Open Access. Powered by Scholars. Published by Universities.®

Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

PDF

Discipline
Institution
Keyword
Publication
Publication Type

Articles 1 - 30 of 1652

Full-Text Articles in Political Science

Marketing An End To War: Constructive Engagement, Community Wellbeing, And Sustainable Peace, Clifford J. Shultz Dec 2016

Marketing An End To War: Constructive Engagement, Community Wellbeing, And Sustainable Peace, Clifford J. Shultz

Markets, Globalization & Development Review

Markets and marketing are integral to human welfare and survival. When used however for the purposes of war and other systemically violent conflict, they can be devastating and pose an existential threat to humanity. Drawing on experience in war-ravaged and recovering economies, the author examines a stream of research on marketing systems disrupted or destroyed by war. Some underlying conditions and predictors of war and its peaceful resolution are introduced, including social traps and their mitigation or elimination. An argument is revisited for marketing as a form of constructive engagement, which must be implemented to affect and to develop equitable ...


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini Dec 2016

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are ...


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Burroughs As A Political Writer?, Alexander Greiffenstern Dec 2016

Burroughs As A Political Writer?, Alexander Greiffenstern

CLCWeb: Comparative Literature and Culture

In his article "Burroughs as a Political Writer?" Alexander Greiffenstern discusses political elements in William S. Burroughs's work. Greiffenstern looks at Burroughs's text "The Coming of the Purple Better One" written for Esquire about the Democratic National Convention in Chicago 1968. By writing a surprisingly personal text, Burroughs might have captured something about the significance of the convention that many later historical accounts miss. In the end, Burroughs leaves the critical reader no other choice than to attempt a historical and political analysis.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk Dec 2016

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga Dec 2016

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear ...


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa Dec 2016

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to ...


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr Dec 2016

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath Dec 2016

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Some Remarks On Self-Defense And Intervention: A Reaction To Reading Law And Civil War In The Modern World, Josef Rohlik Dec 2016

Some Remarks On Self-Defense And Intervention: A Reaction To Reading Law And Civil War In The Modern World, Josef Rohlik

Georgia Journal of International & Comparative Law

No abstract provided.


The Effect Of Economic Integration And Political Centralization On Linguistic Diversity - And The New Function And Status Of The English Language In Europe, Demba K. Baldeh Dec 2016

The Effect Of Economic Integration And Political Centralization On Linguistic Diversity - And The New Function And Status Of The English Language In Europe, Demba K. Baldeh

School of Arts & Sciences Theses

This paper examines the effect of economic integration (EI) and political unity on

linguistic diversity and the new function and status of the English language in

Europe. It shows the current sociolinguistic transformation and the growing use of

English both as strong effects and key indicators of the process.


Heroism Research: A Review Of Theories, Methods, Challenges, And Trends, Zeno E. Franco, Scott T. Allison, Elaine L. Kinsella, Ari Kohen, Matt Langdon, Philip G. Zimbardo Dec 2016

Heroism Research: A Review Of Theories, Methods, Challenges, And Trends, Zeno E. Franco, Scott T. Allison, Elaine L. Kinsella, Ari Kohen, Matt Langdon, Philip G. Zimbardo

Faculty Publications: Political Science

Heroism as an expression of self-actualization and a pinnacle social state is of fundamental interest to humanistic psychology and the field more broadly. This review places the growing discussion on heroic action in a humanistic perspective, as heroism aligns with ethical self-actualization in its highest form, personal meaning making, and social good, and can also involve profound existential costs. This review is organized in four major sections: First, the historical and philosophical underpinnings of heroism are examined, moving from ancient Greco-Roman perspectives, to more modern interpretations of Continental philosophy, and to Freud and Le Bon. Second, the article summarizes in ...


Manufacturing Consent In The Maghreb: How Mohammed Vi Of Morocco Survived The Arab Spring, David Michael Duke Ii Dec 2016

Manufacturing Consent In The Maghreb: How Mohammed Vi Of Morocco Survived The Arab Spring, David Michael Duke Ii

Dissertations and Theses

The Arab Spring of 2011 revealed stark variation in the durability of different types of authoritarian regimes. Kings and emirs demonstrably outperformed their republican peers. This paper provides a qualitative study of the Moroccan monarchy in order to better explain this pattern. The findings of an original media content analysis support the paper's thesis that Morocco's King Mohammed VI maintained his throne by effectively using a historically derived position of concentrated power and immense wealth to manipulate potential opposition and dominate public discourse. This multi-causal mechanism of manufactured consent helped create and sustain the monarch's domestic legitimacy ...


People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green Dec 2016

People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green

Military Cyber Affairs

China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese ...


Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden Dec 2016

Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden

Military Cyber Affairs

Over the course of decades in service, I have experienced multiple presidential transitions. Each new Commander in Chief updates policies, personnel, and priorities…especially when the transition involves a new political party. In this respect, the current transition from the Obama to the Trump administration is no different. While this periodic exercise of our democracy may seem disruptive to some, it is a true opportunity for military cyber professionals to help shape our future national security posture.


The Rise Of Fundamentalism: The End Of American Pluralism?, Kaitlin L. Giles Dec 2016

The Rise Of Fundamentalism: The End Of American Pluralism?, Kaitlin L. Giles

Honors Theses AY 16/17

Liberty is a balancing act between the individual and society where the government is expected to provide for individual rights without impeding the rights of others. Nowhere is this conflict between the private and public more evident than in the case of religion. Due to the Establishment clause, the United States government must simultaneously promote individual belief without endorsing any single belief. This is extremely difficult for American’s extensively diverse society when individuals want to express their religion within a public setting. While government seeks a peaceful coexistence of religions in society, some religious factions believe they have the ...


Commentary: Justice Who Follows Scalia's Path Would Hurt The Working Class, Bruce A. Larson Dec 2016

Commentary: Justice Who Follows Scalia's Path Would Hurt The Working Class, Bruce A. Larson

Political Science Faculty Publications

During the campaign, Donald Trump released a list of 21 conservatives from which he promised to pick Supreme Court justices, should he win the election. With President-elect Trump apparently nearing a decision on a nominee to replace the late Justice Scalia, Senate Republicans are no doubt eagerly awaiting the chance to confirm Trump's pick and restore a conservative majority on the court. [excerpt]


Ajit Singh, Ajit Singh Dec 2016

Ajit Singh, Ajit Singh

Digital Narratives of Asia

After thirty years as a career diplomat, Malaysia's first ASEAN Secretary-General Ajit Singh, sees his five-year term as the most productive, golden years of his life. He speaks to DNA about the challenges he faced with admitting Myanmar to ASEAN, and the visionary ASEAN leadership. He also expounds on the differences in impacts of work between an ambassador and a bureaucrat.


Surfing The Revolutionary Wave 2010-12: A Social Theory Of Agency, Resistance, And Orders Of Dissent In Contemporary Social Movements, Athina Karatzogianni, Michael Schandorf Dec 2016

Surfing The Revolutionary Wave 2010-12: A Social Theory Of Agency, Resistance, And Orders Of Dissent In Contemporary Social Movements, Athina Karatzogianni, Michael Schandorf

Athina Karatzogianni

The theorisation and understanding of contemporary social movements, socio-technological phenomena, and the intersection of the two are limited by an incommensurability between the conceptualisations of individual agency and the disciplining powers of social structures. We introduce a theory of sociotechnological agency that bridges the individual and the social through a reconceptualization of the conventional notion of intentionality. Drawing from recent theories of affect and embodiment, posthuman-influenced materialisms and realisms, postmodern critical theory, and critiques of network theory, we introduce a model for understanding sociopolitical action and dissent that accounts for individual human agency as a nexus of overlapping and often ...