Scholarly Works, Political Science
Permanent URI for this collection
Browse
Browsing Scholarly Works, Political Science by Issue Date
Now showing 1 - 20 of 91
Results Per Page
Sort Options
- An Empirical Analysis of International Confederation of Free Trade Unions (ICFTU) Annual SurveysWeisband, Edward; Colvin, Christopher (Johns Hopkins Univ Press, 2000-02)
- Hip‐hop Imaginaries: a Genealogy of the PresentKalyan, Rohan (2006-07)
- Social Democracy in Sweden: The Threat from a Globalised WorldTsarouhas, Dimitris (I.B. Tauris, 2008-09-30)Social Democracy in Sweden is an important reassessment of European social democracy and the impact of globalization.
- Definitions of Interdisciplinary Research: Toward Graduate-Level Interdisciplinary Learning OutcomesBorrego, Maura Jenkins; Newswander, L. K. (Johns Hopkins Univ Press, 2010)Combining the interdisciplinary studies (primarily humanities) literature with the content analysis of 129 successful National Science Foundation proposals written predominantly by science and engineering faculty members, the authors identify five categories of learning outcomes for interdisciplinary graduate education: disciplinary grounding, integration, teamwork, communication, and critical awareness. They identify important parallels between humanities-based descriptions of interdisciplinary integration and implicit graduate learning outcomes hinted at by engineering and science faculty who more frequently work in teams. Applying the lens of interdisciplinary studies (humanities) to science and engineering provides important depth and focus to engineering and science interdisciplinary learning outcomes, particularly in detailing integration processes.
- Fragmentation by Design: Architecture, Finance, and IdentityKalyan, Rohan (2011-07)
- Taking the Temperature: Implications for Adoption of Election Day Registration, State-Level Voter Turnout, and Life ExpectancyWuffle, A.; Brians, C. L.; Coulter, K. (Cambridge University Press, 2012-01)We consider the neglected importance of temperature as an explanatory variable. We show that: (1) colder states have turnout that is high relative to the national average; (2) the coldest states in the United States were more likely to adopt Election Day Registration (EDR) than other states, and very hot states never did so; and (3) those who live in colder states live longer.
- Democratization as a Peace StrategyStivachtis, Yannis A.; Georgakis, Stefanie (Canadian Center of Science and Education, 2013-07-05)The European Union's Security Strategy views the creation of strong and stable states as a prerequisite for international peace and stability. At the same time, the establishment of democratic regimes is seen as fundamental to achieving domestic stability and, as an extension, development. Consequently, democratization and democracy promotion can been seen as strategies that the EU seek to employ in order to achieve international peace and security. The EU seeks to establish an international democratic order through the application of conditionality. The EU does not only apply conditions to states that seek membership of the Union but also to third states, such as the countries included in the European Neighborhood Policy (ENP) or countries that seek to receive financial aid and development assistance from the European Union. In so doing, the article analyzes how the policy of conditionality applies to each different case.
- Supplemental Tables for New Policies for New ResidentsMilly, Deborah (2014-02-07)Tables contain data concerning immigrants in Japan. These tables are a supplement to the book by Deborah J. Milly, New Policies for New Residents: Immigrants, Advocacy, and Governance in Japan and Beyond (Ithaca, NY: Cornell University Press, 2014). The tables are not contained in this book but notes in the book refer readers to these resources.
- Cyber Actions by State Actors: Motivation and UtilityBrantly, Aaron F. (2014-05-12)Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence situations and events. Covert action is and has been a staple of the state system. A dark and nefarious tool often banished to philosophical and intellectual exile, covert action is in truth an oft-used method of achieving utility that is frequently overlooked by academics. Modern scholars contend that, for utility to be achieved, activities such as war and diplomacy must be conducted transparently. Examined here is the construction of utility for a subset of covert action: cyber attacks.
- The Cyber LosersBrantly, Aaron F. (2014-05-22)National security cyber activities harm human rights and democracy activists. With increasing state cyber capabilities comes heightened pressure on civil society and democracy activists.We often think of the cyber arms race from the perspective of states and corporations; however, the real losers are activists who seek to promote democracy, development, and human rights. This article examines how advances in national security activities have created a new spectrum of issues for activists not previously encountered, and posits a theory of externalities emanating from the cyber arms race.
- Biopolitical and Disciplinary Peacebuilding: Sport, Reforming Bodies and Rebuilding SocietiesZanotti, Laura; Stephenson, Max O. Jr.; Schnitzer, Marcy H. (Taylor & Francis, 2015-03-25)The peacebuilding political rationality established in the first years of the current century broadened the target of such efforts from state institutions to populations and adopted an array of disciplinary and biopolitical techniques aimed at changing individuals and the ways they live together. This article explores international organization discourses on sport and peacebuilding and argues that the broad consensus on sport as a peacebuilding strategy is most fruitfully explored in light of the intensification of the biopolitical and disciplinary trajectories of the liberal peace.
- Sovereignty and European Integration: Deconstruction or Reconstruction of State Authority?Romaniuk, Scott N.; Stivachtis, Yannis A. (Canadian Center of Science and Education, 2015-07-24)The purpose of this essay is twofold: first, to examine the nature of the European Union's system of governance; and second, to investigate the implications of the EU's institutional and decision-making arrangements for sovereignty. To this end, it engages a set of theories of European integration applied to a selection of developments of contemporary EU integration that have had different effects on EU Member States' sovereignty. The essay attempts to highlight the linkages between these theories to show how the current EU political organization of authority qualifies as "shared sovereignty" in practice. In doing so, it reviews the pillar theories of integration; explores the concepts of "integration" and "sovereignty"; and presents three levels of development that are used to frame wider and deeper integration and its effects on Member States resulting in the transfer and sharing of sovereignty.
- "Introduction: On the Imperative, Challenges and Prospects of Decolonizing Comparative Methodologies"Kalyan, Rohan; Donahue, Amy K. (2015-11-01)To reflect on coloniality is not to study the history of colonialism from the safety of a “postcolonial” present. Rather, it requires one to interrogate ongoing legacies of colonialism, not only in parts of the world that were once, or continue to be, dominated and ruled by Western European nations, including the United States, but also in elements of discourse such as “the West” and “modernity,” which were and are constituted through colonial practices of subjugation, derogation, and dehumanization. In his contribution to this special issue, David Kim asks, “Who can seriously doubt that global Western imperialism occurred and did so with enduring consequences, [and] that Eurocentrism continues to distort the epistemic landscape of Western culture, politics, and philosophy…?” Postcolonial and decolonial studies, broadly defined, aim to make this contemporary condition of coloniality theoretically and empirically visible. The terms “postcolonial” and “decolonial” indicate an ongoing critical engagement with coloniality, a legacy that modern colonial empires inaugurated that has proven to endure far beyond the ostensible end of European colonial history...
- The Most Governed Ungoverned Space: Legal and Policy Constraints on Military Operations in CyberspaceBrantly, Aaron F. (2016)Winning wars in cyberspace might sound easy: the click of a mouse or the press of the enter key on a keyboard. Yet, the web of networks that constitutes cyberspace is imbued with challenges. Seemingly every day there is a new story of a government, business, or individual, suffering from a serious hack. These hacks are often attributed to state actors or transnational criminal organizations. Combined, the almost daily revelations of serious incidents compound a common misperception that cyberspace is an ungoverned space. The reality of cyberspace, however, is far different and constitutes a complex environment of overlapping jurisdictions. The overlapping geographic, legal, and technical boundaries affect everything from the freedom of information to the decision to engage in military operations. Technical specifications as well as laws and policies established by local and national governments, international institutions, non-governmental organizations, and corporations form the decision-making framework for national policymakers and military commanders. Understanding how all the elements of cyberspace interact provides context for when, why and how the United States engages in military operations in cyberspace. This paper examines the complexities of the environment and their impact on the decisions of states (with emphasis placed on the United States) to engage in offensive cyber operations, cyber exploitation, and defensive cyber operations against other states and non-state actors. Moreover, it examines the important role that overlapping governmental and non-governmental organizations have in affecting the types of behaviors that occur within cyberspace.
- Can the river speak? Epistemological confrontation in the rise and fall of the land grab in Gambella, EthiopiaGill, Bikrum Singh (SAGE, 2016-04)In this paper, I focus on the role of knowledge production in the rise and fall of the Indian multinational agribusiness firm Karuturi’s efforts to become a leading global supplier of food through the initiation of large-scale industrial agricultural production in the Gambella province of Ethiopia. In particular, I interrogate a modernist epistemological framework which privileges the ‘‘developmental’’ knowledge of the Ethiopian state and the ‘‘productive’’ knowledge of Indian capital as central to the urgent task of mastering nature and bringing dormant virgin lands to life, while at the same time it necessarily discounts, through processes of racialization, displaced indigenous peoples and nonhuman life forms as beings incapable of efficient and productive economic activity. My argument in this paper is that while modernist knowledge production and mobilization has been critical to Karuturi’s construction of the Gambella land concession as a staging ground for its launch into global prominence in agro-food provisioning, it has also proved fatal to the project, as the epistemological inability to incorporate indigenous knowledge that accounts for ‘‘extra-human’’ agency left the company dramatically unaware of the particular socio-ecological dynamics of the Baro River ecosystem on whose floodplain the land concession was located.
- Subverting Reality: The Role of Propaganda in 21st Century IntelligenceBrantly, Aaron F. (2017-02-08)The digital era has placed most of humanity’s knowledge within a few clicks of a computer mouse or the touches of a smart phone screen. Yet in an age where knowledge is so readily available it is also seemingly elusive. Reality hides behind oceans of information streamed from innumerable sources competing for a single moment of attention. But disinformation dangerously poisons that abundance of knowledge and begins a process of ideational inception, in which even the idea of reality is itself subverted. In the digital age, propaganda and disinformation injected into the global information environment, known now as cyberspace, can have significant implications. Strategically utilized in the digital era, they can facilitate significant political actions that slow or dilute policy responses. They also pose a direct and relevant threat to national security, both within target nations as well as in those beyond the intended scope of a given operation.
- Strategic Cyber ManeuverBrantly, Aaron F. (Small Wars Foundation, 2017-10-17)Maneuver warfare is an integral part of the strategy, tactics and operations of the United States military, but what does it mean to maneuver in cyberspace? Maneuvering with an army is advantageous; with an undisciplined multitude, most dangerous. – Sun Tzu, The Art of War Maneuver warfare dates back millennia and yet the fundamental goal of maneuver, to provide military advantage in tactical situations, has not changed. There are concrete and identifiable military tactics associated with maneuver each refined through conflict and war and each tailored to the needs of the situation faced by commanders on the frontline. The modern era has seen joint forces maneuvers in which Air, Land, Sea work in tandem to accomplish a mission. The state of maneuver warfare changes as weapons and technology evolve. No longer is it reasonable to maneuver in column in two opposing battle lines as in the Napoleonic Wars, modern weapons have changed the concepts of maneuver and made them increasingly more complex, nuanced and challenging. Five years after the establishment of U.S. Cyber Command the United States is confronted with yet another advance in technology that requires a reevaluation of the concepts of maneuver in a cyberized¹ world with smart bombs, laser guided field munitions, blue force trackers, digital logistic networks, and network command and control centers. The department of defense has a new domain that must be examined, poked and prodded to ascertain the means and mechanisms to achieve advantage. This paper examines the concept of maneuver within cyberspace and attempts to develop an initial framework for maneuver operations to achieve both within and cross-domain effects.
- Defending the Borderland: Ukrainian Military Experiences with IO, Cyber, and EWBrantly, Aaron F.; Cal, Nerea M.; Winkelstein, Devlin P. (Army Cyber Institute at West Point, 2017-12-01)Ukraine is currently experiencing a conflict in two separate regions within its boundaries that challenges traditional conceptions of war, intervention, international law, and peacekeeping. The involvement of foreign military forces, unaffiliated foreign fighters, domestic rebels, irregular military units, and civilians in the conflict it a case study in hybrid warfare. This report seeks to understand the current state of hybrid warfare in Ukraine with a particular emphasis on the use of Information Operations (IO), Electronic Warfare (EW), and Cyber Operations (CO). We examine Ukraine’s technical, training, political-legal, financial, and cultural vulnerabilities and illustrate how Russian and Russian-backed actors have tailored their IO, CO, and EW operations in Ukraine to exploit these vulnerabilities to achieve their strategic objectives. This model of hybrid warfare has affected Ukraine militarily and domestically and has had geopolitical implications within the region and the broader international community. We argue that the conflict in Ukraine serves as a testing ground for a new, more complex and dynamic form of hybrid warfare for which the United States Army and Department of Defense (DoD) must be prepared. Developing a robust and detailed understanding of the conditions that enabled this style of warfare and how Russia has exploited those conditions in Ukraine will serve to inform strategists and decision-makers of the measures that must be taken to prevent or counter future uses. The context in which hybrid warfare has transpired in Ukraine is important as it forms the starting point for all subsequent findings on the impact of cyber, IO and EW on Ukraine’s military and society. This report focuses on the military impact of hybrid warfare, a future report building on these findings will focus on the societal impact. Our analysis is based on two weeks of in country meetings conducted with members of the Ukrainian government, military leadership and rank and file, volunteer battalions, members of the academic community, military industrial and commercial sectors as well as civilians. The result is an analytical work that provides an array of insights into many of the technical and societal aspects of a complex conflict.
- Blood is Thicker than Water: Family Ties to Political Power WorldwideJalalzai, Farida; Rincker, Meg (GESIS, 2018-01-01)This article analyzes the relevance of family ties for the recruitment of chief executives - presidents or prime ministers - with special emphasis on gender. Based on a cross-national data-set examining political chief executives from 2000-2017 in five world regions (Sub-Saharan Africa, Latin America, Asia, Europe, and North America), we test several hypotheses and present four main results. First, belonging to a political family (BPF), is an advantage to entering national executive positions around the world, for both democracies and non-democracies. Among those with a sizeable number of executives in this period, regions range from 9 percent (Africa) to 13 percent (Latin America and Europe) of executives BPF. Second, executives' family ties are more powerful (with a previous chief executive) in Asia, Africa, and Latin America and more direct (with an immediate family member) in Asia and Africa. Across the globe, women only made up 6% of chief executives in the time period. Third, females who manage to become chief executives are more often BPF than their male counterparts, particularly in Asia and Latin America. Fourth, regardless of region, family ties nearly always originate from men, not women.
- A Comparative Assessment of Hillary Clinton’s 2016 Presidential RaceJalalzai, Farida (SAGE, 2018-01-01)This article assesses how Hillary Clinton’s 2016 presidential loss conforms to established findings within the gender and politics literature about the difficulties women face in running for presidential office. In many ways, Clinton’s loss was predictable, though at times she defied the conventional wisdom. The presidential glass ceiling remains fully intact in the United States now and perhaps the foreseeable future.