Now showing items 1-10 of 20
Democratization as a Peace Strategy
(Canadian Center of Science and Education, 2013-07-05)
The European Union's Security Strategy views the creation of strong and stable states as a prerequisite for international peace and stability. At the same time, the establishment of democratic regimes is seen as fundamental ...
Democratic incumbent resilience in the post-1980 Senate
In the period since the Reagan revolution that disrupted decades of Democratic control of the United States Senate, Democratic senators have proved remarkably resilient when running for reelection. Over the past 600 Senate ...
Can the river speak? Epistemological confrontation in the rise and fall of the land grab in Gambella, Ethiopia
(SAGE Publications, 2016-04)
In this paper, I focus on the role of knowledge production in the rise and fall of the Indian multinational agribusiness firm Karuturi’s efforts to become a leading global supplier of food through the initiation of large-scale ...
Sovereignty and European Integration: Deconstruction or Reconstruction of State Authority?
(Canadian Center of Science and Education, 2015-07-24)
The purpose of this essay is twofold: first, to examine the nature of the European Union's system of governance; and second, to investigate the implications of the EU's institutional and decision-making arrangements for ...
The Death of Neoliberal Realism?
Taking the Temperature: Implications for Adoption of Election Day Registration, State-Level Voter Turnout, and Life Expectancy
(Cambridge University Press, 2012-01)
We consider the neglected importance of temperature as an explanatory variable. We show that: (1) colder states have turnout that is high relative to the national average; (2) the coldest states in the United States were ...
On market concentration and cybersecurity risk
(Taylor & Francis, 2020-02-24)
Market concentration affects each component of the cybersecurity risk equation (i.e. threat, vulnerability and impact). As the Internet ecosystem becomes more concentrated across a number of vectors from users and incoming ...
Cyber Actions by State Actors: Motivation and Utility
Covert action is as old as political man. The subversive manipulation of others is nothing new. It has been written about since Sun Tzu and Kautilya. People and nations have always sought the use of shadowy means to influence ...