Open Access. Powered by Scholars. Published by Universities.®

Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Journal

2016

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 400

Full-Text Articles in Political Science

Marketing An End To War: Constructive Engagement, Community Wellbeing, And Sustainable Peace, Clifford J. Shultz Dec 2016

Marketing An End To War: Constructive Engagement, Community Wellbeing, And Sustainable Peace, Clifford J. Shultz

Markets, Globalization & Development Review

Markets and marketing are integral to human welfare and survival. When used however for the purposes of war and other systemically violent conflict, they can be devastating and pose an existential threat to humanity. Drawing on experience in war-ravaged and recovering economies, the author examines a stream of research on marketing systems disrupted or destroyed by war. Some underlying conditions and predictors of war and its peaceful resolution are introduced, including social traps and their mitigation or elimination. An argument is revisited for marketing as a form of constructive engagement, which must be implemented to affect and to develop equitable …


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to plunge …


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights …


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult …


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Burroughs As A Political Writer?, Alexander Greiffenstern Dec 2016

Burroughs As A Political Writer?, Alexander Greiffenstern

CLCWeb: Comparative Literature and Culture

In his article "Burroughs as a Political Writer?" Alexander Greiffenstern discusses political elements in William S. Burroughs's work. Greiffenstern looks at Burroughs's text "The Coming of the Purple Better One" written for Esquire about the Democratic National Convention in Chicago 1968. By writing a surprisingly personal text, Burroughs might have captured something about the significance of the convention that many later historical accounts miss. In the end, Burroughs leaves the critical reader no other choice than to attempt a historical and political analysis.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini Dec 2016

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are …


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga Dec 2016

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear energy …


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa Dec 2016

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to accommodate fault causes …


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr Dec 2016

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk Dec 2016

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath Dec 2016

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Some Remarks On Self-Defense And Intervention: A Reaction To Reading Law And Civil War In The Modern World, Josef Rohlik Dec 2016

Some Remarks On Self-Defense And Intervention: A Reaction To Reading Law And Civil War In The Modern World, Josef Rohlik

Georgia Journal of International & Comparative Law

No abstract provided.


People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green Dec 2016

People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green

Military Cyber Affairs

China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese doctrine, controlling …


Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden Dec 2016

Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden

Military Cyber Affairs

Over the course of decades in service, I have experienced multiple presidential transitions. Each new Commander in Chief updates policies, personnel, and priorities…especially when the transition involves a new political party. In this respect, the current transition from the Obama to the Trump administration is no different. While this periodic exercise of our democracy may seem disruptive to some, it is a true opportunity for military cyber professionals to help shape our future national security posture.


The Foreign Policy Association, Joan C. Davis Dec 2016

The Foreign Policy Association, Joan C. Davis

The Catholic Lawyer

No abstract provided.


How Threat Assessment Could Become Self-Fulfilling Prophecy: Case Of U.S.-China Relations, Muhamad Arif Dec 2016

How Threat Assessment Could Become Self-Fulfilling Prophecy: Case Of U.S.-China Relations, Muhamad Arif

Global: Jurnal Politik Internasional

This article tries to explain how misperception can trigger conflict between countries. The article would employ spiral model of conflict proposed by Robert Jervis as a theoretical framework to scrutinize contemporary US and Chinese contemporary competition. As a result, this paper shows how threat assessment could trigger a spiral of conflict through state’s tendency to overestimate threat level and its failure to perceive that defensive behavior can be interpreted as offensive by the belligerent. Based on this analysis, the probability of conflicts can be reduced as each country tries to comprehend motivations that drive other behavior, perceptions and reactions that …


Contesting Global Civil Society’S Legitimacy Claims: Evaluating International Non-Governmental Organizations (Ingos)’ Representation Of And Accountability To Beneficiaries, Cazadira Fediva Tamzil Dec 2016

Contesting Global Civil Society’S Legitimacy Claims: Evaluating International Non-Governmental Organizations (Ingos)’ Representation Of And Accountability To Beneficiaries, Cazadira Fediva Tamzil

Global: Jurnal Politik Internasional

The global civil society is often regarded as a progressive moral force that provides advocacy and protection of marginalized groups in the global political arena. Nevertheless, departing from the belief that civil society has great power and influence over global dynamics, it sees that the legitimacy claims they articulate and articulated by academics are essential to be evaluated, especially with regard to their representation and accountability groups and individual beneficiaries. This paper concludes that the claims of legitimacy of civil society are less justifiable, both normatively and empirically. From the normative point of view, claims for civil society representation are …


Kerja Sama Pembangunan Korea Selatan Di Vietnam Dalam Pengembangan Area Pedesaan Melalui Model Saemaul Undong, Indah Lestari Dec 2016

Kerja Sama Pembangunan Korea Selatan Di Vietnam Dalam Pengembangan Area Pedesaan Melalui Model Saemaul Undong, Indah Lestari

Global: Jurnal Politik Internasional

In this last decade, a closed cooperation of rural development “Saemaul Undong” between South Korea and Vietnam has been formed. Saemaul Undong is a success model of South Korea’s rural development. Along with it, question related to the possibility of adopting Saemaul Undong by developing countries arises. With this regard, this research attempts to explain the reasons why this cooperation has been formed. By using concept of cooperation, this research tries to observe the existence of goals and benefits in “Saemaul Undong” cooperation between South Korea and Vietnam. Result of this research affirmed that goals and benefits spurred “Saemaul Undong” …


The Evolving Security Policy Of Japan And The Adherence To Antimilitarism Culture, Chaula Rininta Anindya Dec 2016

The Evolving Security Policy Of Japan And The Adherence To Antimilitarism Culture, Chaula Rininta Anindya

Global: Jurnal Politik Internasional

Japan has reinterpreted Article 9 as the fundamental constitution of their antimilitarist culture and shows its willingness to play a more active role in the International security. This article seeks to examine the changes of Japan’s security and the potential shift of antimilitarist strategic culture, arguing that despite the continuous changes, Japan has not changed its strategic culture due to perpetual debates within the domestic politics that are vital in shaping the security identity. The changing security practices are merely a natural response to the current dynamic of International security environments. Therefore, it remains unlikely for Prime Minister Shinzo Abe …


Foundational Review On Information Seeking Behavior Of Legislators, Yousef T. Alfarhoud Dec 2016

Foundational Review On Information Seeking Behavior Of Legislators, Yousef T. Alfarhoud

Proceedings from the Document Academy

Legislators play a major role in the development of their countries. They suggest new bills and oversee the performance of the government. Legislators represent different parties, affiliations, and divisions.

Many studies have discussed the information seeking behavior of members of parliament. Information seeking behavior is a complex activity, requiring access to diverse information resources to deal with work, personal, and social information problems. In the case of legislators, such studies have discussed how members of parliament seek information that will eventually affect their decision-making process.

The aim of this review is to discuss the information needs and information seeking behavior …


From Fief To Clan: Boisot’S Information Space Model As A Documentary Theory For Cultural And Institutional Analysis, Lin Wang, Michael Buckland Dec 2016

From Fief To Clan: Boisot’S Information Space Model As A Documentary Theory For Cultural And Institutional Analysis, Lin Wang, Michael Buckland

Proceedings from the Document Academy

Max Boisot (1943-2011) and his Information Space (I-Space) model are introduced. The I-Space model characterized information flow on three dimensions (codification, abstraction, and diffusion). It can be seen as a document-based model. Boisot and colleagues identifies four types of institutional information practices (bureaucracies, markets, fiefs, and clans). Chinese economic reform in the 1980s is used as a case-study to demonstrate how document configuration and infrastructure is associated with cultural and institutional change. This echoes Suzanne Briet's assertion that documentation is a cultural technique.