Articles

41 Items

A Chinese soldier stands guard next to Tiananmen Square

AP/Louise Delmotte

Journal Article - Global Studies Quarterly

Two Paths: Why States Join or Avoid China's Belt and Road Initiative

    Authors:
  • M. Taylor Fravel
  • Raymond Wang
  • Nick Ackert
  • Sihao Huang
| 2023

Although China's motives for developing the Belt and Road Initiative (BRI) have been well studied, scholars have yet to comprehensively examine why states seek to join the initiative. The authors fill this gap by examining how and why states join the BRI. Countries join by signing a Memorandum of Understanding (MOU) with China on cooperation under the BRI framework.

A protester holds up a placard outside the U.S. Consulate in Hong Kong, Wednesday, June 26, 2019.

AP Photo/Kin Cheung

Journal Article - Quarterly Journal: International Security

Nowhere to Hide? Global Policing and the Politics of Extradition

    Author:
  • Daniel Krcmaric
| Fall 2022

U.S. power extends beyond the military and economic spheres to include policing. The United States has used its global policing power to capture terrorists, warlords, and drug kingpins. But extradition is not simply a bureaucratic tool. States’ geopolitical interests shape their willingness to cooperate with others in extraditing fugitives. 

Soldiers conducting a Mobile Training Team deployment in Liberia.

U.S. Army

Journal Article - Quarterly Journal: International Security

Soldiers' Dilemma: Foreign Military Training and Liberal Norm Conflict

| Spring 2022

When the U.S. military trains other states’ forces, it tries to impart liberal norms such as respect for human rights. But when liberal norms clash, these soldiers prioritize loyalty to their unit, the military, and shared goals.

Ambassador Ivor Richard, left, of the United Kingdom, and U.S. Ambassador Andrew Young, right, raise their arms during vote, Friday, Nov. 4, 1977 at the United Nations Security Council.

(AP Photo/Dave Pickoff)

Journal Article - Quarterly Journal: International Security

Caught Red-Handed: How States Wield Proof to Coerce Wrongdoers

| Fall 2021

States frequently acquire proof that other states have violated norms. Yet, existing theories do not fully explain how states wield such proof to coerce wrongdoers. Four case studies of nuclear proliferation probe a novel theory of how states coerce norm violators by concealing, sharing privately, or publicizing proof of guilt.

Black Americans register to vote in the July 4 Georgia Democratic Primary in Atlanta, Ga., on May 3, 1944. Registrations are increasing in Atlanta as black schools are giving instructions to students in ballot casting procedure.

AP Photo

Journal Article - Quarterly Journal: International Security

White Supremacy, Terrorism, and the Failure of Reconstruction in the United States

| Summer 2021

White Southerners opposed to Reconstruction used violence to undermine Black political power and force uncommitted white Southerners to their side. Although structural factors made it harder for the U.S. government to suppress this violence, a series of policy failures prompted Reconstruction’s failure and generations of injustice.

It was announced, that a pact of mutual assistance has been negotiated between the British, French, and Soviet governments. It is stated that the British Cabinet is sending their draft of the fact, negotiated mainly by Lord Halifax during his visit to Geneva, to Moscow and Paris for approval within the next twenty-four hours. From left to right are Georges Bonnet, the French Foreign Minister, Ivan Maisky, the Russian Ambassador in London, and Lord Edward Halifax, the British Foreign Minister, at Geneva, Swi

AP Photo

Journal Article - Quarterly Journal: International Security

When Do Ideological Enemies Ally?

| Summer 2021

Two variables help determine whether ideological enemies are likely to ally against a shared material threat. States’ susceptibility to domestic ideological changes and the nature of states’ ideological differences are two contending forces that influence alliance formation or failure.

Former President Bill Clinton in conversation with Kennedy School professor R. Nicholas Burns at the inaugural Stephen W. Bosworth Memorial Lecture in Diplomacy on Wednesday.

Isabel G. Skomro, Crimson Staff Writer

Newspaper Article - Harvard Crimson

Former President Bill Clinton Reflects on Foreign Policy Challenges at HKS Lecture

| Apr. 07, 2021

Former President Bill Clinton reflected on the foreign policy challenges of his presidency at the inaugural Stephen W. Bosworth Memorial Lecture in Diplomacy, hosted Wednesday by the Harvard Kennedy School.

Granddaughter of President Dwight Eisenhower Mary Jean Eisenhower (front row 4th from L), the great-grandson of President Eisenhower Merrill Eisenhower Atwater (5th) and Japan's Prime Minister Shinzo Abe (5th) and others pose for photo ahead of the reception to mark 60th anniversary of Japan-U.S. Security Treaty at Iikura Guest House in Tokyo on Jan. 19, 2020. (The Yomiuri Shimbun)

AP Photo/Pool for Yomiuri

Journal Article - Quarterly Journal: International Security

Network Connections and the Emergence of the Hub-and-Spokes Alliance System in East Asia

    Author:
  • Yasuhiro Izumikawa
| Fall 2020

A social exchange network approach reveals how three U.S. allies—Japan, South Korea, and Taiwan—contributed to the emergence and shape of the hub-and-spokes alliance system in East Asia. This finding enables scholars and policymakers to devise appropriate policy responses as the system changes.

teaser image

Magazine Article - Economist

Digital Dominance: A new global ranking of cyber-power throws up some surprises

China has the world’s largest army. Russia wields the most tanks. America owns the fanciest satellites. But who has the most cyber-power? A new National Cyber Power Index by the Belfer Centre at Harvard University ranks 30 countries on their level of ambition and capability. Offensive cyber-power—the ability to do harm in or through computer networks—is one measure. But so too are the strength of a country’s defences, the sophistication of its cyber-security industry and its ability to spread and counter propaganda.