Open Access. Powered by Scholars. Published by Universities.®

Business Commons

Open Access. Powered by Scholars. Published by Universities.®

Public Policy

2012

Institution
Keyword
Publication
Publication Type
File Type

Articles 1 - 30 of 61

Full-Text Articles in Business

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los satélites forman parte …


Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael Dec 2012

Privacy Issues And Solutions In Social Network Sites, Xi Chen, Katina Michael

Associate Professor Katina Michael

The boom of the internet and the explosion of new technologies have brought with them new challenges and thus new connotations of privacy. Clearly, when people deal with e-government and e-business, they do not only need the right to be let alone, but also to be let in secret. Not only do they need freedom of movement, but also to be assured of the secrecy of their information. Solove [6] has critiqued traditional definitions of privacy and argued that they do not address privacy issues created by new online technologies. Austin [7] also asserts: “[w]e do need to sharpen and …


Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael Dec 2012

Privacy- The Times They Are A-Changin', M.G. Michael, Katina Michael

Professor Katina Michael

This special section is dedicated to privacy in the information age. Since the rise of mobile social media in particular and the advent of cloud computing few can dispute that the times have changed. Privacy is now understood in context, and within a framework that is completely different to what it once was. The right to be let alone physically seemingly has been replaced by the right to give away as much information as you want virtually. What safeguards can be introduced into such a society? We cannot claim to wish for privacy as a right if we ourselves do …


Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom Dec 2012

Interative Discussion Leader (Idt) @ Futuregov Forum Queensland On The Theme Of "Mobile Government", Katina Michael, Erica Fensom

Professor Katina Michael

Mobile Government Briefing: Provide services anywhere any time: - Transact to enable in-field data collection, request processing, order management, approvals, edits, updates and execute actions. - What are the implications for the incorporation of rich multimedia content on devices to better serve staff and citizens? - Addressing the security challenges of various risks around data access, data transmission, and data storage for BI architecture and mobile devices


Identifying Local Entrepreneurship Development System Policy In Rural Areas And How Local Context Shapes Entrepreneurship Policy Formation, Stacey Wright Mccullough Dec 2012

Identifying Local Entrepreneurship Development System Policy In Rural Areas And How Local Context Shapes Entrepreneurship Policy Formation, Stacey Wright Mccullough

Graduate Theses and Dissertations

As rural communities struggle to maintain a sustainable economic base in today's global economy, many are exploring strategies to encourage entrepreneurial development. The purpose of this study was to better understand how local public policy is being be used to support the creation of entrepreneurship development systems in rural communities and how local context shapes entrepreneurship public policy formation. In phase one of the study, a survey and analysis of documents available on the Internet were used to identify county and municipal policy actions associated with entrepreneurial development in 16 counties in North Carolina. In the second study phase, two …


The Striking Success Of The National Labor Relations Act, Michael L. Wachter Dec 2012

The Striking Success Of The National Labor Relations Act, Michael L. Wachter

All Faculty Scholarship

Although often viewed as a dismal failure, the National Labor Relations Act (NLRA) has been remarkably successful. While the decline in private sector unionization since the 1950s is typically viewed as a symbol of this failure, the NLRA has achieved its most important goal: industrial peace.

Before the NLRA and the 1947 Taft-Hartley Amendments, our industrial relations system gave rise to frequent and violent strikes that threatened the nation’s stability. For example, in the late 1870s, the Great Railroad Strike spread throughout a number of major cities. In Pittsburg alone, strikes claimed 24 lives, nearly 80 buildings, and over 2,000 …


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Ieee T&S Magazine: Undergoing Transformation, Katina Michael Nov 2012

Ieee T&S Magazine: Undergoing Transformation, Katina Michael

Professor Katina Michael

Our Magazine is in a transformative period, not only because we are ‘Going Green’ in 2013 but because we are experiencing tremendous growth in quality international submissions. This means that we are increasingly appealing to an international audience with transdisciplinary interests. This has not gone unnoticed by the media, nor by our SSIT readership or wider engineering community.


Glogging Your Every Move, Lisa Wachsmuth, Katina Michael Nov 2012

Glogging Your Every Move, Lisa Wachsmuth, Katina Michael

Professor Katina Michael

"It is one thing to lug technologies around, another thing to wear them, and even more intrusive to bear them... But that's the direction in which we're headed."

"I think we're entering an era of person-view systems which will show things on ground level and will be increasingly relayed to others via social media.

"We've got people wearing recording devices on their fingers, in their caps or sunglasses - there are huge legal and ethical implications here."


Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael Oct 2012

Indian Millennials: Are Microchip Implants A More Secure Technology For Identification And Access Control?, Christine Perakslis, Katina Michael

Associate Professor Katina Michael

This mixed methods study with a sequential explanatory strategy explored qualitatively the statistically significant quantitative findings relative to Indian respondents’ perceptions about RFID (radio frequency identification) transponders implanted into the human body. In the first analysis phase of the study, there was a significant chi-square analysis reported (χ2 = 56.64, df = 3, p = .000) relative to the perception of small business owners (N = 453) that implanted chips are a more secure form of identification and/or access control in organizations and the respondents’ country of residence. Countries under study included Australia, India, the UK and US. The country …


Annual Review Of Social Partnerships Issue 7, Maria May Seitanidi Oct 2012

Annual Review Of Social Partnerships Issue 7, Maria May Seitanidi

Maria May Seitanidi

This is the 7th Issue of the Annual Review of Social Partnerships previously known as the NPO-BUS Partnerships Bulletin.


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


Managing Expectations: Does The Directors' Duty To Monitor Promise More Than It Can Deliver?, Lisa Fairfax Oct 2012

Managing Expectations: Does The Directors' Duty To Monitor Promise More Than It Can Deliver?, Lisa Fairfax

All Faculty Scholarship

This article grapples with whether we are expecting too much from the duty of oversight. The directors’ oversight duty refers to directors’ responsibility to actively monitor corporate officers, employees, and corporate affairs. Directors breach their oversight duty when officers and employees engage in wrongdoing that causes harm to the corporation and that wrongdoing can be attributed to directors’ failure to monitor. In other words, oversight liability holds directors liable for their failure to act under circumstances where it can be proven that directors should have acted and their actions could have prevented corporate harm.

The significance of directors’ oversight duty …


Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael Aug 2012

Editorial: Social Implications Of Technology- “Il Buono, Il Brutto, Il Cattivo”, Katina Michael

Professor Katina Michael

Late last year, IEEE SSIT was invited to put together a paper for the centennial edition of Proceedings of the IEEE that was published in May 2012. The paper titled, “Social Implications of Technology: The Past, the Present, and the Future,” brought together five members of SSIT with varying backgrounds, and two intense months of collaboration and exchange of ideas. I personally felt privileged to be working with Karl D. Stephan, Emily Anesta, Laura Jacobs and M.G. Michael on this project.


Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael Aug 2012

Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael

Professor Katina Michael

This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.


The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther Aug 2012

The Return Of Dr. Strangelove, Jan Kallberg, Adam Lowther

Jan Kallberg

With the prospect of sequestration looming, the United States may find itself increasingly rely ing on nuclear and cy ber deterrence as an affordable means of guaranteeing national sovereignty and preventing major conflict between the U.S. and potential adversaries in the Asia-Pacific. While earlier defense planning and acquisition were based on economic conditions that no longer ex ist, Congress’s options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense v oters” relative to “social welfare voters,” according to a number of recent public opinion surveys. The simple fact is China’s rise has …


Understanding The Dimensions Of Trust In Public Relations And Their Measurements, Joosuk Park Aug 2012

Understanding The Dimensions Of Trust In Public Relations And Their Measurements, Joosuk Park

Doctoral Dissertations

Trust judgment of an organization’s publics validates the existence of an organization as well as being one of the most powerful moderators of public relations effectiveness. The ideas of trust as one of the key dimensions to explain relational status between an organization and its key publics has been around more than a decade. Over the last two decades, the idea of trust in fact has been showing rising prominence across many diversified studies of relationship and relationship management. In relationship management, one of the important goals of public relations is to build mutually beneficial relationships among organizations and their …


The Effect Of Casino Tax Policy On Short-Run Gaming Development, Kahlil Philander Aug 2012

The Effect Of Casino Tax Policy On Short-Run Gaming Development, Kahlil Philander

UNLV Theses, Dissertations, Professional Papers, and Capstones

This study examines the effect of casino tax rate structure on investment by casino operators. Using a panel data set consisting of all states with legal commercial casino gambling from 1998 to 2009, a fixed-effect model with two-stage least squares is estimated to examine the effect of gambling taxes on firms' short-run behavior. The study finds that maximum casino tax rates decrease casino employment, with an estimated average elasticity of -0.5. This result is noted to be robust to several different model specifications and data subsets. No robust relationship is found between maximum tax rates and casino wages. No significant …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


The Leadership Of Sustainable Cities: A Multiple-Case Study Of Two Oregon Cities, Kenneth L. Weaver Jul 2012

The Leadership Of Sustainable Cities: A Multiple-Case Study Of Two Oregon Cities, Kenneth L. Weaver

Department of Agricultural Leadership, Education and Communication: Dissertations, Theses, and Student Scholarship

In order for cities to become more sustainable it is necessary for the leaders of the efforts to change the organizations and governments so that they understand and embrace what it means to be more sustainable. This study examined the change processes of two Oregon Cities, Corvallis and Eugene, that had made the choice to become more sustainable as a community. The approaches that the participant leaders used demonstrated the use of different ways of thinking about the leadership of change. The ways of thinking of the community leaders were formed by their unique personal backgrounds, knowledge, skills, and abilities. …


The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei Jul 2012

The Value Of Government Mandated Location-Based Services In Emergencies In Australia, Anas Aloudat, Katina Michael, Roba Abbas, Mutaz Al-Debei

Associate Professor Katina Michael

The adoption of mobile technologies for emergency management has the capacity to save lives. In Australia in February 2009, the Victorian Bushfires claimed 173 lives, the worst peace-time disaster in the nation’s history. The Australian government responded swiftly to the tragedy by going to tender for mobile applications that could be used during emergencies, such as mobile alerts and location services. These applications, which are becoming increasingly accurate with the evolution of positioning techniques, have the ability to deliver personalized information direct to the citizen during crises, complementing traditional broadcasting mediums like television and radio. Indeed governments have a responsibility …


Implementing A State Lottery In Nevada, Benjamin K. Boulton Jul 2012

Implementing A State Lottery In Nevada, Benjamin K. Boulton

UNLV Theses, Dissertations, Professional Papers, and Capstones

The purpose of this study is to assess the feasibility of implementing a state lottery in Nevada and to present the benefits of a state lottery for both the Nevada hospitality industry and the Nevada economy. It will compare and contrast the arguments for and the arguments against a lottery by executing a content analysis of existing research literature as well as other relevant publications. It will also examine the history of lotteries, the states that border Nevada and have lotteries and the legislative history of lottery proposals in Nevada.


Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael Jun 2012

Book Review Of Hacking: The Next Generation (Written By Nitesh Dhanjani, Billy Rios & Brett Hardin), Katina Michael

Professor Katina Michael

Hacking: The Next Generation demonstrates just how hackers continue to exploit “back doors”. New ways of working and new ways of communicating have meant that the number of attack vectors continue to rise rapidly. This provides hackers with a greater number of opportunities to penetrate systems using blended approaches while organizations struggle to come up to speed with the latest technology developments and commensurate security capabilities. Dealing with anticipated threats is a lot harder than dealing with known threats.


Making Sense Of Irish Health Care Management: The Street Level Public Organisation (Slpo)., Vivienne Byers Jun 2012

Making Sense Of Irish Health Care Management: The Street Level Public Organisation (Slpo)., Vivienne Byers

Conference papers

Public service reform in modern economies has placed an emphasis on effective planning and management of service delivery to the citizen-client. This paper draws on the concept of the Street Level Public Organization (SLPO) to examine the problem of government’s top down implementation of planning reform in the delivery of public services. It does so, by exploring the implementation of strategic planning in the health sector and drawing upon field work from such implementation in the health services in Ireland and Canada. The SLPO model (McKevitt 1998) is used as an explanatory tool to add to the public sector reform …


Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael Jun 2012

Converging And Coexisting Systems Towards Smart Surveillance, Katina Michael, Mg Michael

Professor Katina Michael

Tracking and monitoring people as they operate within their personal networks benefits service providers and their constituents but involves hidden risks and costs.

Automatic identification technologies, CCTV cameras, pervasive and mobile networks, wearable computing, location-based services and social networks have traditionally served distinct purposes. However, we have observed patterns of integration, convergence and coexistence among all these innovations within the information and communication technology industry.1For example, ‘location-based social networking’ can draw on a smart phone's capacity to identify a user uniquely, locate him within 1–2m and share this information across his social network in real time. The resulting ability to …


Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham Jun 2012

Towards Cyber Operations The New Role Of Academic Cyber Security Research And Education, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Abstract – The shift towards cyber operations represents a shift not only for the defense establishments worldwide but also cyber security research and education. Traditionally cyber security research and education has been founded on information assurance, expressed in underlying subfields such as forensics, network security, and penetration testing. Cyber security research and education is connected to the homeland security agencies and defense through funding, mutual interest in the outcome of the research, and the potential job market for graduates. The future of cyber security is both defensive information assurance measures and active defense driven information operations that jointly and coordinately …


Career-Based Influences On Scientific Recognition In The United States And Europe: Longitudinal Evidence From Curriculum Vitae Data, Jan Youtie, Juan Rogers, Thomas Heinze, Philip Shapira, Li Tang Jun 2012

Career-Based Influences On Scientific Recognition In The United States And Europe: Longitudinal Evidence From Curriculum Vitae Data, Jan Youtie, Juan Rogers, Thomas Heinze, Philip Shapira, Li Tang

Philip Shapira

This paper examines how funding patterns, career pathways and collaboration networks influence scientific recognition. We analyze these institutional factors in the early and middle phases of academic careers through comparison of a group of researchers recognized as creative by their peers with a matched group of researchers. Measurement of scientific recognition is based on survey nominations and research prizes in two growing, laboratory-intensive research domains: nanotechnology and human genetics. Curriculum vitae data is used to compare researchers based in the United States and Europe. In the early career model for the United States, we find that scientific recognition is associated …


Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat May 2012

Location-Based Social Networking And Its Impact On Trust In Relationships, Sarah Jean Fusco, Roba Abbas, Katina Michael, Anas Aloudat

Professor Katina Michael

Location based social networking (LBSN) applications are part of a new suite of social networking tools. LBSN is the convergence between location based services (LBS) and online social networking (OSN). LBSN applications offer users the ability to look up the location of another “friend” remotely using a smart phone, desktop or other device, anytime and anywhere. Users invite their friends to participate in LBSN and there is a process of consent that follows. This paper explores the potential impact of LBSN upon trust in society. It looks at the willingness of individuals to share their location data with family, friends, …


Editorial: The Idio-Technopolis, Katina Michael May 2012

Editorial: The Idio-Technopolis, Katina Michael

Professor Katina Michael

The rapid rise of social media has brought with it an emphasis on the distinct dimensions of the whole person. Social media recognises that the individual has a personal network of extensions- a home life, a work life, a social life, a study life, a hobbyist life, and much more- some of these identities even hidden from full view. Each of these online value networks are now accessible by big business, where opinion leaders and early adopters are easily distinguishable, and where brand commentary between consumers matters manifold more than any form of targeted advertising.


Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii May 2012

Emp And Geomagnetic Storm Protection Of Critical Infrastructure, George H. Baker Iii

George H Baker

EMP and solar storm wide geographic coverage and ubiquitous system effects beg the question of “Where to begin?” with protection efforts. Thus, in addressing these “wide area electromagnetic (EM) effects,” we must be clever in deciding where to invest limited resources. Based on simple risk analysis, the electric power and communication infrastructures emerge as the highest priority for EM protection. Programs focused on these highest risk infrastructures will go a long way in lessoning societal impact. Given the national scope of the effects, such programs must be coordinated at the national level but implemented at local level. Because wide-area EM …