Frank L. Smith III

Frank L. Smith III
United States Naval War College · Strategic and Operational Research Department

PhD

About

11
Publications
7,028
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
158
Citations

Publications

Publications (11)
Article
Malicious software and infectious diseases are similar is several respects, as are the functional requirements for surveillance and intelligence to defend against these threats. Given these similarities, this article compares and contrasts the actors, relationships, and norms at work in cyber intelligence and disease surveillance. Historical analys...
Article
The US military is responsible for protecting its forces from biological weapons. However, the Department of Defense has neglected biodefense—most of the funding for which now comes from civilian organizations rather than traditional military sponsors. Why? I argue that organizational frames explain military neglect and the rise of civilian biodefe...
Article
Science diplomacy supposedly builds international cooperation through scientific and technical exchange. In practice, however, there are important but often overlooked instances where it might create conflict instead--as with accusations of espionage surrounding the US Naval Medical Research Unit 2 (NAMRU-2) in Indonesia. Did American science diplo...
Technical Report
Full-text available
The 2014 Ebola outbreak in Guinea, Liberia and Sierra Leone proved to be an exceptional outbreak that blurred the lines between health and humanitarian crises. In so doing, it highlighted numerous problems with regard to the coordination of humanitarian disasters that have public health implications of international consequence. The manner in which...
Article
Full-text available
Technology hype is an important concept in business, marketing, and science and technology studies, but it is rarely related to security studies. What is technology hype? How does it relate to national security? And to what effect? This article examines rational and performative perspectives on technology hype as either a kind of exaggeration or ex...
Article
Full-text available
The Internet is an interconnected network and cyber security requires collective action. How that action is organised has important implications for national security, including the defence against cyber attacks and malicious activities. This article explains the origins and institutionalisation of cyber security in Australia—particularly ‘civilian...
Article
Full-text available
The creation of a virulent mousepox virus in Australia and publication of this experiment in 2001 are often argued to mark a dangerous turn in dual use research (1). After this experiment and – far more consequential – September 11 and the anthrax letters, the oversight of dual use research in the life sciences received considerable attention in th...
Article
Full-text available
Throughout Asia, states are competing to build and leverage soft power using public diplomacy. This article examines these investments, whether they pay dividends, and why they are being made. A mix of qualitative and quantitative analysis shows little, if any, positive correlation between public diplomacy by Asian states and foreign public opinion...
Article
For more than fifty years, the World Health Organization has helped monitor flu viruses and manufacture vaccines through the Global Influenza Surveillance Network (GISN). However, GISN became a flashpoint for conflict when Indonesia refused to share its samples of avian influenza until drugs and other benefits were shared in return. Years of contro...

Network

Cited By