Books

946 Items

teaser image

Book - Belknap Press

Democracy: A Case Study

    Author:
  • David Moss
| Feb. 21, 2017

To all who declare that American democracy is broken—riven by partisanship, undermined by extremism, and corrupted by wealth—history offers hope. In nearly every generation since the nation’s founding, critics have made similar declarations, and yet the nation is still standing. When should we believe the doomsayers? In Democracy: A Case Study, historian David Moss adapts the case study method made famous by Harvard Business School to revitalize our conversations about governance and democracy and show how the United States has often thrived on political conflict.

Democracy’s nineteen case studies were honed in Moss’s Harvard course, which is among the institution’s most highly rated. Each one presents readers with a pivotal moment in U.S. history and raises questions facing key decision makers at the time: Should delegates to the Constitutional Convention support James Madison’s proposal for a congressional veto over state laws? Should President Lincoln resupply Fort Sumter? Should Florida lawmakers approve or reject the Equal Rights Amendment?

These vibrant cases ask readers to weigh choices and consequences, wrestle with momentous decisions, and come to their own conclusions. They provoke us to rethink which factors make the difference between constructive and destructive conflict, and they provide an opportunity to reengage the passionate debates that are crucial to a healthy society. Democracy: A Case Study invites us all to experience American history anew and come away with a deeper understanding of our democracy’s greatest strengths and vulnerabilities as well as its extraordinary resilience over time.

Book - Oxford University Press

The Cybersecurity Dilemma: Hacking, Trust, and Fear Between Nations

Feb. 01, 2017

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well.

Book - Oxford University Press

The Cybersecurity Dilemma: Hacking, Trust and Fear Between Nations

    Author:
  • Ben Buchanan
| February 2017

In this book, Cyber Security Project Fellow Dr. Ben Buchanan shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Book - Cornell University Press

Insider Threats

| January 2017

High-security organizations around the world face devastating threats from insiders—trusted employees with access to sensitive information, facilities, and materials. From Edward Snowden to the Fort Hood shooter to the theft of nuclear materials, the threat from insiders is on the front page and at the top of the policy agenda. Insider Threats offers detailed case studies of insider disasters across a range of different types of institutions, from biological research laboratories, to nuclear power plants, to the U.S. Army. Matthew Bunn and Scott D. Sagan outline cognitive and organizational biases that lead organizations to downplay the insider threat, and they synthesize "worst practices" from these past mistakes, offering lessons that will be valuable for any organization with high security and a lot to lose

Saudi fighters in Islamic State

Islamic State film screenshot

Book Chapter - Oxford University Press

In the Shadow of the Islamic State: Shi'i Responses to Sunni Jihadist Narratives in a Turbulent Middle East

| 2016

This chapter examines how the Arab Spring was gradually sectarianized, leading to the emergence of much more rigid and puritanical sect-based identities and inter-communal conflicts across the Middle East and extending even further outside of the region and across the Muslim-majority world.

teaser image

Book - Oxford University Press

Jihadism Transformed: Al-Qaeda and Islamic State's Global Battle of Ideas

    Editors:
  • Simon Staffell
  • Akil Awan
| 2016

Jihadist narratives have evolved dramatically over the past five years, driven by momentous events in the Middle East and beyond; the death of bin Laden; the rise and ultimate failure of the Arab Spring; and most notably, the rise of the so-called Islamic State. For many years, al-Qaeda pointed to an aspirational future Caliphate as their utopian end goal — one which allowed them to justify their violent excesses in the here and now. Islamic State turned that aspiration into a dystopic reality, and in the process hijacked the jihadist narrative, breathing new life into the global Salafi-Jihadi movement. Despite air-strikes from above, and local disillusionment from below, the new caliphate has stubbornly persisted and has been at the heart of ISIS's growing global appeal. This timely collection of essays examines how jihadist narratives have changed globally, adapting to these turbulent circumstances. Area and thematic specialists consider transitions inside the Middle East and North Africa as well as in South Asia, sub-Saharan Africa and Europe. As these analyses demonstrate, the success of the ISIS narrative has been as much about resonance with local contexts, as it has been about the appeal of the global idea of a tangible and realised caliphate.

Book - Rowman & Littlefield Publishers, Inc.

Cyber Insecurity: Navigating the Perils of the Next Information Age

| October 2016

In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future.

Book - Harvard University Press

Cycles of Invention and Discovery: Rethinking the Endless Frontier

Cycles of Invention and Discovery offers an in-depth look at the real-world practice of science and engineering. It shows how the standard categories of "basic" and "applied" have become a hindrance to the organization of the U.S. science and technology enterprise. Tracing the history of these problematic categories, the authors document how historical views of policy makers and scientists have led to the construction of science as a pure ideal on the one hand and of engineering as a practical (and inherently less prestigious) activity on the other. Even today, this erroneous but still widespread distinction forces these two endeavors into separate silos, misdirects billions of dollars, and thwarts progress in science and engineering research.

Book - Cornell University Press

Rape During Civil War

| August 2016

Rape is common during wartime, but even within the context of the same war, some armed groups perpetrate rape on a massive scale while others never do. In Rape During Civil WarDara Kay Cohen examines variation in the severity and perpetrators of rape using an original dataset of reported rape during all major civil wars from 1980 to 2012. Cohen also conducted extensive fieldwork, including interviews with perpetrators of wartime rape, in three postconflict counties, finding that rape was widespread in the civil wars of the Sierra Leone and Timor-Leste but was far less common during El Salvador's civil war.