833 resultados para US credibility
Resumo:
This thesis is a study of how the Gerald Ford administration struggled to address a perceived loss of US credibility after the collapse of Vietnam, with a focus on the role of Secretary of State Henry Kissinger in the formulation, implementation and subsequent defence of US Angolan policy. By examining the immediate post-Vietnam period, this thesis shows that Vietnam had a significant impact on Kissinger’s actions on Angola, which resulted in an ill conceived covert operation in another third world conflict. In 1974, Africa was a neglected region in Cold War US foreign policy, yet the effects of the Portuguese revolution led to a rapid decolonization of its African territories, of which Angola was to become the focus of superpower competition. After South Vietnam collapsed in April 1975, Kissinger became fixated on restoring the perceived loss of US prestige, Angola provided the first opportunity to address this. Despite objections from his advisors, Kissinger methodically engineered a covert program to assist two anti-Marxist guerrilla groups in Angola. As the crisis escalated, the media discovered the operation and the Congress decided to cease all funding. A period of heated tensions ensued, resulting in Kissinger creating a new African policy to outmanoeuvre his critics publicly, while privately castigating them to foreign leaders. This thesis argues that Kissinger’s dismissal of internal dissent and opposition from the Congress was influenced by what he perceived as bureaucrats being affected by the Vietnam syndrome, and his obsession with restoring US credibility. By looking at the private and public records – as expressed in government meetings and official reports, US newspaper and television coverage and diplomatic cables – this thesis addresses the question of how the lessons of Vietnam failed to influence Kissinger’s actions in Angola, but the lessons of Angola were heavily influential in the construction of a new US-African policy.
Resumo:
The range of political information sources available to modern Australians is greater and more varied today than at any point in the nation’s history, incorporating print, broadcast, Internet, mainstream and non-mainstream media. In such a competitive media environment, the factors which influence the selection of some information sources above others are of interest to political agents, media institutions and communications researchers alike. A key factor in information source selection is credibility. At the same time that the range of political information sources is increasing rapidly, due to the development of new information and communication technologies, audience research suggests that trust in mainstream media organisations in many countries is declining. So if people distrust the mainstream media, but have a vast array of alternative political information sources available to them, what do their personal media consumption patterns look like? How can we analyse such media consumption patterns in a meaningful way? In this paper I will briefly map the development of media credibility research in the US and Australia, leading to a discussion of one of the most recent media credibility constructs to be shown to influence political information consumption, media scepticism. Looking at the consequences of media scepticism, I will then consider the associated media consumption construct, media diet, and evaluate its usefulness in an Australian, as opposed to US, context. Finally, I will suggest alternative conceptualisations of media diets which may be more suited to Australian political communications research.
Resumo:
Hard-line anti-communists in the United States recognised the potential for the Soviet invasion of Afghanistan in 1979 to embroil their super-power rival in a ‘Vietnam-like quagmire.’ Their covert operation to arm the mujahedeen is well documented. This dissertation argues that propaganda and public diplomacy were powerful and essential instruments of this campaign. It examines the protagonists of this strategy, their policies, initiatives and programmes offering a comprehensive analysis heretofore absent. It stretches from the dying days of the Carter administration when Zbigniew Brzezinski saw the ‘opportunity’ presented by the invasion to the Soviet’s withdrawal in 1989. The aim of these information strategies was to damage Soviet credibility and enhance that of the US, considered under threat from growing ‘moral equivalence’ amongst international publics. The conflict could help the US regain strategic advantage in South Asia undermined by the ‘loss’ of Iran. The Reagan administration used it to justify the projection of US military might that it believed was eviscerated under Carter and emasculated by the lingering legacy of Vietnam. The research engages with source material from the Reagan Presidential Library, the United States Information Agency archives and the Library of Congress as well as a number of online archives. The material is multi-archival and multi-media including documentaries, booklets, press conferences, summit programmes and news-clips as well as national security policy documents and contemporaneous media commentary. It concludes that propaganda and public diplomacy were integral to the Reagan administration and other mujahedeen supporters’ determination to challenge the USSR. It finds that the conflict was used to justify military rearmament, further strategic aims and reassert US power. These Cold War machinations had a considerable impact on the course of the conflict and undermined efforts at resolution and reconciliation with profound implications for the future stability of Afghanistan and the world.
Resumo:
Thesis (Ph.D.)--University of Washington, 2015
Resumo:
Successful and responsible introduction of probiotic and prebiotic products into the worldwide marketplace requires labelling for health benefits that meets consumer needs, adheres to regulatory standards and does not overextend scientific evidence. Regulations differ among countries, but underlying all is an emphasis on scientific credibility of any statements of health benefits. This paper considers the value of different types of evidence offered in substantiation of efficacy and reviews different regulatory approaches to labelling for health claims. Limitations of in vitro, animal and different types of human studies used for efficacy substantiation for probiotics and prebiotics are discussed.
Resumo:
Pronouns carry considerable importance in language. The speaker’s identity and connection to the audience emerges through the consistent use of certain pronouns (De Fina, 1995). This research is about the use of we, us, and our in political discourse. Specifically, their use will be examined in the inaugural addresses of George W. Bush in 2005 and Barack Obama in 2009. The aim of this research is to examine the frequencies and the co-occurrences of these pronouns and then compare their use in these two speeches. More specifically, how do the pronouns examined affect the message and enhance hearer credibility. This is done by applying (a) a quantitative corpus linguistics analysis and (b) qualitative analysis of the context of use. The results show that there is a difference in frequency of pronoun use; however, the usage of pronouns is rather similar in the two speeches
Resumo:
The euro area is facing crisis, while the US is not, though the overall fiscal situation and outlook is better in the euro area than in the US, and though the US faces serious state-level fiscal crises. A higher level of fiscal federalism would strengthen the euro area, but is not inevitable. Current fiscal reform proposals (strengthening of current rules, more policy coordination and an emergency financing mechanism) will if implemented result in some improvements. But implementation might be deficient or lack credibility, and could lead to disputes and carry a significant political risk. Introduction of a Eurobond covering up to 60 percent of member states’ GDP would bring about much greater levels of fiscal discipline than any other proposal, would create an attractive Eurobond market, and would deliver a strong message about the irreversible nature of European integration.
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. ^ This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document. ^
Resumo:
In broad terms — including a thief's use of existing credit card, bank, or other accounts — the number of identity fraud victims in the United States ranges 9-10 million per year, or roughly 4% of the US adult population. The average annual theft per stolen identity was estimated at $6,383 in 2006, up approximately 22% from $5,248 in 2003; an increase in estimated total theft from $53.2 billion in 2003 to $56.6 billion in 2006. About three million Americans each year fall victim to the worst kind of identity fraud: new account fraud. Names, Social Security numbers, dates of birth, and other data are acquired fraudulently from the issuing organization, or from the victim then these data are used to create fraudulent identity documents. In turn, these are presented to other organizations as evidence of identity, used to open new lines of credit, secure loans, “flip” property, or otherwise turn a profit in a victim's name. This is much more time consuming — and typically more costly — to repair than fraudulent use of existing accounts. This research borrows from well-established theoretical backgrounds, in an effort to answer the question – what is it that makes identity documents credible? Most importantly, identification of the components of credibility draws upon personal construct psychology, the underpinning for the repertory grid technique, a form of structured interviewing that arrives at a description of the interviewee’s constructs on a given topic, such as credibility of identity documents. This represents substantial contribution to theory, being the first research to use the repertory grid technique to elicit from experts, their mental constructs used to evaluate credibility of different types of identity documents reviewed in the course of opening new accounts. The research identified twenty-one characteristics, different ones of which are present on different types of identity documents. Expert evaluations of these documents in different scenarios suggest that visual characteristics are most important for a physical document, while authenticated personal data are most important for a digital document.
Comparison of Regime Switching, Probit and Logit Models in Dating and Forecasting US Business Cycles
Resumo:
Listed Australian property companies wrote off more than $8.5 billlion from their ill-fated US investment adventures during this reporting season.
Resumo:
Although the soap opera as a television genre has consistently captured the imagination of millions of people around the world, surprisingly little has been written about it in the marketing literature. Understanding the consumption imagery in soaps may allow marketers to assess the relevance of product placement for their promotion strategy better, as well as providing valuable insight into the consumption habits of their considerable viewing audiences. Data were collected through content analysis from two soap operas, one in the USA and one in New Zealand. The results indicated a high level of consumption imagery, including brand references. Furthermore significant differences in the types of product and the emotional outcome of product use were found between the countries.