Homeland Security (homeland + security)

Distribution by Scientific Domains


Selected Abstracts


Talent management at Homeland Security: A corporate model suggests a recipe for success

EMPLOYMENT RELATIONS TODAY, Issue 3 2009
Thomas D. Cairns
First page of article [source]


From Illegal to Legal: Estimating Previous Illegal Experience among New Legal Immigrants to the United States1

INTERNATIONAL MIGRATION REVIEW, Issue 4 2008
Guillermina Jasso
This paper develops a framework for estimating previous illegal experience among annual cohorts of new legal immigrants to the United States , using public-use administrative microdata alone, survey data alone, and the two jointly , and provides estimates for the FY 1996 cohort of new immigrants, based on both administrative and survey data. Our procedures enable assessment of type of illegal experience, including entry without inspection, visa overstay, and unauthorized employment. We compare our estimates of previous illegal experience to estimates that would be obtained using administrative data alone; examine the extent of previous illegal experience by country of birth, immigrant class of admission, religion, and geographic residence in the United States; and estimate multivariate models of the probability of having previous illegal experience. To further assess origins and destinations, we carry out two kinds of contrasts, comparing formerly illegal new legal immigrants both to fellow immigrants who do not have previous illegal experience and also to the broader unauthorized population, the latter using estimates developed by the U.S. Department of Homeland Security (2002), Passel (2002), and Costanzo et al. (2002). [source]


The Effect of International Terrorism on EU Intelligence Co-operation

JCMS: JOURNAL OF COMMON MARKET STUDIES, Issue 1 2008
BJÖRN MÜLLER-WILLE
While the US has revamped its intelligence community by creating the Department of Homeland Security, little seems to have happened at the European level. The article seeks to explain why some intelligence co-operation takes place within the EU and why the bulk does not. It uses a new model, the ,intelligence cube', to develop a discussion on co-operation in distinct areas. Following a functionalist approach, suggesting that collaboration is utility driven, it proposes that efficiency considerations offer the most convincing explanation why no new European Intelligence Agency has been created and why so little co-operation takes place within EU structures. [source]


Under Construction: Making Homeland Security at the Local Level by Kerry Fosher

AMERICAN ANTHROPOLOGIST, Issue 4 2009
ROBERTO J. GONZALEZ
No abstract is available for this article. [source]


Trends in Philanthropy: Democracy as Homeland Security

NATIONAL CIVIC REVIEW, Issue 2 2002
David Mathews
[source]


The Politics of Antiracism & Social Justice: The Perspective of a Human Rights Network in the U.S. South

NORTH AMERICAN DIALOGUE (ELECTRONIC), Issue 2 2008
Faye V. Harrison
Abstract: Since 9/11 the sociopolitical and legal climate of the country has deteriorated, engendering a moral panic over national security and intensifying a longstanding trend of violating the human rights of a portion of the citizenry and immigrant population. These segments of the populace lived under de facto conditions of a police state long before the War on Terror and the USA Patriot Act. This repression implicates the War on Drugs and a racially- and class-biased system of criminal (in)justice with which Homeland Security intersects. Problems such as these have attracted the attention of both social scientists and activists mobilizing for social justice. Among the latter is a southeastern network of human rights organizers who map their region as part of the Global South. A multiracial group organized around the vision of three African American women, the Southern Human Rights Organizers Network promotes consciousness and praxis shaped by the vernacularization of international human rights discourse and the reclamation of the history of African American and broader Afro-Atlantic struggles for expanding the terms of what it means to be human. [source]


Widespread Policy Disruption: Terrorism, Public Risks, and Homeland Security

POLICY STUDIES JOURNAL, Issue 2 2009
Peter J. May
We address theoretical and empirical aspects of policy disruptions that affect multiple areas of policymaking. Our theorizing leads us to consider the effects of widespread disruptions in gaining the attention of elected officials, in affecting policymaking, and in reshaping the involvement of federal agencies. Our empirical analyses concern the threat of terrorism in the United States and its implications for public risk subsystems over the past 25 years. Our analyses of the attention of policymakers and resultant policymaking volatility show selective patterns of subsystem disruption related to the threat of terrorism. We show that capturing the attention of policymakers in multiple subsystems is insufficient to motivate heightened levels of policymaking across the board. In addition, we find more muted impacts for federal agency involvement than might have been expected from the massive reorganization that created the Department of Homeland Security. More generally, the disjunctions we observe show the powerful influence of policy subsystems in buffering against widespread policy disruptions. [source]


World Risk Society and War Against Terror

POLITICAL STUDIES, Issue 2 2005
Keith Spence
I interpret the ,war against terror', declared following September 11 2001, as adopting concepts drawn from the work of Ulrich Beck, as a projection of world risk society. Despite its global character, war against terror is constructed through outmoded vocabularies of national security and sovereignty, within which the reasoned negotiation of risk is marginalized. This exclusion contributes to the intensification rather than reduction of terror and terrorism. In so doing the moment of violence inscribed within the concept of the political resurfaces in the constitution of war against terror, Homeland Security, and the identities and anxieties that they reproduce. Contrary to Slavoj ,i,ek's claim that risk society is incapable of resolving the dilemmas that it exposes, Beck's approach cuts across established ideological and methodological boundaries, anticipating key transformations of discourse required to address the prevailing global predicament through the vocabularies and logic of cosmopolitan risk, rather than those of absolute security, terror and war. [source]


Communicating throughout Katrina: Competing and Complementary Conceptual Lenses on Crisis Communication

PUBLIC ADMINISTRATION REVIEW, Issue 2007
James L. Garnett
Hurricane Katrina was as much a communication disaster as it was a natural and bureaucratic disaster. Communication gaps, missed signals, information technology failures, administrative buffering, turf battles, and deliberate and unintentional misinterpretations delayed and handicapped both the recognition of the crisis that Katrina posed and the response to its devastation. This essay views crisis communication through four conceptual lenses: (1) crisis communication as interpersonal influence, (2) crisis communication as media relations, (3) crisis communication as technology showcase, and (4) crisis communication as interorganizational networking. A conceptual framework is presented that compares these lenses with regard to agency, transparency, technology, and chronology. The planning, response, and recovery stages of the Hurricane Katrina disaster are viewed through these communication conceptual lenses, illustrating key facets of each perspective and adding to our deepening understanding of the events. Many of the problems we have identified can be categorized as "information gaps",or at least problems with information-related implications, or failures to act decisively because information was sketchy at best. Better information would have been an optimal weapon against Katrina. Information sent to the right people at the right place at the right time. Information moved within agencies, across departments, and between jurisdictions of government as well. Seamlessly. Securely. Efficiently , One would think we could share information by now. But Katrina again proved we cannot. ,U.S. House Select Bipartisan Committee With the floodwalls gashed and hemorrhaging billions of gallons of water into the city, it was only a matter of a few hours on Monday before the communications citywide began to fail , Communication was about to become the biggest problem of the catastrophe. ,Christopher Cooper and Robert Block, Disaster: Hurricane Katrina and the Failure of Homeland Security Truth became a casualty, news organizations that were patting their own backs in early September were publishing protracted mea culpas by the end of the month. ,Matt Welch, "They Shoot Helicopters, Don't They?" [source]


Collaboration and Leadership for Effective Emergency Management

PUBLIC ADMINISTRATION REVIEW, Issue 2006
William L. Waugh Jr.
Collaboration is a necessary foundation for dealing with both natural and technological hazards and disasters and the consequences of terrorism. This analysis describes the structure of the American emergency management system, the charts development of the Federal Emergency Management Agency, and identifies conflicts arising from the creation of the Department of Homeland Security and the attempt to impose a command and control system on a very collaborative organizational culture in a very collaborative sociopolitical and legal context. The importance of collaboration is stressed, and recommendations are offered on how to improve the amount and value of collaborative activities. New leadership strategies are recommended that derive their power from effective strategies and the transformational power of a compelling vision, rather than from hierarchy, rank, or standard operating procedures. [source]


Preparing Leaders for High-Stakes Collaborative Action: Darrell Darnell and the Department of Homeland Security

PUBLIC ADMINISTRATION REVIEW, Issue 2006
Heather Getha-Taylor
No abstract is available for this article. [source]


Imperfect Federalism: The Intergovernmental Partnership for Homeland Security

PUBLIC ADMINISTRATION REVIEW, Issue 4 2006
Peter Eisinger
The terror attacks of September 11, 2001, posed a set of security challenges for the nation's cities that the increasingly decentralized federal system was poorly prepared to meet. Although it was generally agreed that domestic security required a close intergovernmental partnership, strong national leadership and support were lacking in creating and guiding this partnership. To make matters more difficult, political considerations in Congress generally trumped the assessment of security risks in the distribution of federal fiscal aid. This article explores the strains in the intergovernmental homeland security partnership, their causes, and efforts to adapt and reform. Despite some progress toward a more rational public administration of homeland security, the partnership still reflects the deficiencies of imperfect federalism. [source]


Collaboration over Adaptation: The Case for Interoperable Communications in Homeland Security

PUBLIC ADMINISTRATION REVIEW, Issue 3 2006
William O. Jenkins
Analogizing the U.S. Department of Homeland Security to a corporate conglomerate consisting of multiple, formerly independent operating units with little in common and even less history of cooperation, this response to Professor Charles Wise prescribes the "bitter medicine" of interoperable communications. The critical function of assuring homeland security and disaster preparedness cannot depend on the uncertain trajectory of adaptive response. [source]


Financing Homeland Security and Emergency Preparedness: Use of Interlocal Cost-Sharing

PUBLIC BUDGETING AND FINANCE, Issue 2 2008
SUSAN A. MACMANUS
Before this study, much of the research on interlocal collaboration has focused broadly on interlocal service agreements, of which interlocal cost-sharing is but one dimension. This study is one of the first to examine the nature of interlocal cost-sharing agreements for a specific (and critically important) functional area. A mail survey of Florida city and county finance officers finds that the most common interlocal cost-sharing partnership is between local general purpose governments rather than with local special purpose governments. The strongest incentives for interlocal cost-sharing are (1) inadequate funding for emergency management in a jurisdiction's capital budget, (2) the perceived inadequacy of federal and/or state homeland security funding, and (3) greater faith in horizontal (local-to-local) than vertical (federal-state-local) intergovernmental agreements. The research also highlights the importance of asking fiscal condition survey questions in a more functionally specific manner rather than as an "overall fiscal condition" question. [source]


Re-Engineering the Immigration System: A Case for Data Mining and Information Assurance to Enhance Homeland Security: Part I: Identifying the Current Problems

BULLETIN OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE & TECHNOLOGY (ELECTRONIC), Issue 1 2002
Lee S. Strickland Visiting Professor
First page of article [source]


Re-Engineering the Immigration System: A Case for Data Mining and Information Assurance to Enhance Homeland Security: Part II: Where Do We Go from Here?

BULLETIN OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE & TECHNOLOGY (ELECTRONIC), Issue 1 2002
Lee S. Strickland Visiting Professor
First page of article [source]


Current Awareness in Drug Testing and Analysis

DRUG TESTING AND ANALYSIS, Issue 4 2010
Article first published online: 1 APR 2010
In order to keep subscribers up-to-date with the latest developments in their field, John Wiley & Sons are providing a current awareness service in each issue of the journal. The bibliography contains newly published material in the field of drug testing and analysis. Each bibliography is divided into 18 sections: 1 Reviews; 2 Sports doping - General; 3 Steroids; 4 Peptides; 5 Diuretics; 6 CNS agents; 7 Equine; 8 Recreational drugs - General; 9 Stimulants; 10 Hallucinogens; 11 Narcotics; 12 Forensics; 13 Alcohol; 14 Tobacco; 15 Homeland security; 16 Workplace; 17 Product authenticity; 18 Techniques. Within each section, articles are listed in alphabetical order with respect to author. If, in the preceding period, no publications are located relevant to any one of these headings, that section will be omitted. [source]


Current Awareness in Drug Testing and Analysis

DRUG TESTING AND ANALYSIS, Issue 9-10 2009
Article first published online: 22 DEC 200
In order to keep subscribers up-to-date with the latest developments in their field, John Wiley & Sons are providing a current awareness service in each issue of the journal. The bibliography contains newly published material in the field of drug testing and analysis. Each bibliography is divided into 18 sections: 1 Reviews; 2 Sports doping - General; 3 Steroids; 4 Peptides; 5 Diuretics; 6 CNS agents; 7 Equine; 8 Recreational drugs - General; 9 Stimulants; 10 Hallucinogens; 11 Narcotics; 12 Forensics; 13 Alcohol; 14 Tobacco; 15 Homeland security; 16 Workplace; 17 Product authenticity; 18 Techniques. Within each section, articles are listed in alphabetical order with respect to author. If, in the preceding period, no publications are located relevant to any one of these headings, that section will be omitted. [source]


Current Awareness in Drug Testing and Analysis

DRUG TESTING AND ANALYSIS, Issue 6 2009
Article first published online: 7 OCT 200
In order to keep subscribers up-to-date with the latest developments in their field, John Wiley & Sons are providing a current awareness service in each issue of the journal. The bibliography contains newly published material in the field of drug testing and analysis. Each bibliography is divided into 18 sections: 1 Reviews; 2 Sports doping - General; 3 Steroids; 4 Peptides; 5 Diuretics; 6 CNS agents; 7 Equine; 8 Recreational drugs - General; 9 Stimulants; 10 Hallucinogens; 11 Narcotics; 12 Forensics; 13 Alcohol; 14 Tobacco; 15 Homeland security; 16 Workplace; 17 Product authenticity; 18 Techniques. Within each section, articles are listed in alphabetical order with respect to author. If, in the preceding period, no publications are located relevant to any one of these headings, that section will be omitted. [source]


Targeting Chemical and Biological Warfare Agents at the Molecular Level

ELECTROANALYSIS, Issue 14 2003
Omowunmi
Abstract After the September,11 tragedies of 2001, scientists and law-enforcement agencies have shown increasing concern that terrorist organizations and their "rogue" foreign government-backers may resort to the use of chemical and/or biological agents against U.S. military or civilian targets. In addition to the right mix of policies, including security measures, intelligence gathering and training for medical personnel on how to recognize symptoms of biochemical warfare agents, the major success in combating terrorism lies in how best to respond to an attack using reliable analytical sensors. The public and regulatory agencies expect sensing methodologies and devices for homeland security to be very reliable. Quality data can only be generated by using analytical sensors that are validated and proven to be under strict design criteria, development and manufacturing controls. Electrochemical devices are ideally suited for obtaining the desired analytical information in a faster, simpler, and cheaper manner compared to traditional (lab-based) assays and hence for meeting the requirements of decentralized biodefense applications. This articler presents a review of the major trends in monitoring technologies for chemical and biological warfare (CBW) agents. It focuses on research and development of sensors (particularly electrochemical ones), discusses how advances in molecular recognition might be used to design new multimission networked sensors (MULNETS) for homeland security. Decision flow-charts for choosing particular analytical techniques for CBW agents are presented. Finally, the paths to designing sensors to meet the needs of today's measurement criteria are analyzed. [source]


Foldable Printed Circuit Boards on Paper Substrates

ADVANCED FUNCTIONAL MATERIALS, Issue 1 2010
Adam C. Siegel
Abstract This paper describes several low-cost methods for fabricating flexible electronic circuits on paper. The circuits comprise i) metallic wires (e.g., tin or zinc) that are deposited on the substrate by evaporation, sputtering, or airbrushing, and ii) discrete surface-mountable electronic components that are fastened with conductive adhesive directly to the wires. These electronic circuits,like conventional printed circuit boards,can be produced with electronic components that connect on both sides of the substrate. Unlike printed circuit boards made from fiberglass, ceramics, or polyimides, however, paper can be folded and creased (repeatedly), shaped to form three-dimensional structures, trimmed using scissors, used to wick fluids (e.g., for microfluidic applications) and disposed of by incineration. Paper-based electronic circuits are thin and lightweight; they should be useful for applications in consumer electronics and packaging, for disposable systems for uses in the military and homeland security, for applications in medical sensing or low-cost portable diagnostics, for paper-based microelectromechanical systems, and for applications involving textiles. [source]


Technology, security, and individual privacy: New tools, new threats, and new public perceptions

JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, Issue 3 2005
Lee S. Strickland
Highly portable information collection and transmission technologies such as radio frequency identification (RFID) tags and smart cards are becoming ubiquitous in government and business,employed in functions including homeland security, information security, physical premises security, and even the control of goods in commerce. And, directly or indirectly, in many of these applications, it is individuals and their activities that are tracked. Yet, a significant unknown is (a) whether the public understands these technologies and the manner in which personally identifiable information may be collected, maintained, used, and disseminated; and (b) whether the public consents to these information practices. To answer these and related questions, we surveyed a select group of citizens on the uses of this technology for business as well as homeland security purposes. We found a significant lack of understanding, a significant level of distrust even in the context of homeland security applications, and a very significant consensus for governmental regulation. We conclude that a primary objective for any organization deploying these technologies is the promulgation of a comprehensive Technology Privacy Policy, and we provide detailed specifications for such an effort. [source]


Imperfect Federalism: The Intergovernmental Partnership for Homeland Security

PUBLIC ADMINISTRATION REVIEW, Issue 4 2006
Peter Eisinger
The terror attacks of September 11, 2001, posed a set of security challenges for the nation's cities that the increasingly decentralized federal system was poorly prepared to meet. Although it was generally agreed that domestic security required a close intergovernmental partnership, strong national leadership and support were lacking in creating and guiding this partnership. To make matters more difficult, political considerations in Congress generally trumped the assessment of security risks in the distribution of federal fiscal aid. This article explores the strains in the intergovernmental homeland security partnership, their causes, and efforts to adapt and reform. Despite some progress toward a more rational public administration of homeland security, the partnership still reflects the deficiencies of imperfect federalism. [source]


Collaboration over Adaptation: The Case for Interoperable Communications in Homeland Security

PUBLIC ADMINISTRATION REVIEW, Issue 3 2006
William O. Jenkins
Analogizing the U.S. Department of Homeland Security to a corporate conglomerate consisting of multiple, formerly independent operating units with little in common and even less history of cooperation, this response to Professor Charles Wise prescribes the "bitter medicine" of interoperable communications. The critical function of assuring homeland security and disaster preparedness cannot depend on the uncertain trajectory of adaptive response. [source]


Federal Budgeting After September 11th: A Whole New Ballgame, or Is It Déjà Vu All Over Again?

PUBLIC BUDGETING AND FINANCE, Issue 1 2005
Philip G. Joyce
Federal budgeting has undergone some profound changes since the tragic events of September 11th, 2001. Large surpluses that existed prior to September 11th and were forecast to continue have been replaced by equally large and intractable deficits. The consensus around a macro-level norm for federal budgeting has completely broken down. In other ways, the federal budget process has not changed at all. Despite the emphasis on defense and homeland security, domestic discretionary spending is still continuing unabated, as it has since the late 1980s. Further, the federal government continues to have chronic difficulty adopting its budget in a timely fashion. [source]