This curriculum vitae summarizes the professional experience and qualifications of Robert Stewart-Ingersoll, an Assistant Professor of National Security at the USAF Air Command and Staff College. It outlines his education, including a PhD in Political Science from the University of Arizona, areas of research interest in international security, human rights, and regional powers, courses taught on these topics at multiple universities, publications, conference presentations, professional service, and university service.
PS 1010, American Government 1 Course Learning Out.docxtarifarmarie
PS 1010, American Government 1
Course Learning Outcomes for Unit VIII
Upon completion of this unit, students should be able to:
3. Describe the three branches of government.
4. Explain how the U.S. government functions at the federal, state, and local levels.
5. Identify the role of political parties in the United States political system.
6. Discuss how policies affect change.
6.1 Describe the purpose and goals of one type of policy in the United States.
6.2 Discuss how a specific policy might cause the United States to implement either isolationism or
internationalism.
7. Identify the impact of media on public opinion and politics.
Course/Unit
Learning Outcomes
Learning Activity
3
Unit VIII Lesson
Reading: “An ‘Invitation to Struggle’? The Use of Force Against ‘Legislatively
Vulnerable’ American Presidents”
Reading: “11. Policy Making: Political Interactions”
Unit VIII Final Project
4
Unit VIII Lesson
Reading: “An ‘Invitation to Struggle’? The Use of Force Against ‘Legislatively
Vulnerable’ American Presidents”
Reading: “11. Policy Making: Political Interactions”
Unit VIII Final Project
5
Reading: “An ‘Invitation to Struggle’? The Use of Force Against ‘Legislatively
Vulnerable’ American Presidents”
Reading: “11. Policy Making: Political Interactions”
Unit VIII Final Project
6.1
Unit VIII Lesson
Chapter 17
Reading: “11a. Foreign Policy: What Now?”
Reading: “11b. Defense Policy”
Reading: “11c. Economic Policy”
Reading: “11d. Social and Regulatory Policy”
Unit VIII Final Project
6.2
Unit VIII Lesson
Chapter 17
Reading: “Lesson 4: The Great Debate: Internationalists vs. Isolationists”
Unit VIII Final Project
7
Unit VIII Lesson
Reading: “11. Policy Making: Political Interactions”
Unit VIII Final Project
UNIT VIII STUDY GUIDE
Policy: Domestic, Economic, and Foreign
PS 1010, American Government 2
UNIT x STUDY GUIDE
Title
Reading Assignment
In order to access the reading from the OpenStax American Government textbook, please click the link below.
Chapter 17: Foreign Policy (Section 17.4)
To access the following resources, click the links below.
Foster, D. M. (2006). An “invitation to struggle”? The use of force against “legislatively vulnerable” American
presidents. International Studies Quarterly, 50(2), 421–444. Retrieved from
https://libraryresources.columbiasouthern.edu/login?auth=CAS&url=http://search.ebscohost.com/logi
n.aspx?direct=true&db=a9h&AN=20656715&site=ehost-live&scope=site
Independence Hall Association. (n.d.). 11. Policy Making: Political interactions. Retrieved from
http://www.ushistory.org/gov/11.asp
Independence Hall Association. (n.d.). 11a. Foreign policy: What now? Retrieved from
http://www.ushistory.org/gov/11a.asp
Independence Hall Association. (n.d.). 11b. Defense policy. Retrieved from
http://www.ushistory.org/gov/11b.asp
Independence Hall Association. (n.d.). 11c. Economic policy. Retri.
PS 1010, American Government 1 Course Learning Out.docxtarifarmarie
PS 1010, American Government 1
Course Learning Outcomes for Unit VIII
Upon completion of this unit, students should be able to:
3. Describe the three branches of government.
4. Explain how the U.S. government functions at the federal, state, and local levels.
5. Identify the role of political parties in the United States political system.
6. Discuss how policies affect change.
6.1 Describe the purpose and goals of one type of policy in the United States.
6.2 Discuss how a specific policy might cause the United States to implement either isolationism or
internationalism.
7. Identify the impact of media on public opinion and politics.
Course/Unit
Learning Outcomes
Learning Activity
3
Unit VIII Lesson
Reading: “An ‘Invitation to Struggle’? The Use of Force Against ‘Legislatively
Vulnerable’ American Presidents”
Reading: “11. Policy Making: Political Interactions”
Unit VIII Final Project
4
Unit VIII Lesson
Reading: “An ‘Invitation to Struggle’? The Use of Force Against ‘Legislatively
Vulnerable’ American Presidents”
Reading: “11. Policy Making: Political Interactions”
Unit VIII Final Project
5
Reading: “An ‘Invitation to Struggle’? The Use of Force Against ‘Legislatively
Vulnerable’ American Presidents”
Reading: “11. Policy Making: Political Interactions”
Unit VIII Final Project
6.1
Unit VIII Lesson
Chapter 17
Reading: “11a. Foreign Policy: What Now?”
Reading: “11b. Defense Policy”
Reading: “11c. Economic Policy”
Reading: “11d. Social and Regulatory Policy”
Unit VIII Final Project
6.2
Unit VIII Lesson
Chapter 17
Reading: “Lesson 4: The Great Debate: Internationalists vs. Isolationists”
Unit VIII Final Project
7
Unit VIII Lesson
Reading: “11. Policy Making: Political Interactions”
Unit VIII Final Project
UNIT VIII STUDY GUIDE
Policy: Domestic, Economic, and Foreign
PS 1010, American Government 2
UNIT x STUDY GUIDE
Title
Reading Assignment
In order to access the reading from the OpenStax American Government textbook, please click the link below.
Chapter 17: Foreign Policy (Section 17.4)
To access the following resources, click the links below.
Foster, D. M. (2006). An “invitation to struggle”? The use of force against “legislatively vulnerable” American
presidents. International Studies Quarterly, 50(2), 421–444. Retrieved from
https://libraryresources.columbiasouthern.edu/login?auth=CAS&url=http://search.ebscohost.com/logi
n.aspx?direct=true&db=a9h&AN=20656715&site=ehost-live&scope=site
Independence Hall Association. (n.d.). 11. Policy Making: Political interactions. Retrieved from
http://www.ushistory.org/gov/11.asp
Independence Hall Association. (n.d.). 11a. Foreign policy: What now? Retrieved from
http://www.ushistory.org/gov/11a.asp
Independence Hall Association. (n.d.). 11b. Defense policy. Retrieved from
http://www.ushistory.org/gov/11b.asp
Independence Hall Association. (n.d.). 11c. Economic policy. Retri.
Review Neoclassical Realism and Theories of Foreign Poli.docxAASTHA76
Review: Neoclassical Realism and Theories of Foreign Policy
Reviewed Work(s): The Perils of Anarchy: Contemporary Realism and International
Security by Michael E. Brown; Useful Adversaries: Grand Strategy, Domestic Mobilization,
and Sino-American Conflict, 1947-1958 by Thomas J. Christensen; Deadly Imbalances:
Tripolarity and Hitler's Strategy of World Conquest by Randall L. Schweller; The Elusive
Balance: Power and Perceptions during the Cold War by William Curti Wohlforth; From
Wealth to Power: The Unusual Origins of America's World Role by Fareed Zakaria
Review by: Gideon Rose
Source: World Politics, Vol. 51, No. 1 (Oct., 1998), pp. 144-172
Published by: Cambridge University Press
Stable URL: https://www.jstor.org/stable/25054068
Accessed: 12-08-2018 23:50 UTC
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Cambridge University Press is collaborating with JSTOR to digitize, preserve and extend
access to World Politics
This content downloaded from 76.109.204.44 on Sun, 12 Aug 2018 23:50:44 UTC
All use subject to https://about.jstor.org/terms
Review Article
NEOCLASSICAL REALISM AND
THEORIES OF FOREIGN POLICY
By GIDEON ROSE*
Michael E. Brown et al., eds. The Perils of Anarchy: Contemporary Realism and
International Security. Cambridge: MIT Press, 1995, 519 pp.
Thomas J. Christensen. Useful Adversaries: Grand Strategy, Domestic Mobiliza
tion, and Sino-American Conflict, 1947-1958. Princeton: Princeton Univer
sity Press, 1996, 319 pp.
Randall L. Schweller. Deadly Imbalances: Tripolarity and Hitlers Strategy of
World Conquest. New York: Columbia University Press, 1998,267 pp.
William Curti Wohlforth. The Elusive Balance: Power and Perceptions during
the Cold War. Ithaca, N.Y.: Cornell University Press, 1993, 317 pp.
Fareed Zakaria. From Wealth to Power: The Unusual Origins of Americas World
Role. Princeton: Princeton University Press, 1998,199 pp.
FOR two decades international relations theory has been dominated by the debate between neorealists and their various critics.1 Much
of the skirmishing has occurred over questions about the nature of the
international system and its effect on patterns of international out
comes such as war and peace. Thus scholars have disputed whether a
multipolar system generates more conflict than a bipolar one, or
* For support, criticisms, and suggestions regarding earlier versions of this essay I am grateful to
Richard Berts, Michael Desch, Michael Doyle, Aaron Friedberg, Philip Gordon, Ethan Kapstein, Jeff
Legro, Sean Lynn-Jones, Andrew Moravcsik, Kenne.
Este ensayo de reflexión institucional fue desarrollado con la finalidad de discutir diferentes aspectos de las instituciones políticas americanas, incluyendo sus impactos e influencias, entre el desarrollo de las políticas públicas en los Estados Unidos. Por lo tanto, este artículo incorpora el punto de vista y argumentos de la rama ejecutiva de los Estados Unidos y la seguridad nacional, basado en pares revisión el análisis en el campo de la política pública y justicia penal. El ensayo cubrirá los aspectos de los asuntos de seguridad nacional de acción y cómo las políticas se pueden volver a dirigir hacia el incremento de la seguridad de nuestra nación. Logro final de este documento será demostrar la importancia de crear políticas y cómo cada institución política estadounidense tiene una función crucial entre el proceso de elaboración de políticas públicas.
RUNNING HEADER: TERRORISM 1
Terrorism in America
Position Paper 1
CJUS 380
Kenton Shatzer
Liberty University
Introduction
“Have you forgotten how it felt that day? To see your homeland under fire and her people blown away. Have you forgotten when those towers fell? We had neighbors still inside going thru a living hell and you say we shouldn’t worry ‘bout bin Laden. Have you forgotten?” (Worley. 2003). Have forgotten what happened on 9/11 and do you ever wonder what the United States could have done to ensure that the terrorist attack did not happen on that faithful day? 9/11 was not the first terrorist attack on the United States and it was not the last. On April 14, 1972, in New York City, “ten members of a local mosque phoned in a false alarm and then ambushed responding officer, killing one” (TheReligionofPeace.com. 2015). In Moore, OK on September 25, 2014, “A Sharia advocate beheaded a woman after calling for Islamic terror and posting an Islamist beheading photo” (TheReligionofPeace.com. 2015.).
So what is terrorism? “There are more than 100 definitions of terrorism in the literature. The United Nations defines terrorism as “an anxiety-inspiring method of repeated violent action, employed by clandestine individual, group or state actors, for idiosyncratic, criminal or political reason, whereby- in contrast to assassinations- the direct targets of violence are not the man targets”” (Bullock, Haddow, & Coppola. 2013. Pg. 490). The problem with terrorism is that terrorists want to attack when their target is not ready, but also when there is a large crowd that will be watching and knowing that the attack will kill and injury many innocent people. So how can terrorist attacks be stopped or be limited? Can countries stop terrorist from attacking their countries? The learner of this paper firmly believes that countries can limit and stop terrorist attacks.
Literature Review
Like stated above, terrorism has been around since the first attack in 1972 and has continued to present day when the last terrorist attack was in September 2014. “The largest act of international terrorism occurred on September 11, 2001 in a set of co-ordinated attacks on the United States of America, where Islamic terrorists hijacked civilian airliners and used them to attack the World Trade Center towers in New York City and the Pentagon in Washington, DC” (Terrorism Research). Since 9/11, the United States has cracked down and created new laws to help protect the American citizens. The learner firmly believes that the laws have enhanced the security and protection of the United States and the citizens.
The United States government created a new policy after 9/11 known as the “Homeland Security,” and in this new policy is an act called the USA PARTRIOT Act. The Bush Administration passed this acted and also updated elect.
This research analyzes the sectarian violence that was an end product of the destruction of the golden dome of the mosque of al-Askari on February 22nd, 2006 and the effectiveness of US military responses to that event. According to many policy think tanks, the destruction of the golden dome was simply a catalyst of sectarian strife of an unexplained origin.i This on-the-spot characterization of the mosque bombing as an igniter of sectarian warfare does not give justice to the deep historical nature of the religious complexities of the violence which the bombing caused; any violent event of equivalent magnitude (a similar attack at Karbala or Najaf for example) would have spurred similar reactions.
Instead this study of an effective counterinsurgency theory will utilize primary sources such as interviews from ex-military personnel, Iraqi weblogs composed around the year 2006 and recent scholarly works concerning counterinsurgency theory and tactics (such as FM 3-24) in order to better frame the issue on why the mosque bombing had such violent responses and an explanation on how the US responded (in Baghdad). Contrary to common viewpoint that the mosque bombing in Samarra was the source of sectarian violence in Iraq, it was simply an event in a larger mosaic that comprises the history of Islamic sectarian conflict in Iraq, the endgame of which is currently out of reach.
This study also addresses the shortcomings of conventional thinking (as evidence by veteran interviews) that the regular military operates under when it comes to post-invasion standard operating procedures in the months preceding the mosque bombing in Samarra and after it. These interviews will address the fact that in order to combat sectarian violence in Iraq, the occupying force must work in tandem with local security forces focusing on the desires of the population. The operations that will be analyzed (and taken into context within the veteran interviews and Iraqi weblogs) are those that were conducted in the city of Baghdad due to the city’s near resemblance of the ethnic composition of Iraq and the socio-political importance that the city holds on Iraq’s national stage.
The findings of research concluded that there were several factors that were present in Baghdad during the months after the mosque bombing that influenced the feelings of the population and the response of US forces. These factors include (but are not limited to): the perception of al Qaeda to occupying forces and local inhabitants, the influence of Iran with regards to sectarian groups and Sunni and Shiite relations. This research advocates that standard operating procedures need to be replaced with unconventional strategy and tactics (akin to Special Forces, for example) which tends to be more population-centric when dealing with known and unknown challenges.
A description of the projects and activities of the Jerusalem Center for Public Affairs, a multidisciplinary, independent non-profit think tank for Israel policy research and education, bringing together the best minds in the political, strategic, diplomatic and legal arenas, in Israel and abroad.
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docxloganta
Weeks1-2_MyLastName.doc/x
Weeks 1-2 Written Assignment
(submit here as
single
MS Word file)
·
Part 1
(refer to
Week
1
Readings in the Lessons for Week 1
)
o Provide an aprox. 1000-word in-depth evaluation of three articles of your choice from the Week 1 Reading List.
§
What are the strengths and weaknesses of each?
§
What is the most and lest persuasive premise, claim or rebuttal?
o
Conclude with a research or policy question for further research
o You must utilize literature and cite properly. Use style.APA
·
Part 2
o (
Title each response with the text of each question)
o
Has U.S. federal government developed a robust legal, regulatory and policy framework to address cyber security challenges? Why? Why not?
o
Conclude with a research question
or
policy question for further research.
o You must utilize APA (cite, reference, list) required
Week 2 Readings
.
· Submit both Parts as
single
Microsoft Word document.
· Name the file "
EDMG600Weeks1-2_YourLastName.doc/x
" (e.g., EDMG600Week1-2_Pesic.doc/x).
· Upload the document under Weeks1-2 Assignments.
Week 1
Reading and Resources
Reading Assignment
Choose and read
three
articles from the list bellow:
Kello, L. (2013).
The meaning of the cyber revolution: Perils to theory and statecraft
.
International Security,
Fall 2013.
Gartzke, E. (2013).
The myth of cyberwar: Bringing war in cyberspace back down to earth
.
International Security,
Fall 2013.
Arquilla, J. (2012).
Cyberwar is already upon us
.
Foreign Policy
. March/April, 2012.
Brown, G. & Poellet, K. (2012).
The Customary International Law of Cyberspace
.
Strategic Studies Quarterly,
6, no. 3, pp. 126-145.
Caplan, N. (2013).
Cyber War: the Challenge to National Security
.
Global Security Studies
, Winter 2013, Volume 4, Issue
Studentnummer, L. van den Boom (2012).
The dilemmas of state response to cyber attacks. Understanding the phenomena, challenges and legal response
. Vrije Universiteit Amsterdam:
Paper Governance of Security and Policing
.
Crosston, M. D. (2011).
World Gone Cyber MAD: How 'Mutually Assured Debilitation' Is the Best Hope for Cyber Deterrence
.
Strategic Studies Quarterly,
5, no. 1, pp. 100-116.
Goldsmith, J. (2011).
Cybersecurity Treaties: A Skeptical View
. A Future Challenges Essay. Hoover Institution.
Mudrinich, E. (2012).
Cyber 3.0: the Department of Defense strategy for operating in cyberspace and the attribution problem
.
Guinchard, A. (2011).
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
.
Journal of Strategic Security
Volume 4 Number 2 Summer 2011.
Khosla, P. (2009).
Information Security for the Next Century
.
Carnegie Mellon CyLab.
Hansen, L., & Nissenbaum, H. (2009).
Digital disaster, cyber security, and the Copenhagen School
.
Inte ...
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Review Neoclassical Realism and Theories of Foreign Poli.docxAASTHA76
Review: Neoclassical Realism and Theories of Foreign Policy
Reviewed Work(s): The Perils of Anarchy: Contemporary Realism and International
Security by Michael E. Brown; Useful Adversaries: Grand Strategy, Domestic Mobilization,
and Sino-American Conflict, 1947-1958 by Thomas J. Christensen; Deadly Imbalances:
Tripolarity and Hitler's Strategy of World Conquest by Randall L. Schweller; The Elusive
Balance: Power and Perceptions during the Cold War by William Curti Wohlforth; From
Wealth to Power: The Unusual Origins of America's World Role by Fareed Zakaria
Review by: Gideon Rose
Source: World Politics, Vol. 51, No. 1 (Oct., 1998), pp. 144-172
Published by: Cambridge University Press
Stable URL: https://www.jstor.org/stable/25054068
Accessed: 12-08-2018 23:50 UTC
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected]
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Cambridge University Press is collaborating with JSTOR to digitize, preserve and extend
access to World Politics
This content downloaded from 76.109.204.44 on Sun, 12 Aug 2018 23:50:44 UTC
All use subject to https://about.jstor.org/terms
Review Article
NEOCLASSICAL REALISM AND
THEORIES OF FOREIGN POLICY
By GIDEON ROSE*
Michael E. Brown et al., eds. The Perils of Anarchy: Contemporary Realism and
International Security. Cambridge: MIT Press, 1995, 519 pp.
Thomas J. Christensen. Useful Adversaries: Grand Strategy, Domestic Mobiliza
tion, and Sino-American Conflict, 1947-1958. Princeton: Princeton Univer
sity Press, 1996, 319 pp.
Randall L. Schweller. Deadly Imbalances: Tripolarity and Hitlers Strategy of
World Conquest. New York: Columbia University Press, 1998,267 pp.
William Curti Wohlforth. The Elusive Balance: Power and Perceptions during
the Cold War. Ithaca, N.Y.: Cornell University Press, 1993, 317 pp.
Fareed Zakaria. From Wealth to Power: The Unusual Origins of Americas World
Role. Princeton: Princeton University Press, 1998,199 pp.
FOR two decades international relations theory has been dominated by the debate between neorealists and their various critics.1 Much
of the skirmishing has occurred over questions about the nature of the
international system and its effect on patterns of international out
comes such as war and peace. Thus scholars have disputed whether a
multipolar system generates more conflict than a bipolar one, or
* For support, criticisms, and suggestions regarding earlier versions of this essay I am grateful to
Richard Berts, Michael Desch, Michael Doyle, Aaron Friedberg, Philip Gordon, Ethan Kapstein, Jeff
Legro, Sean Lynn-Jones, Andrew Moravcsik, Kenne.
Este ensayo de reflexión institucional fue desarrollado con la finalidad de discutir diferentes aspectos de las instituciones políticas americanas, incluyendo sus impactos e influencias, entre el desarrollo de las políticas públicas en los Estados Unidos. Por lo tanto, este artículo incorpora el punto de vista y argumentos de la rama ejecutiva de los Estados Unidos y la seguridad nacional, basado en pares revisión el análisis en el campo de la política pública y justicia penal. El ensayo cubrirá los aspectos de los asuntos de seguridad nacional de acción y cómo las políticas se pueden volver a dirigir hacia el incremento de la seguridad de nuestra nación. Logro final de este documento será demostrar la importancia de crear políticas y cómo cada institución política estadounidense tiene una función crucial entre el proceso de elaboración de políticas públicas.
RUNNING HEADER: TERRORISM 1
Terrorism in America
Position Paper 1
CJUS 380
Kenton Shatzer
Liberty University
Introduction
“Have you forgotten how it felt that day? To see your homeland under fire and her people blown away. Have you forgotten when those towers fell? We had neighbors still inside going thru a living hell and you say we shouldn’t worry ‘bout bin Laden. Have you forgotten?” (Worley. 2003). Have forgotten what happened on 9/11 and do you ever wonder what the United States could have done to ensure that the terrorist attack did not happen on that faithful day? 9/11 was not the first terrorist attack on the United States and it was not the last. On April 14, 1972, in New York City, “ten members of a local mosque phoned in a false alarm and then ambushed responding officer, killing one” (TheReligionofPeace.com. 2015). In Moore, OK on September 25, 2014, “A Sharia advocate beheaded a woman after calling for Islamic terror and posting an Islamist beheading photo” (TheReligionofPeace.com. 2015.).
So what is terrorism? “There are more than 100 definitions of terrorism in the literature. The United Nations defines terrorism as “an anxiety-inspiring method of repeated violent action, employed by clandestine individual, group or state actors, for idiosyncratic, criminal or political reason, whereby- in contrast to assassinations- the direct targets of violence are not the man targets”” (Bullock, Haddow, & Coppola. 2013. Pg. 490). The problem with terrorism is that terrorists want to attack when their target is not ready, but also when there is a large crowd that will be watching and knowing that the attack will kill and injury many innocent people. So how can terrorist attacks be stopped or be limited? Can countries stop terrorist from attacking their countries? The learner of this paper firmly believes that countries can limit and stop terrorist attacks.
Literature Review
Like stated above, terrorism has been around since the first attack in 1972 and has continued to present day when the last terrorist attack was in September 2014. “The largest act of international terrorism occurred on September 11, 2001 in a set of co-ordinated attacks on the United States of America, where Islamic terrorists hijacked civilian airliners and used them to attack the World Trade Center towers in New York City and the Pentagon in Washington, DC” (Terrorism Research). Since 9/11, the United States has cracked down and created new laws to help protect the American citizens. The learner firmly believes that the laws have enhanced the security and protection of the United States and the citizens.
The United States government created a new policy after 9/11 known as the “Homeland Security,” and in this new policy is an act called the USA PARTRIOT Act. The Bush Administration passed this acted and also updated elect.
This research analyzes the sectarian violence that was an end product of the destruction of the golden dome of the mosque of al-Askari on February 22nd, 2006 and the effectiveness of US military responses to that event. According to many policy think tanks, the destruction of the golden dome was simply a catalyst of sectarian strife of an unexplained origin.i This on-the-spot characterization of the mosque bombing as an igniter of sectarian warfare does not give justice to the deep historical nature of the religious complexities of the violence which the bombing caused; any violent event of equivalent magnitude (a similar attack at Karbala or Najaf for example) would have spurred similar reactions.
Instead this study of an effective counterinsurgency theory will utilize primary sources such as interviews from ex-military personnel, Iraqi weblogs composed around the year 2006 and recent scholarly works concerning counterinsurgency theory and tactics (such as FM 3-24) in order to better frame the issue on why the mosque bombing had such violent responses and an explanation on how the US responded (in Baghdad). Contrary to common viewpoint that the mosque bombing in Samarra was the source of sectarian violence in Iraq, it was simply an event in a larger mosaic that comprises the history of Islamic sectarian conflict in Iraq, the endgame of which is currently out of reach.
This study also addresses the shortcomings of conventional thinking (as evidence by veteran interviews) that the regular military operates under when it comes to post-invasion standard operating procedures in the months preceding the mosque bombing in Samarra and after it. These interviews will address the fact that in order to combat sectarian violence in Iraq, the occupying force must work in tandem with local security forces focusing on the desires of the population. The operations that will be analyzed (and taken into context within the veteran interviews and Iraqi weblogs) are those that were conducted in the city of Baghdad due to the city’s near resemblance of the ethnic composition of Iraq and the socio-political importance that the city holds on Iraq’s national stage.
The findings of research concluded that there were several factors that were present in Baghdad during the months after the mosque bombing that influenced the feelings of the population and the response of US forces. These factors include (but are not limited to): the perception of al Qaeda to occupying forces and local inhabitants, the influence of Iran with regards to sectarian groups and Sunni and Shiite relations. This research advocates that standard operating procedures need to be replaced with unconventional strategy and tactics (akin to Special Forces, for example) which tends to be more population-centric when dealing with known and unknown challenges.
A description of the projects and activities of the Jerusalem Center for Public Affairs, a multidisciplinary, independent non-profit think tank for Israel policy research and education, bringing together the best minds in the political, strategic, diplomatic and legal arenas, in Israel and abroad.
Weeks1-2_MyLastName.docxWeeks 1-2 Written Assignment (s.docxloganta
Weeks1-2_MyLastName.doc/x
Weeks 1-2 Written Assignment
(submit here as
single
MS Word file)
·
Part 1
(refer to
Week
1
Readings in the Lessons for Week 1
)
o Provide an aprox. 1000-word in-depth evaluation of three articles of your choice from the Week 1 Reading List.
§
What are the strengths and weaknesses of each?
§
What is the most and lest persuasive premise, claim or rebuttal?
o
Conclude with a research or policy question for further research
o You must utilize literature and cite properly. Use style.APA
·
Part 2
o (
Title each response with the text of each question)
o
Has U.S. federal government developed a robust legal, regulatory and policy framework to address cyber security challenges? Why? Why not?
o
Conclude with a research question
or
policy question for further research.
o You must utilize APA (cite, reference, list) required
Week 2 Readings
.
· Submit both Parts as
single
Microsoft Word document.
· Name the file "
EDMG600Weeks1-2_YourLastName.doc/x
" (e.g., EDMG600Week1-2_Pesic.doc/x).
· Upload the document under Weeks1-2 Assignments.
Week 1
Reading and Resources
Reading Assignment
Choose and read
three
articles from the list bellow:
Kello, L. (2013).
The meaning of the cyber revolution: Perils to theory and statecraft
.
International Security,
Fall 2013.
Gartzke, E. (2013).
The myth of cyberwar: Bringing war in cyberspace back down to earth
.
International Security,
Fall 2013.
Arquilla, J. (2012).
Cyberwar is already upon us
.
Foreign Policy
. March/April, 2012.
Brown, G. & Poellet, K. (2012).
The Customary International Law of Cyberspace
.
Strategic Studies Quarterly,
6, no. 3, pp. 126-145.
Caplan, N. (2013).
Cyber War: the Challenge to National Security
.
Global Security Studies
, Winter 2013, Volume 4, Issue
Studentnummer, L. van den Boom (2012).
The dilemmas of state response to cyber attacks. Understanding the phenomena, challenges and legal response
. Vrije Universiteit Amsterdam:
Paper Governance of Security and Policing
.
Crosston, M. D. (2011).
World Gone Cyber MAD: How 'Mutually Assured Debilitation' Is the Best Hope for Cyber Deterrence
.
Strategic Studies Quarterly,
5, no. 1, pp. 100-116.
Goldsmith, J. (2011).
Cybersecurity Treaties: A Skeptical View
. A Future Challenges Essay. Hoover Institution.
Mudrinich, E. (2012).
Cyber 3.0: the Department of Defense strategy for operating in cyberspace and the attribution problem
.
Guinchard, A. (2011).
Between Hype and Understatement: Reassessing Cyber Risks as a Security Strategy
.
Journal of Strategic Security
Volume 4 Number 2 Summer 2011.
Khosla, P. (2009).
Information Security for the Next Century
.
Carnegie Mellon CyLab.
Hansen, L., & Nissenbaum, H. (2009).
Digital disaster, cyber security, and the Copenhagen School
.
Inte ...
The French Revolution, which began in 1789, was a period of radical social and political upheaval in France. It marked the decline of absolute monarchies, the rise of secular and democratic republics, and the eventual rise of Napoleon Bonaparte. This revolutionary period is crucial in understanding the transition from feudalism to modernity in Europe.
For more information, visit-www.vavaclasses.com
Read| The latest issue of The Challenger is here! We are thrilled to announce that our school paper has qualified for the NATIONAL SCHOOLS PRESS CONFERENCE (NSPC) 2024. Thank you for your unwavering support and trust. Dive into the stories that made us stand out!
How to Make a Field invisible in Odoo 17Celine George
It is possible to hide or invisible some fields in odoo. Commonly using “invisible” attribute in the field definition to invisible the fields. This slide will show how to make a field invisible in odoo 17.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
Instructions for Submissions thorugh G- Classroom.pptxJheel Barad
This presentation provides a briefing on how to upload submissions and documents in Google Classroom. It was prepared as part of an orientation for new Sainik School in-service teacher trainees. As a training officer, my goal is to ensure that you are comfortable and proficient with this essential tool for managing assignments and fostering student engagement.
1. Curriculum Vitae
Robert Stewart-Ingersoll
Assistant Professor of National Security
Department of International Security and Military Studies
USAF Air Command and Staff College
8853 Ashland Park Place
Montgomery, AL 36117
Phone: 334-294-7814
Email: stewartingersoll@gmail.com
Education
Ph.D., Political Science, May 2005, University of Arizona
Dissertation: Globalization and Human Rights: The Effects of Integration on State
Repression in Developing Countries, 1976-2000
Committee: William J. Dixon (Chair), Gary Goertz, and Scott W. Desposato
M.A., Political Science, 2002, University of Arizona
Major: International Relations
B.A., Political Science, 1996, Indiana University, Bloomington
Minor: History
Professional Experience
Course Director – International Security Studies February 2013 – Present
Department of International Security and Military Studies
USAF Air Command and Staff College
225 Chennault Circle, Room 236
Maxwell AFB, AL 36112
334-953-7767
Assistant Professor of National Security July 2011 – Present
Department of International Security and Military Studies
USAF Air Command and Staff College
225 Chennault Circle, Room 236
Maxwell AFB, AL 36112
334-953-7767
2. Assistant Professor of Political Science August 2009 – June 2011
Department of International Studies
American University of Sharjah
P.O. Box 26666
Sharjah, UAE
+971 6 515 1000
Assistant Professor August 2005 – June 2009
Department of Political Science
Grand Valley State University
1121 Au Sable Hall
Allendale, MI 49401
616-331-2320
Acting Director, International Relations Program January 2009 – June 2009
Grand Valley State University
1121 Au Sable Hall
Allendale, MI 49401
616-331-2320
Independent Instructor August 2003 – May 2005
Department of Political Science
University of Arizona
315 Social Science Building
Tucson, AZ 85721
520-621-7600
Teaching Assistant August 2000 – May 2003
Department of Political Science
University of Arizona
315 Social Science Building
Tucson, AZ 85721
520-621-7600
Books
Regional Powers and Security Orders: A Theoretical Framework, [with Derrick V.
Frazier]. London: Routledge Press, 2011.
Articles and Book Chapters
“Human Rights in the Middle East: A Global Outlier?” Alabama Journal of International
Affairs 1(1): 10-21.
“Geopolitics and India” [with Derrick V. Frazier]. In Handbook of India’s International
Relations, ed. David Scott. London: Routledge Press, 2011.
3. “Regional Powers and Security: A Framework for Understanding Order within Regional
Security Complexes” [with Derrick V. Frazier]. European Journal of International
Relations 16(4): 731-753.
“India as a Regional Power: Identifying the Impact of Roles and Foreign Policy
Orientation on the South Asian Security Order,” [with Derrick V. Frazier]. Asian Security
6(1): 51-73.
“Resistance to Hegemony Within the Core: Domestic Politics, Terrorism, and Policy
Divergence Within the G-7” [with Thomas J. Volgy, Kristin Kanthak, and Derrick V.
Frazier]. In Hegemony Constrained: Evasion, Modification, and Resistance to American
Foreign Policy, ed. Davis Bobrow. Pittsburgh, PA: University of Pittsburgh Press, 2008.
“The G7, International Terrorism, and Domestic Politics: Modeling Policy Cohesion in
Response to Systemic Disturbances” [with Thomas J. Volgy, Kristin Kanthak, and
Derrick V. Frazier]. International Interactions 30(3): 191-210, 2004.
“Preference Similarities and Group Hegemony: G-7 Voting Cohesion in the UN General
Assembly” [with Thomas J. Volgy and Derrick V. Frazier]. Journal of International
Relations and Development 6(1): 51-70, 2003.
“Another Inconvenient Truth: Why a US Withdrawal from Iraq would be a Mistake”
[with Derrick V. Frazier]. In The Illinois International Review. 7:3, 2008.
Working Projects
“Dissecting the Trade-Rights Connection: The Influence of Dyadic Trade Patterns on
State Repression, 1976-2006.”
“The Rise of the Regional Power.”
Book Review on North American Regional Security: A Trilateral Framework (by
Richard Kilroy, Abelardo Rodriguez Sumano, and Todd S. Hateley). Invited by Journal
of Strategic Security.
“Before the Spring: Human Rights and the Sources of Contentious Politics in the Middle
East, 1981-2009.”
“Regional Powers Are as Regional Powers Do: The RPSF and the Sources of Regional
Security Orders.”
“Leapfrogging the Local?: Domestic and Regional Security and India’s Rise.”
“Regional Powers and the Global-Regional Nexus in an Era of Systemic
Transformation.”
4. "Regions and Rights: Order, Leadership, and Repression within Regional Security
Complexes, 1981-2006."
“Meeting the Objectives of the QDR and NMS: Employing a Framework for Evaluating
Regional Security.”
“Trading for Rights: The Effects of Changing Trade Patterns on the Protection of
Personal Integrity Rights, 1976-2006.”
Conference Participation (Last 5 Years)
“Beating the ‘Global Problems’ Trade: Transnational Terrorism as a Regional Security
Issue.” To be presented at the ISSS/ISAC Conference in Chapel Hill, NC, October 4-6,
2012.
“Regional Powers and the Global-Regional Nexus in an Era of Systemic
Transformation.” Presented at the American Political Science Association
Conference in New Orleans, LA, August 30-September 2, 2012.
“Regional Powers and the Global-Regional Nexus in an Era of Systemic
Transformation.” Presented at the British International Studies Association-International
Studies Association Conference in Edinburgh, Scotland, June 20-22, 2012.
“Before the Spring: Human Rights and the Sources of Contentious Politics in the Middle
East, 1981-2009.” Presented at the Annual Convention of the International Studies
Association in San Diego, CA, March 31-April 4, 2012.
“Leapfrogging the Local?: Domestic and Regional Security and India’s Rise.” Presented
at the Annual Convention of the International Studies Association in San Diego, CA,
March 31-April 4, 2012.
“Meeting the Objectives of the QDR and NMS: Employing a Framework for Evaluating
Regional Security.” Presented at the Air Education and Training Command Symposium
in San Antonio, TX, January 12-13, 2012.
“Regional Powers Are as Regional Powers Do: The RPSF and the Sources of Regional
Security Orders.” Presented at the International Studies Association, Midwest Conference
in St. Louis, MO, November 11-13, 2011.
“The RPSF and its Implications for Understanding Security Orders.” Presented at the
IPSA-ECPR Joint Conference at Sao Paulo, Brazil, February16-19, 2011
“India and the South Asian RSC in the Wake of the Financial Crisis.” Presented at the
SGIR 7th
Pan-European Conference on International Relations in Stockholm, Sweden,
September 10-12, 2010.
5. "Regions and Rights: Order, Leadership, and Repression within Regional Security
Complexes, 1981-2006." Presented at the Annual Meeting of the American
Political Science Association in Washington, D.C., September 2-5, 2010.
“Trading for Rights: The Effects of Changing Trade Patterns on the Protection of
Personal Integrity Right, 1976-2006.” Presented at the Annual Conference of the
Eurasian Peace Science Society in Istanbul, Turkey, January 8-10, 2010 and at the
Annual Convention of the International Studies Association in New Orleans, USA,
February 17-20, 2010.
“Power, Roles, and Orientations: A Comparative Analysis of the Effects of Regional
Powers on the Security Orders in Three Unipolar Regions.” Presented at the Annual
Convention of the International Studies Association in New Orleans, USA, February 17-
20, 2010.
“U.S. Foreign Policy, International Human Rights, and the ‘Global War on Terror’.”
Presented at the Conference on American Government, Politics, and Policies at the
American University of Sharjah, Sharjah, UAE, January 25, 2010.
“Regional Powers and the Initiation and Management of Security Orders: Examining the
South Asian Case,” Presented at the Annual Meeting of the International Studies
Association, New York, NY, February 15-18, 2009.
“Dissecting the Trade-Rights Connection: The Influence of Dyadic Trade Patterns on
State Repression,” Annual Meeting of the Peace Science Society, Claremont, CA,
October 2009.
“Pressure to Conform? Exploring the Effects of Human Rights Behavior by States’
Primary Trade Partners on Levels of Repression,” Annual Meeting of the International
Studies Association – West Section, San Francisco, CA, September 2008.
“Regional Powers and Security: A Framework for Understanding Order within Regional
Security Complexes.” Annual Meeting of the International Studies Association, San
Francisco, CA, March 2008 (co-authored with Derrick V. Frazier).
Invited Professional Talks
The Legacy of Hiroshima and Nagasaki Today: Nuclear Oct. 2012
Proliferation in the Current International Environment,
presented at Auburn University, Montgomery for event
entitled “Hiroshima and Nagasaki: The Aftermath.”
The US Economy and National Security, presented at the USAF Sep. 2012
Air Command & Staff College for the International
Security Studies Course.
6. The International Political Economy of Trade, presented at the Jul. 2012
USAF Eaker Center, Defense Financial Management &
Comptroller School.
The International Political Economy of Trade, presented at the Apr. 2012
USAF Eaker Center, Defense Financial Management &
Comptroller School.
Globalization as International Order, presented at the USAF Eaker Jan. 2012
Center, Defense Financial Management & Comptroller
School
The Responsibility to Protect and the ‘New’ Interventionism in the May 2011
Middle East, presented as part of a panel at the American
University of Sharjah
Regional Powers and Security Orders: A Theoretical Framework for Sep. 2010
Explaining Regional Security Order, given at the Stockholm
International Peace Research Institute (SIPRI)
Directed Workshop and Gave Talk on Regional Powers and Security June 2010
Framework at the 3rd
Annual National Security Summit,
Middle East 2010: Counterterrorism and Border Security in
Abu Dhabi, UAE
India as a Regional Power through the Regional Powers and Security Mar. 2009
Framework, given at the Institute of Peace and Conflict
Studies, New Delhi, India
Understanding the Conflict Between Russia and Georgia within the Oct. 2008
Context of Regional Security Dynamics (GVSU)
Background and Contemporary Developments in the Darfur Crisis Jan. 2008
(GVSU)
Exploring the Tibetan Experience under Chinese Occupation (GVSU) Jan. 2008
Considering a U.S. Withdrawal from Iraq through a Regional Security Sep. 2007
Complex Lens (GVSU)
Constructive Responses to American Involvement in Iraq (Democracy Aug. 2007
for America – Kent County)
7. Political Science 2006 Elections Roundtable Discussion (GVSU) Oct. 2006
The Globalization Experience and its Impact on the Protection of Nov. 2005
Human Rights
Areas of Research and Teaching Interest
Regional Security Complexes
International Security
Human Rights
International Political Economy (Globalization)
South Asia
International Conflict and Conflict Resolution
International Relations Theory
U.S. Foreign Policy
Courses Taught
USAF Air Command and Staff College
Cultural and Regional Studies
International Security Studies
The Return of Regional Powers and Security Orders
Warfare Studies
American University of Sharjah
American Foreign Policy, POL 308
Comparative Politics, POL 300
Introduction to International Relations, POL 202
Introduction to Political Studies, POL 201
Wars, Conflicts, and Diplomacy, POL 307
Krakow University of Economics (Invited to Teach a Short Course in April 2009 as part of the
Studies in Transatlantic International Relations Program)
Contemporary Debates in U.S. Foreign Policy
Grand Valley State University
Human Rights in International Politics, PLS 316
International Relations, PLS 211
International Conflict and Conflict Resolution, PLS 311
International Political Economy, PLS 315
8. University of Arizona
Contemporary International Politics, POL 365
American Foreign Policy, POL 455
International Political Economy, POL 360
Theories of International Relations, POL 454
Professional Development
Participant in USAF Research Institute’s Asia Pacific Nov. 2011
Conference
Participant in CIEE (Council on International Economic Exchange) June 2008
Faculty Development Seminar – “Identity, Community, and
Culture in Contemporary Turkey”
Professional Service
Co-Organizer for Event on the Legacy of Hiroshima and Nagasaki Present
at Auburn University, Montgomery
Editorial Board Member for Alabama Journal of International Present
Affairs
Chair for “Transnational Terrorism” Panel at the ISSS/ISAC Oct. 2012
Conference in Chapel Hill, NC, Oct. 4-6, 2012.
Reviewer for Global Governance Apr. 2012
Discussant for “South Asian Security in Perspective” Panel at the Apr. 2012
Annual Convention of the International Studies
Association, San Diego, CA, Mar. 31-Apr. 4, 2012.
Chair of “Regional Powers and Security” Section of Panels and the Feb. 2011
“Russia And its ‘Near Abroad’: the Central Eurasian Security
Order” Panel at the IPSA-ECPR Joint Conference at Sao
Paulo, Brazil, February16-19, 2011
Discussant for “Russia and its ‘Near Abroad’: the Central Eurasian Feb. 2011
Security Order” Panel at the IPSA-ECPR Joint Conference
at Sao Paulo, Brazil, February 16-19, 2011
Chair of “Current Issues in Strategy and Security” Panel at the Sep. 2008
Annual Meeting of the International Studies Association – West,
San Fancisco, CA, Sep. 2008
9. University and Departmental Service, USAF Air Command and Staff College
Course Director for International Security Studies Feb. 2013 – Present
Course, AY14
Political Development Lecture for AY13 Cultural Mar. 2013
and Regional Studies Course
Terrorism Lecture for AY13 Warfare Studies Course Oct. 2012
The Economy and National Security Lecture for AY13 Sep. 2012
International Security Studies Course
Director of Introduction to Security Studies for New Jul. 2012
Faculty Development
Developer of BRICs Lesson for AY13 National Security Feb. 2012 – Present
Course
Developer of Globalization and IPE Lessons for AY13 Feb. 2012 – Present
National Security Course
Departmental Blackboard Trainer Jan. 2012 – Present
University and Departmental Service, American University of Sharjah
Search Committee for Interim Faculty Line in Philosophy Apr. 2010 – May 2010
Organizing Committee for the Conference on American Nov. 2009 – Jan. 2010
Government, Politics, and Policy Conference
Faculty Advisor for Model United Nations Aug. 2009 – Jun. 2011
Chair of the International Studies Accreditation and
Assessment Committee Aug. 2009 – Apr. 2011
International Studies Events Committee Aug. 2009 – Jun. 2011
International Studies Law and Diplomacy Committee Aug. 2009 – Jun. 2011
International Studies Student Life Committee Aug. 2009 – Jun. 2011
International Studies Teaching and Learning Committee Aug. 2009 – Jun. 2011
University and Department Service, Grand Valley State University
Acting International Relations Director Jan. 2009 – Jun. 2009
Academic Advisor (75 Advisees) Aug. 2006 – Jun. 2009
Advisor for Senior Honors Project Aug. 2006 – May 2007
Department of Political Science Strategic Planning Aug. 2006 – May 2007
Subcommittee on Student Learning Goals
International Education Committee Aug. 2008 – Jun. 2009
Academic Advisory Panel for Studies in Trans-Atlantic Mar. 2008 – Jun. 2009
International Relations (STAIR) Program
International Relations Committee Aug. 2006 – Jun. 2009
Advisor for Students for a Free Tibet Aug. 2008 – Jun. 2009
Advisor for International Relations Organization Aug. 2005 – Jun. 2009
10. Moderator – Exploring the Foreign Policy Positions of the two Oct. 2008
U.S. Presidential Candidates
Chair – Regional Perspectives on the Decolonization Experience Mar. 2008