Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Policy

PDF

2012

Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 53

Full-Text Articles in Business

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Identifying Local Entrepreneurship Development System Policy In Rural Areas And How Local Context Shapes Entrepreneurship Policy Formation, Stacey Wright Mccullough Dec 2012

Identifying Local Entrepreneurship Development System Policy In Rural Areas And How Local Context Shapes Entrepreneurship Policy Formation, Stacey Wright Mccullough

Graduate Theses and Dissertations

As rural communities struggle to maintain a sustainable economic base in today's global economy, many are exploring strategies to encourage entrepreneurial development. The purpose of this study was to better understand how local public policy is being be used to support the creation of entrepreneurship development systems in rural communities and how local context shapes entrepreneurship public policy formation. In phase one of the study, a survey and analysis of documents available on the Internet were used to identify county and municipal policy actions associated with entrepreneurial development in 16 counties in North Carolina. In the second study phase, two …


The Striking Success Of The National Labor Relations Act, Michael L. Wachter Dec 2012

The Striking Success Of The National Labor Relations Act, Michael L. Wachter

All Faculty Scholarship

Although often viewed as a dismal failure, the National Labor Relations Act (NLRA) has been remarkably successful. While the decline in private sector unionization since the 1950s is typically viewed as a symbol of this failure, the NLRA has achieved its most important goal: industrial peace.

Before the NLRA and the 1947 Taft-Hartley Amendments, our industrial relations system gave rise to frequent and violent strikes that threatened the nation’s stability. For example, in the late 1870s, the Great Railroad Strike spread throughout a number of major cities. In Pittsburg alone, strikes claimed 24 lives, nearly 80 buildings, and over 2,000 …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Annual Review Of Social Partnerships Issue 7, Maria May Seitanidi Oct 2012

Annual Review Of Social Partnerships Issue 7, Maria May Seitanidi

Maria May Seitanidi

This is the 7th Issue of the Annual Review of Social Partnerships previously known as the NPO-BUS Partnerships Bulletin.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


Managing Expectations: Does The Directors' Duty To Monitor Promise More Than It Can Deliver?, Lisa Fairfax Oct 2012

Managing Expectations: Does The Directors' Duty To Monitor Promise More Than It Can Deliver?, Lisa Fairfax

All Faculty Scholarship

This article grapples with whether we are expecting too much from the duty of oversight. The directors’ oversight duty refers to directors’ responsibility to actively monitor corporate officers, employees, and corporate affairs. Directors breach their oversight duty when officers and employees engage in wrongdoing that causes harm to the corporation and that wrongdoing can be attributed to directors’ failure to monitor. In other words, oversight liability holds directors liable for their failure to act under circumstances where it can be proven that directors should have acted and their actions could have prevented corporate harm.

The significance of directors’ oversight duty …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


Understanding The Dimensions Of Trust In Public Relations And Their Measurements, Joosuk Park Aug 2012

Understanding The Dimensions Of Trust In Public Relations And Their Measurements, Joosuk Park

Doctoral Dissertations

Trust judgment of an organization’s publics validates the existence of an organization as well as being one of the most powerful moderators of public relations effectiveness. The ideas of trust as one of the key dimensions to explain relational status between an organization and its key publics has been around more than a decade. Over the last two decades, the idea of trust in fact has been showing rising prominence across many diversified studies of relationship and relationship management. In relationship management, one of the important goals of public relations is to build mutually beneficial relationships among organizations and their …


The Effect Of Casino Tax Policy On Short-Run Gaming Development, Kahlil Philander Aug 2012

The Effect Of Casino Tax Policy On Short-Run Gaming Development, Kahlil Philander

UNLV Theses, Dissertations, Professional Papers, and Capstones

This study examines the effect of casino tax rate structure on investment by casino operators. Using a panel data set consisting of all states with legal commercial casino gambling from 1998 to 2009, a fixed-effect model with two-stage least squares is estimated to examine the effect of gambling taxes on firms' short-run behavior. The study finds that maximum casino tax rates decrease casino employment, with an estimated average elasticity of -0.5. This result is noted to be robust to several different model specifications and data subsets. No robust relationship is found between maximum tax rates and casino wages. No significant …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


The Leadership Of Sustainable Cities: A Multiple-Case Study Of Two Oregon Cities, Kenneth L. Weaver Jul 2012

The Leadership Of Sustainable Cities: A Multiple-Case Study Of Two Oregon Cities, Kenneth L. Weaver

Department of Agricultural Leadership, Education and Communication: Dissertations, Theses, and Student Scholarship

In order for cities to become more sustainable it is necessary for the leaders of the efforts to change the organizations and governments so that they understand and embrace what it means to be more sustainable. This study examined the change processes of two Oregon Cities, Corvallis and Eugene, that had made the choice to become more sustainable as a community. The approaches that the participant leaders used demonstrated the use of different ways of thinking about the leadership of change. The ways of thinking of the community leaders were formed by their unique personal backgrounds, knowledge, skills, and abilities. …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Implementing A State Lottery In Nevada, Benjamin K. Boulton Jul 2012

Implementing A State Lottery In Nevada, Benjamin K. Boulton

UNLV Theses, Dissertations, Professional Papers, and Capstones

The purpose of this study is to assess the feasibility of implementing a state lottery in Nevada and to present the benefits of a state lottery for both the Nevada hospitality industry and the Nevada economy. It will compare and contrast the arguments for and the arguments against a lottery by executing a content analysis of existing research literature as well as other relevant publications. It will also examine the history of lotteries, the states that border Nevada and have lotteries and the legislative history of lottery proposals in Nevada.


Making Sense Of Irish Health Care Management: The Street Level Public Organisation (Slpo)., Vivienne Byers Jun 2012

Making Sense Of Irish Health Care Management: The Street Level Public Organisation (Slpo)., Vivienne Byers

Conference papers

Public service reform in modern economies has placed an emphasis on effective planning and management of service delivery to the citizen-client. This paper draws on the concept of the Street Level Public Organization (SLPO) to examine the problem of government’s top down implementation of planning reform in the delivery of public services. It does so, by exploring the implementation of strategic planning in the health sector and drawing upon field work from such implementation in the health services in Ireland and Canada. The SLPO model (McKevitt 1998) is used as an explanatory tool to add to the public sector reform …


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Career-Based Influences On Scientific Recognition In The United States And Europe: Longitudinal Evidence From Curriculum Vitae Data, Jan Youtie, Juan Rogers, Thomas Heinze, Philip Shapira, Li Tang Jun 2012

Career-Based Influences On Scientific Recognition In The United States And Europe: Longitudinal Evidence From Curriculum Vitae Data, Jan Youtie, Juan Rogers, Thomas Heinze, Philip Shapira, Li Tang

Philip Shapira

This paper examines how funding patterns, career pathways and collaboration networks influence scientific recognition. We analyze these institutional factors in the early and middle phases of academic careers through comparison of a group of researchers recognized as creative by their peers with a matched group of researchers. Measurement of scientific recognition is based on survey nominations and research prizes in two growing, laboratory-intensive research domains: nanotechnology and human genetics. Curriculum vitae data is used to compare researchers based in the United States and Europe. In the early career model for the United States, we find that scientific recognition is associated …


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii May 2012

Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii

George H Baker

EMP and solar storm wide geographic coverage and ubiquitous system effects beg the question of “Where to begin?” with protection efforts. Thus, in addressing these “wide area electromagnetic (EM) effects,” we must be clever in deciding where to invest limited resources. Based on simple risk analysis, the electric power and communication infrastructures emerge as the highest priority for EM protection. Programs focused on these highest risk infrastructures will go a long way in lessoning societal impact. Given the national scope of the effects, such programs must be coordinated at the national level but implemented at local level. Because wide-area EM …


Press Release 3rd Intl Symposium On Cross Sector Social Interactions: Making A Diffeence: Enhancing The Impact Of Partnerships For The Social Good, Maria May Seitanidi May 2012

Press Release 3rd Intl Symposium On Cross Sector Social Interactions: Making A Diffeence: Enhancing The Impact Of Partnerships For The Social Good, Maria May Seitanidi

Maria May Seitanidi

Leading academics from around the world including The Netherlands, France, the UK, the US and Canada, discussed at the Rotterdam School of Management-Erasmus University, on 24th and 25th May 2012, how to enhance the impact of partnerships while contributing to the social good by delivering policies, programmes and actions and encouraging the collaboration between business, nonprofits, governements and citizens.


The Destructive Ambiguity Of Federal Proxy Access, Jill E. Fisch May 2012

The Destructive Ambiguity Of Federal Proxy Access, Jill E. Fisch

All Faculty Scholarship

After almost seventy years of debate, on August 25, 2010, the SEC adopted a federal proxy access rule. This Article examines the new rule and concludes that, despite the prolonged rule-making effort, the new rule is ambiguous in its application and unlikely to increase shareholder input into the composition of corporate boards. More troubling is the SEC’s ambiguous justification for its rule which is neither grounded in state law nor premised on a normative vision of the appropriate role of shareholder nominations in corporate governance. Although the federal proxy access rule drew an unprecedented number of comment letters and is …


Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta Apr 2012

Social Implications Of Technology: Past, Present, And Future, Karl D. Stephan, Katina Michael, M.G. Michael, Laura Jacob, Emily Anesta

Professor Katina Michael

The social implications of a wide variety of technologies are the subject matter of the IEEE Society on Social Implications of Technology (SSIT). This paper reviews the SSIT’s contributions since the Society’s founding in 1982, and surveys the outlook for certain key technologies that may have significant social impacts in the future. Military and security technologies, always of significant interest to SSIT, may become more autonomous with less human intervention, and this may have both good and bad consequences. We examine some current trends such as mobile, wearable, and pervasive computing, and find both dangers and opportunities in these trends. …


Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael Apr 2012

Commentary On: Mann, Steve (2012): Wearable Computing, Katina Michael, M.G. Michael

Associate Professor Katina Michael

In Professor Steve Mann- inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist- we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.


Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael Apr 2012

Book Review: Securing The Cloud: Cloud Computer Security Techniques And Tactics, Katina Michael

Associate Professor Katina Michael

With so much buzz around Cloud Computing, books like this one written by Winkler are much in demand. Winkler’s experience in the computing business shines through and as readers we are spoiled with a great deal of useful strategic information- a jam packed almost 300 page volume on securing the cloud.


Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael Apr 2012

Book Review: The Basics Of Information Security: Understanding The Fundamentals Of Infosec In Theory And Practice, Katina Michael

Professor Katina Michael

Dr Jason Andress (ISSAP, CISSP, GPEN, CEH) has written a timely book on Information Security. Andress who is a seasoned security professional with experience in both the academic and business worlds, categorically demonstrates through his book that underlying the operation of any successful business today is how to protect your most valuable asset- “information”. Andress completed his doctorate in computer science in the area of data protection, and presently works for a major software company, providing global information security oversight and performing penetration testing and risks assessment.


In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael Apr 2012

In Memoriam: Associate Professor Dr Elaine Lawrence, Katina Michael

Associate Professor Katina Michael

Despite being a graduate of the rigorous Bachelor of Information Technology at the University of Technology, Sydney (UTS) in 1996, I was unfortunate in that I missed being taught by Associate Professor Elaine Lawrence who began working at UTS in 1990 as a Lecturer in Computing Science. Dr Lawrence became a senior lecturer in 2000, and subsequently an associate professor in 2006. Our paths crossed in 2002 when I was tasked to deliver a new course entitled “eBusiness Principles” in my first year of lecturing at the University of Wollongong, and after an initial scurry to find an adequate textbook, …