rise to Africa's struggle to consolidate migration for economic development. The paper concludes that without effective policies, Africa will continue to miss the economic benefits of migration. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
15. The securitisation of foreign disinformation.
- Author
-
Jackson, Nicole J.
- Subjects
DISINFORMATION ,CANADIAN federal government ,GOVERNMENT policy ,NATIONAL security ,INTERNATIONAL relations - Abstract
This paper analyses the Canadian government’s foreign and security policy responses to Russian disinformation in the context of the Russo-Ukrainian war. It asks whether, how, and why the government has securitised the “crisis of Russian disinformation.” The paper first briefly reviews literature on the Copenhagen’s School’s “securitisation” theory and how it has been used to explain responses to other crises. It then adopts the framework to contextualise the Canadian federal government’s official rhetoric, and then to categorise government policies and actions. The sources consulted include government actors’ reports and stated intentions and policies from 2022 to 2024. Adopting a securitisation framework reveals that Russian disinformation has been rhetorically securitised by government actors as an existential threat to national security and democratic integrity which requires urgent action. Within a context of cascading risks, the government has taken a range of distinct yet reinforcing policies and actions, some more comprehensive than others. The paper argues that together this “pervasive rhetorical securitisation” and “ad hoc practical securitisation” comprise the Canadian government’s ongoing process of partial securitisation. This process is legitimising different methods of governance: security and warfare communications (to address threats to national defence and security), democratic resilience (to address threats to democracy), and, most controversially, blocking and sanctioning (to signal discontent to the Russian regime). The analysis further reveals that each approach has different benefits and limits. The paper concludes that the securitisation process is incomplete compared to the government's rhetoric, with no over-arching organisation or strategy. It outlines implications for future research. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
16. Nexus between digital trade and security: geopolitical implications for global economy in the digital age.
- Author
-
Zhang, Chi, Chen, Xuechen, Yang, Jilong, and Gao, Xinchuchu
- Subjects
ELECTRONIC commerce ,GEOPOLITICS ,NATIONAL security - Abstract
This special issue explores the relationship between digital trade and security, emphasizing the geopolitical implications for the global economy in the digital age. The rapid growth of digital trade has introduced significant challenges and opportunities, necessitating robust data governance to balance national security interests with the free flow of goods, services, and data across borders. The papers explore the different models of data governance championed by the US, China, and the EU, highlighting the complexities of cross-border data flows and their impact on international relations. Through detailed analyses of various international agreements and frameworks, this special issue provides a comprehensive overview of the current landscape of digital trade and its security implications, with a particular focus on China's evolving approach to data governance and its global influence. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
17. National Security or Trade Openness? The Balancing Act in Contemporary Trade Relations.
- Author
-
Ul Mansoor, Sheikh Inam
- Subjects
NATIONAL security ,SECURITIES trading ,INTERNATIONAL trade ,COLLATERAL security ,INTERNATIONAL law - Abstract
The intersection of trade openness and national security in the realm of international trade law constitutes a nuanced and intricate landscape. This paper endeavors to unravel the complexities inherent in this delicate equilibrium, examining legal frameworks within the General Agreement on Tariffs and Trade (GATT)/World Trade Organization (WTO), Regional Trade Agreements (RTAs), and emerging global trends. The foundational principles outlined in GATT, particularly Article XXI, acknowledge the sovereign right of nations to take actions necessary for their essential security interests. However, the broad and permissive nature of this provision introduces challenges related to potential misuse and a lack of robust scrutiny mechanisms. The proliferation of RTAs, each housing unique national security clauses, adds layers of complexity to the overarching legal framework. Divergent standards, conflicting obligations, and the risk of fragmentation highlight the intricate balancing act that nations must perform to reconcile regional commitments with the principles of the global trade governance structure. The paper delves into practical applications and case studies, dissecting the challenges nations face as they navigate the fine line between economic integration and strategic safeguarding. [ABSTRACT FROM AUTHOR]
- Published
- 2024
18. South Korea in the Chip War: Challenges and Opportunities.
- Author
-
Sayankina, Sofiya
- Subjects
CHINA-United States relations ,SEMICONDUCTOR industry ,NATIONAL security ,SUPPLY chains ,MANUFACTURING industries - Abstract
This paper analyzes how South Korea, the leader in memory chip manufacturing, is affected by the US-China chip war. To assess the strategy that the Korean government is building to mitigate the adverse effects on its export-dependent economy and national security, the paper looks at the interdependence of the semiconductor supply chain and the conditions of the current conflict. The analysis of the current US-China chip war and its impact on South Korea's semiconductor industry and, by extension, its national economy and security, shows how South Korea is addressing the challenges and exploiting the opportunities to maintain its status as a major semiconductor manufacturer. The paper also explains how South Korea is leveraging its technological power status and experience to ensure the security and continued growth of its semiconductor industry. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
19. ПОЗИЦІЯ АДМІНІСТРАЦІЇ БІЛЛА КЛІНТОНА СТОСОВНО СПІВРОБІТНИЦТВА УКРАЇНИ ТА НАТО.
- Author
-
Л. Т., Тимошенко and Н. Д., Городня
- Subjects
PRESIDENTS of the United States ,NATIONAL security ,INTERNATIONAL relations ,COOPERATION - Abstract
The article examines the position of the United States of America regarding Ukraine’s cooperation with the North Atlantic Alliance during both administrations of the 42nd US President William Jefferson Clinton. The reflection of Ukraine’s relations with NATO from the standpoint of the American establishment in such important foreign policy documents as «The National Security Strategy of the United States for 1994, 1995, 1997 year» (L.T.), as well as in the official sources of the Presidents of the United States - «Public Papers of the Presidents of the United States of America». [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
20. Agile Inverse Design of Polarization-Independent Multi-Functional Reconfiguration Metamaterials Based on Doped VO 2.
- Author
-
Shan, Bingyao, Shen, Yang, Yi, Xuran, Chi, Xianqing, and Chen, Kejian
- Subjects
VANADIUM dioxide ,SENSOR networks ,METAMATERIALS ,NATIONAL security ,ABSORPTION - Abstract
Increasing attention is being paid to the application potential of multi-functional reconfigurable metamaterials in intelligent communication, sensor networks, homeland security, and other fields. A polarization-independent multi-functional reconfigurable metasurface based on doped vanadium dioxide (VO
2 ) is proposed in this paper. It can be controlled to switch its function among three working modes: electromagnetically induced absorption (EIA), electromagnetically induced transparency (EIT), and asymmetrical absorption. In addition, deep learning tools have greatly accelerated the design of relevant devices. Such devices and the method proposed in this paper have important value in the field of intelligent reconfigurable metamaterials, communication, and sensing. [ABSTRACT FROM AUTHOR]- Published
- 2024
- Full Text
- View/download PDF
21. 体系化构造:美国保密基础设施立法及启示.
- Author
-
张 涛 and 朱莉欣
- Abstract
Copyright of Journal of Xi'an Jiaotong University (Social Sciences) is the property of Journal of Xi'an Jiaotong University (Social Sciences) Editorial Office and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
22. Principles of Cloud Computing Infrastructure IaaS.
- Author
-
Alhazeem, Housam Ghanim
- Subjects
CLOUD computing ,INFORMATION technology ,NATIONAL security ,DIGITAL technology ,DATA analysis - Abstract
Copyright of Journal of Engineering Sciences & Information Technology is the property of Arab Journal of Sciences & Research Publishing (AJSRP) and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
23. THE FUNCTIONING OF THE INSTITUTIONS IN THE REPUBLIC OF NORTH MACEDONIA DURING THE COVID-19 PANDEMIC.
- Author
-
DIMOVSKI, Zlate and ISUFI, Fadil
- Subjects
COVID-19 pandemic ,NATIONAL security ,INTELLIGENCE service ,SECURITY sector ,NATURAL resources - Abstract
The interests of states in the field of national security do not differ much. They are the following: the protection of sovereignty, independence, territory, population, natural resources, basic principles, and values, which constitute the basis for future development and enhancement of wellbeing and contribution to harmonious relations with other countries. What differentiates them is the extent to and the manner in which the afore-stated interests are realized. Starting from the complexity of the interests and values that the state builds and develops, and for the purpose of national security, we will tackle the part of achieving and preserving the stated interests during crises, specifically the emergence and management of pandemic situations and the protection of national security in certain institutions (police, army, judiciary), whose work is directly and indirectly related to the security of citizens. The nature of COVID-19 had a tendency of threatening national security in all areas of life: the political system, human rights, the judiciary, the media, the economy, health, education, the security sector itself, including the police, the military, and the overall security intelligence community. This paper will cover the second and third years of the pandemic. The paper used quantitative and qualitative methods, which when applied gave us different numbers and facts complemented by the actions of different institutions, as key elements of national security, and we expect the paper to be instructive for the academic community, state authorities, society, and individuals about how to better prepare for future pandemics [ABSTRACT FROM AUTHOR]
- Published
- 2024
24. Anti-unmanned aerial vehicle detection system for airports: aviation and national security perspective.
- Author
-
Anghuwo, John Shivute, Imanuel, Peter, and Nangolo, Sam Shimakeleni
- Abstract
Unmanned Aerial Vehicles gained significant popularity in the last decade as demonstrated by their wide usage in various fields. From around the year 2001, the usage of unmanned aerial vehicles' technology was mainly confined to law enforcement agencies such as the military, police, and customs. In the contemporary, terrorists have also been observed to be using unmanned aerial vehicles to attack aviation facilities. The current paper examines the levels of vulnerability of the Namibian airports to possible intrusion and attack from unmanned aerial vehicles, a situation that could pose a serious threat to aviation and national security. Adopting a qualitative research approach, the study made use of a questionnaire and semi-structured interview guide to collect primary data from the participants. Microsoft Excel was used to analyse the data. The study establishes that Namibian airports are prone to attacks from unmanned aerial vehicles as there are no anti-unmanned aerial vehicle detection systems installed at all airports in the country. Thus, there is clear evidence that the Namibia Civil Aviation Authority and the Namibian Airport Company's regulations and policies on aviation safety and security did not prioritise the installation of anti-unmanned aerial vehicle detection systems at all airports in Namibia. The paper suggests that, in order to enhance aviation safety and security, a joint civil/military Information Technology Unit, responsible for spoofing, detection, and the monitoring of illicit unmanned aerial vehicle operations should be set up and operations activated at all airports and other public infrastructures in Namibia. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
25. 数智赋能国家安全教育现代化的概念、内涵与 机制.
- Author
-
王 秉 and 赵 桉
- Abstract
Copyright of Modern Educational Technology is the property of Editorial Board of Modern Educational Technology, Tsinghua University and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)
- Published
- 2024
- Full Text
- View/download PDF
26. THE ROLE OF THE EUROPEAN UNION IN ACHIEVING SUSTAINABLE DEVELOPMENT AT THE GLOBAL LEVEL.
- Author
-
GERGINOVA, Tatjana
- Subjects
SECURITY management ,DEMOGRAPHIC change ,SUSTAINABLE development ,INTERNET security ,POLITICAL stability - Abstract
In the context of globalization and demographic change, states are currently more vulnerable to non-military, asymmetric, hybrid and cyber threats and threats from non-state actors. Russia's war on Ukraine, Hamas's military attack on Israel indicate the likelihood of armed aggression against the sovereignty and territorial integrity of the state in modern global conditions. In the introductory part of the paper, the author analyzes the notion of national security as the ability of states, taking into account global changes and development, to protect their own identity, survival and interests. Furthermore, the author analyzes the need to achieve Sustainable Development at the global level. In the final part of the paper, the author states that Investing in the common future with its closest neighbors is fundamental for the long-term political stability of the European Union itself. Therefore, the enlargement of the European Union is based on development programs aimed at achieving political stability, secure economic conditions, social cohesion and environmental sustainability. The content will be created based on the analysis of foreign literature and using electronic content. In preparing the content of the paper, the author will apply the general scientific methods: the descriptive method, the normative method, the comparative method and the content analysis method as a special scientific method. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
27. The Long-run Impact of Childhood Wartime Violence on Preferences for Nuclear Proliferation.
- Author
-
Kim, James D.
- Subjects
NUCLEAR nonproliferation ,VIOLENCE ,NUCLEAR weapons ,REGIONAL differences ,BABY boom generation ,INDIVIDUALS' preferences - Abstract
How do childhood experiences of wartime violence affect individuals' preferences for nuclear proliferation? This paper argues that individuals who experienced severe war violence during childhood are more likely to value the security-enhancing aspects of nuclear weapons. These individuals are more concerned about being exposed to additional wartime violence, so they view nuclear weapons as a deterrent against large-scale invasions. By utilizing the geographic variation of violence intensity during the Korean War, this paper compares the pre-war and post-war cohorts who resided in severely damaged regions and relatively safe areas. Within the pre-war cohort, I find that individuals who resided in war-torn areas are more supportive of nuclear proliferation than those who were exposed to less violence. This regional difference, however, is not substantial in the post-war generation. The results suggest that direct exposure to wartime violence during childhood increases public demand for nuclear weapons when confronted with security threats. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
28. Towards Demystifying Trade Dependencies: At What Point do Trade Linkages Become a Concern?
- Author
-
Arriola, Christine, Cai, Mattia, Kowalski, Przemyslaw, Miroudot, Sébastien, and van Tongeren, Frank
- Subjects
SUPPLY chain disruptions ,GEOPOLITICS ,NATIONAL security ,INTERNATIONAL trade ,INPUT-output analysis - Abstract
Supply chain disruptions related to natural events or geopolitical tensions have in recent years prompted policy makers to identify potential vulnerabilities related to critical trade dependencies -- commercial links that could potentially impose significant economic or societal harm, be a source of coercion, a risk to national security, or disrupt strategic activities. Using three complementary methodologies -- detailed trade data analysis, input output data techniques, and computable general equilibrium (CGE) modelling -- this paper examines the nature and evolution of trade dependencies between the OECD countries and major non-OECD economies (MNOE). It shows that global production has become increasingly concentrated at the product level, with China representing 15% of import dependencies in strategic products for OECD countries in 2020-21 compared to 4% in 1997-99. The methodologies used in this paper unanimously demonstrate a high degree of trade interdependency between OECD and MNOE countries. The current debate on "de-risking" international trade, therefore, needs to carefully consider the possible costs and benefits of different policy choices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
29. Revitalising Australia's defence industry and national service scheme: Lessons from Sweden and the AUKUS initiative.
- Author
-
Parker, Lincoln
- Subjects
DEFENSE industries ,MANUFACTURING industries ,SERVICE industries ,NATIONAL security ,ACHIEVEMENT - Abstract
This paper describes the current state of the Australian defence industry, highlighting its achievements, threats, and opportunities. Also discussed are the importance of having a robust national service scheme with regard to the manufacturing industry, and implications of the AUKUS (Australia United Kingdom United States) initiative on Australia's defence industry and national security. [ABSTRACT FROM AUTHOR]
- Published
- 2024
30. Validation of the Enhanced Model for Efficient Development of Security Audit Criteria.
- Author
-
Kelo, T. and Eronen, J.
- Subjects
TELECOMMUNICATION systems ,NATIONAL security ,INFORMATION storage & retrieval systems ,CYBERTERRORISM ,MODEL validation - Abstract
Cyberattacks have grown in importance to become a matter of national security. Security criteria are important tools for defensive capabilities of critical communications and information systems. An enhanced model for efficient development of security audit criteria has been proposed. This paper provides evidence in support of the validation of the proposed model. The model is validated through case study observations from two criteria development projects that utilised the model during criteria development. The results indicate that the model is useful for criteria development and provides efficiency to such processes. The results also suggest minor improvements for development of the model. [ABSTRACT FROM AUTHOR]
- Published
- 2024
31. National President's Column.
- Author
-
Irving, Paul
- Subjects
RUSSIAN invasion of Ukraine, 2022- ,DEFENSE industries ,SCHOLARLY publishing ,NATIONAL security ,AMBASSADORS - Abstract
The document is a publication called "United Service," which is the journal of the Royal United Services Institute for Defence and Security Studies - Australia. The journal aims to inform the defense and national security debate in Australia and internationally. It publishes papers, opinion pieces, letters to the editor, biographies, obituaries, and book reviews related to defense and national security issues. The document also mentions the difficulty the Australian Defense Force faces in meeting its growth targets and the upcoming final report of the Royal Commission into Defense and Veteran Suicide. The National Institute will hold its Annual General Meeting in October 2024. [Extracted from the article]
- Published
- 2024
32. Climate Refugees in India: Seeking Security between Disaster Diplomacy and Strategic Ambiguity.
- Author
-
Bollempalli, Manasa
- Subjects
- *
ENVIRONMENTAL refugees , *LEGISLATION , *EMIGRATION & immigration , *NATIONAL security - Abstract
Among the 100 million refugees and displaced persons in 2022, the category of "climate refugees" has become more salient, yet countries still do not know how to handle it. Two aspects of climate refugees also remain understudied; how climate refugees are perceived, since they are viewed through the dual lenses of climate risks and migratory flows and how these perceptions impact policies. Climate refugees are thus doubly impacted by the spill-over effect of securitization processes in the fields of climate change and immigration. This paper analyzes how climate- and migration-security legislation in a resource-constrained nation conceptualizes climate refugees, and how their diverse conceptual categories spill over into policymaking and create a mutually beneficial and humanitarian approach for host and migrant populations. This paper uses India as a case study based on its historical practice of refugee protection despite significant resource constraints, high risk of inbound climate refugees, participation in key global agreements, and domestic discourse over climate and immigration securitization. Using policy analysis and expert interviews, this study demonstrates that India successfully exemplifies a broadly humanitarian climate mobility regime in the South Asian region through relocations, Humanitarian Assistance and Disaster Relief operations, and ad hoc legal protection. Despite crucial structural limitations, India illustrates a democratic global south template implicitly recognizing migrants' vulnerability to climate change and attempts to minimize risk, with potential for replication in other developing and developed nations. This normative policy framework, notwithstanding its limitations, presents an alternative to the threat-centric and unsustainable securitization of climate migration practiced in the Global North. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Towards a non-Western model of security assistance: How Iran assists militaries.
- Author
-
Divsallar, Abdolrasool and Azizi, Hamidreza
- Subjects
- *
NATIONAL security , *IRANIANS , *INTERNATIONAL security ,IRANIAN Revolution, 1979 - Abstract
With the 1979 revolution, Iran's Security Assistance (SA) underwent a significant transformation, from fragmented and ideologically-driven support for Islamic movements in the early post-revolutionary stage to making SA the centrepiece of its national security strategy. This article explores Iran' model of SA by addressing the following key questions: How have perceptions of SA and its role in post-revolutionary Iran's strategic thinking changed? What constitutes key elements of the Iranian SA practice? Is there an 'Iranian way' of assisting local military partners, and to what extent does it overlap with other states' similar practices? The paper identifies a two-stage process of evolution, arguing that SA gradually evolved into a strategic tool to build a Tehran-led regional alliance model, boost Iran's deterrence capability, and counter the US-led collective security architecture. With a hybrid ideological and anti-imperialist rationale at its core, relying on human bonds and personal loyalties, mixing asymmetric operations with sustained force projection, and using a centralized command structure with minimum public exposure, Tehran has introduced a unique model of security assistance. The paper shows how Iran has moved beyond a technical view of SA to gradually shape a holistic model with interwoven messianic, economic, and strategic dimensions. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. Egypt's position in the Russia–Ukraine war.
- Author
-
Ragab, Eman
- Subjects
RUSSIAN invasion of Ukraine, 2022- ,FOOD security ,NATIONAL security - Abstract
This paper argues that Egypt's balancing position on the war on Ukraine is shaped by a combination of a rational analysis of the consequences of the war and a pre‐war vision of its role in the ongoing global transformation. The paper employs the framework of varied consequentialism to identify the main factors driving Egypt's balancing position. The first factor relates to Egypt's dependence on external partners, contributing to the vulnerability of its national security, which leaves minimal room for maneuvering in responding to external crises, including the war in Ukraine. The second factor relates to the negative implications of the war on Egypt's national food security. The third factor is the need for external support to contain the war's negative consequences, which raises questions about the reliability of the international partners. The paper also discusses how this balancing position has defined Egypt's response to the American and Russian visions of the new world order in the post‐Ukraine war period. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. 'It's like crossing a border everyday': Police-migrant encounters in a postcolonial city.
- Author
-
Waseem, Zoha
- Subjects
IMMIGRATION enforcement ,RACISM ,IMMIGRATION policy ,NATIONAL security ,IMMIGRANTS - Abstract
How are migrant communities policed in cities of the Global South where racially securitized discourses and colonial institutional legacies shape contemporary police practice? Critical criminologists advise that postcolonial perspectives offer valuable insights on imperial legacies, while allowing us to expand conceptual and empirical analyses of crime, policing, justice, and social order. Building on this agenda, this paper explores the intersection of postcolonial policing and immigration enforcement in the context of urban encounters between police officers and Afghan and Bengali migrants in urban Pakistan. It considers how the securitization of migration and migrants impacts their routine interactions with street-level enforcement officers. Based on ethnographic findings from Karachi, this paper argues that migrant encounters with urban policing can be captured by what I call the "postcolonial condition of policing" wherein prejudiced security policies enable expansions in police power without addressing structural inequalities within the police, facilitating reliance upon informal procedures and practices. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Soviet Active Measures and the Second Cold War: Security, Truth, and the Politics of Self.
- Author
-
Whyte, Jeffrey
- Subjects
COLD War, 1945-1991 ,PRESIDENTIAL administrations ,PEACE movements ,SELF ,NATIONAL security - Abstract
This paper explores the emergence of "Soviet active measures" in US political discourse during the "Second Cold War" of the early 1980s. It follows the efforts of the Active Measures Working Group, a little-known interagency organization led by Reagan administration appointees that constructed an image of Soviet active measures as a threat to national security. I detail, especially, how the Working Group framed the US anti-war movement as both a target of and vehicle for active measures. In so doing, I show how the active measure was constructed in US political discourse through a dramaturgy of secrecy and revelation that placed it within a broader "covert imaginary." This paper concludes with a theorization of these efforts in relation to Foucault's concept of "alethurgy," considering how the construction of the active measure produced a "politics of truth" in which the anti-war protestor appeared as a dangerous, disinformed subject. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
37. ПРАВОВІ АСПЕКТИ ЗАСТОСУВАННЯ СИЛ ОБОРОНИ ПІД ЧАС ВОЄННОГО СТАНУ
- Author
-
Л. П., Медвідь and Ю. В., Симчукевич
- Abstract
This article delves into the legal aspects of employing various defense components. It analyzes regulatory and legal documents that define the tasks and purposes of Ukraine's Defense Forces, including security forces, defense forces, the defense industry complex, and citizens and public associations that voluntarily participate in ensuring national security. The article outlines their functions, as reflected in new strategic documents. It demonstrates that the primary focus of security and defense sector development is on restoring and maintaining the state's defense capability at an appropriate level. The paper identifies additional powers granted to military command under martial law, which are associated with certain limitations on rights and freedoms, necessary to ensure the possibility of introducing and implementing martial law measures. The study analyzes the entities entrusted with tasks related to the implementation of the state's defense function, namely: the Armed Forces of Ukraine, the National Guard of Ukraine, and the State Border Service of Ukraine. It reveals that the lack of a unified normative act regulating the interaction between security and defense sector institutions within the framework of tasks for ensuring the state's defense poses a certain problem. This item examines the powers of the National Police of Ukraine under martial law and emphasizes the legal status and organization of territorial defense units. An analysis of criminal norms reveals that the amendments and additions to the Criminal Code of Ukraine will become the basis for establishing constitutional order in society and the state as a whole. The article states that in the context of the aggravation of the socio-political situation in Ukraine, caused by the active influence of the Russian Federation on the spread of anti-state and separatist tendencies and direct interference in all social processes of Ukraine, there is a need to unite all components of security and defense, given the complexity of the threats facing the country. It is noted that it will be possible to separate issues into separate security or defense ones only after the elimination of the threat from the Russian Federation. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
38. The role of political institutions in the religious sphere before and during the Russo-Ukrainian war: national security vs. freedom of religion.
- Author
-
Salnikova, Svitlana and Savelyev, Yuriy
- Subjects
- *
RUSSIAN invasion of Ukraine, 2022- , *FREEDOM of religion , *POLITICAL participation , *RELIGIOUS diversity , *RELIGIOUS institutions - Abstract
The paper aims to demonstrate characteristics of interaction between governmental efforts to maintain national security and the situation with freedom of religion in Ukraine. To answer the questions of how political decisions have influenced the religious sphere in Ukraine over the past five years including wartime and whether there is a balance between national interests and freedom of religion we apply event impact assessment comparing trends of transitions of parishes and people attitudes towards different Orthodox churches before and after political actions and governmental decisions during 2018–2023. The paper confirms that although religion was repeatedly brought into the political sphere religious pluralism persists in Ukraine on the territories that are under government control. We demonstrate that establishing the Orthodox church that was independent of Russia bolstered freedom of religion and full-scale Russia invasion caused a steep increase in many religious transfers from the Ukrainian Orthodox Church of the Moscow Patriarchate (UPC MP) to the Orthodox Church of Ukraine (OCU). Despite an increased role of the state and issues of national security due to Russian aggression, the religious sphere was quite autonomous. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
39. Chip-encoded high-security classical optical key distribution.
- Author
-
Wu, Bo, Zhou, Hailong, Dong, Jianji, Chen, Yinfang, Zhu, Ninghua, and Zhang, Xinliang
- Subjects
INFORMATION technology security ,OPTICAL fibers ,ERROR rates ,NATIONAL security ,RECIPROCITY (Psychology) ,QUANTUM computers - Abstract
The information security plays a significant role in both our daily life and national security. As the traditional algorithm-based secure key distribution (SKD) is challenged by the quantum computers, the optical physical-layer SKD has attracted great attentions such as quantum SKD, chaos SKD, and reciprocity-based SKD. However, the cost of quantum SKD is still unaffordable and the latter two classical SKDs are only reliable with some preshared information or under simple eavesdrop. So far, there still lacks a high-security and low-cost optical SKD scheme. In this paper, we propose and demonstrate a high-security chip-encoded classical optical SKD paradigm based on the reciprocity of incoherent matrix. The security of SKD is facilitated by the incoherence of input light, and it is the first time that the classical optical SKD is achieved with silicon photonic chips and commercial optical fiber link. Experimentally, we set up a chip-to-chip communication link and achieve key generation rate of 100 bit/s over a 40 km single mode fiber, with key error rate of only 1.89 %. Moreover, we demonstrate the key capacity expansion of the proposed scheme with four-channel wavelength division multiplexing. Our proposal paves the way for the low-cost, high-security, and miniaturized optical SKD. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
40. The Urban Deployment Model: A Toolset for the Simulation and Performance Characterization of Radiation Detector Deployments in Urban Environments.
- Author
-
Abgrall, Nicolas, Ayyad, Yassid, Chow, Chun Ho, Cooper, Reynold, Hellfeld, Daniel, and Rofors, Emil
- Subjects
NUCLEAR counters ,COMPUTER network security ,FALSE alarms ,DETECTORS ,NATIONAL security - Abstract
Static and mobile radiation detectors can be deployed in urban environments for a range of nuclear security applications, including radiological source search-and-tracking scenarios. Modeling detector performance for such applications is challenging, as it does not depend solely on the detector capabilities themselves. Many factors must be taken into consideration, including specific source and background signatures, the topology and constraints of the deployment environment, the presence of nuisance sources, and whether detectors are mobile or static. When considering the simultaneous deployment of multiple, heterogeneous detectors, assessment of the system-wide performance requires the simulation of the individual detectors, and a system-level analysis of the detection performance. In radiological source search-and-tracking scenarios, performance is mostly dominated by the probability of encounter, which depends on the specifics of a given deployment, e.g., static vs. mobile detectors or a combination of both modalities, the number of detectors deployed, the dynamic vs. static setting of false alarm rates, and individual vs. networked operation. The Urban Deployment Model (UDM) toolset was specifically developed to cover the gap in the available generic frameworks for the simulation of radiation detector deployments at city scales. UDM provides a unified and modular framework to support the simulation and performance characterization of heterogeneous detector deployments in urban environments. This paper presents the key components along the UDM workflow. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
41. Advancing the Emergency Industry: Policy, Innovation, and Implications for National Security
- Author
-
Shen, Yanmei and Zhang, Bin
- Published
- 2024
- Full Text
- View/download PDF
42. An Assessment on Internal Security Threat to Pakistan and Impacts of Terrorism on Economy.
- Author
-
Iqbal, Muhammad
- Subjects
INTERNAL security ,HUMAN security ,DOMESTIC terrorism ,NATIONAL security ,TERRORISM ,TWENTY-first century ,SECTARIANISM - Abstract
This paper focuses on internal security threat to Pakistan and impacts of Terrorism on Economy. The multifarious threats to the security of Pakistan whether external or internal, have intensified in the 21st century. Previously, security was conceived in military terms alone. No longer true, in the matrix of national security, military threat is merely one constant. Other factors like law and order, economy, terrorism etc are all now reckonable constituents which, either alone or in combination, can trigger internal security catalysts or cause destabilization of a country. Whereas external and ideological dimensions of threat are being handled aptly by the government with appropriate responses, it is the internal dimension of national security that presents a daunting challenge to our policy makers. In this context, this paper addresses various forms of sectarianism and its impact on Pakistan's economy in line with the US relations with Pakistan and reflections on its economy. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Shanghai Cooperation Organization: Opportunities for Pakistan.
- Author
-
Khan, Mehran and Jamal, Ferdos
- Subjects
INTERNATIONAL economic relations ,SOCIOECONOMIC factors ,ECONOMIC development ,NATIONAL security - Abstract
This research paper explores Pakistan's potential advantages within the Shanghai Cooperation Organization (SCO). It focuses on three main areas: energy sector collaboration, economic cooperation, and joint military exercises. The paper uses qualitative research methodology to provide a comprehensive overview of the opportunities the SCO presents for Pakistan. It suggests that Pakistan can harness economic, security, and diplomatic benefits through increased trade, infrastructure development, and regional cooperation, provided it engages proactively and aligns with SCO objectives. The paper also highlights the strategic implications of joint military exercises between Pakistan and SCO member states, addressing shared security concerns. The paper offers valuable insights for policymakers and stakeholders interested in promoting regional cooperation. By recommendations, Pakistan can further leverage its membership in the SCO to realize the full spectrum of opportunities for socioeconomic growth and regional cooperation, contributing to a more integrated and prosperous Eurasian region. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. THE COMMUNITY FRAMEWORK FOR THE EXAMINATION OF FOREIGN DIRECT INVESTMENTS UNDER THE MAGNIFYING GLASS EUROPEAN COURT OF AUDITORS.
- Author
-
ATTILA, DÉZSI
- Subjects
FOREIGN investments ,GEOPOLITICS ,AUDITING ,NATIONAL security - Abstract
This paper examines in detail the current Community framework for the screening of foreign direct investments (FDI) in the European Union, in the context of Special Report No 27/2023 published by the European Court of Auditors. This analysis is essential for understanding the dynamics and implications of foreign direct investment on national security and competition in the European Union, in light of contemporary geopolitical and economic realities. The study examines both the scope and main objectives of the European legal framework and the evolution of investment screening mechanisms in the Member States of the European Union, presents the European Court of Auditors' organization, mission, vision and values, as well as the scope and approach to external public audit, focusing specifically on the findings and recommendations of the European Court of Auditors, critically examining how European competition authorities manage these investments and the European Commission's responses to these challenges. By using a mixed methodology that combines the analysis of official documents with interviews and case audit, the paper provides a thorough assessment of the effectiveness and efficiency of current regulations and suggests directions for improving the European Union's policy in this area. The results show that although the Community framework has recently been strengthened, significant adjustments are still needed to adequately address the risks associated with foreign direct investment and to balance security and economic development needs in the bloc. In conclusion, the paper recommends a prudential and coordinated approach in the review of foreign investment policies, with a particular focus on long-term implications for regional stability and international competitiveness. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Violation of territorial integrity as a tool for waging long-term hybrid warfare (against the backdrop of power games in the South Caucasus region).
- Author
-
Iskandarov, Khayal Ibrahim, Gawliczek, Piotr, and Soboń, Andrzej
- Subjects
POLITICAL realism ,NATIONAL security ,IRREGULAR warfare ,INTERNATIONAL relations - Abstract
This paper seeks to examine the violation of territorial integrity as a stage of hybrid warfare. Grounded in the theoretical framework of neoclassical realism, this study analyses nations' foreign policy strategies considering both global and domestic factors. Employing primarily qualitative research, this study concentrates on a case study of the South Caucasus region. Against the backdrop of the war which broke out in the early 2022 between Russia and Ukraine, the preservation of territorial integrity emerges as an imperative aspect of national security policy. Despite the longstanding recognition of territorial integrity as a fundamental tenet of international law over the centuries, this war has galvanised all nations with regard to the violation of territorial integrity. The paper delineates the principles of territorial integrity vis-à-vis the national security of the South Caucasus countries, substantiating the assertion that violation of the territorial integrity of the particular countries in this region serves the interests of external actors, either directly or indirectly, and is employed as a strategic tool in the pursuit of protracted hybrid warfare. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. Rising sun in the cyber domain: Japan’s strategic shift toward active cyber defense.
- Author
-
Mochinaga, Dai
- Subjects
- *
NATIONAL security , *TWENTY-first century , *SUNRISE & sunset , *MILITARY policy , *CYBERSPACE - Abstract
AbstractThis paper provides an in-depth analysis of Japan’s evolving cyber defense capabilities and explores its future challenges. National security has transformed in the twenty first century, with cyberspace becoming a key conflict domain. Japan, like other nations, has adapted to these changes. In 2022, the Japanese government introduced its active cyber defense concept. The National Security Strategy of 2022 stated the government’s posture for active cyber defense, which pre-emptively neutralizes adversary computers. This marked a turning point in Japan’s security and defense. This strategic shift, which occurred notably between 2000 and 2022, exemplifies Japan’s transition in the cyber domain. The scope of protecting cyberspace has evolved from primarily safeguarding civilian infrastructure to adopting proactive measures. This evolution is analyzed in the paper, which contrasts Japan’s approach with Western nations’ military-driven cyber policies. Additionally, the multifaceted challenges and opportunities arising from this paradigm shift in cyber capability development are explored. The analysis encompasses key aspects, including the policy formation, international cooperation, budgetary allocations, and the progress of organizational structures regarding the cyber domain. Furthermore, the study explores Japan’s future trajectory in cyber defense, with a particular focus on its role within the ‘Multi-Domain Defense Force’ and the dynamics of the Japan-US alliance. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
47. Extending SysML Model Federation to Support Systems of Systems Multilevel Security Development.
- Author
-
Swickline, Chris
- Subjects
ENGINEERING models ,SYSTEMS engineering ,DIGITAL twins ,INTELLIGENCE service ,NATIONAL security - Abstract
Practitioners of modern systems engineering within the defense industry and intelligence community often find themselves being pulled in diametrically opposed directions. On the one hand, systems engineering is quickly evolving into a digital practice, strategically connecting heterogeneous sets of models to form digital threads and digital twins capable of providing insights more valuable than the sum of their parts. On the other hand, the inherent nature of working within the national security space necessitates information be held a multiple levels of classification, safeguarded from release, and compartmentalized. This paper focuses on Model Based Systems Engineering (MBSE) development to introduce methods and tools to aid in overcoming these challenges. The work presented here builds on previously published works in SysML Model Federation for Systems of Systems (SoS) Architecting, the experience of applying this methodology on real world programs. Furthermore, it leverages freely available MBSE tools, processes, and methods in the construction of System Architecture Models (SAMs). This paper culminates in a call to action for additional published research and development to address residual challenges and gaps with respect to executing MBSE for Multilevel Security (MLS) development. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Illustrative Examples of How to Measure Influence Operations: Experimental and Statistical Methods for Causal Inference.
- Author
-
Bryant, D. J.
- Subjects
CAUSAL inference ,NATIONAL security ,PSYCHOLOGICAL techniques ,EXPERIMENTAL design ,PROFESSIONAL employees - Abstract
National security influence professionals have always struggled with influence measures of effectiveness and operational assessments. This paper includes fictional examples that illustrate how experimental methods from psychological science can address this problem. Three fictional use cases are examined. A scientific approach to national security influence is essential to accumulating knowledge in this domain. Without it, the information operations community will continue to struggle to identify what works and why. [ABSTRACT FROM AUTHOR]
- Published
- 2024
49. Food Acquirability: An Unexplored Component of Food Security?
- Author
-
Okpala, Emeka Franklin, Korir, Lilian, and Manning, Louise
- Subjects
FOOD security ,FOOD preferences ,SOCIOECONOMIC factors ,NATIONAL security ,DATA analysis - Abstract
The key elements, or pillars, of food security are stated as food availability, food access, food utilization, and stability. These food security pillars are often linked to food security interventions at the national, community or household level. However, if the urban 'household' is the unit of interest for any food security intervention, this research asks if a more holistic element, or pillar, is needed. The aim of this research has been to explore the socio-economic aspects of food security/insecurity that we have termed as a result of the research "food acquirability". Through the use of structured questionnaires (n = 120), and analysis of the data derived from local market and supermarket settings in the city of Awka, Nigeria, the concept of food acquirability has emerged and been conceptualized and critiqued. The contribution of this paper is to frame the concept of acquirability with regard to food security in Nigeria in order to develop a better understanding of the factors that impact household urban food security/insecurity and how they can be effectively mitigated. Factors of acquirability that emerged were culture, time poverty, resource availability and cooking skills, and household food preference and meal choice. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
50. Rockburst prediction using artificial intelligence techniques: A review.
- Author
-
Yu Zhang, Kongyi Fang, Manchao He, Dongqiao Liu, Junchao Wang, and Zhengjia Guo
- Subjects
ARTIFICIAL intelligence ,ENERGY security ,NATIONAL security ,INTERDISCIPLINARY research ,EXCAVATION - Abstract
Rockburst is a phenomenon where sudden, catastrophic failure of the rock mass occurs in underground deep regions or areas with high tectonic stress during the excavation process. Rockburst disasters endanger the safety of people's lives and property, national energy security, and social interests, so it is very important to accurately predict rockburst. Traditional rockburst prediction has not been able to find an effective prediction method, and the study of the rockburst mechanism is facing a dilemma. With the development of artificial intelligence (AI) techniques in recent years, more and more experts and scholars have begun to introduce AI techniques into the study of the rockburst mechanism. In previous research, several scholars have attempted to summarize the application of AI techniques in rockburst prediction. However, these studies either are not specifically focused on reviews of the application of AI techniques in rockburst prediction, or they do not provide a comprehensive overview. Drawing on the advantages of extensive interdisciplinary research and a deep understanding of AI techniques, this paper conducts a comprehensive review of rockburst prediction methods leveraging AI techniques. Firstly, pertinent definitions of rockburst and its associated hazards are introduced. Subsequently, the applications of both traditional prediction methods and those rooted in AI techniques for rockburst prediction are summarized, with emphasis placed on the respective advantages and disadvantages of each approach. Finally, the strengths and weaknesses of prediction methods leveraging AI are summarized, alongside forecasting future research trends to address existing challenges, while simultaneously proposing directions for improvement to advance the field and meet emerging demands effectively. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.