47 research outputs found
CROSS-IDEOLOGICAL SOLAR POWER COALITIONS IN THE AMERICAN SOUTH: AN ADVOCACY COALITION APPROACH
Abstract
CROSS-IDEOLOGICAL SOLAR POWER COALITIONS IN THE AMERICAN SOUTH: AN ADVOCACY COALITION APPROACH
By Brian T. Toibin, Ph.D.
A dissertation submitted in partial fulfillment of the requirements for the degree of
Doctor of Philosophy in Public Policy and Administration at Virginia Commonwealth University.
Virginia Commonwealth University, 2018.
Major Director: Dr. Damian Pitt
Associate Professor of Urban and Regional Studies and Planning
L. Douglas Wilder School of Government and Public Affairs
The purpose of this study was to explore two particular cross-ideological coalitions that have formed in order to promote pro-solar power policies in Georgia and Florida through the lens of the Advocacy Coalition Framework. The membership of the coalitions include individuals and organizations from opposite sides of the current prevailing ideological spectrum which united to support pro-solar policies for reasons that are consistent with their ideological worldview. The coalition in Georgia is known as the Green Tea Coalition and the coalition in Florida is known as Floridians for Solar Choice.
This qualitative study was guided by the following questions: 1) Why did supporters of solar power organize themselves into the particular coalition structures represented by Georgia’s Green Tea Coalition and the Floridians for Solar Choice Coalition?; 2) How have Georgia’s Green Tea Coalition and the Floridians for Solar Choice Coalition successfully managed their policy coalitions?; 3) How effective are these coalitions perceived to be by public policy players outside the coalitions?; 4) Do the Green Tea Coalition and the Floridians for Solar Choice Coalition represent an Advocacy Coalition approach?
Engaging these questions through the effective theoretical lens of the Advocacy Coalition Framework revealed a compelling example of cross-ideological cooperation within an increasingly divided political culture. Significant lessons concerning the formation and successful operation of coalitions were learned. The importance of strategic alliances, public belief systems, policy messaging, electorate education, policy learning, and careful political positioning are a few of the factors that enabled these coalitions to find success. The political success of these coalitions significantly advanced the role that solar power will be allowed to play in the future energy portfolio of these two influential states in the American South and across the country.
While the positive results for the future of solar power engineered by the coalitions are impressive, perhaps the most important lessons revealed by the study concern the potential for progress and cooperation on other complex issues. A portfolio of difficult issues awaits action by persons of good faith willing to find a cooperative path on which to move forward. Coalitions will be required to address many of these difficult problems. The lessons and example provided by these two cross-ideological coalitions may help others produce a their own blueprint to encourage cross-ideological cooperation. This cooperation will be required if progress is to be made for the well being of current and future generations
Examining experiences and perceptions of ethnic diversity and inclusivity in United Kingdom orthodontics
1334 Words for 1334 Students : A Story by Colm Toibin, Handwritten by the Students of Cawthra Par Secondary School and Collected by Don Ball's Grade 12 Visual Arts Class Art of Our Time : a Project by Micah Lexier, 2008
Mad, Bad, Dangerous to Know: The Fathers of Wilde, Yeats, and Joyce
Elegant, profound, and riveting, Mad, Bad, Dangerous to Know illuminates not only the complex relationships between three of the greatest writers in the English language and their fathers, but also illustrates the surprising ways these men surface in their work. Through these stories of fathers and sons, Tóibín recounts the resistance to English cultural domination, the birth of modern Irish cultural identity, and the extraordinary contributions of these complex and masterful authors.https://corescholar.libraries.wright.edu/dlpp_all/1597/thumbnail.jp
The heroin bushfire.
Investigation into the Dublin heroin trade; focus on the trafficking of drugs, the impact on communities in Dublin, Garda response, details on the Dunne family. The article discusses events in various areas of Dublin including Crumlin, St. Teresa's Gardens, Dolphin House, Ballyfermot, Ballymun and Hardwicke St. The article also covers community response to drugs and drug users , the Tallaght Drugs Actions Committee, and retaliation by drug dealers towards members of local community groups
Code Obfuscation: A Comprehensive Approach to Detection, Classification, and Ethical Challenges
Code obfuscation has become an essential practice in modern software development, designed to make source or machine code challenging for both humans and computers to comprehend. It plays a crucial role in cybersecurity by protecting intellectual property, safeguarding trade secrets, and preventing unauthorized access or reverse engineering. However, the lack of transparency in obfuscated code raises significant ethical concerns, including the potential for harmful or unethical uses such as hidden data collection, malicious features, back doors, and concealed vulnerabilities. These issues highlight the need for a balanced approach that ensures the protection of developers’ intellectual property while addressing ethical responsibilities related to user privacy, transparency, and societal impact. This paper investigates various code obfuscation techniques, their benefits, challenges, and practical applications, underscoring their relevance in contemporary software development. This study examines obfuscation methods and tools, evaluates machine learning models—including Random Forest, Gradient Boosting, and Support Vector Machine—and presents experimental results aimed at classifying obfuscated versus non-obfuscated files. Our findings demonstrate that these models achieve high accuracy in identifying obfuscation methods employed by tools such as Jlaive, Oxyry, PyObfuscate, Pyarmor, and py-obfuscator. This research also addresses emerging ethical concerns and proposes guidelines for a balanced, responsible approach to code obfuscation
