Description |
1 online resource. |
|
text file |
Series |
Intelligence and counterintelligence studies
|
|
Intelligence and counterintelligence studies series.
|
Note |
Includes index. |
Contents |
Preface; Chapter 1; Introduction to the Prevailing National Security Issues Confronting the United States; Introduction; Methodology; References; Chapter 2; Threats to the National Security of the United States' Homeland: A Qualitative Assessment; Abstract; Literature Review; Research Questions; Methodology; Limitations; Analysis; Trend of National Security Threats; Geographic Analysis; TSA as the First National Security Defense Warriors; Immigration and Organized Crime; Conclusion; Appendix A: List of All Data Sources and Thematic Coding Scheme; References; Chapter 3 |
|
Russia's Threat to the National Security of the United States:A Qualitative Assessment; Abstract; Literature Review; Research Questions; Methodology; Limitations; Analysis; Geographical Analysis of Crimea; Russia's National Power Building Through M.I.E. Instrument; Findings and Conclusion; Appendix A: List of Data Souces and Thematic Coding Matrix; References; Chapter 4; Overview of China's Threat to the National Security of the United States: A Qualitative Assessment; Abstract; Literature Review; China's Recent Economic Juggernaut; China's Military Development Landscape |
|
China's Technological Advances and Cyber IntelligenceResearch Questions; The D.I.M.E. Logic and YIRTM Model; Methodology; Limitations; Analysis; China's Growing Economic Clout as Top National; Security Threat; China's Military Maneuvers to the National Security; China's Information Technology and Cyber Threats to the National Security; Conclusion; China's Economic Growth and Diplomacy; China's Military Threat; Information Technology and Cyber Threat; Appendix A: List of Data Sources and Thematic Coding Matrix; References; Chapter 5 |
|
North Korea and Its Threats to U.S. National Security: A Qualitative AssessmentAbstract; Literature Review; Research Questions; The D.I.M.E. Logic Model; Methodology; Limitations; Analysis; Geographic Analysis; North Korea as a Regional and Global Destabilizer; Findings and Conclusion; Appendix A: List of All Data Sources and Thematic Coding Matrix; References; Chapter 6; Asia-Pacific Threats to the National Security of the United States: A Qualitative Assessment; Abstract; Literature Review; Research Questions; The YIRTM Logic Model; Methodology; Limitations; Analysis |
|
Findings and ConclusionAppendix A. List of All Data Sources and Thematic Coding Matrix; References; Chapter 7; African Security Threats and the Connection to the United States National Security: A Qualitative Assessment; Abstract; Literature Review; Research Questions; The D. I. M. E. Logic Model; Methodology; Analysis; Findings and Conclusion; Appendix A. List of Data Sources and Thematic Coding Matrix; References; Chapter 8; Central Command Threats to the National Security of the United States: A Qualitative Assessment; Abstract; Literature Review; Research Questions; The Logic Model |
Local Note |
eBooks on EBSCOhost EBSCO eBook Subscription Academic Collection - North America |
Subject |
National security -- United States.
|
|
National security. |
|
United States. |
|
Strategic culture -- United States.
|
|
Strategic culture. |
|
World politics -- 21st century.
|
|
World politics. |
Chronological Term |
21st century |
|
2000-2099 |
Genre/Form |
Electronic books.
|
Added Author |
Weaver, John Michael, editor.
|
|
Pomeroy, Jennifer, editor.
|
ISBN |
9781536101065 (electronic book) |
|
1536101060 (electronic book) |
|
9781536100921 |
|