Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 12 of 12

Full-Text Articles in Policy Design, Analysis, and Evaluation

Propaganda Or Diplomacy? 'Selling' Brand Australia, Stuart Murray Sep 2013

Propaganda Or Diplomacy? 'Selling' Brand Australia, Stuart Murray

Stuart Murray

No abstract provided.


Who Should Uphold International Law, And Why Do Syrians Support The Regime?, Ahmed E. Souaiaia Sep 2013

Who Should Uphold International Law, And Why Do Syrians Support The Regime?, Ahmed E. Souaiaia

Ahmed E SOUAIAIA

Answering a reporter’s question if bombing Syria is needed in order to preserve his credibility since he was the one who set a red line, President Obama replied: “First of all, I didn't set a red line. The world set a red line. The world set a red line when governments representing 98 percent of the world's population said the use of chemical weapons are abhorrent and passed a treaty forbidding their use even when countries are engaged in war. Congress set a red line when it ratified that treaty..."

It is true that international law and ...


Investment Prospectus: Concentrated Solar Power With Heliostat Tower And Molten Salt Storage, Kyle Herman Mar 2013

Investment Prospectus: Concentrated Solar Power With Heliostat Tower And Molten Salt Storage, Kyle Herman

Dr. Kyle S. Herman

This article delivers a preliminary overview of Concentrated Solar Technology. It offers data for investors and policy-makers in order to more properly understand and mitigate risks of this renewable energy.


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a ...


Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg Mar 2013

Nuclear Deterrence In A Second Obama Term, Adam Lowther, Jan Kallberg

Jan Kallberg

In the months prior to the 2012 presidential election in the United States, members of the Obama administration and sympathetic organizations inside the Beltway began floating the idea that the administration would pursue – after an Obama victory – further reductions in the US nuclear arsenal. With the ink still wet on the New ST ART Treaty, efforts to reduce the American arsenal to 1000 operationally deployed strategic nuclear weapons or, as some suggest, 500, is certainly premature. These efforts illustrate a poor understanding of nuclear deterrence theory and practice and the ramifications of a United States that lacks a credible nuclear ...


The Carbon Frame: Condensed Version, Kyle Herman Feb 2013

The Carbon Frame: Condensed Version, Kyle Herman

Dr. Kyle S. Herman

This paper demonstrates the necessity of changing the policy language, in particular the word "carbon", in order to increase the logical development of renewable energy policy Europe.


Attracting Fdi: The Chilean Government's Role Promoting Renewable Energy, Kyle Herman Feb 2013

Attracting Fdi: The Chilean Government's Role Promoting Renewable Energy, Kyle Herman

Dr. Kyle S. Herman

The development and implementation of renewable energy power plants is important for Chile in order to increase energy security, supply remote mines with electricity, and eventually decrease energy costs. The Chilean government has promoted renewable energy and attracted Foreign Direct Investment (FDI) to develop large-scale renewable energy projects. However, the policies cannot sufficiently attract FDI in unproven renewable energies such as Concentrated Solar Power, though it is proven elsewhere. This paper examines the Chilean government’s renewable energy policies, related government agencies, and the extent that these provide a stable backdrop for FDI in large-scale renewable energy projects. Following that ...


Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg Feb 2013

Offensive Cyber: Superiority Or Stuck In Legal Hurdles?, Jan Kallberg

Jan Kallberg

In recent years, offensive cyber operations have attracted significant interest from the non-Defense Department academic legal community, prompting numerous articles seeking to create a legal theory for cyber conflicts. Naturally, cyber operations should be used in an ethical way, but the hurdles generated by the legal community are staggering. At a time when the United States has already lost an estimated $4 trillion in intellectual property as a result of foreign cyber espionage, not to mention the loss of military advantage, focusing on what the United States cannot do in cyberspace only hinders efforts to defend the country from future ...


Chilean Renewable Energy Investment Potential With Technology Transfer, Kyle Herman Jan 2013

Chilean Renewable Energy Investment Potential With Technology Transfer, Kyle Herman

Dr. Kyle S. Herman

For potential for investment in Chilean renewable energy investment is promising. After the Chicago boys effectively transformed the Chilean economy into a haven for FDI (Foreign Direct Investment) during the 1980’s, government laws have aligned definitively with neo-liberal policy—in other words, open markets, incentives for investors, public-private partnerships and consistent injections of capital into its financial markets. This article explore these components and highlights investment potential and offers policy advice.


Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther Jan 2013

Europe In A ‘Nato Light’ World - Building Affordable And Credible Defense For The Eu, Jan Kallberg, Adam Lowther

Jan Kallberg

From an outsider’s perspective, the Common Security and Defense Policy and the efforts of the European Defense Agency are insufficient to provide Europe with the defense it will require in coming decades. While the European Union—particularly the members of the European Monetary Union—struggle to solve prolonged fiscal challenges, viable European security alternatives to an American-dominated security architecture are conspicuously absent from the documents and discussions that are coming from the European Council and at a time when the United States is engaged in an Asia-Pacific pivot. This is not to say that no thought has been given ...


Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham Jan 2013

Cyber Operations Bridging From Concept To Cyber Superiority, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

The United States is preparing for cyber conflicts and ushering in a new era for national security. The concept of cyber operations is rapidly developing, and the time has come to transpose the conceptual heights to a broad ability to fight a strategic cyber conflict and defend the Nation in a cohesive way. Richard M. George, a former National Security Agency official, commented on recent developments: “Other countries are preparing for a cyberwar. If we’re not pushing the envelope in cyber, somebody else will.”1 Therefore, increased budgets are allocated to cyber operations research and education. The Defense Advanced ...


What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii Dec 2012

What We Do And Do Not Know: The Social Implications Of Defense, Bruce D. Mcdonald Iii

Bruce D. McDonald, III

The relationship between defense spending and economic growth has been a major topic of research and political debate for more than one hundred years. Although the relationship of interest is economically oriented, its theoretical underpinning has relied upon the social spillovers of the defense sector. This includes programs on community health, education, and access to technology. Despite this reliance, little is known about what social spillovers. This paper furthers our understanding of the defense-growth relationship by introducing the social spillovers that exist and clarifying how those spillovers occur. The author concludes with a discussion about the direction of future research ...