The Department of Security Studies and International Affairs offers:
- Bachelor of Science in Global Conflict Studies
- Bachelor of Science in Homeland Security and Intelligence
- Minor in Cybersecurity Application and Management
- Minor in Emergency Management
- Minor in Forensic Accounting
- Minor in Global Conflict Studies
- Minor in Homeland Security
- Minor in Intelligence
- Minor in Military Science
- Minor in Terrorism Studies
The department offers a broad, applied social science approach to security, intelligence and global conflict studies, providing hands-on processes starting early in a student's career. That approach continues through projects such as the senior capstone in Global Conflict Studies or Homeland Security and Intelligence, where students go out of the classroom, consult with industry members and work with real clients to solve real problems.
Visit the website of the Department of Security Studies & International Affairs
Submissions from 2021
Cyber Supply Chain Risk Management: Implications for the SOF Future Operating Environment, J. Philip Craiger, Laurie Lindamood-Craiger, and Diane M. Zorri
Cross Domain IW Threats to SOF Maritime Missions: Implications for U.S. SOF, Gary C. Kessler and Diane M. Zorri
Submissions from 2020
The Evolution of Social Justice in International Higher Education, Aaron D. Clevenger
Meeting at the Crossroads: A Dialogue Navigating the Intersections between International Education and Social Justice, Aaron D. Clevenger and Linwood Whitten
Iran, Diane M. Zorri
Submissions from 2019
Field Expertise: How to Create an Effective Travel Risk Policy, Aaron D. Clevenger
Current Trends in Small Unmanned Aircraft Systems: Implications for U.S. Special Operations Forces, J. Philip Craiger and Diane Maye Zorri
An Overview of Cryptography (Updated Version 24 January 2019), Gary C. Kessler
Cybersecurity in the Maritime Domain, Gary C. Kessler
Submissions from 2018
A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System, Gary C. Kessler, Philip Craiger, and J. C. Haass
A Taxonomy Framework for Maritime Cybersecurity: A Demonstration Using the Automatic Identification System, G. C. Kessler, J. P. Craiger, and J. C. Haass
Two Awakenings, One Process: Implications from the Sunni Realignment in Iraq, 2006-2007, Diane Maye Zorri
Submissions from 2017
Exploring Myths in Digital Forensics: Separating Science From Ritual, Gary C. Kessler and Gregory H. Carlton
Using Journals to Assess Non-STEM Student Learning in STEM Courses: A Case Study in Cybersecurity Education, Gary Kessler, Glenn S. Dardick, and Douglas L. Holton
Autarky or Interdependence? U.S. vs. European Security and Defense Industries in a Globalized Market, Diane Maye Zorri
Does ISIS Satisfy the Criteria of an Apocalyptic Islamic Cult? An Evidence-Based Historical Qualitative Meta-Analysis, Diane Maye Zorri and Bruce Barron
Submissions from 2016
An Overview of Cryptography (Updated Version, 3 March 2016), Gary C. Kessler
The Wrecks of Lake Champlain, Gary C. Kessler
Understanding the Sunni Awakening with Complexity Theory, Diane Maye Zorri
Submissions from 2015
Are Mobile Device Examinations Practiced like 'Forensics'?, Gary Kessler
An Overview of Steganography for the Computer Forensics Examiner (Updated Version, February 2015), Gary C. Kessler
Herbert Yardley and the American Black Chamber: Lessons for Today?, William J. Lahneman
Submissions from 2014
A Study of Forensic Imaging in the Absence of Write-Blockers, Gary C. Kessler and Gregory H. Carlton
Educating the Next Generation of Cyberforensic Professionals, Mark Pollitt and Philip Craiger
Submissions from 2013
Technology Corner: Calculating the Number of Android Lock Patterns: An Unfinished Study in Number Theory, Gary C. Kessler
Paradigms for Cybersecurity Education in a Homeland Security Program, Gary C. Kessler and James Ramsay
The Case to Accredit Homeland Security Programs: Why Outcomes-based Accreditation Makes Sense, James D. Ramsay
There's a Pattern Here: The Case to Integrate Environmental Security into Homeland Security Strategy, James D. Ramsay and Terrence M. O'Sullivan
Submissions from 2012
New Media and Ethno-Politics in the Guinean Diaspora, Mohamed S. Camara
Identifying Trace Evidence from Target-Specific Data Wiping Application Software, Gregory H. Carlton and Gary C. Kessler
Developing a Homeland Security Curriculum: A Case Study in Outcomes-Based Education Using the Delphi Method, Daniel Cutrer
Introduction to Cryptography, Gary C. Kessler
The Advanced Persistent Threat and the Role of Cybersecurity Education, Gary C. Kessler
Perceptual Framing of Homeland Security, Linda Kiltz and James D. Ramsay
Submissions from 2011
Forensic Analysis of Plug Computers, Scott Conrad, Greg Dorn, and Philip Craiger
A Guide for Homeland Security Instructors Preparing Physical Critical Infrastructure Protection Courses, Steven Hart and James D. Ramsay
Judges' Awareness, Understanding, and Application of Digital Evidence, Gary C. Kessler
Submissions from 2010
Forensic Analysis of a Playstation 3 Console, Scott Conrad, Greg Dorn, and Philip Craiger
Book Review: Digital Forensic Evidence Examination, Gary C. Kessler
Development of an Outcomes-Based Undergraduate Curriculum in Homeland Security, James D. Ramsay, Daniel A. Cutrer, and Robert Raffel
Submissions from 2009
Bluetooth Hacking: A Case Study, Dennis Browning and Gary C. Kessler
Forensic Analysis of the Sony Playstation Portable, Scott Conrad, Carlos Rodriguez, Chris Marberry, and Philip Craiger
Analyzing the Impact of a Virtual Machine on a Host Machine, Greg Dorn, Chris Marberry, Scott Conrad, and Philip Craiger
Book Review: Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, Gary C. Kessler
Digital Forensics: Everything Leaves a Trace in Cyberspace, Gary C. Kessler
Submissions from 2008
Benediction and Malediction in Fulani Culture: Exploring an Afro-Muslim Perception of the Socio-Spiritual Dimensions of Success and Failure, Mohamed S. Camara
Media, Civil Society and Political Culture in West Africa, Mohamed S. Camara
Book Review: Challenges to Digital Forensic Evidence, Gary C. Kessler
Book Review: Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit, Gary C. Kessler
Book Review: The dotCrime Manifesto: How to Stop Internet Crime, Gary C. Kessler
On Teaching TCP/IP Protocol Analysis to Computer Forensics Examiners, Gary C. Kessler
Submissions from 2007
Forensic Analysis of Xbox Consoles, Paul Burke and Philip Craiger
Nation Building and the Politics of Islamic Internationalism in Guinea: Toward an Understanding of Muslims’ Experience of Globalization in Africa, Mohamed S. Camara
Book Review: Conquest in Cyberspace: National Security and Information Warfare, Gary C. Kessler
Book Review: No Place to Hide, Gary C. Kessler
The Case for Teaching Network Protocols to Computer Forensics Examiners, Gary C. Kessler and Matt Fasulo
Factors Affecting One-Way Hashing of CD-R Media, Christopher Marberry and Philip Craiger
Submissions from 2006
Assessing Trace Evidence Left By Secure Deletion Programs, Paul Burke and Philip Craiger
Mac OS X Forensics, Philip Craiger and Paul Burke
Book Review: Digital Crime and Forensic Science in Cyberspace, Gary C. Kessler
Two-Factor Authentication for Online Banking Applications, Gary C. Kessler
The Design of an Undergraduate Degree Program in Computer & Digital Forensics, Gary C. Kessler and Michael E. Schirling
The Future of Intelligence Analysis, Volume 2: Annotated Bibliography: Publications on Intelligence Analysis and Reform, William J. Lahneman
Submissions from 2005
Recovering Digital Evidence From Linux Systems, Philip Craiger
Future Ideological Challenges: Fault Lines, Movements, and Competing Models (Annotated Bibliography Based on Survey of the Literature), William J. Lahneman
Future Ideological Challenges: Fault Lines, Movements, and Competing Models (Report on Survey of the Literature), William J. Lahneman
Impact of Diaspora Communities on National and Global Politics: Annotated Bibliography Based on Survey of the Literature, William J. Lahneman
Impact of Diaspora Communities on National and Global Politics: Report on Survey of the Literature, William J. Lahneman
Submissions from 2004
"Exclusive Domination" or "Short Term Imperialism": The Peruvian Response to U.S.-Argentine Rivalry, 1946-1950, Glenn J. Dorn
An Overview of Steganography for the Computer Forensics Examiner, Gary C. Kessler
Submissions from 2002
Computer Forensics: The Issues and Current Books in the Field, Gary C. Kessler and Michael Schirling
Submissions from 1999
The Web Can Be Suitable for Learning, Gary C. Kessler, Ken Rosenblad, and Steven D. Shepard
Submissions from 1997
John Bassett Moore, Robert Lansing, and the Shandong Question, Stephen Craft
Submissions from 202
Impact of Technology on University International Travel Policies, Aaron D. Clevenger, Elaine Del Rossi, Patrick Morgan, and Gary Rhodes