1,024 research outputs found

    Stunted Growth: Institutional Challenges to the Department of Homeland Security\u27s Maturation

    Get PDF
    Scholars have proposed numerous explanations as to why the Department of Homeland Security has struggled to mature as an organization and effectively conduct its core mission. We propose an alternative viewpoint that the department lacks key legal authorities and necessitates key organizational transfer in order to rationalize its portfolio. We examine these points through review of legal authorities in select mission areas and through a resource analysis of activities conducted throughout the federal government to execute the homeland security mission. The analysis leads to specific recommendations for transfers and authorities and suggestions as to how the political environment might coalesce around engendering these changes

    Paradigms for Cybersecurity Education in a Homeland Security Program

    Get PDF
    Cybersecurity threats to the nation are growing in intensity, frequency, and severity and are a very real threat to the security of the country. Academia has responded to a wide variety of homeland security (HS) threats to the nation by creating formal curricula in the field, although these programs almost exclusively focus on physical threats (e.g., terrorist attacks, and natural and man-made disasters), law and policy and transportation . Although cybersecurity programs are commonly available in U.S. colleges and universities, they are invariably offered as a technical course of study nested within engineering (or other STEM) programs. We observe that technical and calculus-based courses might not be well suited to HS students and do not necessarily meet a broad suite of professional needs in this discipline. As a result, cybersecurity principles, and strategies tend to be under-represented in the typical HS program. This paper proposes paradigms that could be included in a cybersecurity curriculum that are consistent with the broad array of outcomes now evident in many HS degree programs

    Organizational Conflict Within the Department of Homeland Security

    Get PDF
    This thesis seeks to explain why the Department of Homeland Security had difficulty fulfilling its roles when it was formed, specifically its role as grant administrator. Role theory surmises that conflict arises from unclear expectations, conflicting expectations, and too many roles. This study utilized various public testimonies, legislation, and other government documents to examine how the missions of the twenty-two agencies that were merged together to make up DHS changed. Even though DHS has changed continually over the five years since its existence most employees seem to be clear on the mission of the organization in which they work. However, there is still a considerable amount of conflict resulting from the agencies being forced together in such a frankensteinian way

    Air Force Institute of Technology Research Report 2017

    Get PDF
    This Research Report presents the FY18 research statistics and contributions of the Graduate School of Engineering and Management (EN) at AFIT. AFIT research interests and faculty expertise cover a broad spectrum of technical areas related to USAF needs, as reflected by the range of topics addressed in the faculty and student publications listed in this report. In most cases, the research work reported herein is directly sponsored by one or more USAF or DOD agencies. AFIT welcomes the opportunity to conduct research on additional topics of interest to the USAF, DOD, and other federal organizations when adequate manpower and financial resources are available and/or provided by a sponsor. In addition, AFIT provides research collaboration and technology transfer benefits to the public through Cooperative Research and Development Agreements (CRADAs)

    NATIONAL CYBERSECURITY POLICY IN THE U.S AND INDONESIA

    Get PDF
    Cyber attacks are a dangerous threat to a country that has a high dependence on communication and information technology. Cyber attacks can be used systematically to disrupt and dysfunction an infrastructure and network so that it can cause not only physical damage but also fatalities. Cyber attacks are complex and multidomain; consequently, they require comprehensive and targeted policies. Indonesia in the early stages of developing cyber policies, therefore it can learn from America in developing policies in dealing with cyber threats

    Air Force Institute of Technology Research Report 2014

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems Engineering and Management, Operational Sciences, Mathematics, Statistics and Engineering Physics

    Air Force Institute of Technology Research Report 2013

    Get PDF
    This report summarizes the research activities of the Air Force Institute of Technology’s Graduate School of Engineering and Management. It describes research interests and faculty expertise; lists student theses/dissertations; identifies research sponsors and contributions; and outlines the procedures for contacting the school. Included in the report are: faculty publications, conference presentations, consultations, and funded research projects. Research was conducted in the areas of Aeronautical and Astronautical Engineering, Electrical Engineering and Electro-Optics, Computer Engineering and Computer Science, Systems Engineering and Management, Operational Sciences, Mathematics, Statistics and Engineering Physics

    Cyberspace and Organizational Structure: An Analysis of the Critical Infrastructure Environment

    Get PDF
    Now more than ever, organizations are being created to protect the cyberspace environment. The capability of cyber organizations tasked to defend critical infrastructure has been called into question by numerous cybersecurity experts. Organizational theory states that organizations should be constructed to fit their operating environment properly. Little research in this area links existing organizational theory to cyber organizational structure. Because of the cyberspace connection to critical infrastructure assets, the factors that influence the structure of cyber organizations designed to protect these assets warrant analysis to identify opportunities for improvement. This thesis analyzes the cyber‐connected critical infrastructure environment using the dominant organizational structure theories. By using multiple case study and content analysis, 2,856 sampling units are analyzed to ascertain the level of perceived uncertainty in the environment (complexity, dynamism, and munificence). The results indicate that the general external environment of cyber organizations tasked to protect critical infrastructure is highly uncertain thereby meriting implementation of organic structuring principles
    corecore