Bridging the Gap Between Academic Research and National Security

…https://gnet-research.org/2020/07/30/telegrams-anti-is-campaign-effectiveness-perspectives-and-policy-suggestions/, and GW Program on Extremism, https://extremism.gwu.edu/sites/g/files/zaxdzs2191/f/EncryptedExtremism.pdf, RESOLVE network at USIP, https://www.resolvenet.org/system/files/2019-09/RSVE_RVESeries_ResearchingJihadistPropaganda_CWinter_May2019.pdf 22 https://www.degruyter.com/document/doi/10.7312/krau19300-021/html 23 https://www.justsecurity.org/67605/no-place-to-hide-no-place-to-post-lessons-from-recent-efforts-at-de-platforming-isis/ 24 https://twitter.com/just_security/status/1270811076448354304?s=20 25 https://www.vox.com/mischiefs-of-faction/2019/3/6/18252793/why-republicans-hate-nsf 26 https://psmag.com/news/congress-nsf-political-science-budget-54283 27 https://politicalsciencenow.com/an-update-on-political-science-at-the-nsf/ 28 https://blogs.lse.ac.uk/impactofsocialsciences/2016/05/25/should-academics-be-expected-to-change-policy-six-reasons-why-it-is-unrealistic/ 29 https://www.insidehighered.com/news/2020/03/05/pentagons-social-science-research-program-chopping-block 30 https://www.defensenews.com/congress/2021/08/02/defense-top-line-will-probably-go-up-key-dems-see-gop-boost-as-path-to-a-deal/…
Social Media Misinformation and the Prevention of Political Instability and Mass Atrocities

…1) belonging, 2) intelligibility, and 3) confirmation bias.18Christina Nemr and William Gangware, Weapons of Mass Distraction: Foreign State-Sponsored Disinformation in the Digital Age (Park Advisors, 2019), https://www.state.gov/wp-content/uploads/2019/05/Weapons-of-Mass-Distraction-Foreign-State-Sponsored-Disinformation-in-the-Digital-Age.pdf. The first category…
Privacy Policy
…to www.google.com/policies/privacy/partners/, and exercise the opt-out provided by Google by downloading the Google Analytics opt-out browser add-on, available at https://tools.google.com/dlpage/gaoptout. We also use Hotjar, which collects and analyzes information about…
The Defense Research Funding Environment: A Conversation

…that research because we’ve built this wall around it. When you just say the role of research in the DoD, the big role of research is actually to ensure that…
China’s Use of Armed Coercion: To Win Without Fighting

…that should be read by every policy practitioner.” Dr. Michael Swaine, Senior Research Fellow, East Asia Program, Quincy Institute for Responsible Statecraft Recent Media Hits March 5, 2024 –…
Politics & Ethics in the Mobilization of Social Science for National Security

…185-225, pp. 215, 216, 213. See also David Price, Cold War Anthropology: The CIA, the Pentagon, and the Growth of Dual Use Anthropology (Durham: Duke University Press, 2016), xii-xiv. 27…
Military Coercion and US Foreign Policy: The Use of Force Short of War

…of Asymmetric Conflict,” World Politics, 27, no. 2 (1975), 175–200; Diane Pfundstein Chamberlain, Cheap Threats: Why the United States Struggles to Coerce Weak States (Washington, DC: Georgetown University Press, 2016) 18 Michael Tomz, “Domestic Audience Costs…
What’s the Best Process? International Community Needs to Recommend Approaches to Implementation of Cyber Norms and Law
…For example, see: https://cyberlaw.ccdcoe.org/wiki/Main_Page. 6 https://www.universiteitleiden.nl/en/research/research-output/governance-and-global-affairs/revisiting-past-cyber-operations-in-light-of-new-cyber-norms-and-interpretations-of-international-law-inching-towards-lines-in-the-sand 7 See: https://front.un-arm.org/wp-content/uploads/2021/02/new-updated-norms-guidance-text-feb-11-clean.pdf and https://documents.unoda.org/wp-content/uploads/2021/12/Canadian-position-paper-2021-25-OEWG-final-Dec-6_Annex-Gender-Considerations.pdf 8 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/30March_ROK_law.pdf 9 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/30March_Japan_law.pdf 10 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/31March_CostaRica_CB.pdf 11 https://reachingcriticalwill.org/images/documents/Disarmament-fora/other/icts/oewg-II/statements/15Dec_Indonesia.pdf 12 https://www.stimson.org/project/cyber-security/ 13 For example, to support and complement other efforts,…