Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Public Affairs, Public Policy and Public Administration

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 1304

Full-Text Articles in Entire DC Network

Private Sector’S Perceptions And Adoption Of The E-Invoicing System In Egypt, Riham Mohamed Soliman Jun 2024

Private Sector’S Perceptions And Adoption Of The E-Invoicing System In Egypt, Riham Mohamed Soliman

Theses and Dissertations

This study explores the private sector’s perceptions and adoption of the mandated e-invoicing system, a key component of Egypt’s digital tax system. Twenty-three qualitative semi-structured interviews with the private sector to answer the research question: How does the private sector perceive the mandatory e-invoicing system adopted by the Egyptian government? Furthermore, the study explored the perceived impact of the Unified Theory of Acceptance and Use of Technology (UTAUT)’s four aspects on the private sector’s perceptions and adoption of the system, including performance expectancy, effort expectancy, social influence, and facilitating conditions. The study’s findings show that all respondents confirmed the four …


Towards A Digitally Mediated Transitional Justice Process? An Analysis Of Colombian Transitional Justice Organisations’ Posting Behaviour On Facebook, Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter May 2024

Towards A Digitally Mediated Transitional Justice Process? An Analysis Of Colombian Transitional Justice Organisations’ Posting Behaviour On Facebook, Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter

Peace and Conflict Studies

In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ …


A Red Awakening: An Analysis Of China’S Quest For Global Dominance Through Economic Alternative Warfare Methods, Sarah Beddingfield May 2024

A Red Awakening: An Analysis Of China’S Quest For Global Dominance Through Economic Alternative Warfare Methods, Sarah Beddingfield

Senior Honors Theses

In the 2023 annual meeting of China’s parliament, Chinese President Xi made it clear to his political leaders and the world that he was preparing for war. This should come as no surprise after analysis of China's grand strategy points clearly to the intent to surpass the U.S. as the premier global superpower in all respects. China has been building towards this goal for years through untraditional methods of warfare, forcing the national security community to reevaluate its own strategy and assess the Chinese threat through a different lens. This thesis seeks to address one specific area in which China …


Smart Cities And How They Affect Those With Disabilities, Kassie Dover May 2024

Smart Cities And How They Affect Those With Disabilities, Kassie Dover

Honors Theses

This study investigates how to further improve the lives of people with Autism and Cerebral Palsy when it comes to the development of Smart Cities. This is an effort to provide a glimpse into the perspective of those with these disabilities when it comes to technological advancement. The focus of this study was Chattanooga,Tennessee and Los Angeles, California. These two cities are respectively on the East and West side of the country. Thus, there is of course a difference when how these two cities function. This was done through research under the guise of a question and answer methodology. The …


Exposure Of Future Nuclear Energy Infrastructure To Climate Change Hazards: A Review Assessment, Joana Portugal-Pereira, Miguel Esteban, Kathleen Araújo May 2024

Exposure Of Future Nuclear Energy Infrastructure To Climate Change Hazards: A Review Assessment, Joana Portugal-Pereira, Miguel Esteban, Kathleen Araújo

Public Policy and Administration Faculty Publications and Presentations

This review discusses climate hazards and specific risks associated with existing and new nuclear power plants under global warming level futures, with an emphasis on water-based risks for plants that rely on traditional water-cooling processes. Projected hazards, including extreme heatwaves, sea-level rise, and altered precipitation patterns pose significant challenges to the safe and efficient operation of nuclear plants. Additional risks include reduced water-cooling system efficiency, clogging due to biological contamination of water streams, water access issues in reactors during droughts, disruptions from extreme storms, and coastal sea level rise. These findings emphasise the importance of formulating appropriate adaptation strategies that …


Policy Solutions For Juvenile Cyber-Deviant Behaviors: Insights From Criminological Theory, Holly Verity Williams May 2024

Policy Solutions For Juvenile Cyber-Deviant Behaviors: Insights From Criminological Theory, Holly Verity Williams

All Dissertations

The aim of this thesis is to develop a deeper understanding of online deviance as a phenomenon among juveniles, both in terms of engagement and victimization, by applying Attachment Theory, Social Learning Theory, and Self-Control Theory. Throughout the literature, Attachment Theory, Social Learning Theory, and Self-Control Theory have been attributed as key criminological theories in the explanation of juvenile deviance offline, but little research has been applied to online deviance in this way. This thesis seeks to apply the same criminological theories to the phenomenon of online deviance among juveniles and compare outcomes to both online and offline deviance among …


Decisive Decade: Prc Global Strategy And The Pla As A Pacing Challenge – 2023 Pla Conference – Updated And Expanded Apr 2024

Decisive Decade: Prc Global Strategy And The Pla As A Pacing Challenge – 2023 Pla Conference – Updated And Expanded

Monographs, Collaborative Studies, & IRPs

The US Army War College’s 2023 Conference on the People’s Liberation Army (PLA) was held February 22 to 24, 2023, at Carlisle Barracks, Pennsylvania. The conference, entitled “Decisive Decade: PRC Global Strategy and the PLA as Pacing Challenge,” featured presentations on PRC global and regional strategy, and the PLA’s enabling role by experts from a wide range of academic, media, and government agencies and organizations.

The conference papers better defined the notion of the PLA as a pacing challenge as evidenced by PRC strategies and activities in various regions to build a much stronger appreciation of how PLA operations in …


Cybersecurity Fiscal Statecraft Conundrums In South Africa, Sabelo Lyndon Mbokazi Mar 2024

Cybersecurity Fiscal Statecraft Conundrums In South Africa, Sabelo Lyndon Mbokazi

Walden Dissertations and Doctoral Studies

No abstract provided.


Cyber Defense Planning In Tabletop Exercises And Consideration Of A Fractured Flaw Theory For Security Applications, Patrick K. Kilroy Ii Mar 2024

Cyber Defense Planning In Tabletop Exercises And Consideration Of A Fractured Flaw Theory For Security Applications, Patrick K. Kilroy Ii

Doctoral Dissertations and Projects

Cybersecurity threats endanger every part of American life. Security and emergency preparedness professionals plan and prevent cyber-attacks using tabletop exercises. The tabletop exercises establish the risks and protection strategies for multiagency threats, thus, various agencies and industrial partners must work together in these training events. The purpose of this grounded study will be to develop criteria for selecting tabletop participants and explore the risks of participation. An additional consideration is the impact of the sponsoring agencies' agenda on the value of the outcome for the participants. There is sufficient evidence to justify the investigation of these issues. Failing to include …


Research On Chinese Data Sovereignty Policy Based On Lda Model And Policy Instruments, Han Qiao, Junru Xu Mar 2024

Research On Chinese Data Sovereignty Policy Based On Lda Model And Policy Instruments, Han Qiao, Junru Xu

Bulletin of Chinese Academy of Sciences (Chinese Version)

Data sovereignty has become an important component of national sovereignty in the dual context of the digital economy development and the overall national security concept. Major countries and regions are actively carrying out data sovereignty strategic deployment and engaging in fierce competition in data resources, data technology, and data rules. This work adopts the policy text analysis method to study China’s data sovereignty policy, and employs the LDA model and policy instruments to quantitatively analyze the process evolution and thematic characteristics of China’s data sovereignty policy. Drawing on these findings, this study comprehensively considers the global data sovereignty policy and …


Study On R&D Strategies In Nanoscale Science And Technology Of Powerhouses And Insights, Wenyue Bian, Xingjie Liang, Chunlei Ge, Zhongyang Hui, Xiaoqi Jia, Si Liu, Jing Ye, Xiaoyi Chen, Wenjun Wang, Huajun Ju Mar 2024

Study On R&D Strategies In Nanoscale Science And Technology Of Powerhouses And Insights, Wenyue Bian, Xingjie Liang, Chunlei Ge, Zhongyang Hui, Xiaoqi Jia, Si Liu, Jing Ye, Xiaoyi Chen, Wenjun Wang, Huajun Ju

Bulletin of Chinese Academy of Sciences (Chinese Version)

Nanoscale science and technology (nano S&T) are at the frontier of global strategic high-tech competition. After examining nearly 160 strategy and planning documents released by scientific and technological powerhouses from 2000 to 2023, the study finds ten common approaches adopted by the powerhouses to advance nano S&T as follows. (1) Recognizing nano S&T as a key area for the economy and global competition. (2) Establishing cross-department organizations to meet the cross-disciplinary nature of nano S&T. (3) Developing strategic plans to guide the development of nano S&T and implementing major programs with significant investment. (4) Establishing multidisciplinary nano S&T research centers …


Counterterrorism Legislation On Community Integration In Kenya, Collins Okinyi Odongo Mar 2024

Counterterrorism Legislation On Community Integration In Kenya, Collins Okinyi Odongo

Walden Dissertations and Doctoral Studies

No abstract provided.


China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens Mar 2024

China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens

The US Army War College Quarterly: Parameters

This article argues that the People’s Republic of China uses its police and internal security forces as a nontraditional means of projecting strategic Landpower in the Indo-Pacific and Central Asia. Instead of limiting analysis of China’s power projection to military forces, this article employs new data on Chinese police engagements abroad to fill a gap in our understanding of the operating environment in Asia. Policymakers will gain an understanding of how these activities enhance China’s presence, partnerships, and influence across the region to inform the development of recommendations for a more effective response.


Strategy As Problem-Solving, Andrew Carr Mar 2024

Strategy As Problem-Solving, Andrew Carr

The US Army War College Quarterly: Parameters

This article proposes a new definition of strategy as problem-solving that challenges the focus on goals and assumptions of order within many post–Cold War approaches to strategy. It argues that the military needs strategy to diagnose the complex problems of the twenty-first century before they can be solved. Inspired by practitioners such as Andrew Marshall and George F. Kennan, this new definition clarifies what strategists do and offers a logic for distinguishing the use of the term strategy. Practitioners will also find problem-solving tools and pedagogies they can adopt today.


Us-Taiwan Relations And The Future Of The Liberal International Order, Christina Lai Mar 2024

Us-Taiwan Relations And The Future Of The Liberal International Order, Christina Lai

The US Army War College Quarterly: Parameters

Strengthening ties with Taiwan is the best chance the United States has to preserve the liberal international order in Asia and improve its security relative to China. This study offers a normative perspective on how Taiwan can contribute to US-led international institutions and the Asian regional order and reduce conflict risk. It concludes with recommendations for the United States and its partners to integrate Taiwan into multilateral institutions in Asia.


International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze Mar 2024

International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze

The US Army War College Quarterly: Parameters

This article examines the international law of self-defense as it applies to the ongoing Israel-Hamas conflict to determine whether the October 2023 attacks by Hamas against Israel can be interpreted under Article 51 of the UN Charter as an “armed attack” that gives Israel the right to use military force in self-defense against non-state actors. It situates the conflict within ongoing legal and political debates, shows how this conflict fits into a changing global reality where the most dangerous security threats do not exclusively emanate from other states and concludes that Israel’s resort to force in the current conflict appears …


Pornography: Social, Emotional And Mental Implications Among Adolescents, William K. Canady Mar 2024

Pornography: Social, Emotional And Mental Implications Among Adolescents, William K. Canady

National Youth Advocacy and Resilience Conference

This presentation will explain the historical development of pornography. It will highlight three segments: 1- Porn’s impact on brain development of reward pathways, ultimately increasing the appetite for more porn. 2- Porn can be a false substitute for real intimacy, resulting in decreased sexual satisfaction with a real person and increased verbal and physical aggression. 3- Porn promotes sex trafficking, promotes multiple sex partners and reduced STD prevention.


Chinese Digital Platform Companies’ Expansion In The Belt And Road Countries, Yujia He Mar 2024

Chinese Digital Platform Companies’ Expansion In The Belt And Road Countries, Yujia He

Patterson School of Diplomacy and International Commerce Faculty Publications

The emergence of digital platforms is shifting the digital economy toward a platform economy, and Chinese platform-based businesses like Alibaba, Tencent, and JD are increasingly expanding in the Global South. Alongside this, the Chinese government has been promoting digital economy collaboration with emerging markets through high-level engagement under the banner of the Belt and Road Initiative (BRI) and its digital economy component the Digital Silk Road (DSR). Despite significant market interest and policy attention, grounded empirical analysis of Chinese digital platforms’ expansion within Belt and Road Initiative countries is scarce. This study employs a mixed-methods approach, drawing on both quantitative …


Development Of Technology Pilot Training To Reduce The Number Of Senior Citizens Victimized By Computer Fraud Scams, James Eric Johnston Feb 2024

Development Of Technology Pilot Training To Reduce The Number Of Senior Citizens Victimized By Computer Fraud Scams, James Eric Johnston

Walden Dissertations and Doctoral Studies

There is need in the public sector to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction. This age group is targeted more than others involving technology fraud. The current study focused on which topics need to be part of Technology Fraud Pilot Training to reduce the victimization that is put upon seniors 60+ years of age. The project included measures that may improve understanding and safe usage of basic technology that is frequently used. These searches came from public administration, technology, government, city government, state sources, and others …


Advocacy Spotlight: 2024 Regulatory Reminders, Neema Katibai Jd Feb 2024

Advocacy Spotlight: 2024 Regulatory Reminders, Neema Katibai Jd

The Journal of the Michigan Dental Association

The Advocacy Spotlight column delves into critical regulatory reminders for dentists in 2024, emphasizing compliance challenges and potential disruptions to practice. Key areas covered include licensing, amalgam separator renewal, electronic prescribing, and Beneficial Ownership Information reporting. The article stresses the importance of staying informed about evolving regulations to ensure seamless practice operations.


Island Platforms And The Hyper-Terrestrialisation Of Singapore's Smart City-State, Orlando Woods, Tim Bunnell, Lily Kong Feb 2024

Island Platforms And The Hyper-Terrestrialisation Of Singapore's Smart City-State, Orlando Woods, Tim Bunnell, Lily Kong

Research Collection College of Integrative Studies

This paper foregrounds the importance of underlying territorial formations in realising a vision of the smart city. It argues that as a political technology of the state, territory should be understood as a platform upon which data works and the smart city unfolds. In this view, island territories – of which bordered city-states like Singapore provide paradigmatic examples – provide an integral, yet hitherto unexplored, component in the realisation of urban “smartness”. We illustrate these theoretical arguments through an analysis of how the territorial constraints that characterise Singapore’s island platform enable the state to accurately and effectively realise its vision …


Turkey Vs Italy: Gender And Cyber Security, Esra Merve Caliskan, Irem Itegin Jan 2024

Turkey Vs Italy: Gender And Cyber Security, Esra Merve Caliskan, Irem Itegin

Journal of Cybersecurity Education, Research and Practice

With the development of technology, security, a core human concern throughout history,has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of today as a result of how prevalent technology is in our daily lives. This study looks at how the literature on international relations approaches the idea of cybersecurity, with an emphasis on the role gender dynamics play.

This study adopts a comprehensive strategy in recognition of the possibility that people of …


International Competition In The High North: Kingston Conference On International Security 2022 Jan 2024

International Competition In The High North: Kingston Conference On International Security 2022

Monographs, Collaborative Studies, & IRPs

The 16th annual Kingston Consortium on International Security conference, “International Competition in the High North,” took place on October 11–13, 2022, in Kingston, Ontario, Canada. The conference examined the Arctic region in the context of ongoing climate change and against the backdrop of war in Ukraine. Over the past several years, the United States has acknowledged the growing importance of the Arctic as a strategic region, and the Department of Defense and each of the US military services have published Arctic policies or strategies. In addition, the Department of Defense has created a new regional study center, the Ted Stevens …


Digital Scientists And Parallel Sciences: The Origin And Goal Of Ai For Science And Science For Ai, Feiyue Wang, Yutong Wang Jan 2024

Digital Scientists And Parallel Sciences: The Origin And Goal Of Ai For Science And Science For Ai, Feiyue Wang, Yutong Wang

Bulletin of Chinese Academy of Sciences (Chinese Version)

Based on recent development in foundation model, parallel intelligence, decentralized science (DeSci), and other artificial intelligence (AI) technologies, from AI for Science (AI4S) to Science for AI (S4AI), this study discusses parallel sciences and digital scientists, and their impact and significance in paradigm shift for research and development as well as Industry 5.0 and intelligent industry, which demonstrate that paradigm shift is emerging and accelerating, and we must be prepared.


Experience And Thinking Of Promoting Open Source Of Achievement Of State-Funded Scientific Research Projects, Yuntao Long, Zhe Wang, Zheping Xu, Tao Wang, Yungang Bao, Yanjun Wu, Qigang Zhu, Rong Gu Jan 2024

Experience And Thinking Of Promoting Open Source Of Achievement Of State-Funded Scientific Research Projects, Yuntao Long, Zhe Wang, Zheping Xu, Tao Wang, Yungang Bao, Yanjun Wu, Qigang Zhu, Rong Gu

Bulletin of Chinese Academy of Sciences (Chinese Version)

In the era of digital economy, open source innovation has become the stimulator of innovation vitality, and is becoming an important source of high-quality supply of digital public goods. This study focuses on the importance of promoting the open source of state-funded scientific research projects, and summarizes the practical experience and policy measures of major countries and regions in the world on the open source of state-funded scientific research projects. It is also emphasized that the challenges of promoting the open source of state-funded scientific research projects in China. Suggestions for promoting the establishment of an open source mechanism of …


Strategic Research On Information Technology Promoting National Governance Modernization—Review On The S70th Xiangshan Science Conferences, Chao Zhang, Weiyu Duan, Kaihua Chen, Xiaoguang Yang, Yuntao Long Jan 2024

Strategic Research On Information Technology Promoting National Governance Modernization—Review On The S70th Xiangshan Science Conferences, Chao Zhang, Weiyu Duan, Kaihua Chen, Xiaoguang Yang, Yuntao Long

Bulletin of Chinese Academy of Sciences (Chinese Version)

This study systematically summarizes the reports and speeches of the S70th Xiangshan Science Conferences on the theme of “Strategic Research on Information Technology Promoting the National Governance Modernization” and summarizes the consensus of the conference in the following three aspects. (1) Important progress and achievements have been made in the four typical areas, i.e., smart justice, internet governance, data governance, and emergency management. (2) Using information technology to promote the modernization of national governance is confronted with unprecedented opportunities and challenges. And (3) it is necessary to take a series of effective measures to promote information technology to facilitate the …


J Mich Dent Assoc January 2024 Jan 2024

J Mich Dent Assoc January 2024

The Journal of the Michigan Dental Association

Every month, The Journal of the Michigan Dental Association brings news, information, and features about Michigan dentistry to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists!

The January issue sets the foundation for Children’s Dental Health Month in February, the reader will find the following original content:

  • A cover commentary on Pediatric Dentistry
  • A feature article on “Silver Diamine Fluoride as a Caries Management Option for the Young Child”.
  • A feature on “Considerations Concerning Obesity-Related Education for Parents of Young Children”.
  • Professional advice commentary on “Staying Focused on a Moving Target: Coping …


Identifying Barriers: Analysis Of Federal Law Enforcement Social Media And Recruitment Efforts, Reena Desai, Edgar Greer, Meghan Waldron Jan 2024

Identifying Barriers: Analysis Of Federal Law Enforcement Social Media And Recruitment Efforts, Reena Desai, Edgar Greer, Meghan Waldron

Doctor of Education Capstones

The Federal Bureau of Investigation Richmond Field Office seeks to diversify their applicant pool. In an effort to provide information on how to meet this need, our doctoral team analyzed the social media sites of six federal law enforcement agencies to include: the Federal Bureau of Investigation- Headquarters, Federal Bureau of Investigation-Richmond Field Office, Alcohol Tobacco & Firearms, the Federal Bureau of Prisons, the Drug Enforcement Agency, and the United States Marshal Service. By examining a 60-day window of images and their associated text on X (formerly Twitter), Facebook, and Instagram accounts, we wanted to gain a stronger understanding of …


Cybercrime Victimization: Online Routine Behaviors, Guardianship, And Identity Theft Victimization In A Nationally Reflective Sample, Ifeoluwa Stella Elegbe Jan 2024

Cybercrime Victimization: Online Routine Behaviors, Guardianship, And Identity Theft Victimization In A Nationally Reflective Sample, Ifeoluwa Stella Elegbe

Electronic Theses and Dissertations

In this digital era, cybercrime victimization has emerged as a significant issue, with identity theft being one of the most prevalent forms. This study examines the relationship between online routine behaviors, guardianship, demographics, and identity theft victimization in a nationally representative sample of U.S. adults utilizing routine activities theory (RAT) as a conceptual

framework. The research applies statistical methods such as descriptive statistics, correlation analysis, and logistic regression models to examine theoretically oriented hypotheses. The

hypotheses suggest connections between different online habitual behaviors, steps taken to

protect oneself, demographic characteristics, and the extent to which one has been a victim …


Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo Jan 2024

Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo

Research outputs 2022 to 2026

Introduction: The research project's objective was to conduct a comprehensive horizon scan of Network Centric Warfare (NCW) technologies—specifically, Cyber, IoT/IoBT, AI, and Autonomous Systems. Recognised as pivotal force multipliers, these technologies are critical to reshaping the mission, design, structure, and operations of the Australian Defence Force (ADF), aligning with the Department of Defence (Defence)’s offset strategies and ensuring technological advantage, especially in the Indo-Pacific's competitive landscape.

Research process: Employing a two-pronged research approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding …