Bridging the Gap Between Academic Research and National Security

…https://gnet-research.org/2020/07/30/telegrams-anti-is-campaign-effectiveness-perspectives-and-policy-suggestions/, and GW Program on Extremism, https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/EncryptedExtremism.pdf, RESOLVE network at USIP, https://www.resolvenet.org/system/files/2019-09/RSVE_RVESeries_ResearchingJihadistPropaganda_CWinter_May2019.pdf 22 https://www.degruyter.com/document/doi/10.7312/krau19300-021/html 23 https://www.justsecurity.org/67605/no-place-to-hide-no-place-to-post-lessons-from-recent-efforts-at-de-platforming-isis/ 24 https://twitter.com/just_security/status/1270811076448354304?s=20 25 https://www.vox.com/mischiefs-of-faction/2019/3/6/18252793/why-republicans-hate-nsf 26 https://psmag.com/news/congress-nsf-political-science-budget-54283 27 https://politicalsciencenow.com/an-update-on-political-science-at-the-nsf/ 28 https://blogs.lse.ac.uk/impactofsocialsciences/2016/05/25/should-academics-be-expected-to-change-policy-six-reasons-why-it-is-unrealistic/ 29 https://www.insidehighered.com/news/2020/03/05/pentagons-social-science-research-program-chopping-block 30 https://www.defensenews.com/congress/2021/08/02/defense-top-line-will-probably-go-up-key-dems-see-gop-boost-as-path-to-a-deal/…
Social Media Misinformation and the Prevention of Political Instability and Mass Atrocities

…Sense of Information and Judging Its Credibility” (Understanding and Addressing the Disinformation Ecosystem, Annenberg School for Communications, 2017), 45–50, https://firstdraftnews.org/wp-content/uploads/2018/03/The-Disinformation-Ecosystem-20180207-v3.pdf. The most popular YouTube channels receive over 14 billion views…
Privacy Policy
…to www.google.com/policies/privacy/partners/, and exercise the opt-out provided by Google by downloading the Google Analytics opt-out browser add-on, available at https://tools.google.com/dlpage/gaoptout. We also use Hotjar, which collects and analyzes information about…
The Defense Research Funding Environment: A Conversation

…that research because we’ve built this wall around it. When you just say the role of research in the DoD, the big role of research is actually to ensure that…
Politics & Ethics in the Mobilization of Social Science for National Security

…and the Office of Naval Research,” 305. As the Cold War deepened, the security community’s growing research budget and the NSF’s meager support of social research made military agencies leading…
What’s the Best Process? International Community Needs to Recommend Approaches to Implementation of Cyber Norms and Law
…For example, see: https://cyberlaw.ccdcoe.org/wiki/Main_Page. 6 https://www.universiteitleiden.nl/en/research/research-output/governance-and-global-affairs/revisiting-past-cyber-operations-in-light-of-new-cyber-norms-and-interpretations-of-international-law-inching-towards-lines-in-the-sand 7 See: https://front.un-arm.org/wp-content/uploads/2021/02/new-updated-norms-guidance-text-feb-11-clean.pdf and https://documents.unoda.org/wp-content/uploads/2021/12/Canadian-position-paper-2021-25-OEWG-final-Dec-6_Annex-Gender-Considerations.pdf 8 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/30March_ROK_law.pdf 9 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/30March_Japan_law.pdf 10 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/31March_CostaRica_CB.pdf 11 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/15Dec_Indonesia.pdf 12 https://www.stimson.org/project/cyber-security/ 13 For example, to support and complement other efforts,…
Preventing Atrocities Among Pastoral Communities Through Disarmament

…in the Great Lakes Region and the Horn of Africa,” n.d., https://www.sipri.org/sites/default/files/research/disarmament/dualuse/pdf-archive-att/pdfs/recsa-nairobi-protocol-for-the-prevention-control-and-reduction-of-small-arms-and-light-weapons-in-the-great-lakes-region-and-the-horn-of-africa.pdf. have been tested to control SALW proliferation, the most infamous being the “cooperate to disarm” (C2D) model. The C2D model…
What the Last Century of Efforts to Bridge the Beltway/Ivory Tower Gap In National Security Tells Us

…1974): 230. Parallel efforts also took place at the Department of Defense. DoD, or at least the more technical research offices such as the Defense Advanced Research Projects Agency (DARPA)…