Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 15 of 15

Full-Text Articles in Public Affairs, Public Policy and Public Administration

Terrorism In Africa: An Analysis Of The Efficacy Of U.S. Counterterrorism, Max Yong Apr 2024

Terrorism In Africa: An Analysis Of The Efficacy Of U.S. Counterterrorism, Max Yong

Global Tides

This paper seeks to identify whether United States aid to Africa has impacted violent terrorist activity on the continent. The existing literature has produced a range of critiques. Many have voiced concern about foreign terrorist organizations (FTO) growing and blame ineffective efforts by the U.S. for this reality. Instances of African nations, in the face of persisting security challenges from FTOs, turning to political adversaries of the U.S. for assistance is evidence of this sentiment. Furthermore, terror attacks since the onset of the U.S. Global War on Terror (GWOT) have only remained higher than in the previous era. Others have …


Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen Jan 2014

Much Ado About Cyber-Space: Cyber-Terrorism And The Reformation Of The Cyber-Security, Christian Pedersen

Pepperdine Policy Review

The threats residing in cyber-space are becoming well understood by policymakers and security experts alike. However, cyber-security defenses and strategies cannot solely be directed towards nation states, as non-governmental actors – such as transnational crime groups and terrorist organizations are becoming increasingly reliant upon internet technologies. Attacks on the digital components of the critical infrastructure, have the potential to unleash devastation on the United States. In a time when reliability and ethnicity of the National Security Administration, the Nation’s leading digital intelligence organization, are becoming increasingly questioned; defensive measures need to be improved to prevent future attacks and improve the …


Federal V. State Effectiveness: An Analysis Of The Endangered Species Act And Current Potential Attempts At Reform, Nicholas Primo Jan 2014

Federal V. State Effectiveness: An Analysis Of The Endangered Species Act And Current Potential Attempts At Reform, Nicholas Primo

Pepperdine Policy Review

In November 2013, several Congressional leaders drafted a new bill to reform the Endangered Species Act of 1973 (ESA). While the Endangered Species Management Self-Determination Act (ESMSDA) was the first major attempt at updating the crucial U.S. environmental policy in decades, it also inflamed environmentalist defenders of the original bill. More importantly, it raised several questions as to whether state or federal-oriented approaches to endangered species protection and environmental policy more broadly is ultimately more effective. This article analyzes the original 1973 ESA, followed by an analysis of the ESMSDA currently being considered. It will discuss the various strengths and …


The Role Of Health Care In A Democratic Capitalist Society, Barbi Appelquist Jun 2013

The Role Of Health Care In A Democratic Capitalist Society, Barbi Appelquist

Pepperdine Policy Review

What is the government’s role in health care? On March 23, 2010, President Barack Obama signed into law The Patient Protection and Affordable Care Act, commonly known as “Obamacare.” Did the government’s hand reach too far into the health care economy of our nation? This paper focuses on the Affordable Care Act’s general application to the capitalist tradition as framed by Adam Smith and Milton Friedman, with a limited analysis of the federal mandate to purchase individual health insurance. First, I will provide an overview of our nation’s health care system and the Affordable Care Act. Then, I will analyze …


The Korean Conflict And The United States National Security, Matthew Smith Jun 2013

The Korean Conflict And The United States National Security, Matthew Smith

Pepperdine Policy Review

The United States has a substantial interest in the Korean Conflict concerning its own national security. It is based primarily on the potential outcomes of the policies deriving from North Korea. The United States must maintain its relationship with South Korea in order to address any situation that arises on the Korean peninsula.


Regulation Of Hydraulic Fracturing Of Shale Gas Formations In The United States, Fatemeh Bagheri Jun 2013

Regulation Of Hydraulic Fracturing Of Shale Gas Formations In The United States, Fatemeh Bagheri

Pepperdine Policy Review

The practice of hydraulic fracturing has become increasingly common over the years since it has been looked at to replace energy derived from coal. Though hydraulic fracturing may be one of the better forms of obtaining energy, it comes with its own set of problems ranging from environmental problems to health problems if the appropriate safeguards are not implemented when completing the process. Regulations at the local, state, and federal level are assessed to determine which entity should regulate the practice and many technologies are reviewed in order to offer suggestions which allow the process to be completed without significant …


Preparing For The Inevitable: Us Climate Change Preparation, David Ernenwein Jun 2013

Preparing For The Inevitable: Us Climate Change Preparation, David Ernenwein

Pepperdine Policy Review

There is growing consensus in the scientific community that the global climate is changing. Increasing average global temperatures are expected to increase both the frequency and intensity of extreme weather events, which will affect human civilization. However, these events do not need to become disasters. Analysis of past extreme weather disasters in the United States shows that failures in policy, specifically in terms of disaster preparedness, are the real culprit and not the actual weather event. Given the increasing destructiveness of storms and the projected increase in frequency, it makes formulating a coherent and effective national response a priority.


Oil Sands Extraction: Lessons From Alberta Can, And Should, Inform American Policies, Victoria Lopez Jun 2013

Oil Sands Extraction: Lessons From Alberta Can, And Should, Inform American Policies, Victoria Lopez

Pepperdine Policy Review

Enclosed is a final empirical project on foreign direct investment as impacted by (or impacting) infrastructure development levels in the countries of the former Soviet Union.


No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo Jun 2013

No Music In Timbuktu: A Brief Analysis Of The Conflict In Mali And Al Qaeda’S Rebirth, Nicholas Primo

Pepperdine Policy Review

State Department officials stated at the end of 2011 that after a careful review of year's events concerning the terror group Al Qaeda, the threat of terrorism was now greatly diminished with little chance of retunring. Less than four months later, Al Qaeda affiliate group Al Qaeda in the Islamic Maghreb (AQIM) staged a coup in the West African country of Mali, effectively splitting the country in half. The article will analyze the conflict in Mali as an example of how Islamic fundamentalism and global terrorism of Al Qaeda has not dissipated, despite the best hopes of American foreign policymakers. …


Mobile Health Technology In Developing Countries: The Case Of Tanzania, Shruti Modi Jun 2013

Mobile Health Technology In Developing Countries: The Case Of Tanzania, Shruti Modi

Pepperdine Policy Review

Mobile technology is one of the fastest growing industries. In rural parts of the world, mobile phones are more accessible than sanitation facilities and electricity. Mobile phones can be used to transmit health information, promote health awareness, track the spread of diseases, and ultimately decrease the prevalence of diseases. In particular, this study focuses on how mobile health technology, m-health, can reduce the spread of HIV/AIDS and malaria in Tanzania.


Financial Openness And Growth: 2000-2010, Amy Kennedy Jun 2013

Financial Openness And Growth: 2000-2010, Amy Kennedy

Pepperdine Policy Review

In light of the recent financial crisis and economic downturn, policymakers are looking at other options to raise tax revenue. One such option proposed is a financial transaction tax which would tax various cross-border transactions such as banking or securities transactions. Yet, economic growth is arguably the better option for increasing revenue. One might further argue that a tax will lead to less revenue through reduced growth resulting from investors investing money in other tax free arenas. Therefore, this study looks at the relationship between financial openness and annual real GDP per capita growth to ascertain the effect of financial …


A Global Blasphemy Law: Protecting Believers At The Expense Of Free Speech, Kiley Widelitz Jun 2013

A Global Blasphemy Law: Protecting Believers At The Expense Of Free Speech, Kiley Widelitz

Pepperdine Policy Review

Since 1999, the Organization for Islamic Cooperation has annually introduced a resolution to the United Nations Human Rights Council to create an international blasphemy law. The United Nations is currently debating whether to accept a resolution that criminalizes blasphemy. In order to assess whether the United Nations should enact such a law, this article examines the laws of the United States in comparison to three countries that enforce their blasphemy laws: Indonesia, Pakistan, and Saudi Arabia. This article concludes that the United Nations should follow the way of the United States and forgo any restriction on blasphemy, as blasphemy laws …


The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen Jan 2013

The Rising Digital Missile Gap: The Security Threat Of The United States’ Cyber Inactivity, Christian Pedersen

Pepperdine Policy Review

Over the past two decades, the ubiquitousness of the internet has created new reals in which artistic expression, dialogue, and commerce have flourished. Yet the same technologies which bring about the conveniences of the modern age also carry the greatest threats to international security over the next few decades. Defense strategies and security protocols have failed to evolve at the same rate at which internet technologies have grown. While the eminence and complexity of cyber-attacks continues to be debatable, the fact remains that networks are vulnerable to attack by both foreign governments and non-state actors. Unless definitive and aggressive steps …


“It’S All Political, But Public Policy Is Irrational”, Jaquelyn King Jan 2012

“It’S All Political, But Public Policy Is Irrational”, Jaquelyn King

Pepperdine Policy Review

No abstract provided.


Verifiable And Non-Verifiable Anonymous Mechanisms For Regulating A Polluting Monopolist, James Prieger, Nicholas J. Sanders Aug 2011

Verifiable And Non-Verifiable Anonymous Mechanisms For Regulating A Polluting Monopolist, James Prieger, Nicholas J. Sanders

School of Public Policy Working Papers

Optimal regulation of a polluting natural monopolist must correct for both external damages and market power to achieve a social optimum. Existing non-Bayesian regulatory methods require knowledge of the demand function, while Bayesian schemes require knowledge of the underlying cost distribution. We introduce mechanisms adapted to use less information. Our Price-based Subsidy (PS) mechanisms give the firm a transfer that matches or approximates the incremental surplus generated each period. The regulator need not observe the abatement activity or know the demand, cost, or damage functions of the firm. All of the mechanisms induce the firm to price at marginal social …