Open Access. Powered by Scholars. Published by Universities.®

Political Science Commons

Open Access. Powered by Scholars. Published by Universities.®

2016

Journal

Discipline
Institution
Keyword
Publication

Articles 1 - 30 of 401

Full-Text Articles in Political Science

Marketing An End To War: Constructive Engagement, Community Wellbeing, And Sustainable Peace, Clifford J. Shultz Dec 2016

Marketing An End To War: Constructive Engagement, Community Wellbeing, And Sustainable Peace, Clifford J. Shultz

Markets, Globalization & Development Review

Markets and marketing are integral to human welfare and survival. When used however for the purposes of war and other systemically violent conflict, they can be devastating and pose an existential threat to humanity. Drawing on experience in war-ravaged and recovering economies, the author examines a stream of research on marketing systems disrupted or destroyed by war. Some underlying conditions and predictors of war and its peaceful resolution are introduced, including social traps and their mitigation or elimination. An argument is revisited for marketing as a form of constructive engagement, which must be implemented to affect and to develop equitable ...


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


Letter From The Editor Dec 2016

Letter From The Editor

International Journal of Nuclear Security

No abstract provided.


Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene Dec 2016

Nuclear Power: Black Sky Liability Or Black Sky Asset?, Sherrell R. Greene

International Journal of Nuclear Security

Ready access to abundant electricity is a key enabler of modern life. During the past decade the vulnerability of Critical Infrastructure sectors in the U.S. to a variety of natural hazards and man-made threats has become increasingly apparent. The electrical infrastructure (the “Grid”) is the foundation for all other critical civil infrastructures upon which our society depends. Therefore, protection of the Grid is an energy security, homeland security, and national security issue of highest importance. Geomagnetic disturbances (GMD) induced by solar coronal mass ejections (CMEs), electromagnetic pulse (EMP) attacks, and cyber attacks are three events having the potential to ...


Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall Dec 2016

Implementation Of The 1995 Middle East Resolution: A Vital Lifeline To The Extension And Success Of The Non-Proliferation Treaty, Haidy Y. Ghoname, Howard Lewis Hall

International Journal of Nuclear Security

This study highlights the core non-proliferation dilemmas we face and suggests an effective mechanism for reviving the spirit and the hope of the Non-Proliferation Treaty. An indispensable key to the treaty calls for a rethinking of what we believe should be referred to as its four pillars: disarmament, non-proliferation, peaceful uses of nuclear energy, and implementation of the 1995 Middle East Resolution. We seek to contribute to the renaissance of the non-proliferation regime by addressing seven dilemmas that arise from the way various Non-Proliferation Treaty participants pursue the goals of the four pillars undergirding the treaty. This study highlights core ...


A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini Dec 2016

A New Pathway To Enhance The Nuclear Security Regime, Francesca Giovannini

International Journal of Nuclear Security

The paper investigates the approach used by a new set of regional institutions, the Disaster Preparedness and Risk Management Organizations (DPRMOs), in strengthening regional governance and cooperation. It also inquires in what ways these new institutions might indirectly contribute to the establishment of a more cohesive global nuclear security framework. More specifically, through the examination of the case of Southeast Asia, the paper argues that these institutions, albeit without a specific and direct mandate to operate in the nuclear security domain, are fundamentally strengthening states’ capacity to assess risks and threats and to map vulnerabilities in timely fashion. They are ...


Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame Dec 2016

Evaluation Of Covert Plutonium Production From Unconventional Uranium Sources, Ondrej Chvala, Steven Skutnik, Tyrone Christopher Harris, Emily Anne Frame

International Journal of Nuclear Security

The potential for a relatively non-advanced nation to covertly acquire a significant quantity of weapons-grade plutonium using a gas-cooled, natural uranium-fueled reactor based on relatively primitive early published designed is evaluated in this article. The economic and technical issues that would influence the design decisions of a covert 239Pu production program are considered.

Several unconventional uranium acquisition approaches were explored. Methods for extracting uranium from enrichment tails, seawater, and coal ash sources were considered. The evaluation indicated that uranium extraction from coal ash or insitu leaching from underground deposits could be performed in economical manner that might be difficult ...


Student Competition Cover Dec 2016

Student Competition Cover

International Journal of Nuclear Security

No abstract provided.


Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed Dec 2016

Addressing The Tunnel Threat At Nuclear Facilities: A Case Study, Md. Mobasher Ahmed

International Journal of Nuclear Security

No abstract provided.


Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen Dec 2016

Improving Nuclear Safety, Security, And Nonproliferation In Northeast Asia Through Multinational Approach, Viet Phuong Nguyen

International Journal of Nuclear Security

No abstract provided.


Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan Dec 2016

Prospects For Cooperation On Tackling Nuclear And Radiological Terrorism In South Asia: India–Pakistan Nuclear Detection Architecture, Muhammad Umer Khan

International Journal of Nuclear Security

No abstract provided.


Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein Dec 2016

Janus Realized: The Use Of Social Media As A Means Of Transparency Nuclear Communication To The Public, Frances Bachstein

International Journal of Nuclear Security

No abstract provided.


Burroughs As A Political Writer?, Alexander Greiffenstern Dec 2016

Burroughs As A Political Writer?, Alexander Greiffenstern

CLCWeb: Comparative Literature and Culture

In his article "Burroughs as a Political Writer?" Alexander Greiffenstern discusses political elements in William S. Burroughs's work. Greiffenstern looks at Burroughs's text "The Coming of the Purple Better One" written for Esquire about the Democratic National Convention in Chicago 1968. By writing a surprisingly personal text, Burroughs might have captured something about the significance of the convention that many later historical accounts miss. In the end, Burroughs leaves the critical reader no other choice than to attempt a historical and political analysis.


Table Of Contents Dec 2016

Table Of Contents

International Journal of Nuclear Security

No abstract provided.


From The Editor’S Desk Dec 2016

From The Editor’S Desk

International Journal of Nuclear Security

No abstract provided.


Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga Dec 2016

Legal And Regulatory Framework Of Nuclear Security In Indonesia, Dahlia Cakrawati Sinaga

International Journal of Nuclear Security

Nuclear security is one of the most important topics for regulatory purposes in Indonesia. Nuclear security measures exist to prevent, detect, and respond to unauthorized removal of radioactive material and the sabotage of nuclear and radiation facilities. Indonesia participates in bilateral and multilateral cooperation and international events such as the Nuclear Security Summit. Indonesia has also ratified several international instruments related to nuclear security. Based on commitment to international events and ratification, Indonesia has developed nuclear security infrastructures by strengthening legislation and regulation, enhancing building capacity, and strengthening equipment and facilities. Badan Pengawas Tenaga Nuklir (BAPETEN) is Indonesia’s nuclear ...


Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan Dec 2016

Nuclear Security Culture And Batan’S Assessment: Batan’S Experience, Anhar R. Antariksawan

International Journal of Nuclear Security

Organizations should increase safety to minimize the harmful effects of nuclear materials. Additionally, organizations should take measures to protect security culture within the organization itself. This paper covers the National Nuclear Energy Agency of Indonesia’s (BATAN’s) promotion of nuclear security culture and self- assessment projects, which is based on the International Atomic Energy Agency’s (IAEA) methodology.


Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa Dec 2016

Modified Fault Tree Method For Vulnerability Analysis Of Nuclear Medicine Facility Security System Case Study: Radiotherapy Facility, Sardjito General Hospital, Haryono Budi Santosa

International Journal of Nuclear Security

Assessing the vulnerability of physical protection systems (PPS) in nuclear medicine facilities is needed to prevent a security incident that could lead to the malicious use of nuclear material. Theft and sabotage of nuclear materials is becoming globally recognized. The current methods of assessing vulnerability tend to be oriented toward complex nuclear security; consequently, it is excessive to use such methods in simple facilities (i.e., radiotherapy facilities in hospitals).

The fault tree analysis is a method to assess vulnerability for a simple nuclear facility. The method’s primary events (i.e., basic events and undeveloped events) are able to ...


Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr Dec 2016

Opportunities And Challenges In Developing Nuclear Security In Africa, James Larkin Mfr

International Journal of Nuclear Security

Those involved in nuclear security recognize that regions of significant instability in Africa have an impact on the safety and security of the continent's nuclear material and un-enriched uranium; however, some countries outside of continental Africa have taken counterproductive approaches to this issue. Despite challenges, the nuclear security community continues to develop and apply appropriate levels of nuclear security where needed. The community also takes every opportunity to make significant contributions to the global discourse on nuclear security culture.


Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath Dec 2016

Nuclear Security Risk Analysis: An Insider-Outsider Collusion Scenario, Mohammad A. Hawila, Sunil S. Chirayath

International Journal of Nuclear Security

This study analyses the vulnerability of the physical protection system (PPS) deployed at a hypothetical facility. The PPS is designed to prevent and eliminate threats to nuclear materials and facilities. The analysis considers possible outsider and insider threats. A modified adversary sequence diagram (ASD) evaluates threat pathways to test an insider-outsider collusion case. The ASD also measures the probability of adversary interruption by demonstrating the methodology for a typical nuclear facility.


Some Remarks On Self-Defense And Intervention: A Reaction To Reading Law And Civil War In The Modern World, Josef Rohlik Dec 2016

Some Remarks On Self-Defense And Intervention: A Reaction To Reading Law And Civil War In The Modern World, Josef Rohlik

Georgia Journal of International & Comparative Law

No abstract provided.


People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green Dec 2016

People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green

Military Cyber Affairs

China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese ...


Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden Dec 2016

Military Cyber Professionals Have An Important Part To Play In The Obama-Trump Transition, Michael V. Hayden

Military Cyber Affairs

Over the course of decades in service, I have experienced multiple presidential transitions. Each new Commander in Chief updates policies, personnel, and priorities…especially when the transition involves a new political party. In this respect, the current transition from the Obama to the Trump administration is no different. While this periodic exercise of our democracy may seem disruptive to some, it is a true opportunity for military cyber professionals to help shape our future national security posture.


The Foreign Policy Association, Joan C. Davis Dec 2016

The Foreign Policy Association, Joan C. Davis

The Catholic Lawyer

No abstract provided.


Ideas Cambiantes Sobre Territorio, Recursos Y Redes Políticas En La Amazonía Indígena: Un Estudio De Caso Sobre Perú, Diego Leal Pereira, David Salisbury, Josué Faqín Fernández, Lizardo Cauper Pezo, Julio Silva Dec 2016

Ideas Cambiantes Sobre Territorio, Recursos Y Redes Políticas En La Amazonía Indígena: Un Estudio De Caso Sobre Perú, Diego Leal Pereira, David Salisbury, Josué Faqín Fernández, Lizardo Cauper Pezo, Julio Silva

Journal of Latin American Geography

La titulación de territorios fue el objetivo más importante del movimiento indígena de la Amazonía peruana en las últimas décadas. Aunque más de ochenta comunidades permanecen sin título en la región de Ucayali, el movimiento indígena regional busca cada vez más fortalecer la gobernanza sobre territorios titulados. Exploramos el creciente énfasis en la comercialización forestal en el discurso de derechos indígenas en Ucayali. Redes de líderes indígenas producen discursos para forjar nuevas relaciones entre sus comunidades y la economía regional. Nuestro análisis de ochenta entrevistas y testimonios de líderes y miembros de comunidades indígenas muestra la utilidad de considerar la ...


Foundational Review On Information Seeking Behavior Of Legislators, Yousef T. Alfarhoud Dec 2016

Foundational Review On Information Seeking Behavior Of Legislators, Yousef T. Alfarhoud

Proceedings from the Document Academy

Legislators play a major role in the development of their countries. They suggest new bills and oversee the performance of the government. Legislators represent different parties, affiliations, and divisions.

Many studies have discussed the information seeking behavior of members of parliament. Information seeking behavior is a complex activity, requiring access to diverse information resources to deal with work, personal, and social information problems. In the case of legislators, such studies have discussed how members of parliament seek information that will eventually affect their decision-making process.

The aim of this review is to discuss the information needs and information seeking behavior ...


From Fief To Clan: Boisot’S Information Space Model As A Documentary Theory For Cultural And Institutional Analysis, Lin Wang, Michael Buckland Dec 2016

From Fief To Clan: Boisot’S Information Space Model As A Documentary Theory For Cultural And Institutional Analysis, Lin Wang, Michael Buckland

Proceedings from the Document Academy

Max Boisot (1943-2011) and his Information Space (I-Space) model are introduced. The I-Space model characterized information flow on three dimensions (codification, abstraction, and diffusion). It can be seen as a document-based model. Boisot and colleagues identifies four types of institutional information practices (bureaucracies, markets, fiefs, and clans). Chinese economic reform in the 1980s is used as a case-study to demonstrate how document configuration and infrastructure is associated with cultural and institutional change. This echoes Suzanne Briet's assertion that documentation is a cultural technique.


Legal Services For The Poor: A Political Perspective, P. Vaughn Gearan Dec 2016

Legal Services For The Poor: A Political Perspective, P. Vaughn Gearan

The Catholic Lawyer

No abstract provided.


A Politician's Conscience, Senator Philip A. Hart Dec 2016

A Politician's Conscience, Senator Philip A. Hart

The Catholic Lawyer

No abstract provided.


How To Develop World Peace Through Law, Miriam Theresa Rooney Dec 2016

How To Develop World Peace Through Law, Miriam Theresa Rooney

The Catholic Lawyer

No abstract provided.