Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

PDF

University of Central Florida

Electronic Theses and Dissertations

Theses/Dissertations

Local government

Publication Year

Articles 1 - 2 of 2

Full-Text Articles in Entire DC Network

The Effect Of The Great Recession On Local Goverment Policy In Florida, Richard Levey Jan 2015

The Effect Of The Great Recession On Local Goverment Policy In Florida, Richard Levey

Electronic Theses and Dissertations

The length and depth of the Great Recession of 2008 provides an opportunity to examine the policy behavior of local governments unlike any window since the 1930's post Depression era. Utilizing Peterson's (1981) City Limits typology as a framework for local government policy allows for an evaluation of whether or not the economic downturn caused local governments to change their relative expenditures between policy categories. The City Limits typology has been widely used in the literature to explain how expenditures define a local government's role in economic development. The typology has had limited use in a pre-post natural experimental research …


Critical Digital Infrastructure Protection: An Investigatoin Into The Intergovernmental Activities Of Information Technology Directors In Florida Counties, Joah Nicole Devenny Jan 2004

Critical Digital Infrastructure Protection: An Investigatoin Into The Intergovernmental Activities Of Information Technology Directors In Florida Counties, Joah Nicole Devenny

Electronic Theses and Dissertations

As cyber attacks become more sophisticated, the risk to all networked computer systems increases. Whether public or private, whether federal, state, or local, the threat is equally real. Consequently, local governments must respond accordingly to understand the threats, take measures to protect themselves, and determine how to respond in the event of a system breach. Additionally, since cyber criminals do not respect geographic or administrative boundaries, local leaders must be prepared to instantly interact with other governments, agencies, and departments to suppress an attack. Guided by the theory of intergovernmental management (IGM), this exploratory research investigated how Information Technology (IT) …