Search
Now showing items 1-10 of 11
PARTICIPATORY MAPPING GIS TOOLS FOR MAKING HIDDEN PLACES VISIBLE: A CASE STUDY OF THE TEXAS FREEDOM COLONIES ATLAS
(2019-06-21)
Freedom colonies are historic black settlements established by freed black men and women after emancipation. They exist all over the United States with a high concentration in Texas. Black Texans founded more than 557 ...
Estimating the Economic Costs of Espionage
(2010)
Economic espionage is a serious threat to the vitality of the U.S. economy. While this is a widely accepted fact, there is no formal way to measure the damage an incident of economic espionage has on the U.S. economy. The ...
Youth Employment in Ghana: Conditions and Determinants
(2015-06-11)
Youth employment, and its limitations, is a pertinent problem that most developing nations face. “Youth Employment in Ghana: Conditions and Determinants” is a student-led research project that summarizes and analyzes the ...
Evaluating the Implementation of the National Strategy for Biosurveillance
(2015-05-20)
Biological incidents, both man-made and naturally occurring, represent a significant threat to the national security of the United States. Identifying these crises begins with the detection and reporting of essential ...
Pipeline Politics: Natural Gas in Eurasia
(2010)
Eurasia is a major source of oil and natural gas, and events in the region have a great potential to destabilize global security patterns. Supplies of natural gas and oil from Eurasia are vital for the functioning of ...
The 25th Anniversary of the Liberation of Kuwait: A Look at the History, Evolution, and Future of the US-Kuwaiti Relationship
(2017-03-06)
On August 2, 1990, Saddam Hussein invaded Kuwait. The subsequent liberation by a US-led coalition served as a watershed moment in US-Kuwaiti relations. The Gulf War is often viewed as the onset of the close relationship ...
Critical Infrastructure and Cyber Security
(2011)
We were tasked by CENTRA Technology, Inc., to create a methodology that could be used to prioritize critical cyber assets in the United States. We have answered that call by developing a user-friendly, consequence-based ...
Identifying the Strength of Iranian Opposition Groups
(2011)
Angry about the results of the 2009 elections, the Iranian opposition took to the streets, coordinating widespread protests to challenge the authority of the regime in Tehran. The protests hampered, but did not stop, the ...
Ukraine's Military Role in the Black Sea Region
(2010)
Only Ukraine's civilian and military leadership can determine the best course of action Ukraine should undertake to secure the Black Sea region (BSR). By analyzing Ukraine's precarious security environment and assessing ...