Articles

32 Items

Ugandan police and other security forces chase people off the streets to avoid unrest after all public transport was banned for two weeks to halt the spread of the new coronavirus.

AP Photo/Ronald Kabuubi

Journal Article - Quarterly Journal: International Security

Opportunistic Repression: Civilian Targeting by the State in Response to COVID-19

    Authors:
  • Donald Grasse
  • Melissa Pavlik
  • Hilary Matfess
  • Travis B. Curtice
| Fall 2021

Opportunistic repression arises when states use crises to suppress the political opposition. An examination of the relationship between COVID-19 shutdown policies and state violence against civilians in Africa, including and a subnational case study of Uganda, tests this theory.

U.S. President Dwight D. Eisenhower and Secretary of State John Foster Dulles (from left) greet South Vietnamese President Ngo Dinh Diem at Washington National Airport

DoD/Department of the Air Force

Journal Article - Small Wars Journal

Bernard Fall as an Andrew Marshall Avant la Lettre (Part II)

| Dec. 09, 2019

SWJ interview with Nathaniel L. Moir, Ph.D., an Ernest May Postdoctoral Fellow in History and Policy at the Belfer Center for Science and International Affairs, Harvard Kennedy School. Dr. Moir is completing a book manuscript on Bernard Fall for publication.

Journal Article - Quarterly Journal: International Security

Correspondence: Military-Technological Imitation and Rising Powers

| Fall 2019

Michael C. Horowitz and Shahryar Pasandideh respond to Andrea Gilli and Mauro Gilli’s winter 2018/19 article, “Why China Has Not Caught Up Yet: Military-Technological Superiority and the Limits of Imitation, Reverse Engineering, and Cyber Espionage.”

Chinese stealth fighter in the air

(China Military Online)

Journal Article - Quarterly Journal: International Security

Why China Has Not Caught Up Yet: Military-Technological Superiority, Systems Integration, and the Challenges of Imitation, Reverse Engineering, and Cyber-Espionage

| Winter 2018/19

The extraordinary complexity of today’s advanced weapons systems has significantly reduced the ability of states to imitate other states’ military technology. Consequently, U.S. rivals such as China will continue to struggle to develop indigenous capabilities that can match those of the United States.

Chinese soldiers salute during a ceremony in Hangzhou city, east Chinas Zhejiang province, November 15, 2013.

Guo Guangjie/ Imaginechina

Journal Article - Quarterly Journal: International Security

Contested Primacy in the Western Pacific: China's Rise and the Future of U.S. Power Projection

    Author:
  • Evan Braden Montgomery
| Spring 2014

Despite their disagreements, proponents of deep engagement and offshore balancing share an optimistic but unrealistic assessment regarding the durability of U.S. military dominance. China’s antiaccess/area denial strategy and conventional precision-strike capabilities are already undermining the United States’ military dominance in East Asia. The United States will need to adapt its military to meet this challenge.

The women in this image are Minova, DRC, rape survivors who are veiled so they cannot be seen or recognized in court during their testimony.

Globalpost image

Journal Article - Journal of Peace Research

Sexual Violence in Armed Conflict: Introducing the SVAC Dataset, 1989–2009

| May 2014

Which armed groups have perpetrated sexual violence in recent conflicts? This article presents patterns from the new Sexual Violence in Armed Conflict (SVAC) dataset. The dataset, coded from the three most widely used sources in the quantitative human rights literature, covers 129 active conflicts, and the 625 armed actors involved in these conflicts, during the period 1989–2009.

Security detail overseeing the secure transportation of highly enriched uranium to Russia in Poland, October 2010

USA.gov

Journal Article - Journal of Nuclear Materials Management

Preventing Insider Theft: Lessons from the Casino and Pharmaceutical Industries

| June 17, 2013

Through structured interviews and a literature review, we assess which approaches to protection against insider thefts in the casino and pharmaceutical industries could be usefully applied to strengthen protections against insider theft in the nuclear industry, where insider thefts could have very high consequences.

Somali port workers load food aid onto trucks from a warehouse in Mogadishu's port, Dec. 7, 1992.  Disagreements between warring warlords had kept the port closed for more than a month.

AP Photo

Journal Article - International Journal

Agenda for Peace or Budget for War? Evaluating the Economic Impact of International Intervention in Somalia

| Spring 2012

This article shows how international humanitarian aid, particularly food aid, has played an instrumental role in perpetuating chronic civil war and state collapse in Somalia from 1992–2012. During the 1992 famine, food aid created lucrative opportunities for criminal elements of the Somali business community, who partnered with local warlords to create an enduring system of corruption and aid dependence. International aid financed this elite pact between business and warlords, which subsequently undermined domestic processes of order-making and reduced the bargaining power of local communities in the peace-building process.

A  visitor walks past signs for energy conservation during the 2010 China International Industry Fair in Shanghai, China, 9 November 2010.

AP Photo

Journal Article - Energy

A Network-based Modeling Framework for Stakeholder Analysis of China's Energy Conservation Campaign

    Authors:
  • Wen Feng
  • Zheng Li
  • Edward F. Crawley
  • Weidou Ni
| August 2011

This paper proposes a network-based modeling framework to facilitate the development of stakeholder analysis of China's energy conservation campaign. Given the proposed framework, an illustrative case study is provided to elaborate how to integrate a set of techniques to further develop a quantitative model, as well as to demonstrate the practicability of the proposed framework. The results derived from the case study shows that the proposed framework and the model can be used as analytical tools to improve the government's policymaking process in term of providing a systematic perspective of stakeholder interrelations.