Volume VII

Volume VII

Application of Social Network Analysis Methods to Quantitatively Assess Exercise Coordination

Previous failures in effective, large-scale disaster response (e.g., Hurricane Katrina) are often traced to failures in effective coordination. As evidenced in after-action reports, however, assessments of coordination performance are still largely anecdotal in nature.

By Yee San Su

Application of Social Network Analysis Methods to Quantitatively Assess Exercise Coordination

Balancing the Risks, Benefits, and Costs of Homeland Security

The cumulative increase in expenditures on U.S. domestic homeland security over the decade since 9/11 exceeds one trillion dollars. It is clearly time to examine these massive expenditures applying risk assessment and cost-benefit approaches that have been standard for decades.

By John Mueller and Mark G. Stewart

Balancing the Risks, Benefits, and Costs of Homeland Security

Special Report: Key Issues from the UAPI Continental Security Conference

The University and Agency Partnership Initiative (UAPI) of the Center for Homeland Defense and Security conducted its first ever Continental Security Conference (CSC) on December 7/8, 2010 in Colorado Springs. This report provides background, a summary of the proceedings, and proposes a way ahead for this initiative.

By Stanley Supinski, Philip Treglia, Donna Cayson, and Jeffrey Burkett

Special Report: Key Issues from the UAPI Continental Security Conference

Homeland Security in Real-Time: The Power of the Public and Mobile Technology

In the world of homeland security, mobile phones are too often viewed as detonation devices rather than vital communication mechanisms to prevent terrorist attacks from occurring. It takes collective intelligence from federal, state, and local entities, as well as the public, to prevent terrorist attacks.

By Andrew Heighington

Homeland Security in Real-Time: The Power of the Public and Mobile Technology

A Guide for Homeland Security Instructors Preparing Physical Critical Infrastructure Protection Courses

Over 350 academic programs in the United States currently offer instruction in the field of homeland defense and security. In spite of this growth at the program level over the past ten years, there still exists a shortage of instructors and coursework in critical infrastructure protection (CIP).

By Steven Hart and James D. Ramsay

A Guide for Homeland Security Instructors Preparing Physical Critical Infrastructure Protection Courses

Protecting Sensitive Information: The Virtue of Self-Restraint

An abundance of information that could be useful to terrorists is available in the open literature. This information, unclassified but nonetheless sensitive, includes risk assessments that identify infrastructure vulnerabilities, analyses that hypothesize creative attacks, and otherwise dangerous knowledge that is released under the rubric of scientific openness or the public’s “right to know.”

By Dallas Boyd

Protecting Sensitive Information: The Virtue of Self-Restraint

Preparedness Exercises 2.0: Alternative Approaches to Exercise Design That Could Make Them More Useful for Evaluating — and Strengthening — Preparedness

Preparedness exercises play central roles in both the building and assessment of organizational readiness for future incidents. Though processes for designing and evaluating exercises are well established, there are opportunities to improve the value of exercises for strengthening preparedness and as tools for gathering assessment data.

By Brian A. Jackson and Shawn McKay

Preparedness Exercises 2.0: Alternative Approaches to Exercise Design That Could Make Them More Useful for Evaluating — and Strengthening — Preparedness

Scroll to Top