Search Full Text
Now showing items 1-8 of 8
IS THE UNITED STATES PREPARED FOR THE THREAT OF NUCLEAR TERRORISM? AN ANALYSIS OF CURRENT SAFEGUARDS AND POLICIES
(Georgetown University, 2011)
IS THE UNITED STATES PREPARED FOR THE THREAT OF NUCLEAR TERRORISM? AN ANALYSIS OF CURRENT SAFEGUARDS AND POLICIES
The Case of the "Commons" and Cyberspace: Concept Formation and Social Construction
(Georgetown University, 2011)
Despite conspicuous use of the term "the commons" in the security studies literature, little work has been done to define the concept of "the commons," as used in this context. Nor have scholars closely examined assertions ...
DOES PROLIFERATION BEGET PROLIFERATION? WHY NUCLEAR DOMINOES RARELY FALL
(Georgetown University, 2010)
If Iran acquires nuclear weapons, or merely the capacity to do so on short notice, will other regional states attempt to acquire them as well? If North Korea does not give up, enlarges, or further weaponizes the modest ...
Maslow's Hierarchy of Needs: A Failed State and Somali Piracy Threat Assessment: Criminal Deviance or Maritime Terrorism
(Georgetown University, 2011)
Current anti and counter-piracy strategies and operations by both the United States and the international community at large in the Gulf of Aden are fundamentally flawed. These strategies and resulting operations address ...
Combating Nuclear Trafficking in the Former Soviet Union & Eastern Europe: U.S. Nonproliferation Assistance and the Illicit Nuclear Trade, 1997-2009
(Georgetown University, 2011)
The illicit trafficking of fissile and radioactive materials emerged as a prominent threat following the collapse of the USSR. In the aftermath of September 11th, the issue has received renewed attention due to the ...
Talk is Not Cheap: China's Assurance and Reassurance Strategy in East Asia
(Georgetown University, 2015)
This dissertation addresses the conditions under which weaker states balance against or bandwagon with a strong state. China's rise provides an opportunity to examine this question, as over the last two decades, China has ...
On the other side of the coin
(Georgetown University, 2011)
Hezbollah has evolved since 1992 beyond its guerilla identity into a political identity. The sensitive period of 2000-2010 covers best the transformation from a full-fledged guerilla group to a credible political group. ...
Authoritarian Management of (Cyber-) Society: Internet Regulation and the New Political Protest Movements
(Georgetown University, 2016)
Over the last two decades, states around the world have struggled with the challenge of understanding the impact of the Internet and networked information and communication technologies (ICTs) within their societies and ...