Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Cyber Operations (3)
- Cyber defense (3)
- Nukes (3)
- Austerity (2)
- Cyber (2)
-
- Cyber operations (2)
- Deterrence (2)
- Nuclear (2)
- Security Studies (2)
- Sequestration (2)
- 2nd term (1)
- Antenna (1)
- Antennae (1)
- Análisis Político (1)
- Armed forces (1)
- Budget (1)
- Canadian Elections (1)
- Care coordination (1)
- Case management (1)
- Case managers (1)
- Cell towers (1)
- Cellular communications (1)
- College basketball (1)
- Counter cyber (1)
- Critical Theory (1)
- Cyber Deterrence (1)
- Cyber Operations in Space (1)
- Cyber defense workforce (1)
- Cyber deterrence (1)
- Cyber space (1)
- Publication
- Publication Type
Articles 1 - 11 of 11
Full-Text Articles in Other Political Science
Manufacturing Legitimacy: A Critical Theory Of Election News Coverage, Gabriel N. Elias
Manufacturing Legitimacy: A Critical Theory Of Election News Coverage, Gabriel N. Elias
Electronic Thesis and Dissertation Repository
To what degree does instrumental reason influence election news coverage? Using Habermas's understanding of system/life-world as a heuristic, I map the rationalization process of political communication. This illuminates the institutional logics at play in the field of politics and the field of journalism, and the way the social dynamics between them enable the framing of political life as a strategic game. This understanding is then contextualized within an analysis of the media frames that informed the Canadian federal election of 2011. I find that news coverage does tend to focus on political strategy; but this is not wholly at the …
La Larga Marcha De Los Presidenciables, Augusto Reina, Maximo Reina
La Larga Marcha De Los Presidenciables, Augusto Reina, Maximo Reina
Augusto Reina
Tras el match electoral que supuso un revés para el gobierno nacional, ya circula la tentación de definir los candidatos presidenciales. Pero claro, todos las fuerzas que aspiren al poder en el 2015 tienen el desafío de ser sustentables por 18 meses. Esto es toda una panacea para la política argentina.
¿Cuántos de ellos tienen las capacidades para hacerlo? En este articulo, nos centramos en la larga marcha que deberán hacer los presidenciables. Haciendo un balance de su posición actual, sus ventajas comparativas y los desafíos a futuro.
Who We Are: Incarcerated Students And The New Prison Literature, 1995-2010, Reilly Hannah N. Lorastein
Who We Are: Incarcerated Students And The New Prison Literature, 1995-2010, Reilly Hannah N. Lorastein
Honors Projects
This project focuses on American prison writings from the late 1990s to the 2000s. Much has been written about American prison intellectuals such as Malcolm X, George Jackson, Eldridge Cleaver, and Angela Davis, who wrote as active participants in black and brown freedom movements in the United States. However the new prison literature that has emerged over the past two decades through higher education programs within prisons has received little to no attention. This study provides a more nuanced view of the steadily growing silent population in the United States through close readings of Openline, an inter-disciplinary journal featuring …
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg
Jan Kallberg
In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a …
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg
Jan Kallberg
In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future …
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther
Jan Kallberg
From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given to defense issues. …
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced Research Projects …
Evaluation Of The Marketing Strategies Of The Case Management Society Of America, Veronica Chepak
Evaluation Of The Marketing Strategies Of The Case Management Society Of America, Veronica Chepak
Master in Public Administration Theses
No abstract provided.
A Youth Revolt: Discerning The Impact Of “One-And-Done” Rule On Major Collegiate Championship Teams At The Division I Level, Erik Harris
Master in Public Administration Theses
No abstract provided.
Wireless Cell Towers And Antennae: Municipal And Private Relationship, James M. Collins
Wireless Cell Towers And Antennae: Municipal And Private Relationship, James M. Collins
Master in Public Administration Theses
No abstract provided.