Open Access. Powered by Scholars. Published by Universities.®

Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 5 of 5

Full-Text Articles in Political Science

Assessment Of Drinking Water Quality Management And A Treatment Feasibility Study For Brick By Brick Water Storage Tanks In Rakai Uganda, James V. Murduca Mar 2018

Assessment Of Drinking Water Quality Management And A Treatment Feasibility Study For Brick By Brick Water Storage Tanks In Rakai Uganda, James V. Murduca

Graduate Theses and Dissertations

Reliable access to safe drinking water is one necessity for humans to live without concern for major health risks. The overall goal of this research is to improve the public health, through improved drinking water, for communities in the Rakai District in Uganda, directly, and other communities in the world, indirectly, via dissemination of knowledge. This study specifically assessed the knowledge of drinking water quality in regards to public health, their sanitation measures, and water treatment methods for users of Brick by Brick rainwater harvesting tanks in the Rakai District (N = 28) by using a knowledge, attitudes, and practice survey ...


Classification Of Tweets Into Policy Agenda Topics, Rihui Li Jan 2016

Classification Of Tweets Into Policy Agenda Topics, Rihui Li

Graduate Theses and Dissertations

Twitter is a novel online microblogging service launched in July 2006. This service has been rapidly gaining worldwide popularity. It has more than 500 million users, out of which there are more than 332 million active users in May 2015. Twitter website is one of the ten most visited websites and has been described as “the SMS of the Internet.” It is not only widely used in a person’s daily life, but also in politics, such as running election campaigns, mining or influencing public opinions.

We study the problem of automated classification of tweets posted on official accounts by ...


Agenda Detector: Labeling Tweets With Political Policy Agenda, Sheetal Kaul Jan 2015

Agenda Detector: Labeling Tweets With Political Policy Agenda, Sheetal Kaul

Graduate Theses and Dissertations

In nearly one decade of Twitter’s being it has witnessed an ever growing user base from various realms of the world, one of them being politics. In the political domain, Twitter is used as a vital tool for communication purposes, running effective e-campaigns, and mining and affecting public opinions to name a few. We study the problem of automatically detecting whether a tweet posted by a state’s Senate’s twitter handle in the US has a reference to policy agenda(s). Such a capability can help detect the policy agendas that a state focuses on and also capture ...


On The Determinants Of Internal Armed Conflict, Nicholas James Hasty Jan 2015

On The Determinants Of Internal Armed Conflict, Nicholas James Hasty

Graduate Theses and Dissertations

This study expands upon literature on the cross-national causes of civil war and terrorism by combining the two concepts into an aggregate variable called internal armed conflict. It applies relative deprivation theory to politically excluded ethnic groups and also separates those two entities to examine socioeconomic desperation and ethnic exclusion respectively. From a review of the literature I identify eight variables that were found to be statistically significant predictors of either civil war or terrorism in previous studies and I use them as control variables in my models. I find that countries with excluded ethnic groups are somewhat more likely ...


Security Implications Of Implantable Medical Devices, Shelby David Kobes Jan 2014

Security Implications Of Implantable Medical Devices, Shelby David Kobes

Graduate Theses and Dissertations

The advancement of wireless medical devices in the hospital has created an environment that is unsustainable, unsustainable for security management. I will explain how the development of wireless medical devices has changed the landscape of security in the medical field. How the history of medical devices and organizational issues affected device development. I will look in to the inner workings of pacemakers and pacemaker programmers and how their systems affect security. Who are the stakeholders for protecting the information and function of the medical device and pacemaker? What are the stakeholder's capacities and obstacles, especially if the device is ...