2018
DOI: 10.5038/1944-0472.11.3.1689
|View full text |Cite
|
Sign up to set email alerts
|

Going Global: The International Dimensions of U.S. Homeland Security Policy

Abstract: INTRODUCTION On Wednesday, October 27, 2010, a young woman dropped off two packages in San'a, Yemen-one at a UPS store, the other at a FedEx location. 1 Inside each of the two packages was a Hewlett-Packard desktop laser printer. 2 Yet these were no ordinary shipments of office supplies. Within the toner cartridge of each printer was a small amount of pentaerythritol tetranitrate (PETN), a powerful explosive material used in construction and industrial work. 3 The PETN had been inserted into the cartridges so … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…For this reason, they sometimes are referred to as 'borderless' or 'stateless' (Givens, Busch & Bersin, 2018). Nonetheless, they continue to flow toward and over Westphalian border lines, have their principal effects within states, and are regulated by the governments operating there.…”
Section: A New Border Paradigm: Westphalian Lines and Global Flowsmentioning
confidence: 99%
“…For this reason, they sometimes are referred to as 'borderless' or 'stateless' (Givens, Busch & Bersin, 2018). Nonetheless, they continue to flow toward and over Westphalian border lines, have their principal effects within states, and are regulated by the governments operating there.…”
Section: A New Border Paradigm: Westphalian Lines and Global Flowsmentioning
confidence: 99%
“…Addressing these challenges is not merely a technical endeavour but requires a comprehensive understanding that integrates theoretical insights from cybersecurity, critical infrastructure protection, and public policy. This review paper aims to contribute to this understanding by exploring the theoretical underpinnings of cybersecurity challenges in critical water infrastructure, with a specific focus on the contexts of Africa and the United States (Givens, Busch, & Bersin, 2018;Vaseashta, Susmann, & Braman, 2014). This review paper aims to synthesize theoretical perspectives on the cybersecurity challenges faced by critical water infrastructure, providing insights that are relevant both globally and within the specific contexts of Africa and the United States.…”
Section: Introductionmentioning
confidence: 99%
“…Addressing these challenges is not merely a technical endeavour but requires a comprehensive understanding that integrates theoretical insights from cybersecurity, critical infrastructure protection, and public policy. This review paper aims to contribute to this understanding by exploring the theoretical underpinnings of cybersecurity challenges in critical water infrastructure, with a specific focus on the contexts of Africa and the United States (Givens, Busch, & Bersin, 2018;Vaseashta, Susmann, & Braman, 2014). This review paper aims to synthesize theoretical perspectives on the cybersecurity challenges faced by critical water infrastructure, providing insights that are relevant both globally and within the specific contexts of Africa and the United States.…”
Section: Introductionmentioning
confidence: 99%