Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cyber Operations (3)
- Cyber defense (3)
- Nukes (3)
- Austerity (2)
- CubeSat (2)
-
- Cyber (2)
- Cyber operations (2)
- Deterrence (2)
- Nuclear (2)
- Security Studies (2)
- Sequestration (2)
- Small Spacecraft (2)
- 2nd term (1)
- 9/11 (1)
- Academic/Peer Reviewed (1)
- Agency (1)
- Aid recipient activism (1)
- Arab Spring (1)
- Architecture (1)
- Armed forces (1)
- Barack Obama (1)
- Bosnia (1)
- Brazil; China; English School (1)
- Budget (1)
- Chapter VII (1)
- China (1)
- Civic engagement (1)
- Communication technology (1)
- Conflict analysis (1)
- Congressional Lobbying (1)
- Publication
-
- Jon D. Carlson (7)
- Jan Kallberg (5)
- Political Science Faculty Publications (3)
- CMC Senior Theses (2)
- Jeremy Straub (2)
-
- Political Science Honors Projects (2)
- Daniel Añorve (1)
- Department of Political Science and Law Faculty Scholarship and Creative Works (1)
- Dissertations and Theses (1)
- LUX: A Journal of Transdisciplinary Writing and Research from Claremont Graduate University (1)
- Mehmet OZKAN (1)
- Ratnesh Dwivedi (1)
- Senior Honors Theses (1)
- Sherrie M Steiner (1)
- henry u ufomba (1)
- Publication Type
Articles 1 - 30 of 30
Full-Text Articles in Other Political Science
South-South Relations And The English School Of International Relations: Chinese And Brazilian Ideas And Involvement In Sub-Saharan Africa, Anthony Petros Spanakos, Joseph Marques
South-South Relations And The English School Of International Relations: Chinese And Brazilian Ideas And Involvement In Sub-Saharan Africa, Anthony Petros Spanakos, Joseph Marques
Department of Political Science and Law Faculty Scholarship and Creative Works
The rise of large developing countries has led to considerable discussions of re-balancing global relations and giving greater priority to understanding South-South relations. This paper, in exploring the central ideas of Chinese and Brazilian foreign policy and the behavior of these two rising Southern countries toward Sub-Saharan Africa, argues that the English School of International Relations is well suited to understanding the intentions and actions that characterize South-South relations.
Mamluk Jerusalem: Architecturally Challenging Narratives, Andrew C. Smith
Mamluk Jerusalem: Architecturally Challenging Narratives, Andrew C. Smith
LUX: A Journal of Transdisciplinary Writing and Research from Claremont Graduate University
Narratives abound concerning the religious and political positioning of Jerusalem in the past as well as the present and have been used in a variety of ways to serve various ideologies or political ends. One such narrative (which can be found even in some academic treatises of the history of Jerusalem) states that following the Muslim re-conquest of the city after the Crusades Muslim rulers neglected the city entirely, leading to its decline into obscurity and ruin. This narrative asserts that the city remained as such until Zionism, Jewish immigration, and, most especially, the establishment of the state of Israel …
The Politics Media Equation:Exposing Two Faces Of Old Nexus Through Study Of General Elections,Wikileaks And Radia Tapes, Ratnesh Dwivedi Mr
The Politics Media Equation:Exposing Two Faces Of Old Nexus Through Study Of General Elections,Wikileaks And Radia Tapes, Ratnesh Dwivedi Mr
Ratnesh Dwivedi
The important identity of a responsible media is playing an unbiased role in reporting a matter without giving unnecessary hype to attract the attention of the gullible public with the object of making money and money only.After reporting properly the media can educate the public to form their own opinion in the matters of public interest. Throughout the centuries, the world has never existed without information and communication, hence the inexhaustible essence of mass media. The government has the power to either make or reject whatever that will exist within its environment. It also determines how free the mass media …
National Power As A Critical Terrorist Target Choice: A Dataset On The Activities Of The Jamaaahl Al-Sunnah Li-Da’Wawa Al-Jihad (Boko Haram) Sect In Nigeria (2009-2012), Henry U. Ufomba
henry u ufomba
Should we consider a terrorist group as a rational player in its interaction with the state? If yes, does this give room for a rational expectation in its target choice? Situated within these questions, this dataset present the activities of the terrorist group JamaaAhl al-Sunnah li-da’wawa al-Jihad popularly known as the Boko Haram sect in Nigeria between 2009 to 2012. The key objective of the dataset is to match each of Boko Haram’s target type with the primary assumption of the Uyo School in other to aid future empirical study on the subject to determine its robustness.
Turkey, Islamic Politics And The ‘Turkish Model’, Mehmet Ozkan
Turkey, Islamic Politics And The ‘Turkish Model’, Mehmet Ozkan
Mehmet OZKAN
No abstract provided.
A Dissatisfied Partner: A Conflict - Integration Analysis Of Britain's Membership In The European Union, Osman Goktug Tanrikulu
A Dissatisfied Partner: A Conflict - Integration Analysis Of Britain's Membership In The European Union, Osman Goktug Tanrikulu
Dissertations and Theses
Since 2009, the European Union has faced the worst economic crisis of its history. Due to the devastating impact of the Eurozone crisis on their economies, European countries realized the need to deepen the integration. Without a fiscal union, the Monetary Union would always be prone to economic crises. However, the efforts to reinforce the Union’s economy have been hampered by the UK due to its obsession with national sovereignty and lack of European ideals. In opposing further integration, the UK officials have started to speak out about the probability of leaving the EU.
The purpose of this paper is …
How To Talk To Decision Makers...Who Don't Want To Talk To You: An Interview With Leida Rijnhout, Sherrie Steiner
How To Talk To Decision Makers...Who Don't Want To Talk To You: An Interview With Leida Rijnhout, Sherrie Steiner
Sherrie M Steiner
No abstract provided.
Making War And Securing Peace: The Viability Of Peace Enforcement As A Mechanism For Promoting And Securing Civil War Termination, Shawn H. Greene
Making War And Securing Peace: The Viability Of Peace Enforcement As A Mechanism For Promoting And Securing Civil War Termination, Shawn H. Greene
Political Science Honors Projects
Peace enforcement—the threat or use of military force to compel belligerent adherence to a civil war settlement—has become increasingly salient in the past decade. Using a hazards analysis of all civil wars and associated third party interventions between 1945 and 2013 in addition to three structured, focused case studies, I argue that peace enforcement operations that 1) utilize the appropriate typological spoiler management strategy and 2) maintain legitimacy and impartiality through close cooperation with UN peacekeepers, are the most successful at catalyzing civil war termination and securing durable peace. I also provide a theoretical framework through which to study peace …
Do We Have An Itar Problem: A Review Of The Implications Of Itar And Title Vii On Small Satellite Programs, Jeremy Straub, Joe Vacek
Do We Have An Itar Problem: A Review Of The Implications Of Itar And Title Vii On Small Satellite Programs, Jeremy Straub, Joe Vacek
Jeremy Straub
The small satellite space certainly falls within the realm of ITAR considerations. Some programs operate under the (perhaps mistaken) belief that ITAR doesn’t apply to them (or that they will never be caught). Others may assert that they are working under the basic research exemption. Still others have implemented ITAR information and facility access controls. At best, ITAR introduces a level of uncertainty regarding small satellite programs; at worst, it may be a predator lurking in the proverbial ‘tall grass’ waiting to pounce. This paper reviews the current state of ITAR legislation (including efforts to reform and revise the law) …
Stemsat: An Iss Cubesat Program Based On Spare Parts, Anders Nervold, Josh Berk, Jeremy Straub
Stemsat: An Iss Cubesat Program Based On Spare Parts, Anders Nervold, Josh Berk, Jeremy Straub
Jeremy Straub
With the national government’s focus on driving STEM-education, it is important to provide hands-on ave-nues where students can engage with, and accumulate ex-perience working directly with projects within their fields of interest. The Student Technology Emersion Satellite (STEMSat), provides an avenue for students to become in-volved in CubeSat design and development with only mi-nor hardware and monetary resources, and without being dependent on a launch.
STEMSats are CubeSat satellites that are created from spare parts, residual tools and equipment, obsolete mate-rials, and other types of trash aboard the ISS. A list of all the excess items available for such a …
Social Media And The Transformation Of The Humanitarian Narrative: A Comparative Analysis Of Humanitarian Discourse In Libya 2011 And Bosnia 1994, Ellen Noble
Political Science Honors Projects
Within humanitarian discourse, there is a prevailing narrative: the powerful liberal heroes are saving the helpless, weak victims. However, the beginning of the 21st century marks the expansion of the digital revolution throughout lesser-developed states. Growing access to the Internet has enabled aid recipients to communicate with the outside world, giving them an unprecedented opportunity to reshape discourses surrounding humanitarianism. Through a comparative discourse analysis of Libyan Tweets, 1994 newspaper reports on Bosnia, and 2011 newspaper reports on Libya, this paper analyzes whether aid recipient discourse can resist the dominant humanitarian narrative and if that resistance can influence dominant …
An Analysis Of The Effectiveness Of The Director Of National Intelligence (Dni) In Uniting The Intelligence Community, Bethany G. Pico
An Analysis Of The Effectiveness Of The Director Of National Intelligence (Dni) In Uniting The Intelligence Community, Bethany G. Pico
Senior Honors Theses
September 11, 2001 marks the date of the largest attack on American soil since the Japanese attack on Pearl Harbor during World War II. This event not only changed the lives of individuals who suffered intense loss but changed the course of American history in several ways. This paper focuses specifically on the changes in the intelligence community since the attacks. The attacks that 9/11 presented flaws in the system created demonstrating weakness as a direct result of the immense destruction that occurred. The thesis of this paper is to analyze, assess, and draw conclusions on the effectiveness of the …
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Jan Kallberg
In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …
Policy Brief: Unscr 1325: The Challenges Of Framing Women’S Rights As A Security Matter, Natalie Florea Hudson
Policy Brief: Unscr 1325: The Challenges Of Framing Women’S Rights As A Security Matter, Natalie Florea Hudson
Political Science Faculty Publications
While UN Security Council Resolution (UNSCR) 1325 has certainly increased awareness among international actors about women’s and gender issues in armed conflict, opened new spaces for dialogue and partnerships from global to local levels, and even created opportunities for new resources for women’s rights, successes remain limited and notably inconsistent. To understand some of these shortcomings and think creatively about how to move the women, peace and security agenda forward, it is essential to understand the conceptual assumptions underscoring UNSCR 1325.
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
“Las Comunidades Cerradas: ¿Ruptura De La Comunidad?”, Daniel Añorve
“Las Comunidades Cerradas: ¿Ruptura De La Comunidad?”, Daniel Añorve
Daniel Añorve
No abstract provided.
Ethics In Public Management, H. George Frederickson, Richard K. Ghere
Ethics In Public Management, H. George Frederickson, Richard K. Ghere
Political Science Faculty Publications
This volume follows two earlier projects undertaken by Frederickson (1993) and Frederickson and Ghere (2005) to present collections of theoretical essays and empirical analyses on administrative ethics. Three years before the publication of the first volume —Frederickson's Ethics and Public Administration — the National Commission on the Public Service released Leadership for America (also known as the Volcker Commission Report) that attested to "the quiet crisis" in government whereby "too many of the best of the nation's senior executives are ready to leave government, and not enough of its most talented young people are willing to join. This erosion in …
Ngo Leadership And Human Rights, Richard K. Ghere
Ngo Leadership And Human Rights, Richard K. Ghere
Political Science Faculty Publications
This book provides preliminary understanding of what the term NGO means; explains how "human rights" affect NGO missions; and focuses on the meaning of "leadership" in NGOs in comparison to private sector and government agency leadership. It also encourages readers with vocational aspirations in human rights work to think strategically in preparing for their professional futures.
China's Soft Power Offensive In The United States: Cultural Diplomacy, Media Campaigning, And Congressional Lobbying, Kalika A. Tullock
China's Soft Power Offensive In The United States: Cultural Diplomacy, Media Campaigning, And Congressional Lobbying, Kalika A. Tullock
CMC Senior Theses
As China’s economic and military power develops and expands, it has been focusing recent efforts on upgrading its soft power in order to quell concerns and apprehensions about its rise. As the two most powerful nations in the world, China and the United States have both attached great importance to Sino-U.S. relations, recognizing that the structure of the future global community will be largely dependent upon these two countries effectively collaborating in shaping the global structure and improving global issues. Facing an American public that views China as a threat and competitor, as well as Western media that consistently paints …
Grand Strategy In U.S. Foreign Policy: The Carter, Bush, And Obama Doctrines, Sara M. Birkenthal
Grand Strategy In U.S. Foreign Policy: The Carter, Bush, And Obama Doctrines, Sara M. Birkenthal
CMC Senior Theses
This paper seeks to determine under what conditions a U.S. president can implement a grand strategy given the nature of domestic and international opportunities and constraints. It will examine three comparative case studies: Jimmy Carter, George W. Bush, and Barack Obama, with the goal of determining what conditions are necessary at the individual, domestic, and systemic levels of analysis for grand strategy implementation. At the individual level, it will apply operational code analysis, as well as an examination of personal characteristics for each case study. At the domestic level, it will apply a five-prong test for examining factors that are …
Transitions To Democracy (Democratization) - Syllabus, Jon D. Carlson
Transitions To Democracy (Democratization) - Syllabus, Jon D. Carlson
Jon D. Carlson
No abstract provided.
Us Foreign Policy - Syllabus, Jon D. Carlson
International Political Economy - Syllabus, Jon D. Carlson
International Political Economy - Syllabus, Jon D. Carlson
Jon D. Carlson
No abstract provided.
Introduction To International Relations - Syllabus, Jon D. Carlson
Introduction To International Relations - Syllabus, Jon D. Carlson
Jon D. Carlson
No abstract provided.
Introduction To Comparative Politics - Syllabus, Jon D. Carlson
Introduction To Comparative Politics - Syllabus, Jon D. Carlson
Jon D. Carlson
No abstract provided.
Teaching Statement, Courses, & Evaluation Scores, Jon D. Carlson
Teaching Statement, Courses, & Evaluation Scores, Jon D. Carlson
Jon D. Carlson
No abstract provided.
Scramble For The Arctic: Layered Sovereignty, Unclos, And Competing Maritime Territorial Claims, Jon D. Carlson, Christopher Hubach, Joseph Long, Kellen Minteer, Shane Young
Scramble For The Arctic: Layered Sovereignty, Unclos, And Competing Maritime Territorial Claims, Jon D. Carlson, Christopher Hubach, Joseph Long, Kellen Minteer, Shane Young
Jon D. Carlson
No abstract provided.