Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 10 of 10

Full-Text Articles in Social and Behavioral Sciences

Bold Leader Or Bully? Interpreting Chinese Regional Maritime Behavior, Harrison I. Fried Nov 2013

Bold Leader Or Bully? Interpreting Chinese Regional Maritime Behavior, Harrison I. Fried

Electronic Theses and Dissertations

Since 2009, tensions have increased markedly between China and its maritime neighbors over disputed territories in the East and South China Seas. China’s neighbors accuse it of acting like a bully, alleging that China engages in behavior that is aggressive, inappropriate, and oppressive. But can such accusations be substantiated through objective analysis, or is bullying truly in the eye of the beholder? Further, is China simply acting boldly, albeit in a manner that is justifiable, as it emerges as a leader in the region? The purpose of this thesis was to determine whether labeling China’s behavior as “bullying” (as China’s …


Alliances And Preferences: Party System Institutionalization's Potentially Intervening Role On Pre-Election Cooperation In Australia, Fiji, And Papua New Guinea, Lee T. Barrow Nov 2013

Alliances And Preferences: Party System Institutionalization's Potentially Intervening Role On Pre-Election Cooperation In Australia, Fiji, And Papua New Guinea, Lee T. Barrow

Electronic Theses and Dissertations

This research project examines the intervening role of party system institutionalization in determining the effect of electoral rules on the behavior of political parties. Highly institutionalized systems differ across multiple dimensions--supply stability, volatility of results, and rootedness of parties--from fluid systems. Party behavior can be depicted rationally as a response to both institutional incentives and the historical and sociological context of a nation's party system. Electoral incentives promoting certain types of party behavior can be negated by party system mechanics that deter those behaviors. The research uses a medium-N structured, focused comparison of elections from Australia, Fiji, and Papua New …


Robustness: A New Us Cyber Deterrence Strategy, Eric M. Decampos Aug 2013

Robustness: A New Us Cyber Deterrence Strategy, Eric M. Decampos

Electronic Theses and Dissertations

The growing trend of computer network attacks provokes the necessity for a comprehensive cyber deterrence strategy to deter aggressors from attacking U.S. critical infrastructure. The current U.S. cyber deterrence strategy based on punishment is ineffective in deterring aggressors as evidenced by the increasing number of computer network attacks against U.S. critical infrastructure. Therefore, the U.S. should look towards an alternative strategy based on robustness to deny enemy objectives and absorb attacks. To identify the superior cyber deterrence strategy, this study uses a qualitative assessment based on open-sourced information to evaluate the effectiveness of each strategy. The findings of this study …


The Contrasting Paths Of Jordan And The United Arab Emirates In Nuclear Cooperation With The United States, Erica N. Fein Aug 2013

The Contrasting Paths Of Jordan And The United Arab Emirates In Nuclear Cooperation With The United States, Erica N. Fein

Electronic Theses and Dissertations

As one of about eight countries that supply nuclear materials and equipment for nuclear energy development to the rest of the world, the United States also requires some of the most stringent nonproliferation measures of its prospective clients. In 2009, the United States signed a nuclear cooperation agreement with the United Arab Emirates (UAE). Under the terms of the agreement, the UAE foreswore developing sensitive fuel cycle technologies on its own soil in exchange for the ability to receive U.S.-origin materials and equipment. The Kingdom of Jordan is also seeking to develop a nuclear energy program in the face of …


Recognizing 'Game Changers' In Extrapolation Models: An Application To Counterinsurgency, Micah Dolcort-Silver Jun 2013

Recognizing 'Game Changers' In Extrapolation Models: An Application To Counterinsurgency, Micah Dolcort-Silver

Electronic Theses and Dissertations

Recent empirical studies suggest insurgencies may be accurately described by aggregated extrapolation models, such that past behavior becomes the best predictor for future action. I argue that aggregated extrapolation models possess two flaws that make it a poor choice for examining insurgencies. First, aggregated extrapolation models ask the wrong question. The more interesting question is to ask when present action is no longer explainable by past behavior. Secondly, aggregate models mask changes that a phenomenon undergoes over time which are only revealed upon disaggregating the data. Starting with a model and findings provided by Neil Johnson, I use casualty data …


Regime Evolution And The Non-Proliferation Regime: The Proliferation Security Initiative As A Case Study Of Transgovernmental Networking, Pallavi Gulati Jun 2013

Regime Evolution And The Non-Proliferation Regime: The Proliferation Security Initiative As A Case Study Of Transgovernmental Networking, Pallavi Gulati

Electronic Theses and Dissertations

The practice of non-proliferation has evolved significantly since its origins during the Cold War. The most recent and notable contribution to the non-proliferation regime has come in the form of the Proliferation Security Initiative (PSI), a loose consortium of 102 nation-states through which countries can coordinate, share intelligence, and build capacity to interdict weapons of mass destruction (WMD) related transfers. My objective in this paper is to move beyond the “activity not an organisation” rhetoric espoused by proponents of the PSI and to ask a set of deeper and broader questions regarding why transgovernmental networks (TGNs) like the PSI arise …


Invisible Victims: An Analysis Of Human Trafficking Vulnerability And Prevention In Bulgarian Romani Communities, Eric Helms Jun 2013

Invisible Victims: An Analysis Of Human Trafficking Vulnerability And Prevention In Bulgarian Romani Communities, Eric Helms

Electronic Theses and Dissertations

Human trafficking is an international problem that plagues every country in the world. Although no reliable concrete data exist on the extent of human trafficking internationally, it is estimated that thousands of women are trafficked into the European Union every year. According to research conducted by the European Roma Rights Centre in 2010, a disproportionately high percentage of these victims are of Roma ethnicity. Research from service providers, law enforcement and international organizations estimates that Roma comprise between 50 to 80 percent of human trafficking victims in Bulgaria with similar levels across Central and Eastern Europe. High levels of ethnic …


Africom's Impact On International And Human Security: A Case Study Of Tanzania, Mikenna Maroney Jan 2013

Africom's Impact On International And Human Security: A Case Study Of Tanzania, Mikenna Maroney

Electronic Theses and Dissertations

The expansion of U.S. military engagement in Africa is based on American national security interests. The objective of this research was to add to existing evaluations of the U.S. Combatant Command for Africa (AFRICOM) by taking an in-depth look at its impact through a case study of Tanzania and sought to answer three questions: What is the impact of AFRICOM on executing U.S. national security policy in Tanzania? To what extent has AFRICOM addressed the conditions of human insecurity in Tanzania? What is the public perception about AFRICOM among the Tanzanian public? To answer these questions this assessment utilized secondary …


Chinese Intellectuals And China's Policy Toward Japan, Wenting Yang Jan 2013

Chinese Intellectuals And China's Policy Toward Japan, Wenting Yang

Electronic Theses and Dissertations

This dissertation aims at integrating two scholarships: state-society relation studies and Chinese foreign policy analysis. I created Two-level Perception Gap Model to analyze different intellectual groups' relations with party-state by confirming Chinese intellectuals play a role in CFP making in general, China's Japan policy in particular. This model is an alternative approach, instead of conventional wisdom patron-client approach, to explain and analyze the pluralized intellectual-state relations in China. This model first analyzed the role of two intellectual groups, namely think tank scholars and popular nationalist, in China's Japan policy making, and then based on these analyses it explains the interactional …


U.S.-Taiwan Relations: A Study On The Taiwan Relations Act, Jacqueline Anne Vitello Jan 2013

U.S.-Taiwan Relations: A Study On The Taiwan Relations Act, Jacqueline Anne Vitello

Electronic Theses and Dissertations

The relationship between the United States and Taiwan is of great importance to both parties. Taiwan offers certain strategic opportunities for the promotion of American national security interests, and the U.S. accordingly provides Taiwan with support of both a defensive and diplomatic nature. The official U.S. policies regarding relations with Taiwan are enumerated in the Taiwan Relations Act (United States Code Title 22 Chapter 48 Sections 3301 - 3316). The act, approved by the U.S. Congress in 1967, stipulates the terms of the bilateral relationship with regard to national defense and diplomatic relations among other factors. This paper seeks to …