Open Access. Powered by Scholars. Published by Universities.®

Other Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Other Political Science

Campaigning For A Seat On The Un Security Council: A Middle Power Reflection On The Role Of Public Diplomacy, Caitlin Byrne Sep 2013

Campaigning For A Seat On The Un Security Council: A Middle Power Reflection On The Role Of Public Diplomacy, Caitlin Byrne

Caitlin Byrne

For active middle power states like Australia, securing a seat on the United Nations Security Council (UNSC) is indeed a ‘prize to be pursued with vigour’.1 In today’s complex and interdependent world, pursuit of this prize requires more than just intense diplomatic lobbying within the corridors of the UN in New York. Successful election to the UNSC turns upon the broad notions of international reputation and image. The campaign itself is a significant exercise in the engagement and persuasion of wider international audiences who have interests in and expectations of the UNSC candidate nations. Drawing in particular upon the past …


Postwar Reconstruction In Liberia: The Participation And Recognition Of Women In Politics In Liberia, Roland Tuwea Clarke Jul 2013

Postwar Reconstruction In Liberia: The Participation And Recognition Of Women In Politics In Liberia, Roland Tuwea Clarke

Dissertations and Theses

Despite the remarkable contributions made by women to secure peace in Liberia, women's representation in politics is still low. The first female African President has been elected, as well as a few women to strategic government positions, but the vast majority of women remain invisible. The reliance on these few women in government is inadequate to produce the significant changes that will be required to bring equality for all women.

This study examines the recognition of women's relative participation and recognition in postwar reconstruction in Liberia. Differences between traditional and non-traditional women's participation in Liberia were found.

This study includes …


Fourth Time's The Charm?: Modeling A Psychologically-Based Peace Iv Program In Northern Ireland, Cailin A. Rogers Jun 2013

Fourth Time's The Charm?: Modeling A Psychologically-Based Peace Iv Program In Northern Ireland, Cailin A. Rogers

The Macalester Review

Abstract: Social conflict has consumed Northern Ireland for centuries. The relationship between Catholic Nationalists and Protestant Loyalists has proved difficult to reconcile–current policy approaches have been unable to attain peace. This paper seeks to explore the gaps in policy created by ignoring the important distinction between the social identities Nationalists and Loyalists have created and which they continue to perpetuate. This paper examines Social identity theory in context of Northern Ireland and applies the psychology of disparate community identities to current policies and trends in Northern Ireland to suggest reasons for a lack of progress towards peace. Unfortunately, contemporary Northern …


Making War And Securing Peace: The Viability Of Peace Enforcement As A Mechanism For Promoting And Securing Civil War Termination, Shawn H. Greene May 2013

Making War And Securing Peace: The Viability Of Peace Enforcement As A Mechanism For Promoting And Securing Civil War Termination, Shawn H. Greene

Political Science Honors Projects

Peace enforcement—the threat or use of military force to compel belligerent adherence to a civil war settlement—has become increasingly salient in the past decade. Using a hazards analysis of all civil wars and associated third party interventions between 1945 and 2013 in addition to three structured, focused case studies, I argue that peace enforcement operations that 1) utilize the appropriate typological spoiler management strategy and 2) maintain legitimacy and impartiality through close cooperation with UN peacekeepers, are the most successful at catalyzing civil war termination and securing durable peace. I also provide a theoretical framework through which to study peace …


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …