Publisher: Henley-Putnam University   (Total: 1 journals)   [Sort by number of followers]

Showing 1 - 1 of 1 Journals sorted alphabetically
J. of Strategic Security     Open Access   (Followers: 11, SJR: 0.194, CiteScore: 0)
Similar Journals
Journal Cover
Journal of Strategic Security
Journal Prestige (SJR): 0.194
Number of Followers: 11  

  This is an Open Access Journal Open Access journal
ISSN (Print) 1944-0464 - ISSN (Online) 1944-0472
Published by Henley-Putnam University Homepage  [1 journal]
  • A Comparative Analysis of the "Mexican Drug Violence: Hybrid Warfare,
           Predatory Capitalism and the Logic of Cruelty" and "The Rise of the
           Narcostate (Mafia States)

    • Authors: Daniel Argomedo Weisz
      PubDate: Sat, 05 Mar 2022 11:56:09 PST
       
  • Policing in France. Edited by Jacques de Maillard and Wesley G. Skogan.
           New York and London: Routledge, 2021.

    • Authors: John P. Sullivan
      PubDate: Sat, 05 Mar 2022 11:56:06 PST
       
  • China’s Energy Security and Relations with Petrostates by Anna Kuteleva,
           Routledge Publishing, Taylor and Francis Group, 2021.

    • Authors: Mark T. Peters II
      PubDate: Sat, 05 Mar 2022 11:56:03 PST
       
  • Capital of Spies: Intelligence Agencies in Berlin During the Cold War. By
           Sven Felix Kellerhoff and Bernd von Kostka. Translated by Linden Lyons.
           Philadelphia and Oxford, Casemate Publishers, 2021.

    • Authors: Edward J. Hagerty
      PubDate: Sat, 05 Mar 2022 11:56:01 PST
       
  • Votes, Drugs and Violence: The Political Logic of Criminal Wars in Mexico.
           By Guillermo Trejo and Sandra Ley. New York: Cambridge University Press,
           2020. ISBN 978-1-108-79527-2.

    • Authors: Howard Campbell
      PubDate: Sat, 05 Mar 2022 11:55:58 PST
       
  • Cultural Intelligence in the Study of Intelligence

    • Authors: Brian L. Alcorn et al.
      Abstract: Intelligence officers often interact in culturally diverse settings different from the settings in which they grew up. Yet, there is a lack of academic research about the integration of culture and the study of intelligence. Researchers have made Cultural Intelligence (CQ) measurable via the Cultural Intelligence Scale (CQS) and successfully applied it in the business world as a predictor of success in multi-cultural environments. This article describes an application of the CQS, using the Observer Report questionnaire to assess the memoirs of three successful intelligence officers to ascertain the degree that CQ applies to the success of officers in United States Intelligence Community (USIC) in multicultural environments. The study results indicated each intelligence officer possessed a high degree of cultural intelligence that assisted in the course of their duties and the CQS is a good assessment tool to measure cultural intelligence.Keywords: Cultural intelligence, Cultural Intelligence Scale, CQS, Cultural Intelligence Quotient
      PubDate: Sat, 05 Mar 2022 11:55:53 PST
       
  • A Hierarchical Multi-Authority Access Control Scheme for Secure and
           Efficient Data Sharing in Cloud Storage

    • Authors: Smita Athanere et al.
      Abstract: Enterprises choose to keep their data on the cloud to allow for flexible and efficient data exchange among their authorized staff when dealing with huge data. However, during the sharing of sensitive data, data security and users privacy has become major challenges. Most of the existing studies have several limitations, including weak model security, single point of failure, and lack of efficiency during user revocation. This article proposes cloud storage based Hierarchical Multi-authority Access Control Scheme (HMA-ACS) for secure and efficient data sharing. Through theoretical analysis, this article proves that the proposed mechanism efficiently performs cryptographic key operations and secured plus adaptive in the standard model while supporting the access policies. Furthermore, the proposed approach evaluated and compared recent state-of-art schemes in terms of storage overhead, computation overhead, average encryption, and decryption performance. Experimental results analysis shows that the proposed solution is resistant to many types of security threats and ensures data privacy when sharing data in the cloud.
      PubDate: Sat, 05 Mar 2022 11:55:48 PST
       
  • Evolution of Aviation Terrorism – El Al Israeli Airlines, Case Study

    • Authors: Łukasz Szymankiewicz PhD
      Abstract: The research problem of this article is the process of evolution of aviation terrorism over the years as illustrated by attacks against El Al airlines, with special reference to the research perspective of the security system. The author embarks on verifying the hypothesis that aviation terrorism is changing phenomenon which has been accompanied over the years by increasingly brutal methods and effects of the attacks, transforming aviation terrorism from a medium of communication to a tool for causing maximum damage. Employing the genealogical method, the author analysed 52 terrorist attacks from the years 1968 to 2012, whereby he attempted to answer the research question of "How has the phenomenon of aviation terrorism evolved over the years'"
      PubDate: Sat, 05 Mar 2022 11:55:42 PST
       
  • Revisiting Domestic Intelligence

    • Authors: John P. Sullivan et al.
      Abstract: This article looks at the evolution of US domestic intelligence prior to and since 9/11 in light of the Capitol attacks. It also reviews the literature and practice of intelligence reform in the context of foreign comparative experience (France, UK, Canada, Australia). It looks at the promise of fusion centers, cocontemporay domestic intelligence models, and the continuing need for domestic intelligence reform.Additional Keywords: Domestic Intelligence, Intelligence Reform, Intelligence Fusion
      PubDate: Sat, 05 Mar 2022 11:55:35 PST
       
  • Never Mind Betrayal: America’s Indifference to the Kurds is a
           Strategic Blunder

    • Authors: Jonathan Honigman
      Abstract: Although they have proven themselves to be loyal and capable U.S. partners, America has refused to endorse either independence for Iraqi Kurds or autonomy for Syrian Kurds. That policy has been academically underscored by several Realism-based concepts including an offshore balancing approach to the Middle East. This paper argues that America can adjust to new realities in the region without having to forsake its worthwhile Kurdish partnerships. I first compare and contrast the costs of American support for Kurds and then refute the notion that Kurdish independence in Iraq or autonomy in Syria would cause instability or be nonviable. I then recount recent Kurdish actions that have benefited America and argue that the subsequent U.S. capitulations to Baghdad and Ankara were unnecessary and strategically short-sighted. Lastly, I examine America’s relationship with Turkey to discern if it merits impeding U.S. Kurdish policy. This paper concludes that America’s endorsement of independence in Iraqi Kurdistan and perpetual autonomy in Northeast Syria would not be merely altruistic, but primarily a realpolitik reassertion of U.S. geopolitical strategy.
      PubDate: Sat, 05 Mar 2022 11:55:29 PST
       
  • Promoting Cognitive Complexity Among Violent Extremist Youth in Northern
           Pakistan

    • Authors: Feriha Peracha et al.
      Abstract: This article reports on the results of an intervention to promote cognitive complexity (measured by integrative complexity, IC) and perspective taking for youth detained for violent extremism at the Sabaoon Center for Deradicalization and Rehabilitation in northern Pakistan. Participants are sixty-four males (mean age 19.77, SD = 3.26) comprising three cohorts: CVE Detained, CVE Reintegrated, and PVE At-risk.The Sabaoon IC intervention consists of eight sessions with action learning contextualized according to an assessment of the push, pull and personal factors that shape the life experience of the youth. Pre and post testing results show significant gain in IC in the overall sample (Cohen’s d= -1.80, 95% CI[-.87,-.49]), and in each cohort, indicating significantly increased ability to perceive validity in one’s own changing views and others’ differing views along with reduction in derogating or dehumanizing outgroups. Oral presentations showed expected IC scores showing differentiation, with the Reintegrated cohort showing higher order integrations and expressed confidence to be change-makers in their communities.Two subscales from the Violent Extremist Beliefs Survey (concerning beliefs about inter-religious harmony and risk-taking behaviors) showed expected changes, but self-report perspective taking and empathy measures were insignificant.Limitations: The entire Sabaoon sample was selected for the intervention, and due to time and operational constraints, it was not feasible to recruit a control group matched on important variables.Implications for using IC measurement and method for detained and at risk populations are discussed.
      PubDate: Sat, 05 Mar 2022 11:55:19 PST
       
  • Emotional and Rational Decision-Making in Strategic Studies: Moving Beyond
           the False Dichotomy

    • Authors: Samuel Zilincik
      Abstract: It is common, though erroneous, to think of rational and emotional decision-making as being opposed to each other. The binary distinction originated in Western philosophy and subsequently spread to other fields, including strategic studies. Strategic studies scholarship has nurtured this binary in two mainstream traditions, classical strategic theory and the coercion school. The distinction is fallacious because all strategically relevant decisions are emotional, and many of these decisions can be rational. Abandoning the false dichotomy is necessary for the field to remain relevant and for strategists to better understand their choices and the decisions made by their adversaries. Accordingly, this article proposes a new way of thinking about the role of emotions in strategic decision-making, one that starts from the appreciation that all strategically relevant choices are emotional.
      PubDate: Sat, 05 Mar 2022 11:55:13 PST
       
  • On Contested Shores: The Evolving Role of Amphibious Operations in the
           History of Warfare. Edited by Timothy Heck and B.A. Friedman. Quantico,
           VA: Marine Corps University Press, 2020.

    • Authors: John P. Sullivan et al.
      PubDate: Wed, 01 Dec 2021 18:37:59 PST
       
  • Les Opérations D’Influence Chinoises: Un moment machiavélien Paul
           Charon and Jean-Babtiste Jeangéne Vilmer Paris: Institut de Recherche
           Stratégique de l’École militaire (IRSEM), 2021.

    • Authors: Edward M. Roche PhD; JD
      PubDate: Wed, 01 Dec 2021 18:37:57 PST
       
  • Nonstate Warfare: The Military Methods of Guerillas, Warlords, and
           Militias. By Stephen Biddle. Princeton, CT: Princeton University Press,
           April 2021.

    • Authors: Robert J. Bunker
      PubDate: Wed, 01 Dec 2021 18:37:54 PST
       
  • Countering Insurgencies and Violent Extremism in South and South East
           Asia. Ed. Shanthie Mariet D’Souza. London: Routledge, 2019.

    • Authors: Sahar Khan; Ph.D.
      PubDate: Wed, 01 Dec 2021 18:37:51 PST
       
  • Winning the Digital War: Cyber Ideology and the Spectrum of Conflict

    • Authors: Matthew Flynn
      Abstract: Cyberspace allows ideology to dictate who wins a war. That technological medium has marginalized violence to such an extent that a belligerent must make a cognitive effort a priority. That focus means humanity has at last reached a coveted threshold where ideas determine a war’s outcome. This article traces that evolution along the “spectrum of conflict,” a military categorization encompassing all of war. This act of reductionism must confront cyber realities that alter an understanding of war as one driven by acts of violence. This feat means a digital peace finds an equal footing with war arising from a cyber ideological conflict. That conflict rests on cyber rebellions derived from an online interface contested in content but able to withstand the pull of government oversight. Stripped of violence as an absolute defining war, cognitive war becomes of paramount importance as a broad intellectualism compels a state of war. Ideology comes less from a meaning shaped by political context and more from online access impacting political norms. This contest in cyberspace means winning the digital war requires an open interface to pressure authoritarian regimes into reform, all the while allowing for much of this same friction that arises in states favoring democracy. Finding that balance arrests the endless process of war as the chief means of human interaction.
      PubDate: Wed, 01 Dec 2021 18:37:46 PST
       
  • What is the Role of Cyber Operations in Information Warfare'

    • Authors: Emilio Iasiello
      Abstract: Much attention has been focused on the potential consequences of cyber attacks against critical infrastructure and the use of cyber weapons as an asymmetric equalizer. However, as a capability considered to be under the larger umbrella of an information operations (IO)/information warfare (IW) campaign, how significant a weapon is cyber for the strategist in an information environment' As observed in recent IO/IW campaigns targeting U.S. elections in 2016 and 2020, lack of any discernable disruptive cyber attacks may have provided an answer to this, as a cyber power purposefully elected not to implement attacks. Instead, cyber espionage was used, and even at that, played a minor complementary role in the larger effort. This calls into question the efficacy of cyber as an instrument of IO/IW, and the true nature of its role in more strategic soft-power operations. This paper argues that cyber is at best a supportive enabler of campaigns where information is the catalyst to achieve strategic results, reducing cyber attacks as tools best used for signaling, punishment, or implemented in first strike scenarios.
      PubDate: Wed, 01 Dec 2021 18:37:39 PST
       
  • Russo-Ukrainian Patterns of Genocide in the Twentieth Century

    • Authors: Amos Fox
      Abstract: Russo-Ukrainian relations in the 20th Century are dominated by genocide. Using Raphel Lemkin and Martin Shaw as a guide, one finds that Russo-Ukrainian relations during the 20th Century was a long period of genocidal action, linked by periods of punctuated genocides. These genocides included several political genocides that quelled Ukrainian nationalism and independence and kept it subjugated to Soviet Russia. Soviet Russia's genocide during the 20th Century was a carryover from Imperial Russia treatment of Ukraine, the arch of which carries over into today's relations between the two countries. Understanding this long period of genocide helps make sense of the enduring relationship between the two countries.
      PubDate: Wed, 01 Dec 2021 18:37:33 PST
       
  • The Gray Legion: Information Warfare Within Our Gates

    • Authors: Jeffrey Baptist et al.
      Abstract: The information environment, once viewed as an unassailed common for human knowledge, has revealed itself to be a vector for malicious narratives in the ongoing battle for global hegemony. Since 2014, the United States has been under siege from information attacks on multiple fronts, from cyber infrastructure and goods to the cognitive outlooks of its citizenry. Disinformation as a social media tool represents a novel and grave danger to democracy; it serves as a means for sowing unrest and influencing policy changes while enabling conventional conflict or—in the best case for those who would exploit and manipulate narratives—avoiding it entirely. In this article, we identify the harbinger of a dire threat that circles outside, and now inside, the United States' walls by exploring the theoretical dynamics of foreign, state-sponsored disinformation in democracies throughout the West. We examine the mechanisms through which this approach operates and why it is Russia’s preferred course of action.
      PubDate: Wed, 01 Dec 2021 18:37:28 PST
       
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
 


Your IP address: 44.200.174.97
 
Home (Search)
API
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-