<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://posse.gatech.edu/">
  <channel>
    <title>Journal Articles</title>
    <link>https://posse.gatech.edu/</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Nuclear Weapons Scholarship as a Case of Self-Censorship in Security Studies</title>
  <link>https://posse.gatech.edu/node/8740</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Nuclear Weapons Scholarship as a Case of Self-Censorship in Security Studies&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/beno%C3%AEt-pelopidas" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Benoît Pelopidas&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Tue, 11/22/2016 - 14:45&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;Security studies scholarship on nuclear weapons is particularly prone to self-censorship. In this essay, Pelopidas argues that this self-censorship is problematic. The vulnerability, secrecy, and limits to accountability created by nuclear weapons (Deudney 2007, 256–57; Born, Gill, and H^anggi 2010; Cohen 2010, 147) call for responsible scholarship vis-a-vis the general public. This need for renewed and expanded scholarly responsibility is especially pressing given current plans among nuclear-weapon states to “modernize” their nuclear arsenals, committing their citizens and children to live in nuclear-armed countries and, a fortiori , a nuclear armed world (Mecklin 2015). Despite this need, the existing reflexive literature in security studies—calling for greater scholarly responsibility (see Steele and Amoureux 2016; Waever 2015, 95–100)—has neither specifically focused on nuclear weapons nor explored the forms of self-censorship identified here as shaping a modality of responsibility. In making this case, Pelopidas defines self-censorship in nuclear weapons scholarship as unnecessary boundaries on scholarly discourse within security fstudies&lt;/p&gt;
&lt;/div&gt;
      
  &lt;div class="field field--name-field-publication-upload field--type-file field--label-above"&gt;
    &lt;div class="field__label"&gt;Related Files&lt;/div&gt;
          &lt;div class="field__items"&gt;
              &lt;div class="field__item"&gt;
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://posse.gatech.edu/sites/default/files/pubfiles/Pelopidas_2016_JGSS_self-censorship_0.pdf" type="application/pdf"&gt;Pelopidas_2016_JGSS_self-censorship.pdf&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
</description>
  <pubDate>Tue, 22 Nov 2016 19:45:33 +0000</pubDate>
    <dc:creator>Benoît Pelopidas</dc:creator>
    <guid isPermaLink="false">8740 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>Security Competition and Denuclearization: The North Korean  Nuclear Crisis and International Strategic Choices</title>
  <link>https://posse.gatech.edu/node/8739</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Security Competition and Denuclearization: The North Korean  Nuclear Crisis and International Strategic Choices&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/zzhong" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;ZZhong&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Wed, 05/11/2016 - 20:15&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;Differing approaches by key stakeholders to the North Korean nuclear issue is a manifestation of the security competition among some of them, especially the two Koreas, the United States, and China. These major players have competing visions of national security objectives and priorities, including regional peace, regime stability, alliance relationship, security assurance, and denuclearization. Some objectives are overlapping, while others might be conflicting. For some countries, the pursuit of some objectives might be contradictory to the pursuit of other objectives. In past nuclear crises, these players tended to have different hierarchies of preferences, and pursued different and at least partially contradictory approaches to realize them. However, closer exploration of the previous nuclear crises find that it is possible for these key players to curb their competition, so as to reach security cooperation and avoid a transformation from security competition to security dilemma. In achieving that goal, it is imperative for the key players to build mutual trust, to moderate their security competition, and to resume multilateral negotiation based on a combination of coercive means and pertinent incentives. It is also necessary for the key players in the nuclear issue, especially the United States and China, to initiate discussion on how to cooperate and respond to potential future unexpected scenarios.&lt;/p&gt;
&lt;/div&gt;
      
  &lt;div class="clearfix text-formatted field field--name-field-bibliography field--type-text-with-summary field--label-above"&gt;
    &lt;div class="field__label"&gt;Bibliography&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;p&gt;Zhong Zhenming&lt;br /&gt;
Associate Professor, School of Political Science and International Relations, Tongji&lt;br /&gt;
University, Shanghai, 200092, China&lt;/p&gt;
&lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-publication-upload field--type-file field--label-above"&gt;
    &lt;div class="field__label"&gt;Related Files&lt;/div&gt;
          &lt;div class="field__items"&gt;
              &lt;div class="field__item"&gt;
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://posse.gatech.edu/sites/default/files/pubfiles/Zhong%20-%20POSSE%202015%20paper.pdf" type="application/pdf"&gt;Zhong - POSSE 2015 paper.pdf&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
</description>
  <pubDate>Thu, 12 May 2016 00:15:00 +0000</pubDate>
    <dc:creator>ZZhong</dc:creator>
    <guid isPermaLink="false">8739 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>Sharing the Bomb:  Nonproliferation, Deterrence, and  Foreign Nuclear Deployments</title>
  <link>https://posse.gatech.edu/node/8736</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Sharing the Bomb:  Nonproliferation, Deterrence, and  Foreign Nuclear Deployments&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/tsechser" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;TSechser&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Wed, 05/11/2016 - 20:15&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;When the United States dropped an atomic bomb on Hiroshima, Japan in August 1945, it launched a grand contest between two forces: nations determined to prevent the spread of nuclear weapons, and those determined to acquire their own. Early hopes of a long-lasting American atomic monopoly were dashed by the Soviet Union’s first atomic test in 1949, followed by Great Britain in 1952, France in 1960, and China in 1964. Three more nations (Israel, India, and South Africa) successfully crossed the nuclear threshold by 1980, and by 1990 Pakistan had joined the nuclear club as well.&lt;/p&gt;
&lt;/div&gt;
      
  &lt;div class="clearfix text-formatted field field--name-field-bibliography field--type-text-with-summary field--label-above"&gt;
    &lt;div class="field__label"&gt;Bibliography&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;p&gt;Todd S. Sechser&lt;br /&gt;
Associate Professor of Politics,&lt;br /&gt;
University of Virginia&lt;/p&gt;
&lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-publication-upload field--type-file field--label-above"&gt;
    &lt;div class="field__label"&gt;Related Files&lt;/div&gt;
          &lt;div class="field__items"&gt;
              &lt;div class="field__item"&gt;
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://posse.gatech.edu/sites/default/files/pubfiles/Sechser%20-%20Sharing%20the%20Bomb%20-%202015.pdf" type="application/pdf"&gt;Sechser - Sharing the Bomb - 2015.pdf&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
</description>
  <pubDate>Thu, 12 May 2016 00:15:00 +0000</pubDate>
    <dc:creator>TSechser</dc:creator>
    <guid isPermaLink="false">8736 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>Low Numbers and the Role of Verification</title>
  <link>https://posse.gatech.edu/node/8735</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Low Numbers and the Role of Verification&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/nperfilyev" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;NPerfilyev&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Wed, 05/11/2016 - 20:15&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;Arms control treaties deal with sensitive issue of national security. States that come to an agreement through a compromise balancing their interests want to make sure that the other party is fulfilling its obligations and that fulfilling your own obligations does not put you at a relative disadvantage. That is why arms control agreements are rarely self-executing. Even though it is generally believed that states enter international treaties in good faith and are expected to abide by their commitments, contracting parties usually verify that the obligations are observed. A negotiated verification regime becomes an integral part of an arms control agreement. In this context, verification can be described as the “process of gathering and analyzing information to make a judgement about parties' compliance or non-compliance with an agreement.”2 In the absence of a verification regime, such treaties can become a mere declaration of intent.&lt;/p&gt;
&lt;/div&gt;
      
  &lt;div class="clearfix text-formatted field field--name-field-bibliography field--type-text-with-summary field--label-above"&gt;
    &lt;div class="field__label"&gt;Bibliography&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;p&gt;Nikita Perfilyev&lt;/p&gt;
&lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-publication-upload field--type-file field--label-above"&gt;
    &lt;div class="field__label"&gt;Related Files&lt;/div&gt;
          &lt;div class="field__items"&gt;
              &lt;div class="field__item"&gt;
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://posse.gatech.edu/sites/default/files/pubfiles/Perfilyev%20-%2015-12-15%20Verification%20and%20Compliance%20at%20Low%20Numbers%20Final.pdf" type="application/pdf"&gt;Perfilyev - 15-12-15 Verification and Compliance at Low Numbers Final.pdf&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
</description>
  <pubDate>Thu, 12 May 2016 00:15:00 +0000</pubDate>
    <dc:creator>NPerfilyev</dc:creator>
    <guid isPermaLink="false">8735 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>Re-imagining global nuclear ordering beyond proliferation and deterrence</title>
  <link>https://posse.gatech.edu/node/8734</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Re-imagining global nuclear ordering beyond proliferation and deterrence&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/beno%C3%AEt-pelopidas" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Benoît Pelopidas&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Wed, 05/11/2016 - 20:15&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;This article analyzes nuclear weapons related scholarship as a subset of security studies particularly prone to self-censorship, even in the post-Cold War era. It argues that self-censorship effects come from the joint use of the notions of deterrence and non-proliferation and the invocation of an expected veto player. The effects of the words 'proliferation' and 'deterrence' and the assumption that a supposedly important player in nuclear policy will veto proposals for change, create avenues for self-censorship and delegitimize transformative thinking. This is because the utterances including 'proliferation' and 'deterrence' do double work: they want, simultaneously, to describe the world as it is and to have an impact on it. This tension shapes a space in which transformative thinking appears to be either incompetent or dangerous. Furthermore, the invoked existence of an important player inexorably reluctant to change makes critical thinking look futile: it prevents some actors inclined to accept change in principle from actually modifying their practice. To show how these delegitimizing mechanisms and the self-censorship effect operate, the article analyzes the op-ed piece of Harold Brown and John Deutsch rejecting the policy shift towards nuclear disarmament, on the one hand, and more briefly those of George Shultz, William Perry, Henry Kissinger and Sam Nunn advocating it, on the other. Finally, it provides a strategy to create space for transformative thinking about nuclear weapons in security studies.&lt;/p&gt;
&lt;/div&gt;
      
  &lt;div class="clearfix text-formatted field field--name-field-bibliography field--type-text-with-summary field--label-above"&gt;
    &lt;div class="field__label"&gt;Bibliography&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;p&gt;Benoit Pelopidas&lt;/p&gt;

&lt;p&gt;Lecturer in International Relations at the University of Bristol, Affiliate of CISAC, Stanford University and visiting fellow at the Princeton Institute for International and Regional Studies for 2015-2016.&lt;/p&gt;
&lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-publication-upload field--type-file field--label-above"&gt;
    &lt;div class="field__label"&gt;Related Files&lt;/div&gt;
          &lt;div class="field__items"&gt;
              &lt;div class="field__item"&gt;
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://posse.gatech.edu/sites/default/files/pubfiles/Pelopidas_Re-imagining_POSSE2015.pdf" type="application/pdf"&gt;Pelopidas_Re-imagining_POSSE2015.pdf&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
</description>
  <pubDate>Thu, 12 May 2016 00:15:00 +0000</pubDate>
    <dc:creator>Benoît Pelopidas</dc:creator>
    <guid isPermaLink="false">8734 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>Governing North-East Asia Security: Nuclear Non-proliferation &amp; Strategic Reconciliation </title>
  <link>https://posse.gatech.edu/node/8729</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Governing North-East Asia Security: Nuclear Non-proliferation &amp; Strategic Reconciliation &lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/lhuaping" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;HLiu&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Wed, 04/20/2016 - 10:49&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;Nuclear proliferation issue has occupied the central position of the North East Asia area for more than 20 years.  Besides nuclear proliferation problem, there are still many other quarrels and disputes among the countries of this region.  Instead of discussing the proliferation issue technically and tactically, this paper would like to place this issue under a wider strategic context to find a way out and mainly focus on the relationships between or among China, ROK and Japan.  The major hypothesis is that the nuclear proliferation issue must be settled under the condition of genuine strategic reconciliation among these nations.  If the three nations can build mutual-confidence, it would doubtlessly in turn create a favorable environment for the Korea peninsular internal reconciliation.  More importantly, such reconciliation can also push the US- DPRK relationship improved which is the key to denuclearization in the region. &lt;/p&gt;
&lt;/div&gt;
      
  &lt;div class="clearfix text-formatted field field--name-field-bibliography field--type-text-with-summary field--label-above"&gt;
    &lt;div class="field__label"&gt;Bibliography&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;p&gt;Huaping Liu&lt;/p&gt;

&lt;p&gt;School of International Relations&lt;/p&gt;

&lt;p&gt;Beijing Language and Culture University&lt;/p&gt;

&lt;p&gt;hp_liu@hotmail.com&lt;/p&gt;
&lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-publication-upload field--type-file field--label-above"&gt;
    &lt;div class="field__label"&gt;Related Files&lt;/div&gt;
          &lt;div class="field__items"&gt;
              &lt;div class="field__item"&gt;
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://posse.gatech.edu/sites/default/files/pubfiles/Huaping%20Liu%20Paper%20for%20POSSE%20Yr%206.pdf" type="application/pdf"&gt;Huaping Liu Paper for POSSE Yr 6.pdf&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
</description>
  <pubDate>Wed, 20 Apr 2016 14:49:16 +0000</pubDate>
    <dc:creator>HLiu</dc:creator>
    <guid isPermaLink="false">8729 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>How Leaders Assess Intentions Under Uncertainty: Costly Signaling, Leader Background Experiences, and Nuclear Diplomacy</title>
  <link>https://posse.gatech.edu/node/8728</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;How Leaders Assess Intentions Under Uncertainty: Costly Signaling, Leader Background Experiences, and Nuclear Diplomacy&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Anonymous (not verified)&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Tue, 04/19/2016 - 17:04&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;How do leaders assess the intentions of their counterparts under uncertainty? This study&lt;br /&gt;
addresses this question by analyzing the development of nuclear programs. The technology&lt;br /&gt;
needed to build nuclear weapons and produce nuclear energy is indistinguishable. How,&lt;br /&gt;
then, can leaders identify a nuclear developer’s true intentions? An influential body of&lt;br /&gt;
literature suggests that costly signals play a key role in shaping states’ beliefs about whether a&lt;br /&gt;
developer of nuclear technology covets energy or bombs. I argue, however, that leader-centric&lt;br /&gt;
factors could also play a role in how states assess intentions. In particular, the background&lt;br /&gt;
experiences of leaders – particularly whether they are former rebels – might influence how&lt;br /&gt;
they are perceived. Leaders with rebel experience are generally seen as aggressive, revisionist,&lt;br /&gt;
and unreliable, making states more likely to conclude that their intentions are sinister. I test&lt;br /&gt;
the observable implications of these arguments for military conflict. The findings indicate&lt;br /&gt;
that former rebels who develop nuclear capacity are significantly more likely than their&lt;br /&gt;
non-rebel counterparts to be targeted in military disputes, suggesting that countries form&lt;br /&gt;
impressions about others’ intentions based on leader backgrounds. Costly signals, on the&lt;br /&gt;
other hand, do not seem to influence whether states believe that nuclear-capable states&lt;br /&gt;
covet bombs or energy. These findings carry implications for the role of costly signaling in&lt;br /&gt;
world politics and for leader-centric approaches to the study of IR.&lt;/p&gt;
&lt;/div&gt;
      
  &lt;div class="clearfix text-formatted field field--name-field-bibliography field--type-text-with-summary field--label-above"&gt;
    &lt;div class="field__label"&gt;Bibliography&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;p&gt;Matthew Fuhrmann&lt;br /&gt;
Texas A&amp;M University&lt;br /&gt;
mfuhrmann@tamu.edu&lt;/p&gt;
&lt;/div&gt;
          &lt;/div&gt;

  &lt;div class="field field--name-field-publication-upload field--type-file field--label-above"&gt;
    &lt;div class="field__label"&gt;Related Files&lt;/div&gt;
          &lt;div class="field__items"&gt;
              &lt;div class="field__item"&gt;
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://posse.gatech.edu/sites/default/files/pubfiles/Fuhrmann.pdf" type="application/pdf"&gt;Fuhrmann.pdf&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
</description>
  <pubDate>Tue, 19 Apr 2016 21:04:34 +0000</pubDate>
    <dc:creator>Anonymous</dc:creator>
    <guid isPermaLink="false">8728 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>Putin's Syria Strategy: Russian Airstrikes and What Comes Next</title>
  <link>https://posse.gatech.edu/node/8726</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Putin's Syria Strategy: Russian Airstrikes and What Comes Next&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/dima-adamsky" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;Dima Adamsky&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Tue, 04/19/2016 - 16:56&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;Dima Adamsky, Associate Professor, School of Government, and Institute for Policy and Strategy, at IDC Herzliya, provides a concise undertsanding of Putin's strategy in Syria.&lt;/p&gt;
&lt;/div&gt;
      
  &lt;div class="field field--name-field-publication-upload field--type-file field--label-above"&gt;
    &lt;div class="field__label"&gt;Related Files&lt;/div&gt;
          &lt;div class="field__items"&gt;
              &lt;div class="field__item"&gt;
&lt;span class="file file--mime-application-pdf file--application-pdf"&gt; &lt;a href="https://posse.gatech.edu/sites/default/files/pubfiles/Adamsky%20-%20%E2%80%9CPutin%27s%20Syria%20Strategy%E2%80%9D.pdf" type="application/pdf"&gt;Adamsky - “Putin's Syria Strategy”.pdf&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;
              &lt;/div&gt;
      &lt;/div&gt;
</description>
  <pubDate>Tue, 19 Apr 2016 20:56:15 +0000</pubDate>
    <dc:creator>Dima Adamsky</dc:creator>
    <guid isPermaLink="false">8726 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>Cyber (In) Security: A Challenge to Reckon With</title>
  <link>https://posse.gatech.edu/node/8713</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;Cyber (In) Security: A Challenge to Reckon With&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/sitaranoor" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;sitara.noor&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Sun, 10/04/2015 - 05:08&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;div class="page" title="Page 1"&gt;&lt;div class="layoutArea"&gt;&lt;div class="column"&gt;&lt;p&gt;&lt;span&gt;Recent developments in the cyber domain have exposed the dangers of a largely apathetic behaviour towards the looming threats of cyber warfare. Calls for more rigorous corrective measures have been made, as some states have begun to view such breaches as a top national security threat. Such threats have also changed the dynamics of state behaviour, giving way to subtle aggressions with potentially destabilising and far-reaching consequences. These transgressions have also brought to the fore numerous challenges of cyber security that find their origin in scant technical understanding, the absence of a legal framework, and an overall complex strategic environment. This calls for the institution of some rules of the game to ensure the freedom of the Internet, while at the same time protecting critical cyber infrastructure through a normative approach that can pave the way for some concrete measures for regulating state behaviour. &lt;/span&gt;&lt;/p&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;
      
  &lt;div class="clearfix text-formatted field field--name-field-bibliography field--type-text-with-summary field--label-above"&gt;
    &lt;div class="field__label"&gt;Bibliography&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;p&gt;Noor,Sitara,(2015), "Cyber (In) Security: A Challenge to Reckon With"  &lt;em&gt;Strategic Studies, &lt;/em&gt;Vol. 34, Islamabad&lt;/p&gt;&lt;p&gt;http://issi.org.pk/wp-content/uploads/2015/02/Journal-title-and-content-page-2015.pdf&lt;/p&gt;&lt;p&gt; &lt;/p&gt;&lt;/div&gt;
          &lt;/div&gt;
</description>
  <pubDate>Sun, 04 Oct 2015 09:08:51 +0000</pubDate>
    <dc:creator>sitara.noor</dc:creator>
    <guid isPermaLink="false">8713 at https://posse.gatech.edu</guid>
    </item>
<item>
  <title>The Vision and the Steps: Iran, Weaponless Nuclear Deterrence and a World Free of Nuclear Weapons</title>
  <link>https://posse.gatech.edu/publications/vision-and-steps-iran-weaponless-nuclear-deterrence-and-world-free-nuclear-weapons</link>
  <description>&lt;span class="field field--name-title field--type-string field--label-hidden"&gt;The Vision and the Steps: Iran, Weaponless Nuclear Deterrence and a World Free of Nuclear Weapons&lt;/span&gt;

  &lt;div class="field field--name-taxonomy-vocabulary-3 field--type-entity-reference field--label-inline clearfix"&gt;
    &lt;div class="field__label"&gt;Publication Categories&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;a href="https://posse.gatech.edu/publications/journal-articles" hreflang="en"&gt;Journal Articles&lt;/a&gt;&lt;/div&gt;
          &lt;/div&gt;
&lt;span class="field field--name-uid field--type-entity-reference field--label-hidden"&gt;&lt;span lang="" about="https://posse.gatech.edu/users/chris-mcdermott" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;cmcdermott6&lt;/span&gt;&lt;/span&gt;
&lt;span class="field field--name-created field--type-created field--label-hidden"&gt;Fri, 07/17/2015 - 15:19&lt;/span&gt;

            &lt;div class="clearfix text-formatted field field--name-body field--type-text-with-summary field--label-hidden field__item"&gt;&lt;p&gt;From Anne Harrington's latest article, she writes, "From its inception, nuclear strategy has been a profoundly ahistorical field. Only recently have scholars begun to exploit the wealth of evidentiary knowledge generated during the Cold War, whether that be in the form of diplomatic history or creating data sets against which to test rational choice models. Mining that data has revolutionary potential. Providing an evidentiary basis against which to assess theories of nuclear deterrence and nonproliferation holds out the possibility not only of reinvigorating a stale intellectual debate, but of fundamentally reconfiguring what we believe to be true about nuclear deterrence and how it operates."&lt;/p&gt;&lt;p&gt;She then asks the question: "How do we grab hold of the revolutionary potential of the knowledge now available to us without becoming imprisoned within the boundaries of the past?"&lt;/p&gt;&lt;/div&gt;
      
  &lt;div class="clearfix text-formatted field field--name-field-bibliography field--type-text-with-summary field--label-above"&gt;
    &lt;div class="field__label"&gt;Bibliography&lt;/div&gt;
              &lt;div class="field__item"&gt;&lt;p&gt;Dr. Anne I. Harrington&lt;/p&gt;&lt;p&gt;ETH Zurich&lt;/p&gt;&lt;/div&gt;
          &lt;/div&gt;
</description>
  <pubDate>Fri, 17 Jul 2015 19:19:44 +0000</pubDate>
    <dc:creator>cmcdermott6</dc:creator>
    <guid isPermaLink="false">8700 at https://posse.gatech.edu</guid>
    </item>

  </channel>
</rss>
