Matching Items (1,107)
Filtering by

Clear all filters

154175-Thumbnail Image.png
Description
This dissertation seeks to show that the fate of emerging democracies is largely dependent upon the strategic behaviors of political militaries and their coup potential. Given the known issue of democratization's temporarily destabilizing effects, it first examines if such effects makes states vulnerable to coups. It finds clear evidence on

This dissertation seeks to show that the fate of emerging democracies is largely dependent upon the strategic behaviors of political militaries and their coup potential. Given the known issue of democratization's temporarily destabilizing effects, it first examines if such effects makes states vulnerable to coups. It finds clear evidence on democratization's destabilizing effects on coup risk. Such evidence is used to shed new light on the literature about the armed forces and coups in emerging democracies. To explain variation in the military's responses to democratization and consolidation against coup threats, it argues that how the armed forces were organized and controlled during the authoritarian periods influences whether emerging democracies are able to consolidate against coup risk. Second, it explores the declining coup risk and the trilateral relationship between Western democracy promotion, coup risk, and election violence in recently emerging electoral regimes, the so-called "illiberal democracies." It argues that vulnerability to Western leverage, coupled with an emphasis on multiparty elections, creates a political moral hazard problem for incumbents, permitting them to commit electoral violence during the emergence of mass electoral politics.
ContributorsCho, Yong Ouk (Author) / Sheldon, Simon (Thesis advisor) / David, Siroky (Committee member) / Wood, Reed (Committee member) / Arizona State University (Publisher)
Created2015
156421-Thumbnail Image.png
Description
What explains why governments and militaries pursue accountability against some human rights violations committed by members of their armed forces during ongoing conflicts, but not other violations? Further, what are the consequences of such prosecutions for their military and governmental objectives? The theory put forth by this study suggests that

What explains why governments and militaries pursue accountability against some human rights violations committed by members of their armed forces during ongoing conflicts, but not other violations? Further, what are the consequences of such prosecutions for their military and governmental objectives? The theory put forth by this study suggests that rather than only the natural outcome of strong rule of law, domestic prosecutions within a state’s security apparatus represents a strategic choice made by political and military actors. I employ a strategic actor approach to the pursuit of accountability, suggesting that the likelihood of accountability increases when elites perceive they will gain politically or militarily from such actions. I investigate these claims using both qualitative and quantitative methods in a comparative study across the United States and the United Kingdom. This project contributes to interdisciplinary scholarly research relevant to human rights studies, human rights law, political science, democratic state-building, democratic governance, elite decision making, counter-insurgency, protests, international sanctions, and conflict resolution. Particularly, this dissertation speaks to the intersection of strategy and law, or “lawfare” a method of warfare where law is used as means of realizing a military objective (Dunlap 2001). It provides generalizable results extending well beyond the cases analyzed. Thus, the results of this project will interest those dealing with questions relating to legitimacy, human rights, and elite decision making throughout the democratic world.
ContributorsSimmons, Alan James (Author) / Wood, Reed (Thesis advisor) / Peskin, Victor (Thesis advisor) / Lake, Milli (Committee member) / Arizona State University (Publisher)
Created2018
157307-Thumbnail Image.png
Description
This dissertation proposes a theory of authoritarian control of the armed forces using the economic theory of the firm. To establish a “master-servant” relationship, an organization structures governance as a long-term contractual agreement to mitigate the vulnerabilities associated with uncertainty and bilateral dependency. The bargaining power for civilian

This dissertation proposes a theory of authoritarian control of the armed forces using the economic theory of the firm. To establish a “master-servant” relationship, an organization structures governance as a long-term contractual agreement to mitigate the vulnerabilities associated with uncertainty and bilateral dependency. The bargaining power for civilian and military actors entering a contractual relationship is assessed by two dimensions: the negotiated political property rights and the credible guarantee of those rights. These dimensions outline four civil-military institutional arrangements or army types (cartel, cadre, entrepreneur, and patron armies) in an authoritarian system. In the cycle of repression, the more the dictator relies on the military for repression to stay in office, the more negotiated political property rights obtained by the military; and the more rights obtained by the military the less civilian control. Thus, the dependence on coercive violence entails a paradox for the dictator—the agents empowered to manage violence are also empowered to act against the regime. To minimize this threat, the dictator may choose to default on the political bargain through coup-proofing strategies at the cost to the regime’s credibility and reputation, later impacting a military’s decision to defend, defect, or coup during times of crisis. The cycle of repression captures the various stages in the life-cycle of the political contract between the regime and the armed forces providing insights into institutional changes governing the relationship. As such, this project furthers our understanding of the complexities of authoritarian civil–military relations and contributes conceptual tools for future studies.
ContributorsZerba, Shaio Hui (Author) / Thies, Cameron (Thesis advisor) / Wood, Reed (Committee member) / Shair-Rosenfield, Sarah (Committee member) / Arizona State University (Publisher)
Created2019
157076-Thumbnail Image.png
Description
ABSTRACT

Although the US government has been using remotely piloted aircraft (RPA), more commonly referred to as drones, to conduct military strikes against terrorists and insurgents since at least 2001, only around 2011 did media outlets and polling organizations began assessing the attitudes of Americans towards

ABSTRACT

Although the US government has been using remotely piloted aircraft (RPA), more commonly referred to as drones, to conduct military strikes against terrorists and insurgents since at least 2001, only around 2011 did media outlets and polling organizations began assessing the attitudes of Americans towards the use of drones as a weapon of war. Initially, public support for drone strikes was robust with nearly 70 percent of Americans expressing approval. As the discussion of drone strikes intensified however, public support declined over 10 percentage points.

Only a handful of studies have examined public opinion and drone strikes, and all have focused exclusively on explaining support. This study seeks to fill this gap in the literature and explain opposition to drone strikes. The primary argument put forth in this dissertation is that people’s beliefs determine their opinions, and their morality determines their beliefs. Although independent opinion formation is often considered a cognitive process, I argue that, at least in the case of drone strikes, the opinion formation process is largely an affective one.

By examining media coverage and elite discourse surrounding drone strikes, I isolate three narratives which I believe communicate certain messages to the public regarding drone strikes. I argue that the messages produced by elite discourse and disseminated by the media to the public are only influential on opinion formation once they have been converted to beliefs. I further argue that conversion of message to belief is largely dependent on individual moral attitudes.

To test my arguments, I conduct a survey-experiment using subjects recruited from Arizona State University’s School of Politics and Global Studies student subject pool. My research findings lead to two key conclusions. First, opposition to drone strikes is largely the product of the belief(s) that drone strikes are not necessary for protecting the United States from terrorist attack, and that drone strikes kill more civilians than do strikes from conventional aircraft. Second, whether an individual expresses support or opposition to drone strikes, moral attitudes are a relatively good predictor of both beliefs and disposition.
ContributorsDavis, Christopher Todd (Author) / Wood, Reed (Thesis advisor) / Fridkin, Kim (Committee member) / Kubiak, Jeffrey (Committee member) / Wright, Thorin (Committee member) / Arizona State University (Publisher)
Created2019
133359-Thumbnail Image.png
Description
The current trend of interconnected devices, or the internet of things (IOT) has led to the popularization of single board computers (SBC). This is primarily due to their form-factor and low price. This has led to unique networks of devices that can have unstable network connections and minimal processing power.

The current trend of interconnected devices, or the internet of things (IOT) has led to the popularization of single board computers (SBC). This is primarily due to their form-factor and low price. This has led to unique networks of devices that can have unstable network connections and minimal processing power. Many parallel program- ming libraries are intended for use in high performance computing (HPC) clusters. Unlike the IOT environment described, HPC clusters will in general look to obtain very consistent network speeds and topologies. There are a significant number of software choices that make up what is referred to as the HPC stack or parallel processing stack. My thesis focused on building an HPC stack that would run on the SCB computer name the Raspberry Pi. The intention in making this Raspberry Pi cluster is to research performance of MPI implementations in an IOT environment, which had an impact on the design choices of the cluster. This thesis is a compilation of my research efforts in creating this cluster as well as an evaluation of the software that was chosen to create the parallel processing stack.
ContributorsO'Meara, Braedon Richard (Author) / Meuth, Ryan (Thesis director) / Dasgupta, Partha (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133360-Thumbnail Image.png
Description
This study asks the question: does gender-based discrimination exists within Arizona State University's Army Reserve Officer Training Corps (ROTC), and if so, what are the effects of such discrimination? Within this study, discrimination is defined as: the treatment or consideration of, or making a distinction in favor of or against,

This study asks the question: does gender-based discrimination exists within Arizona State University's Army Reserve Officer Training Corps (ROTC), and if so, what are the effects of such discrimination? Within this study, discrimination is defined as: the treatment or consideration of, or making a distinction in favor of or against, a person or thing based on the group, class, or category to which that person or thing belongs, rather than on individual merit. The researcher predicted that this study would show that gender-based discrimination operates within the masculine military culture of Army ROTC at ASU, resulting from women's hyper-visibility and evidenced by their lack of positive recognition and disbelief in having a voice in the program. These expectations were based on background research claiming that the token status of women in military roles causes them to be more heavily scrutinized, and they consequentially try to attain success by adapting to the masculine military culture by which they are constantly measured. For the purposes of this study, success is defined as: the attainment of wealth, favor, or eminence . This study relies on exploratory interviews and an online survey conducted with male and female Army ROTC cadets of all grade levels at Arizona State University. The interviews and survey collected demographic information and perspectives on individual experiences to establish an understanding of privilege and marginalization within the program. These results do support the prediction that women in Army ROTC at ASU face discrimination based on their unique visibility and lack of positive recognition and voice in the program. Likewise, the survey results indicate that race also has a significant impact on one's experience in Army ROTC, which is discussed later in this study in regard to needs for future research. ASU Army ROTC includes approximately 100 cadets, and approximately 30-40 of those cadets participated in this study. Additionally, the University of Arizona and the Northern Arizona University Army ROTC programs were invited to participate in this study and declined to do so, which would have offered a greater sample population. Nonetheless, the results of this research will be useful for analysis and further discussion of gender-equality in Army ROTC at Arizona State University.
ContributorsAllemang, Lindsey Ann (Author) / Wood, Reed (Thesis director) / Switzer, Heather (Committee member) / School of Politics and Global Studies (Contributor) / School of Social Transformation (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
133381-Thumbnail Image.png
Description
This thesis discusses three recent optimization problems that seek to reduce disease spread on arbitrary graphs by deleting edges, and it discusses three approximation algorithms developed for these problems. Important definitions are presented including the Linear Threshold and Triggering Set models and the set function properties of submodularity and monotonicity.

This thesis discusses three recent optimization problems that seek to reduce disease spread on arbitrary graphs by deleting edges, and it discusses three approximation algorithms developed for these problems. Important definitions are presented including the Linear Threshold and Triggering Set models and the set function properties of submodularity and monotonicity. Also, important results regarding the Linear Threshold model and computation of the influence function are presented along with proof sketches. The three main problems are formally presented, and NP-hardness results along with proof sketches are presented where applicable. The first problem seeks to reduce spread of infection over the Linear Threshold process by making use of an efficient tree data structure. The second problem seeks to reduce the spread of infection over the Linear Threshold process while preserving the PageRank distribution of the input graph. The third problem seeks to minimize the spectral radius of the input graph. The algorithms designed for these problems are described in writing and with pseudocode, and their approximation bounds are stated along with time complexities. Discussion of these algorithms considers how these algorithms could see real-world use. Challenges and the ways in which these algorithms do or do not overcome them are noted. Two related works, one which presents an edge-deletion disease spread reduction problem over a deterministic threshold process and the other which considers a graph modification problem aimed at minimizing worst-case disease spread, are compared with the three main works to provide interesting perspectives. Furthermore, a new problem is proposed that could avoid some issues faced by the three main problems described, and directions for future work are suggested.
ContributorsStanton, Andrew Warren (Author) / Richa, Andrea (Thesis director) / Czygrinow, Andrzej (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2018-05
131496-Thumbnail Image.png
Description
Genocide studies have traditionally focused on the perpetrator’s intent to eradicate a particular identity-based group, using the Holocaust as their model and point of comparison. Although some aspects of the Holocaust were undoubtedly unique, recent scholars have sought to challenge the notion that it was a singular phenomenon. Instead, they

Genocide studies have traditionally focused on the perpetrator’s intent to eradicate a particular identity-based group, using the Holocaust as their model and point of comparison. Although some aspects of the Holocaust were undoubtedly unique, recent scholars have sought to challenge the notion that it was a singular phenomenon. Instead, they draw attention to a recurring pattern of genocidal events throughout history by shifting the focus from intent to structure. One particular branch of scholars seeks to connect the ideology and tactics of imperialism with certain genocidal events. These anti-imperialist genocide scholars concede that their model cannot account for all genocides, but still claim that it creates meaningful connections between genocides committed by Western colonialist powers and those that have occurred in a neoimperialist world order shaped according to Western interests. The latter includes genocides in postcolonial states, which these scholars believe were shaped by the scars of their colonial past, as well as genocides in which imperial hegemons assisted local perpetrators. Imperialist and former colonial powers have contributed meaningfully to all of these kinds of genocides, yet their contributions have largely been ignored due to their own influence on the creation of the current international order. Incorporating the anti-imperialist perspective into the core doctrine of genocide studies may lead to breakthroughs in areas of related policy and practice, such as prevention and accountability.
ContributorsParker, Ashleigh Mae (Author) / Thies, Cameron (Thesis director) / Sivak, Henry (Committee member) / School of Politics and Global Studies (Contributor) / School of Social Transformation (Contributor) / Department of English (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131504-Thumbnail Image.png
Description
In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age

In the last few years, billion-dollar companies like Yahoo and Equifax have had data breaches causing millions of people’s personal information to be leaked online. Other billion-dollar companies like Google and Facebook have gotten in trouble for abusing people’s personal information for financial gain as well. In this new age of technology where everything is being digitalized and stored online, people all over the world are concerned about what is happening to their personal information and how they can trust it is being kept safe. This paper describes, first, the importance of protecting user data, second, one easy tool that companies and developers can use to help ensure that their user’s information (credit card information specifically) is kept safe, how to implement that tool, and finally, future work and research that needs to be done. The solution I propose is a software tool that will keep credit card data secured. It is only a small step towards achieving a completely secure data anonymized system, but when implemented correctly, it can reduce the risk of credit card data from being exposed to the public. The software tool is a script that can scan every viable file in any given system, server, or other file-structured Linux system and detect if there any visible credit card numbers that should be hidden.
ContributorsPappas, Alexander (Author) / Zhao, Ming (Thesis director) / Kuznetsov, Eugene (Committee member) / Computer Science and Engineering Program (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05
131514-Thumbnail Image.png
Description
Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its

Political polarization is the coalescence of political parties -- and the individuals of which parties are composed -- around opposing ends of the ideological spectrum. Political parties in the United States have always been divided, however, in recent years this division has only intensified. Recently, polarization has also wound its way to the Supreme Court and the nomination processes of justices to the Court. This paper examines how prevalent polarization in the Supreme Court nomination process has become by looking specifically at the failed nomination of Judge Merrick Garland and the confirmations of now-Justices Neil Gorsuch and Brett Kavanaugh. This is accomplished by comparing the ideologies and qualifications of the three most recent nominees to those of previous nominees, as well as analysing the ideological composition of the Senate at the times of the individual nominations.
ContributorsJoss, Jacob (Author) / Hoekstra, Valerie (Thesis director) / Critchlow, Donald (Committee member) / Computer Science and Engineering Program (Contributor) / School of Politics and Global Studies (Contributor) / Barrett, The Honors College (Contributor)
Created2020-05