Open Access. Powered by Scholars. Published by Universities.®

Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 17 of 17

Full-Text Articles in Political Science

The Role Of Iran Policy The Saudi-American Rift, Christopher Parmly Nov 2015

The Role Of Iran Policy The Saudi-American Rift, Christopher Parmly

FIU Electronic Theses and Dissertations

This thesis explores what effect Saudi and American policy differences towards Iran have had on their bilateral relations. It is based on the recent thaw in Iran-U.S. relations, and the critical reaction of the Saudi government towards this policy. The question has two components – first, how severe the current Saudi-American rift is, and second, to what extent it can be traced to their differences over Iran. The topic will be addressed through process-tracing methods.

The thesis concludes that there is indeed a rift in Saudi-U.S. relations marked by an increasingly assertive and independent Saudi foreign policy, though its ...


In Search Of Peace: Restructuring The Us-Iran Relationship In Light Of The 2015 Joint Comprehensive Plan Of Action, Samuel E. Winkler Oct 2015

In Search Of Peace: Restructuring The Us-Iran Relationship In Light Of The 2015 Joint Comprehensive Plan Of Action, Samuel E. Winkler

Senior Honors Theses

This thesis attempts to ask how the United States should conduct foreign policy towards Iran given the Joint Comprehensive Plan of Action (JCPOA), agreed to on 14 June 2015. The 2015 JCPOA initiated a drastic shift in US foreign policy toward Iran. It is now up to US policy makers to craft a coherent Iran foreign policy moving forward from the agreement. In order to accomplish this, the vitriolic relationship between Iran and the United States, which contains two concurrent narratives, must be examined. The dual narratives are the history of the successive US Presidential administrations’ relations with Iran, and ...


Flight From The Fight? Civil War And Its Effects On Refugees, Paul D. Lowry Oct 2015

Flight From The Fight? Civil War And Its Effects On Refugees, Paul D. Lowry

Student Publications

Civil war dominates conflict in the modern era. An effect of this is a large number of refugees, who flee from war-torn countries in favor of lands where they can live in safety. This paper examines the extent to which the number of these refugees is affected by the number of civil wars a country has had in a year. Previous literature suggests that civil wars increase destruction in a state and threaten people’s lives, which encourages migration out of a warring country. Based on this, this paper hypothesizes that increasing the number of civil wars in a country ...


China's Nine-Dashed Map: Continuing Maritime Source Of Geopolitical Tension, Bert Chapman Sep 2015

China's Nine-Dashed Map: Continuing Maritime Source Of Geopolitical Tension, Bert Chapman

Libraries Faculty and Staff Scholarship and Research

The South China Sea (SCS) is becoming an increasingly contentious source of geopolitical tension due to its significance as an international trade route, possessor of potentially significant oil and natural gas resources, China’s increasing diplomatic and military assertiveness, and the U.S.’ recent and ongoing Pacific Pivot strategy. Countries as varied as China, Taiwan, the Philippines, Indonesia and other adjacent countries have claims on this region’s islands and natural resources. China has been particularly assertive in asserting its SCS claims by creating a nine-dash line map claiming to give it de facto maritime control over this entire region ...


Home Made, Printed, And Remote Controlled Firearms— Terrorism And Insurgency Implications, Robert J. Bunker Jun 2015

Home Made, Printed, And Remote Controlled Firearms— Terrorism And Insurgency Implications, Robert J. Bunker

CGU Faculty Publications and Research

This essay in the TRENDS terrorism futures series focuses on trends in the manufacturing of homemade and printed firearms along with the emergence of remote (teleoperated) firearms. Each of these trends is discussed in turn in this short essay, as are the implications of their cumulative effects on terrorism and insurgency. Ultimately, as will be highlighted in this piece, both physical and cyber forms of terrorism are increasingly merging as a result of firearm and computer components becoming more closely integrated [1].


Swords Into Stethoscopes: How The U.S. Military Could Conduct Medical Diplomacy, Oliver Kendall May 2015

Swords Into Stethoscopes: How The U.S. Military Could Conduct Medical Diplomacy, Oliver Kendall

Political Science Honors Projects

Since the early 1960’s, Cuba and China have won international appreciation by sending doctors abroad to help where they are needed. While there was surprise in some quarters when U.S. military personnel were deployed to combat Ebola in the last months of 2014, the Department of Defense actually has a long history of medical activity. In its current form, DoD medical outreach cannot likely garner soft power in the way that the Chinese and Cuban programs can, but with a few modifications, the U.S. military could be a serious conductor of medical diplomacy that would save countless ...


In Defense Of The Spratly Islands: The Philippines' Bilateral Defense Policy Against A Looming China, Eric S. Cruz Apr 2015

In Defense Of The Spratly Islands: The Philippines' Bilateral Defense Policy Against A Looming China, Eric S. Cruz

International Studies Capstone Research Papers

This research paper examines how China’s encroachment of the Spratly Islands has forced the Philippines to increase their dependency on bilateral defense agreements with the United States. Beginning with the significance of the Asia – Pacific in the 21st century and its key waterway, the South China Sea, this paper examines the Spratly Island dispute beginning in 1995 and continuing to present. Both China’s actions in claiming territory and the Philippines’ strategy of intensifying their ties with the U.S. are detailed throughout. The Philippines have found it essential to take such actions as Chinese aggression has increased ...


New Start From Old Beginnings?, Michaela Ruhlmann Apr 2015

New Start From Old Beginnings?, Michaela Ruhlmann

History Capstone Research Papers

This paper examines the extent of which START I and New START achieved effective balance of power between the United States and Russia. It addresses the purpose, agreements and the impact of START I and New Start on the effectiveness in accomplishing global balance of power. This paper argues that while the original START I accomplished a global balance of power by equalizing reduction of nuclear arsenals in both countries, but that New START did not accomplish a long-term global balance of power. To best demonstrate this, “New START from Old Beginnings?” covers START I’s historical context, examine its ...


Close To The Body And Body Cavity Suicide Bombs, Robert J. Bunker Mar 2015

Close To The Body And Body Cavity Suicide Bombs, Robert J. Bunker

CGU Faculty Publications and Research

The variation in human borne suicide bomb types used by terrorist organizations is much broader than is typically realized due to a number of iterations that have taken place over the course of decades. In this installment of the terrorism futures series, the more specialized close to the body and body cavity types will be focused upon. In addition, HAZMAT (hazardous materials) variants will be discussed along with the future potentials of these devices and the increased security interest in detecting them.


Fifth Dimensional Battlespace: Terrorism And Counter-Terrorism Implications, Robert J. Bunker Feb 2015

Fifth Dimensional Battlespace: Terrorism And Counter-Terrorism Implications, Robert J. Bunker

CGU Faculty Publications and Research

This essay in the terrorism futures series will highlight the emergence of fifth dimensional battlespace, its implications for both the conduct of terrorism and counterterrorism operations, and, to some extent, interactions with terrorist disruptive targeting capabilities. Additionally, the larger civilizational context in which a dynamic yet little recognized terrorism and counterterrorism ‘fifth dimensional capabilities race’ that is taking place will be highlighted. While initially this concept may seem abstract, the importance of understanding its implications will become apparent.


Terrorism As Disruptive Targeting, Robert J. Bunker Jan 2015

Terrorism As Disruptive Targeting, Robert J. Bunker

CGU Faculty Publications and Research

This short terrorism futures essay will focus upon differing forms of targeting and their effects, that is, destructive versus disruptive, and the interrelationship between these and the scale of effect of weaponry in engagements, highlighting the differences between legitimate state use of coercion and the illegitimate use of disruptive targeting—and the subsequent magnification of the scale of effect of weaponry in engagements—when employed by terrorists. It will conclude with a discussion of the counter-threat implications of acknowledging terrorism as a form of disruptive targeting and the need for states to focus on new counter-threat protocols that go beyond ...


Mraps, Irregular Warfare, And Pentagon Reform, Christopher J. Lamb, Matthew J. Schmidt, Berit G. Fitzsimmons Jan 2015

Mraps, Irregular Warfare, And Pentagon Reform, Christopher J. Lamb, Matthew J. Schmidt, Berit G. Fitzsimmons

Political Science Faculty Publications

The controversial MRAPs raise two questions. First, does the MRAP experience support the contention that the Pentagon is not sufficiently able to field irregular warfare capabilities? Second, what factors best explain the MRAP failure, whether that failure is determined to be their delayed fielding or the fact that they were fielded at all? We conclude that MRAPs are a valid irregular warfare requirement and that the Pentagon should have been better prepared to field them, albeit not on the scale demanded by events in Iraq. We also argue that the proximate cause of the failure to quickly field MRAPs is ...


A Guerra Como Trabalho Político: Como Utilizar As Ciências Sociais Para O Êxito Estratégico, Matthew J. Schmidt Jan 2015

A Guerra Como Trabalho Político: Como Utilizar As Ciências Sociais Para O Êxito Estratégico, Matthew J. Schmidt

Political Science Faculty Publications

As Ciências Sociais estudam fenômenos sociais em termos de variáveis interdependentes, em vez de variáveis independentes e dependentes. No caso de fenômenos compostos de variáveis interdependentes — como a guerra — tentar estabelecer teorias claras sobre causa e efeito é algo frustrante até para cientistas sociais acostumados com esse tipo de pesquisa. Com efeito, variáveis interdependentes fazem com que seja impossível fazer previsões como as das ciências exatas. Isso não significa, porém, que se devam desconsiderar abordagens qualitativas. Ao contrário, compreender o valor e as limitações dos métodos qualitativos é essencial para uma profissão incumbida de empregar a força para criar estados ...


Cyber Espionage Or Cyberwar?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo Jan 2015

Cyber Espionage Or Cyberwar?: International Law, Domestic Law, And Self-Protective Measures, Christopher S. Yoo

Faculty Scholarship at Penn Law

Scholars have spent considerable effort determining how the law of war (particularly jus ad bellum and jus in bello) applies to cyber conflicts, epitomized by the Tallinn Manual on the International Law Applicable to Cyber Warfare. Many prominent cyber operations fall outside the law of war, including the surveillance programs that Edward Snowden has alleged were conducted by the National Security Agency, the distributed denial of service attacks launched against Estonia and Georgia in 2007 and 2008, the 2008 Stuxnet virus designed to hinder the Iranian nuclear program, and the unrestricted cyber warfare described in the 1999 book by two ...


Ending Security Council Resolutions, Jean Galbraith Jan 2015

Ending Security Council Resolutions, Jean Galbraith

Faculty Scholarship at Penn Law

The Security Council resolution implementing the Iran deal spells out the terms of its own destruction. It contains a provision that allows any one of seven countries to terminate its key components. This provision – which this Comment terms a trigger termination – is both unusual and important. It is unusual because, up to now, the Security Council has almost always either not specified the conditions under which resolutions terminate or used time-based sunset clauses. It is important not only for the Iran deal, but also as a precedent and a model for the use of trigger terminations in the future. The ...


3 Critical Challenges For Global Health Security, Lawrence O. Gostin Jan 2015

3 Critical Challenges For Global Health Security, Lawrence O. Gostin

Georgetown Law Faculty Publications and Other Works

International institutions are poised to make one of the most momentous decisions about the future of global health security since the formation of the World Health Organization (WHO) in 1948.

By the end of this year, 5 global commissions will have published major critiques of global health preparedness, all spurred by the Ebola epidemic, which exposed deep flaws in the international system.


Actra - A Case Study For Threat Information Sharing, Jon C. Haass, Gail-Joon Ahn, Frank Grimmelmann Jan 2015

Actra - A Case Study For Threat Information Sharing, Jon C. Haass, Gail-Joon Ahn, Frank Grimmelmann

Publications

This paper provides a case study for information sharing within a public/private not-for-profit partnership organization called ACTRA – Arizona Cyber Threat Response Alliance, Inc.. This initiative is comprised of public and private entities with government agencies as invited guests aligned around the goal of improved response to cyber security events. Technical, political, legal and organizational issues arise when multiple parties attempt to exchange information in a formal setting. Benefits and specific solutions developed are discussed. The study concludes with several areas for future improvement and investigation as well as recommendations for newly forming sharing groups.