AccoladesA Collection of Student Scholarship

Archives

Found 8 Accolades
  • 2017

The Impact of the Personal Rivalry Between Patrick Henry and Thomas Jefferson on Early Virginia and National Politics

Author: John McNeer
Abstract:

This paper analyzes the personal rivalry that arose between Patrick Henry and Thomas Jefferson and its impact on early political and legal reform in Virginia, the Federalist-Anti-Federalist Debate, and early national politics. The paper also describes the influences and different perspectives of both men and how they affected Virginia and national politics.

  • 2017

Factors in Somali Culture that Prevent the Establishment of Centralized Governance

Author: Jason Salvog
Abstract:

The nation state of Somalia and its people have been on the periphery of global attention for the better part of the past three decades. During this time, the global community has branded Somalia as a failed state, with no legitimate functioning central government that provides for the population and represents the country internationally.  While there have been other countries labeled as failed states during this time, Somalia is unique in both the duration of this label and the number of attempts to make the country a productive member of the international community. The intent of this writing is to shed light and enhance the understanding of some of the aspects of the issues that exist in Somalia that have contributed to the failure to establish a legitimate and functioning central government. These failures are due both to the lack of cultural understanding by the donor nations and some of the cultural views held by a segment of the Somali population. The approaches that have either worked in donor nations or that the donor nations have had success with in nation building endeavors may not work in Somalia due to cultural differences and factors that external actors may be aware of but not truly understand. This paper highlights and offers potential solutions to some of the cultural issues that have prevented the Somalia from developing a legitimate, functioning government during this time despite support from the international community.

  • 2017

Factors Associated with Falls in Hospitalized Patients

Author: Michele Allen
Abstract:

Injurious falls are the most commonly reported patient safety incidents in hospitals and are among the top 10 sentinel events reported to the Joint Commission (Joint Commission, 2009).  Injuries resulting from falls can lengthen the hospital stay and add additional costs to both client and facility. Up to 1-in-10 in-hospital falls results in injury or death (Joint Commission, 2009). Experts agree that programs personalized to individual patients’ risks of falling are most effective, but very few hospitals have initiated such programs (Eldridge, 2007). Decreasing inpatient falls and fall-related injuries are still a problem at the bedside, and further analysis geared toward understanding this phenomenon to prevent and reduce falls.
The purpose of this non-experimental descriptive correlational proposal will be to identify and analyze factors contributing to patient falls. A collective analysis of data will be gathered on patients who fell while hospitalized at a military treatment facility from October 2015 through April 2016. The statistics will be obtained from the nursing documentation, patient safety risks, post-fall documentation, and questionnaires.

  • 2017

Cyber Strategic Relations Between the United States and the Republic of Korea

Author: Arlene Drew
Abstract:

This paper analyzes the cyber strategic relations between the United States of America and the Republic of Korea through historical and cultural lenses. The two nations created a strong military partnership for the overt reason of defending the region against the Democratic People’s Republic of Korea to the north. Historical and cultural factors have shaped the way the alliance operates, while developments in cyber capabilities and impactful events have directed its actions and motives in cyber defense. Other major actors and methods of cooperation also shape cyber diplomacy in the Asia-Pacific region. This paper examines the specific system used by the U.S.-ROK alliance called CENTRIXS-K and how it should be strengthened for the future. It also provides a cultural explanation for why relations have turned out the way they have, through civil-military relations and Greer Hofstede’s cultural dimensions. Finally, the foundations revealed in this paper highlight the current and future threats for cyber relations, while the limitations of this project and currently unfolding events point the way that future research should go.

  • 2017

Narcocaudillos: A New Technique for Conducting Asymmetrical Warfare

Author: Patrick Simon
Abstract:

The narcocaudillos of Mexico converted from mere smugglers to arbiters of political power willing to initiate insurgencies when the federal government challenged their authority and threatened their economic standing. Many scholars disagree with this assessment and believe that an insurgency must have political-military goals; however, Mexican narcocaudillos are conducting an insurgency with a business-commercial motive based on the new urban insurgency model. They outsource functions outside of their scope of interest to the Mexican federal government, functions such as international political relations and military power, while maintaining tangible political authority throughout the country domestically. Thus, increasing their freedom of movement. Their strategy and methods are more reminiscent of traditional insurgents rather than smugglers or criminal syndicates.  This study forwards the claim that Mexican narcocaudillos conduct an insurgency in Mexico that adheres to the new urban insurgency model. This claim is convoluted at best given the preconceived notions on the concept of insurgency itself to include the belief that non-state actors must have a political-military motivation before being labeled an insurgency. The motives of non-state actors should not solely determine whether the group receives the designation of insurgent.

  • 2017

Terrorism and Insurgency Revisited

Author: Brittany Biglari
Abstract:

Terrorism and insurgencies as strategies, have been conducted on behalf of states and have occurred within states, by non-state entities in the Middle East. While the contexts of terrorism and those of an insurgency are distinct in its features, there is much contention surrounding the application, as terrorists have waged both terrorism and an insurgency at the same time in efforts to shape varying political outcomes.

This paper will seek to explore the differences between insurgencies and terrorism as strategies specifically within Iraq, and the West's counterinsurgency and counterterrorism responses in addressing such issues, specifically through the use of force and repressive responses. Furthermore, this paper will explore how counterinsurgency and counterterrorism approaches are conducted in accordance to international law, and any implications which occur as a result of this application, in terms of the West's capacity to respond.

  • 2017

SCADA Fusion with Commercial Fission

Author: Matthew Horner
Abstract:

Nuclear power plants, as well as most other power plants, rely on digital components to perform daily operations. Many of these components are supervisory control and data acquisition (SCADA) devices that can contain software vulnerabilities. In order to address SCADA and other cyber threats, the regulating body for nuclear power plants, the US Nuclear Regulatory Commission (NRC), has issued directives for licensed operators to develop and submit cybersecurity plans for their facilities. However, while the guidance is on par with cybersecurity programs in other sectors, the application may be inadequate; protection against cyber-attacks is growing more important as SCADA systems become more standardized and connected to other networks. In addition to resilient components, improvements like redundancy, whitelisting, and intrusion detection systems (IDS) can help improve a SCADA control network. Ultimately, a culture shift in the nuclear power industry may be required to improve the actions of nuclear operators and supervisors. Creation of an information sharing and analysis center (ISAC) can also provide anonymous lessons learned and expertise to the NRC and nuclear power plants in the US.

  • 2017

Financial Objectives and Strategies for the Company

Author: Andre Petion
Abstract:

State Street Bank and the division of State Street Corporation, also known as State Street, is an American worldwide service holding company. State Street provides investment management, servicing and administration; research and trading; and financial data. Build from more than 20,000 portfolios with assets exceeding $2 trillion, State Street proprietary universe of data to help to better understand the client performance.