Travis Sharp

ORCID: 0000-0003-3554-0018
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Defense, Military, and Policy Studies
  • Military and Defense Studies
  • International Relations and Foreign Policy
  • Global Health and Surgery
  • Cybersecurity and Cyber Warfare Studies
  • Peacebuilding and International Security
  • Health and Medical Research Impacts
  • Conflict Management and Negotiation
  • Distributed Control Multi-Agent Systems
  • European and Russian Geopolitical Military Strategies
  • African history and culture studies
  • Gender Studies in Language
  • Nuclear Issues and Defense
  • UAV Applications and Optimization
  • Vietnamese History and Culture Studies
  • Political Conflict and Governance
  • Natural Resources and Economic Development
  • Robotic Path Planning Algorithms
  • Technology Assessment and Management
  • Cybercrime and Law Enforcement Studies
  • Politics and Conflicts in Afghanistan, Pakistan, and Middle East
  • Discourse Analysis in Language Studies
  • Research, Science, and Academia
  • Historical and Contemporary Political Dynamics
  • Information and Cyber Security

Princeton University
2017-2019

Buffalo State University
2018

University at Buffalo, State University of New York
2018

Woodrow Wilson International Center for Scholars
2017

Center for a New American Security
2010-2012

This article challenges the conventional wisdom that cyber operations have limited coercive value. It theorizes contribute to coercion by imposing costs and destabilizing an opponent's leadership. As mount destabilization spreads, expected utility of capitulation surpasses continued defiance, leading leaders comply with coercer's demands. The applies this 'cost-destabilization' model 2014 North Korean operation against Sony. Through cost imposition leadership destabilization, operation,...

10.1080/01402390.2017.1307741 article EN Journal of Strategic Studies 2017-04-11

This article advances the geographic grid approach to military unmanned aircraft systems (UAS) routing featured in existing literature. Its contributions are twofold. First, it demonstrates an empirical scoring system determine most important areas for maritime domain awareness-focused intelligence, surveillance, and reconnaissance collection, applying method South China Sea. Second, introduces what we call “team orienteering problem with prize-dependent loitering times” (TOP-PDLT) uses that...

10.1177/15485129241312711 article EN The Journal of Defense Modeling and Simulation Applications Methodology Technology 2025-02-03

Constructing a grand theory of war is difficult task. International Relations scholars such as Hans Morgenthau, Kenneth Waltz, John Mearsheimer, and Samuel Huntington have relied on the principle...

10.1080/10402650701524709 article EN Peace Review 2007-08-01

Track ii diplomacy, or unofficial interactions designed to produce ideas, build relationships, and change perceptions, has become a supplement – sometimes an alternative traditional diplomacy. Yet practitioners scholars still debate its effectiveness. Practitioners claim that diplomacy promotes peace but insist contributions are intangible therefore difficult assess empirically. Meanwhile, maintain only rigorous empirical evaluation can demonstrate the effect of on conflict outcomes. This...

10.1163/15718069-12341349 article EN International Negotiation 2017-02-20

This paper discusses our writing centre’s outreach to trans and gender non-conforming students on campus the subsequent responses this. Specifically, centre embarked an campaign through promotional materials sponsored events. During following 2016 U.S. presidential election, we found posters repeatedly defaced. We present a case study of this situation, beginning with background information about review In order think potential for transformative response these events, explore history...

10.31468/cjsdwr.615 article EN cc-by-sa Discourse and Writing/Rédactologie 2018-05-24

In his recent article, Michael Beckley argues that the military balance in East Asia has stabilized because “China's neighbors can check Chinese maritime expansion.”1 He even Taiwan, neighbor most imperiled by power, repel, perhaps singlehandedly, a invasion. We disagree for three reasons.First, writes “Taiwan probably would have some notice” of invasion (p. 85). But if China concealed its intentions through deception, core tenet doctrine, Taiwan could little warning time to mobilize...

10.1162/isec_c_00339 article EN International Security 2019-02-01

Recent changes to US defence strategy, plans and forces have placed the United States at greater risk of over-promising under-delivering on its global security ambitions. In 2012, Obama administration released a new strategic guidance document adapt shifting environment budget cuts. The upholds two long-standing American goals pre-eminence reach, but seeks apply this military power by using planning regional concepts. It revises Department Defense's force construct, an important tool used...

10.1111/j.1468-2346.2012.01114.x article EN International Affairs 2012-09-01

A s the war in Iraq drags into its sixth year and cumulative spending ap- proved by Congress for "global on terrorism" surpasses $850 billion, both American public security experts are becoming increasingly concerned about present future direction of US defense spending.One proposal under consideration is to allocate budget each as a specific percentage America's gross domestic product (GDP).Advocates this approach typically recommend pegging "base" Department Defense (DOD) spending, which...

10.55540/0031-1723.2443 article EN The US Army War College Quarterly Parameters 2008-08-01

Cyber operations may not impose much physical destruction, but they can squeeze at least three political pressure points: money, leadership and secrecy.

10.1080/00396338.2018.1542800 article EN Survival 2018-11-02

After the Nationalist Party came to power in South Africa 1948, it began institutionalizing white superiority by implementing apartheid, an unprecedented legal codification of racist ideology. M...

10.1080/10402650500374793 article EN Peace Review 2005-10-01

10.1080/14751791003658594 article EN Defense and Security Analysis 2010-03-01
Coming Soon ...