- Defense, Military, and Policy Studies
- Military and Defense Studies
- International Relations and Foreign Policy
- Global Health and Surgery
- Cybersecurity and Cyber Warfare Studies
- Peacebuilding and International Security
- Health and Medical Research Impacts
- Conflict Management and Negotiation
- Distributed Control Multi-Agent Systems
- European and Russian Geopolitical Military Strategies
- African history and culture studies
- Gender Studies in Language
- Nuclear Issues and Defense
- UAV Applications and Optimization
- Vietnamese History and Culture Studies
- Political Conflict and Governance
- Natural Resources and Economic Development
- Robotic Path Planning Algorithms
- Technology Assessment and Management
- Cybercrime and Law Enforcement Studies
- Politics and Conflicts in Afghanistan, Pakistan, and Middle East
- Discourse Analysis in Language Studies
- Research, Science, and Academia
- Historical and Contemporary Political Dynamics
- Information and Cyber Security
Princeton University
2017-2019
Buffalo State University
2018
University at Buffalo, State University of New York
2018
Woodrow Wilson International Center for Scholars
2017
Center for a New American Security
2010-2012
This article challenges the conventional wisdom that cyber operations have limited coercive value. It theorizes contribute to coercion by imposing costs and destabilizing an opponent's leadership. As mount destabilization spreads, expected utility of capitulation surpasses continued defiance, leading leaders comply with coercer's demands. The applies this 'cost-destabilization' model 2014 North Korean operation against Sony. Through cost imposition leadership destabilization, operation,...
This article advances the geographic grid approach to military unmanned aircraft systems (UAS) routing featured in existing literature. Its contributions are twofold. First, it demonstrates an empirical scoring system determine most important areas for maritime domain awareness-focused intelligence, surveillance, and reconnaissance collection, applying method South China Sea. Second, introduces what we call “team orienteering problem with prize-dependent loitering times” (TOP-PDLT) uses that...
Constructing a grand theory of war is difficult task. International Relations scholars such as Hans Morgenthau, Kenneth Waltz, John Mearsheimer, and Samuel Huntington have relied on the principle...
Track ii diplomacy, or unofficial interactions designed to produce ideas, build relationships, and change perceptions, has become a supplement – sometimes an alternative traditional diplomacy. Yet practitioners scholars still debate its effectiveness. Practitioners claim that diplomacy promotes peace but insist contributions are intangible therefore difficult assess empirically. Meanwhile, maintain only rigorous empirical evaluation can demonstrate the effect of on conflict outcomes. This...
This paper discusses our writing centre’s outreach to trans and gender non-conforming students on campus the subsequent responses this. Specifically, centre embarked an campaign through promotional materials sponsored events. During following 2016 U.S. presidential election, we found posters repeatedly defaced. We present a case study of this situation, beginning with background information about review In order think potential for transformative response these events, explore history...
In his recent article, Michael Beckley argues that the military balance in East Asia has stabilized because “China's neighbors can check Chinese maritime expansion.”1 He even Taiwan, neighbor most imperiled by power, repel, perhaps singlehandedly, a invasion. We disagree for three reasons.First, writes “Taiwan probably would have some notice” of invasion (p. 85). But if China concealed its intentions through deception, core tenet doctrine, Taiwan could little warning time to mobilize...
Recent changes to US defence strategy, plans and forces have placed the United States at greater risk of over-promising under-delivering on its global security ambitions. In 2012, Obama administration released a new strategic guidance document adapt shifting environment budget cuts. The upholds two long-standing American goals pre-eminence reach, but seeks apply this military power by using planning regional concepts. It revises Department Defense's force construct, an important tool used...
A s the war in Iraq drags into its sixth year and cumulative spending ap- proved by Congress for "global on terrorism" surpasses $850 billion, both American public security experts are becoming increasingly concerned about present future direction of US defense spending.One proposal under consideration is to allocate budget each as a specific percentage America's gross domestic product (GDP).Advocates this approach typically recommend pegging "base" Department Defense (DOD) spending, which...
Cyber operations may not impose much physical destruction, but they can squeeze at least three political pressure points: money, leadership and secrecy.
After the Nationalist Party came to power in South Africa 1948, it began institutionalizing white superiority by implementing apartheid, an unprecedented legal codification of racist ideology. M...