Open Access. Powered by Scholars. Published by Universities.®

Other Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Other Political Science

The Politics Media Equation:Exposing Two Faces Of Old Nexus Through Study Of General Elections,Wikileaks And Radia Tapes, Ratnesh Dwivedi Mr Oct 2013

The Politics Media Equation:Exposing Two Faces Of Old Nexus Through Study Of General Elections,Wikileaks And Radia Tapes, Ratnesh Dwivedi Mr

Ratnesh Dwivedi

The important identity of a responsible media is playing an unbiased role in reporting a matter without giving unnecessary hype to attract the attention of the gullible public with the object of making money and money only.After reporting properly the media can educate the public to form their own opinion in the matters of public interest. Throughout the centuries, the world has never existed without information and communication, hence the inexhaustible essence of mass media. The government has the power to either make or reject whatever that will exist within its environment. It also determines how free the mass media …


National Power As A Critical Terrorist Target Choice: A Dataset On The Activities Of The Jamaaahl Al-Sunnah Li-Da’Wawa Al-Jihad (Boko Haram) Sect In Nigeria (2009-2012), Henry U. Ufomba Oct 2013

National Power As A Critical Terrorist Target Choice: A Dataset On The Activities Of The Jamaaahl Al-Sunnah Li-Da’Wawa Al-Jihad (Boko Haram) Sect In Nigeria (2009-2012), Henry U. Ufomba

henry u ufomba

Should we consider a terrorist group as a rational player in its interaction with the state? If yes, does this give room for a rational expectation in its target choice? Situated within these questions, this dataset present the activities of the terrorist group JamaaAhl al-Sunnah li-da’wawa al-Jihad popularly known as the Boko Haram sect in Nigeria between 2009 to 2012. The key objective of the dataset is to match each of Boko Haram’s target type with the primary assumption of the Uyo School in other to aid future empirical study on the subject to determine its robustness.


Turkey, Islamic Politics And The ‘Turkish Model’, Mehmet Ozkan Sep 2013

Turkey, Islamic Politics And The ‘Turkish Model’, Mehmet Ozkan

Mehmet OZKAN

No abstract provided.


Do We Have An Itar Problem: A Review Of The Implications Of Itar And Title Vii On Small Satellite Programs, Jeremy Straub, Joe Vacek Apr 2013

Do We Have An Itar Problem: A Review Of The Implications Of Itar And Title Vii On Small Satellite Programs, Jeremy Straub, Joe Vacek

Jeremy Straub

The small satellite space certainly falls within the realm of ITAR considerations. Some programs operate under the (perhaps mistaken) belief that ITAR doesn’t apply to them (or that they will never be caught). Others may assert that they are working under the basic research exemption. Still others have implemented ITAR information and facility access controls. At best, ITAR introduces a level of uncertainty regarding small satellite programs; at worst, it may be a predator lurking in the proverbial ‘tall grass’ waiting to pounce. This paper reviews the current state of ITAR legislation (including efforts to reform and revise the law) …


Stemsat: An Iss Cubesat Program Based On Spare Parts, Anders Nervold, Josh Berk, Jeremy Straub Apr 2013

Stemsat: An Iss Cubesat Program Based On Spare Parts, Anders Nervold, Josh Berk, Jeremy Straub

Jeremy Straub

With the national government’s focus on driving STEM-education, it is important to provide hands-on ave-nues where students can engage with, and accumulate ex-perience working directly with projects within their fields of interest. The Student Technology Emersion Satellite (STEMSat), provides an avenue for students to become in-volved in CubeSat design and development with only mi-nor hardware and monetary resources, and without being dependent on a launch.

STEMSats are CubeSat satellites that are created from spare parts, residual tools and equipment, obsolete mate-rials, and other types of trash aboard the ISS. A list of all the excess items available for such a …


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …


“Las Comunidades Cerradas: ¿Ruptura De La Comunidad?”, Daniel Añorve Jan 2013

“Las Comunidades Cerradas: ¿Ruptura De La Comunidad?”, Daniel Añorve

Daniel Añorve

No abstract provided.


Transitions To Democracy (Democratization) - Syllabus, Jon D. Carlson Dec 2012

Transitions To Democracy (Democratization) - Syllabus, Jon D. Carlson

Jon D. Carlson

No abstract provided.


Us Foreign Policy - Syllabus, Jon D. Carlson Dec 2012

Us Foreign Policy - Syllabus, Jon D. Carlson

Jon D. Carlson

No abstract provided.


International Political Economy - Syllabus, Jon D. Carlson Dec 2012

International Political Economy - Syllabus, Jon D. Carlson

Jon D. Carlson

No abstract provided.


Introduction To International Relations - Syllabus, Jon D. Carlson Dec 2012

Introduction To International Relations - Syllabus, Jon D. Carlson

Jon D. Carlson

No abstract provided.


Introduction To Comparative Politics - Syllabus, Jon D. Carlson Dec 2012

Introduction To Comparative Politics - Syllabus, Jon D. Carlson

Jon D. Carlson

No abstract provided.


Teaching Statement, Courses, & Evaluation Scores, Jon D. Carlson Dec 2012

Teaching Statement, Courses, & Evaluation Scores, Jon D. Carlson

Jon D. Carlson

No abstract provided.


Scramble For The Arctic: Layered Sovereignty, Unclos, And Competing Maritime Territorial Claims, Jon D. Carlson, Christopher Hubach, Joseph Long, Kellen Minteer, Shane Young Dec 2012

Scramble For The Arctic: Layered Sovereignty, Unclos, And Competing Maritime Territorial Claims, Jon D. Carlson, Christopher Hubach, Joseph Long, Kellen Minteer, Shane Young

Jon D. Carlson

No abstract provided.