Open Access. Powered by Scholars. Published by Universities.®

Other Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Business

Institution
Keyword
Publication Year
Publication
Publication Type
File Type

Articles 1 - 30 of 77

Full-Text Articles in Other Political Science

Development Finance Institutions As Tools For Foreign Aid Distribution: A Comparative Analysis Of The Overseas Private Investment Corporation, Findev Canada And Deutsche Investitions – Und Entwicklungsgesellschaft, Kamal Mann May 2019

Development Finance Institutions As Tools For Foreign Aid Distribution: A Comparative Analysis Of The Overseas Private Investment Corporation, Findev Canada And Deutsche Investitions – Und Entwicklungsgesellschaft, Kamal Mann

Major Papers

An understanding of how foreign aid has changed requires a thorough examination of the efforts taken in aid to address the widening finance gap in development, alongside the often-contested issue of aid effectiveness. This is particularly the case when looking at how aid should be paid for. Yet the question of how to best program and deliver foreign aid remains unanswered.

Aid remains one of the largest aspects of international transfers of resources that occur in the world, as such it is important to study it. The rise of Development Finance Institutions, which are publicly owned, private lending institutions helps ...


The Montana Energy Security Act, Kennedy Bahm Apr 2019

The Montana Energy Security Act, Kennedy Bahm

Carroll College Student Undergraduate Research Festival

Eliminating the use of coal-fired power nationwide has been a popular talking point in recent legislative debates in Washington, D.C. Despite obvious threats to the environment, investing in coal-fired energy offers considerable economic benefits to Americans. In Montana, this debate has been centered around the closure of the Colstrip Power Plant. The Montana Energy Security Act (HB 203), proposed by Representative Rodney Garcia, would permit the state of Montana to sell bonds to finance the $500m purchase of the Colstrip Power Plant. This case study offers a cost benefit analysis of the Montana Energy Security Act, comparing the societal ...


Visions Of The Future In Budgetary Discourse, Ewan Macdonald, Brendan O'Rourke, John Hogan Jan 2019

Visions Of The Future In Budgetary Discourse, Ewan Macdonald, Brendan O'Rourke, John Hogan

Conference papers

Whilst there is ample precedent to argue against the common-sense notion that the ideological leanings of political parties are congruent with their implementation of fiscal policy (Boix, 2000; Garrett & Lange, 1991; Hibbs, 1977; Liargovas & Manolas, 2007), there is a relative dearth of research on the role of discourse in shaping fiscal policy with one notable exception by Maatsch (2014). With this in mind, we approach the issue of examining fiscal policy through a fixed, contested and subverted within particular texts” (Howarth, 2005, p. 341). This paper examines how the future is constructed in Irish budget speeches delivered between 1970-2015 using a combination ...


House Bill 2 & The Backlash: A Story Of Frames, Kerry Schellenberger Mar 2018

House Bill 2 & The Backlash: A Story Of Frames, Kerry Schellenberger

Honors Theses (PPE)

While over 20 states considered so-called bathroom bills between 2013-2016, only one state, North Carolina, passed one - in the form of House Bill 2. House Bill 2 modified North Carolina’s non-discrimination legislation, as well as restricting access to multi-user restrooms on the basis of sex designated on one’s birth certificate, which would require some transgender men to use the women’s restroom. The debate between those for and against HB2 raged in the press, the legal system, and finally at the ballot box. An analysis of the first two months of coverage indicates how frames were used by ...


An Investigation Into Best Practices And Lessons Learnt With Respect To China's Crackdown On Corruption, Dominic Kwok Jan 2018

An Investigation Into Best Practices And Lessons Learnt With Respect To China's Crackdown On Corruption, Dominic Kwok

Joseph Wharton Scholars

Corruption is a well-documented problem in China, as well as many other developed and undeveloped countries across the world. The problem is particularly pronounced in countries that have undergone rapid economic transformation, allowing large amounts of wealth to fall into the hands of a select few individuals. Although corruption has been researched extensively, what is less covered are potential solutions that the country, and others looking to carry out similar reform, could use to combat corruption most effectively. As China has transitioned from a planned economy to a market economy, and the economy has become more powerful than ever, corruption ...


Taxation For Whom?:A Diachronic Analysis Of Taxation In Ireland And The United Kingdom From 1970-2015., Ewan Macdonald, John Hogan, Brendan O'Rourke Jan 2018

Taxation For Whom?:A Diachronic Analysis Of Taxation In Ireland And The United Kingdom From 1970-2015., Ewan Macdonald, John Hogan, Brendan O'Rourke

Other

This paper explores the discursive development of taxation within budget speeches in two countries, the Republic of Ireland and the United Kingdom, from 1970 to 2015 by means of a corpus-assisted discourse analysis. We ask the following questions; how have discourses of taxation developed diachronically in both countries, what are the similarities and differences in the observable discourses across both countries, and for whom and how are these discourses legitimised? In answering these questions, this paper makes use of Corpus linguistics, a methodological approach which utilises computational analysis of large bodies of text to draw statistically significant conclusions about the ...


Local Workforce Development Boards: Alignment With Operational Indicators And Behavioral Characteristics, Sharon Humphreys Johnson Aug 2017

Local Workforce Development Boards: Alignment With Operational Indicators And Behavioral Characteristics, Sharon Humphreys Johnson

Dissertations

The ability of a region to remain competitively viable is dependent upon attracting new business and retaining existing businesses (Good & Strong, 2015). In many instances, regional growth depends on the workforce and the region’s ability to develop a talent pipeline of existing or accessible workers (Blakely & Leigh, 2010). The passage of the Workforce Innovation and Opportunity Act (WIOA) increases the expectations of local workforce board leadership. The WIOA vision for Local Workforce Development Boards (LWDB) is to serve as strategic leaders and act as conveners of regional workforce system partners, stakeholders, and businesses to develop new structures for working with regional economies, and engaging stakeholders to jointly lead the regional workforce system (Copus et al., 2014; Innovation and Opportunity Network, 2016).

This study examined how LWDBs align with exemplary LWDB operational indicators and effective nonprofit board behavioral characteristics, as perceived by LWDB members. In addition to LWDB member perceptions, private and public sector board member perceptions were compared to determine differences in perceptions between the two governing groups. A non-experimental, descriptive, cross-sectional study was conducted to investigate the research objectives. Purposive, expert, non-probability sampling was used to identify a finite population of LWDB members. A census ...


Revolutionary Coalition Strength And Collective Failure As Determinants Of Status Reallocation, H. Andrew Michener, Edward J. Lawler Jul 2017

Revolutionary Coalition Strength And Collective Failure As Determinants Of Status Reallocation, H. Andrew Michener, Edward J. Lawler

Edward J Lawler

This experiment investigated the effects of collective performance and coalition strength on the redistribution of status prerogatives in triads. A status hierarchy was established within triads, such that one person held higher control status and the two others held lower status. Each group performed an ambiguous, decision-making task over two trials. Collective performance (i.e., success vs failure) was manipulated via bogus feedback regarding the group’s performance, while coalition strength was manipulated by varying the extent to which the two low-status members, acting together as a revolutionary coalition, could damage the outcomes received by the high-status member. Results indicate ...


The Impact Of Status Differences On Coalitional Agreements: An Experimental Study, Edward J. Lawler Jul 2017

The Impact Of Status Differences On Coalitional Agreements: An Experimental Study, Edward J. Lawler

Edward J Lawler

This experiment investigated the impact of status differences between subordinates and face-to-face coalition negotiations on insurgent coalitional action. The effects of these variables were examined in stratified groups, where a leader established inequitable pay-rates, and subordinates could coalesce and destroy a portion of the leader’s outcomes. The results showed that status differences (as opposed to status similarity) undermined the sense of common interests between subordinates and reduced the severity of coalitional action against the leader. Face-to-face negotiations engendered a more cautious approach to coalition negotiations and also reduced the severity of insurgent action. The results suggest that status differences ...


Cooptation And Coalition Mobilization, Edward J. Lawler, George A. Youngs Jr., Michael D. Lesh Jul 2017

Cooptation And Coalition Mobilization, Edward J. Lawler, George A. Youngs Jr., Michael D. Lesh

Edward J Lawler

The question addressed by this research was, “When structural circumstances make revolutionary action likely, under what conditions will a cooptation strategy prevent subordinate revolts?” Experimental procedures established a group status hierarchy consisting of a leader and two subordinates. Groups earned collective outcomes, and the leader usurped an inequitable portion of these outcomes. In this context, the first experiment shows that a cooptation strategy (i.e., offer of a promotion to one of two subordinates) inhibits subordinate revolts. Two additional experiments indicate that the cooptation strategy is most effective (a) if the offer (strategy) provides the target of cooptation a source ...


Endorsement Of Formal Leaders: An Integrative Model, H. Andrew Michener, Edward J. Lawler Jul 2017

Endorsement Of Formal Leaders: An Integrative Model, H. Andrew Michener, Edward J. Lawler

Edward J Lawler

This experiment develops an integrative, path-analytic model for the endorsement accorded formal leaders. The model contains four independent variables reflecting aspects of group structure (i.e., group success-failure, the payoff distribution, the degree of support by others members for the leader, and the vulnerability of the leader). Also included are two intervening variables reflecting perceptual processes (attributed competence and attributed fairness), and one dependent variable (endorsement). The results indicate that endorsement is greater when the group's success is high, when the payoff distribution is flat rather than hierarchical, and when the leader is not vulnerable to removal from office ...


An Ethical President Elect?, Cameron Mackenzie Jan 2017

An Ethical President Elect?, Cameron Mackenzie

Augustana Center for the Study of Ethics Essay Contest

An ethics paper intended to take an unbiased stance, while breaking down the ethics surrounding then President Elect Donald Trump's 100-day plan.


Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo Jan 2017

Automatically Detecting The Resonance Of Terrorist Movement Frames On The Web, Ugochukwu O. Etudo

Theses and Dissertations

The ever-increasing use of the internet by terrorist groups as a platform for the dissemination of radical, violent ideologies is well documented. The internet has, in this way, become a breeding ground for potential lone-wolf terrorists; that is, individuals who commit acts of terror inspired by the ideological rhetoric emitted by terrorist organizations. These individuals are characterized by their lack of formal affiliation with terror organizations, making them difficult to intercept with traditional intelligence techniques. The radicalization of individuals on the internet poses a considerable threat to law enforcement and national security officials. This new medium of radicalization, however, also ...


Corporate Responsibility In Peace Building, Conflict Prevention And Development: The Role Of The Mining Sector In Ghana, Abdul Karim Issifu May 2016

Corporate Responsibility In Peace Building, Conflict Prevention And Development: The Role Of The Mining Sector In Ghana, Abdul Karim Issifu

Journal of Interdisciplinary Conflict Science

This article seeks to explore the role of the mining sector in peace building, conflict prevention and community development in Ghana. After thoroughly reviewing secondary data, including articles, books, journals, newspapers, etc., via critical document review and qualitative research approaches the research found that, there is no legal document on CSR in Ghana, yet mining companies in a free will, have executed CSR programs laying down for peace, security and development in the country. More so, this article provides a theoretical support for the Integrative theory of CSR on the basis that, the socio-economic, political, cultural and environmental needs of ...


Curbing Corporate Inversions: A Study Of National And International Efforts To Establish Corporate Tax Equity, Scott Novak Dec 2014

Curbing Corporate Inversions: A Study Of National And International Efforts To Establish Corporate Tax Equity, Scott Novak

Independent Study Project (ISP) Collection

In recent years, the number of U.S. companies trying to merge with a foreign company and thereby reincorporate themselves in countries with a lower corporate tax rate – a practice known as corporate inversion – has skyrocketed. The public outcry in 2014 against corporate inversions led the U.S. Treasury to release a series of new anti-inversion regulations, and more policy changes are in the process of being debated. At the same time as this national discussion on the harmful effects corporate inversions have on the U.S. tax base is progressing, the Organization for Economic Cooperation and Development (OECD) is ...


“Decentralization Dilemma In Indonesia: Does Decentralization Breed Corruption?”, Glenys Kirana Dec 2014

“Decentralization Dilemma In Indonesia: Does Decentralization Breed Corruption?”, Glenys Kirana

Independent Study Project (ISP) Collection

Given the pervasiveness of corruption, collusion and nepotism during Suharto’s rule (1967-1998), many people assume that the Reformasi era (1998-present) would introduce a new wave of liberal democratic values, which would consequently reduce corruption in Indonesia. This paper seeks to look at the changes in people’s socio-political incentives to corrupt given the changes in political and legal structure, analyzing it in the context of its contribution to Indonesia’s socio-economic development. Specifically, it centers on how decentralization has affected corruption in the regional districts, legislative, judiciary, and other civil society groups. It is the prominence of the corruption ...


Exploring Economists & Society: Constructing Expert Identity, Joseph Fitzgerald, Brendan O'Rourke Jul 2014

Exploring Economists & Society: Constructing Expert Identity, Joseph Fitzgerald, Brendan O'Rourke

Conference papers

The recent economic crisis has created a heightened interest in economics and greater demand for economics experts. The media has played an important role in meeting this demand as mediated expertise is relied upon to understand the complex relationships within society (Albaek, Christiansen and Togeby 2003; Beck 1992; Boyce 2006; Giddens 1990). Such interactions of experts with media are a key element of the knowledge flows within society (Sturdy et al. 2009) and so have attracted research attention (Ekstrom and Lundell 2011; Hutchby 2006; Montgomery 2008). This paper contributes to this literature by focusing on the under-researched area of the ...


Corruption, Democracy And Asia-Pacific Countries, Neil Campbell, Shrabani Saha Oct 2013

Corruption, Democracy And Asia-Pacific Countries, Neil Campbell, Shrabani Saha

Neil Campbell

This paper argues that the relationship between democracy and corruption is nonmonotonic. When a country shifts from autocratic rule to highly imperfect democracy (an ‘electoral democracy’) it is frequently perceived that the level of corruption increases. Conversely, when the democracy level is already relatively high (approaching ‘mature democracy’) an increase in the level of democracy is typically expected to decrease the level of corruption. To assist with our discussion of these issues, before going on to the empirical part of the paper, we look specifically at the case of South Korea to illustrate how corruption responded to an increasing level ...


Special Religious Education: The Good, The Bad And The Ugly, Cathy Byrne Oct 2013

Special Religious Education: The Good, The Bad And The Ugly, Cathy Byrne

Dr Cathy Byrne

No abstract provided.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a ...


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a credible nuclear ...


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future ...


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given ...


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced ...


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los ...


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given ...


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China ...


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As ...


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately are ...