Open Access. Powered by Scholars. Published by Universities.®

Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics

Selected Works

Institution
Keyword
Publication Year
Publication
File Type

Articles 1 - 30 of 87

Full-Text Articles in Political Science

International Data Sources & Data Literacy, Lisa Deluca Jul 2018

International Data Sources & Data Literacy, Lisa Deluca

Lisa DeLuca, MLIS, MPA

No abstract provided.


Producing Edible Landscapes In Seattle's Urban Forest, Rebecca J. Mclain, Melissa R. Poe, Patrick T. Hurley, Joyce Lecompte, Marla R. Emery May 2018

Producing Edible Landscapes In Seattle's Urban Forest, Rebecca J. Mclain, Melissa R. Poe, Patrick T. Hurley, Joyce Lecompte, Marla R. Emery

Rebecca McLain

Over the next decades, green infrastructure initiatives such as tree planting campaigns, and ecological restoration will dramatically change the species composition, species distribution and structure of urban forests across the United States. These impending changes are accompanied by a demand for urban public spaces where people can engage in practices such as gleaning, gardening, and livestock production. This article analyzes the institutional framework that undergirds efforts in Seattle, Washington to normalize the production and use of edible landscapes. We focus attention on the role of grassroots fruit gleaning groups and highlight their bridging function between Seattle's agriculture and forestry ...


Gathering "Wild" Food In The City: Rethinking The Role Of Foraging In Urban Ecosystem Planning And Management, Rebecca J. Mclain, Patrick T. Hurley, Marla R. Emery, Melissa R. Poe May 2018

Gathering "Wild" Food In The City: Rethinking The Role Of Foraging In Urban Ecosystem Planning And Management, Rebecca J. Mclain, Patrick T. Hurley, Marla R. Emery, Melissa R. Poe

Rebecca McLain

Recent “green” planning initiatives envision food production, including urban agriculture and livestock production, as desirable elements of sustainable cities. We use an integrated urban political ecology and human–plant geographies framework to explore how foraging for “wild” foods in cities, a subversive practice that challenges prevailing views about the roles of humans in urban green spaces, has potential to also support sustainability goals. Drawing on research from Baltimore, New York City, Philadelphia, and Seattle, we show that foraging is a vibrant and ongoing practice among diverse urban residents in the USA. At the same time, as reflected in regulations, planning ...


Urban Foraging And The Relational Ecologies Of Belonging, Melissa R. Poe, Joyce Lecompte, Rebecca J. Mclain, Patrick T. Hurley May 2018

Urban Foraging And The Relational Ecologies Of Belonging, Melissa R. Poe, Joyce Lecompte, Rebecca J. Mclain, Patrick T. Hurley

Rebecca McLain

Through a discussion of urban foraging in Seattle, Washington, USA, we examine how people's plant and mushroom harvesting practices in cities are linked to relationships with species, spaces, and ecologies. Bringing a relational approach to political ecology, we discuss the ways that these particular nature–society relationships are formed, legitimated, and mobilized in discursive and material ways in urban ecosystems. Engaging closely with and as foragers, we develop an ethnographically grounded ‘relational ecologies of belonging’ framework to conceptualize and examine three constituent themes: cultural belonging and identity, belonging and place, and belonging and more-than-human agency. Through this case study ...


Importing Democracy: Promoting Participatory Decision Making In Russian Forest Communities, Maria Tysiachniouk, Errol E. Meidinger Nov 2017

Importing Democracy: Promoting Participatory Decision Making In Russian Forest Communities, Maria Tysiachniouk, Errol E. Meidinger

Errol Meidinger

Published in Environmental Democracy Facing Uncertainty, Cécilia Claeys & Marie Jacqué, eds.

This paper describes how the World Wildlife Fund for Nature (WWF) jump-started democratic institutions in Russian rural communities to create a basis for social, environmental, and economic modernization within the Russian forestry sector. In Russia’s post-soviet markets and institutions, a host of multinational companies and large transnational environmental organizations sought to promote the restructuring of Russia’s legal and economic infrastructure and active subsidiaries in Russia. In order for modern forestry approaches to be imported, management practices that had developed in the West needed to be adapted to ...


Navigating United Nations Data Sources (Pre-Print).Pdf, Lisa Deluca Dec 2016

Navigating United Nations Data Sources (Pre-Print).Pdf, Lisa Deluca

Lisa DeLuca, MLIS, MPA

The number of data resources available from the United Nations is vast. It is easy to be consumed by information published by the UN and its agencies, the World Bank, and the Organization of Economic Cooperation & Development (OECD). Academic librarians can assist diplomacy and international relations students to be focused in their search for relevant open access data with an emphasis on proper citation of
publicly available data. The purpose of this article is to highlight current UN data sources that can be used by academic librarians to enhance international relations, public policy, and political science research.


Muslims Lunar’S Blindness, Sajjad Khaksari Aug 2015

Muslims Lunar’S Blindness, Sajjad Khaksari

SAJJAD KHAKSARI

The age of scientists such as Muhammad ibn Musa al-Khwarizmi (خوارزمی), Al-Farabi (فارابی), Avicenna (پور سینا), Ghiyāth al-Dīn Jamshīd Masʿūd al-Kāshī (غیاث الدین جمشید کاشانی) And Bērūnī (بیرونی) has passed and middle east regions face hideous and offensive figures of Iranian/Saudi/ISIS etc. regimes. What happened to these people and why?!


公的統計における欠測値補定の研究:多重代入法と単一代入法(高橋将宜), Masayoshi Takahashi Jun 2015

公的統計における欠測値補定の研究:多重代入法と単一代入法(高橋将宜), Masayoshi Takahashi

Masayoshi Takahashi

No abstract provided.


Attitudes And Perspectives Of Front-Line Workers In Environmental Policy: A Case Study Of Ohio Epa And Wisconsin Dnr, Sara Rinfret, Michelle Pautz Apr 2015

Attitudes And Perspectives Of Front-Line Workers In Environmental Policy: A Case Study Of Ohio Epa And Wisconsin Dnr, Sara Rinfret, Michelle Pautz

Michelle Pautz

This research is an effort to focus on frontline regulators with the Ohio Environmental Protection Agency and Wisconsin Department of Natural Resources. An online survey was conducted of frontline regulators in these agencies to explore their knowledge, attitudes, and perspectives on policy implementation. More specifically, we endeavor to answer how frontline workers implement environmental policy. To analyze these data, we use two categorizations of factors (knowledge and attitudes, and contextual factors) offered by May and Winter (2009) to examine what influences the decision making of frontline regulators in their regulatory interactions. We find that despite common presumptions of adversarialism in ...


Reconsidering Accountability For Environmental Inspectors: Trading 'Compliance By Computer' For Relationship Building, Michelle C. Pautz Apr 2015

Reconsidering Accountability For Environmental Inspectors: Trading 'Compliance By Computer' For Relationship Building, Michelle C. Pautz

Michelle Pautz

Demands for government accountability extend into all the aspects of government service and the environmental realm is no different. Environmental inspectors — the front-line workers in environmental protection agencies — are among the many civil servants who face demands for accountability. Unfortunately, although accountability is desirable normatively speaking, in practice it is not so simple. Accountability for environmental inspectors frequently involves measures such as the number of inspections completed, the efficiency of data entry in agency databases, and the turnaround time on inspection reports. Such measures leave environmental inspectors, who ideally want — and practically need — to be in the field, stuck in ...


Nuclear War: Hiroshima, Nagasaki, And A Workable Moral Strategy For Achieving And Preserving World Peace, Raymond Wilson Jul 2014

Nuclear War: Hiroshima, Nagasaki, And A Workable Moral Strategy For Achieving And Preserving World Peace, Raymond Wilson

Raymond Wilson

An examination of the horrors of nuclear war, and what happens to the victims in the aftermath. It also explores ways in which we can work to create a peaceful society.


Failed Cyberdefense - The Environmental Consequences Of Hostile Acts, Jan Kallberg, Rosemary A. Burk May 2014

Failed Cyberdefense - The Environmental Consequences Of Hostile Acts, Jan Kallberg, Rosemary A. Burk

Jan Kallberg

A failed cyberdefense can have wider effects than discussed in earlier debates of potential consequences of a cyberattack. The need for cyberdefense to protect the environment has not drawn the attention it deserves as a national security matter. Adversarial nations are covertly pursuing methods to damage and disrupt the United States in a cyberconflict in the future. The president of the United States noted this in Sustaining U.S. Global Leadership: Priorities for 21st Century Defense: Both state and non-state actors possess the capability and intent to conduct cyberespionage and, potentially, cyberattacks on the United States, with possible severe effects ...


Cyber Beyond Computers - The Environmental Aspect, Jan Kallberg Feb 2014

Cyber Beyond Computers - The Environmental Aspect, Jan Kallberg

Jan Kallberg

A forgotten aspect on cyber and cyber conflicts impact on our society is the fact that tampering with our control systems can lead to industrial processes running amok - and lead to environmental damages. Threats to our environment is taken very serious by the population and pollution and contamination of our living space trigger drastic reactions.


Climate Risk Polycentricity And The Iad Framework, Troy D. Abel, Mark Stephan, Dorothy Daley Jan 2014

Climate Risk Polycentricity And The Iad Framework, Troy D. Abel, Mark Stephan, Dorothy Daley

Troy D. Abel

Climate change is commonly cast as a significant governance challenge demanding national and international actions. Subsequently, political science research tends to focus on the policy and politics of nation-states, their domestic institutions, and/or their interplay in international venues. However, thousands of industrial facilities and hundreds of subnational US governments are active in American climate risk governance. Therefore, we argue that more research should attend to climate governance’s subnational policy and politics, their promise, and their performance. In the vacuum of national policies to mitigate and adapt to climate-change, subnational arrangements offer an ideal opportunity to study not only ...


Paradoxes Of Democratisation: Environmental Politics In East Asia, Mary Alice Haddad Dec 2013

Paradoxes Of Democratisation: Environmental Politics In East Asia, Mary Alice Haddad

Mary Alice Haddad

This chapter examines environmental politics in four polities that run the full spectrum of political regimes: mainland China (authoritarian), South Korea and Taiwan (newly democratic), and Japan (mature democracy). The chapter argues that variation in environmental politics in each place resulted primarily from the timing of their environmental movements, with subsequent movements learning from predecessors and gaining increasing access to global NGO networks. Paradoxically, when environmental movements became linked to democratization movements (in South Korea and Taiwan), they also became linked to political parties, which hindered access to government policymaking when non-allied parties were in power.


Birds Of A Feather Deceive Together: The Chicanery Of Multiplied Metadata, David M. Cook Dec 2013

Birds Of A Feather Deceive Together: The Chicanery Of Multiplied Metadata, David M. Cook

Dr. David M Cook

New Media conventions have fluttered along unforeseen flight paths. By combining sock-puppetry with the grouping power of metadata it is possible to demonstrate widespread influence through Twitter dispersion. In one nest there is a growing use of sock-puppetry accentuated by the exploitation of a social media that does not attempt to verify proof of identity. Created identities in their thousands can flock towards, and in support of, a single identity. They do so alongside legitimate accounts but in concert remain imperceptible within an overall group. In another nest there is the practise of homophily, captured through metadata, and used to ...


The Politics Media Equation:Exposing Two Faces Of Old Nexus Through Study Of General Elections,Wikileaks And Radia Tapes, Ratnesh Dwivedi Mr Oct 2013

The Politics Media Equation:Exposing Two Faces Of Old Nexus Through Study Of General Elections,Wikileaks And Radia Tapes, Ratnesh Dwivedi Mr

Ratnesh Dwivedi

The important identity of a responsible media is playing an unbiased role in reporting a matter without giving unnecessary hype to attract the attention of the gullible public with the object of making money and money only.After reporting properly the media can educate the public to form their own opinion in the matters of public interest. Throughout the centuries, the world has never existed without information and communication, hence the inexhaustible essence of mass media. The government has the power to either make or reject whatever that will exist within its environment. It also determines how free the mass ...


Sojuznik Snowden: A Solid Russian Investment, Jan Kallberg Oct 2013

Sojuznik Snowden: A Solid Russian Investment, Jan Kallberg

Jan Kallberg

The Edward Snowden case catapulted us back to the heights of the Cold War for one single reason: His story is too manicured and well-placed to be true. As the old saying goes: If it sounds too good to be true, it probably isn’t. With the Snowden affair, many of the Russian political objectives are reached. It has has created a wedge that split the United States and Europe. Even if Vladimir Putin wears a fancy Italian suit, he is still a KGB-man, slightly better looking than the official grey suits in the heyday of the Soviet Eastern Bloc ...


Private Cyber Retaliation Undermines Federal Authority, Jan Kallberg Jul 2013

Private Cyber Retaliation Undermines Federal Authority, Jan Kallberg

Jan Kallberg

The demarcation in cyber between the government and the private spheres is important to uphold because it influences how we see the state and the framework in which states interact. One reason we have a nation state is, in a uniform and structured way, under the guidance of a representative democracy, to deal with foreign hostility and malicious activity.

The state is given a monopoly on violence by its citizenry. The state then acts under the existing laws on behalf of the citizens to ensure the intentions of the population it represents. These powers grant the federal government an authority ...


Center For Governance And Sustainability: Policy Impact Through Rigorous Analysis, Maria Ivanova, Craig Murphy, Michael Denney Jul 2013

Center For Governance And Sustainability: Policy Impact Through Rigorous Analysis, Maria Ivanova, Craig Murphy, Michael Denney

Maria Ivanova

Three main functions define the center: Serves as an information hub Provides rigorous analysis Acts as an honest broker We collect and manage data on governance and sustainability across scales, apply diverse analytical models grounded in empirics, and create dialogues among scholars, practitioners, and the public.


Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello Jun 2013

Cyber Attack: A Dull Tool To Sharpen Foreign Policy, Emilio Iasiello

Emilio Iasiello

This paper examines how cyber attacks, if indeed conducted by nation states, have been unsuccessful in supporting states' foreign policy objectives. By analyzing three prominent case studies, I show that as a result of geopolitical tensions, cyber attacks were implemented to further nation state objectives in support of foreign policy considerations and failed to achieve their respective outcomes despite successful deployment against their intended targets. The three case studies, hypothetical scenarios because attribution has not been confirmed, include: (1) the October 2012 distributed denial of service attacks targeting the U.S. banking sector; (2) the 2012 Stuxnet attack against Iran ...


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a ...


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a credible nuclear ...


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future ...


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given ...


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced ...


Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg Dec 2012

Diseñando Colisiones De Satélites En La Guerra Cibernética Encubierta, Jan Kallberg

Jan Kallberg

La guerra concentrada en la red depende de la red de información global para capacidades de combate conjuntas.3 La capa fundamental crea la capacidad de combate global como la columna vertebral espacial de la red de información donde los haberes espaciales son el elemento decisivo. EE.UU. depende de las capacidades espaciales para su éxito y la seguridad nacional de EE.UU. se basa hoy en día en un número limitado de satélites muy utilizados. Estos satélites son cruciales para la disuasión estratégica, la vigilancia, la recopilación de inteligencia y las comunicaciones militares. Si la disuasión estratégica falla, los ...


The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther Nov 2012

The Return Of Dr. Strangelove: How Austerity Makes Us Stop Worrying And Love The Bomb…And Cyber War, Jan Kallberg, Adam Lowther

Jan Kallberg

With sequestration looming—generating significant cuts to defense spending—the United States may find itself increasingly relying on nuclear and cyber deterrence as an affordable way to guarantee national sovereignty and prevent major conflict. While earlier defense planning and acquisitions were based on economic conditions that no longer exist, Congress’ options to balance the budget by cutting defense spending are politically palatable because far fewer American are “defense voters” than “social welfare voters,” according to a number of recent public opinion surveys.


Mindscapes And Landscapes: Hayek And Simon On Cognitive Extension, Leslie Marsh Oct 2012

Mindscapes And Landscapes: Hayek And Simon On Cognitive Extension, Leslie Marsh

Leslie Marsh

Hayek’s and Simon’s social externalism runs on a shared presupposition: mind is constrained in its computational capacity to detect, harvest, and assimilate “data” generated by the infinitely fine-grained and perpetually dynamic characteristic of experience in complex social environments. For Hayek, mind and sociality are co-evolved spontaneous orders, allowing little or no prospect of comprehensive explanation, trapped in a hermeneutically sealed, i.e. inescapably context bound, eco-system. For Simon, it is the simplicity of mind that is the bottleneck, overwhelmed by the ambient complexity of the environmental. Since on Simon’s account complexity is unidirectional, Simon is far more ...


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given ...