Jacob N. Shapiro, “Small Wars, Big Data: The Information Revolution in Modern Conflict” (Princeton UP, 2018)
Small Wars, Big Data: The Information Revolution in Modern Conflict (Princeton University Press, 2018), Eli Berman, Joseph H. Felter, and Jacob N. Shapiro, takes a data-based approach to examine how actions can affect violence in asymmetric conflicts.  Using data sets from Afghanistan, Iraq, and the Philippines, the authors evaluate several... Read More
Milan Vaishnav, “When Crime Pays: Money and Muscle in Indian Politics” (Yale UP, 2017)
Why do Indian voters knowingly vote for politicians with pending criminal proceedings against them? Why do political parties recruit criminal politicians among their rank and file? If money and muscle do not mean the failure of democracy, but instead are how things work under certain circumstances, then what are the... Read More
George Perkovich and Ariel E. Levite, “Understanding Cyber Conflict: 14 Analogies” (Georgetown UP, 2017)
Understanding Cyber Conflict: 14 Analogies (Georgetown University Press, 2017), edited by George Perkovich and Ariel E. Levite, uses analogies to conventional warfare and previous technological innovations to explain the complexities of cyber capabilities and threats. The essays examine cyber weapons, cyber warfare, and cyber defense using case studies that include... Read More
Alexander Thurston, “Boko Haram: The History of an African Jihadist Movement” (Princeton UP, 2017)
Boko Haram is one of the most well known global terrorist organizations. They have killed thousands of people and displaced millions of West Africans. While widespread journalistic reporting on the group tries to keep up with their activities, few have placed them in a rich historical context to understand how... Read More
Mark S. Hamm and Ramon Spaaij, “The Age of Lone Wolf Terrorism” (Columbia UP, 2017)
The Age of Lone Wolf Terrorism (Columbia University Press, 2017), by Mark S. Hamm and Ramon Spaaij, identifies patterns among individuals that commit acts of terror outside of a group or network. Hamm and Spaaij follow these individuals, commonly called lone wolf terrorists, through multiple data points to inform a... Read More
Social media & sharing icons powered by UltimatelySocial