Your Schedule at ISSS-ISAC 2016

This conference has closed. This page is kept for archival purposes only. If you have any questions, please contact ISA Headquarters.

Browse the Program

Browse the 2016 program and add items to your schedule to build your personalized program!

Please log in to view your schedule
There's nothing on your schedule yet, browse our program and events to build your personalized schedule!

Logging In

You'll need to log in to use most of the advanced features of the online program. If you're having trouble logging in, the ISA staff are here to help. Also, you can view public PDFs of the program without logging in on the program page.

Your Papers

The Rotten Carrot: U.S.-Turkish Bargaining Failure over Iraq in 2003 and the Impact of Social Embeddedness as a Bargaining Tool
“The Rise of Islamist Extremism in Chechnya: A Demographic Explanation”
A Re-Examination of South Korea’s Nuclear Weapons Program
Adding Fuel to the Fire? Analyzing US Military Assistance to Sub-Saharan Africa
Advancing Methods and Analytics in Security Studies
Alternation Denied: Africa’s Presidential 30+ Club
An Empirical Approach to Defining Domains
Analysis of the United States Drone Program Under International Law
Assessing the Effect of Chinese Construction in the Spratly Islands on the South China Sea Military Balance
Brexit: A trigger for a new Atlanticism
Casualties, Success, and Public Support for War: Revisiting the Causal Mechanisms
Caught in the Loop of Mutual Political and Territorial Animosities or is there an Exit Point in Sight? A Review on the Prospect of North East Asia’s ‚Regionness‘ and ‚Regionalism‘
Causes of rebel fragmentation in the Syrian civil war
Characteristics of Terrorism Hoax Perpetrators: Using Qualitative Comparative Analysis to Augment Findings from Logit Regression
China’s ‘Autonomy’ Policies: The Historical Legacy and Current Practice in Tibet
China’s Buying Spree for Legitimacy: Success and Limitation
China’s New “Splittism” Headache: Hong Kong’s Youth Call For Independence As The “One Country, Two Systems” Model Withers
China’s Peripheral Challenges
China’s Recent Expansions and Contractions: Paper Tiger or Evolving Great Power?
Chinese Economic Statecraft and U.S. Hegemony in Latin America: An Empirical Analysis, 2003–2014
Collective Memory: Powerful Influence, Pervasive Presence, and Strong Potential for Enhancing Predictive Analysis
Combined Effects Power in East Asia
Configuring Legitimacy: Theorizing Variation in the Effects of Legitimacy in Violent Political Conflict
Conflict in the South China Sea
Constructing and Deconstructing Strategy: an Analytical Framework
Could Greater Access to Big Data Result in a Methodological Paradigm Shift in the IR Discipline?
Crime Embeddedness in the Evolution of Somali Piracy
Crises and Foreign-Deployed Nuclear Weapons
Cyber Security
Cyber Security Paradigm: International Cyberspace Norms in the South China Sea
Democracies Under Fire: How Democratic Targets and Allies Respond to Coercive Threats
Democratic Development and Security in Africa
Deterrence, Defense, and Arms Control after Withdrawal from the ABM Treaty
Divide and Deter: An American Grand Strategy for a Multipolar System
Effective in Battle: How to Measure Soldiers' Combat Effectiveness
Effects of Forward Troop Deployment on Regional Stability
Electoral Politics, Party Polarization, and Arms Control: New START in Historical Perspective
Entangled and Loving It: Power, Threat, and America's 19th c. Defense Pacts
Evolving Security Studies
External Dominance, Internal Division? Institutional Coup-Proofing in Major Power Client States
Failure to Launch: The Failure of Soviet Advising Missions in Africa and Asia
From the Army to the Insurgency
Goldwater-Nichols for DHS?
Grand Strategy in the 21st Century: Wealth, Power and the Balance of World Systems
Grappling with Dr. Strangelove’s Wargasm Fantasy
Great Powers and International Law
Grievance Narratives, Recruitment and Political Violence: Debating the Role of Grievances in Radicalization Processes
Holding Tight to Their Pocketbooks: Democratic Targets and Sanctioning Threats
How Neoconservative Were/Are American Conservatives?
Identifications and Securitizations in the 21st Century
Impacts of Shocks, Sanctions, and Military Transfers
Impacts of the Ukraine Crisis and the Brexit on NATO
Inertia, Grand Strategy and Cybersecurity
Insurgency After War Explaining How Failed Expectations Led to Violence In Iraq
Insurgency throughout the World
Insurgent Decision Making
Intellectual Property and the Arms Trade
International Civil Defense in a Time of Environmental/Climate Emergency – The Need for a Cold War-Like Civilian Natural Disaster Resilience and Response Approach
International Relations Theory and Alliance Formation
IOs in Battle: Theorizing the Construction of Military Coalitions under the Umbrella of International Institutions
Is China Moving Away from Deng's Self-Restraint National Security Strategy?
Is the Indian Military’s Counterinsurgency Approach in Kashmir Failing?
Japan’s Security Policy, ‘Collective Self-defense’ and the Politics of Constitutional (Re-)Interpretation
Latin America’s Rising Strategic Visions: Pacific Alliance and the Concept of “Convergence within Diversity”
Lone Wolf or Low Tech Terrorism: Case Facts in European Contexts
Making the case for preserving the INF Treaty – A European Perspective
Malawi's Imported State and Counter-Insurgency: The Nexus between State Brutality and Development, 1964-1994
Mapping Environmentally-Induced Urbanization and (In)security
Maybe I Did(n't): Cyber Attacks and the Logic of Non-Denial Denials
Military Innovation in the Aftermath of Vietnam : Military Realism and the Shaping of Active Defense and AirLand Battle
Military spending and income inequality amongst a panel of OECD countries during the Post-Cold War Era, 1989-2007
Modern War: Uncertain Force, Unstable Victories
Motivations for Armed Mobilization and the Prospects of Disarmament, Demobilization and Reintegration in Syria
NATO after Brexit: An Uncertain Future for European Security
No Man’s Sea: Implications for Theory and Strategy
Notes to the Underground: Credit Claims and the Organization of Cellular Terrorism
Opportunity in Space: Understanding the Determinants of Space Weapons Capacity
Pakistan, India, and South Korea: Exploring Nuclear Strategy in Asia
Peace and Revolutions
Peace as Grand Strategy
Perspectives on Gender and Security
Planning to Fail: The US Wars in Vietnam, Iraq, and Afghanistan
Political Islam and Egypt's National Security
Prelude to Genocide: Why the Jewish Military-based Campaign for Political and Civil Rights failed in Early Twentieth Century Germany
Privatization of energy and environmental security in Japan: A roles of business actors in securing resources
Problems Making and Keeping Peace
Proliferation and Deterrence: Nuclear Weapons
Protecting Civilians: Challenging Traditional Measures of Victory in War?
Radical disagreements and reconciliation processes in the 21st century peacemaking
Realism and its Discontents
Remembering the Human Element of War: Soldiers and Veterans
Road Rage: How Infrastructure Programs Bring Out the Worst in Nation-States
Salami Tactics and the Future of U.S.-Russian Relations
Security and Japan
Security and the Environment, NGOs, and IOs
Security Inequalities in North America: Reassessing Regional Security Complex Theory
Security Strategy: Europe and Russia
Security Topics in Africa and Asia
Service culture and gender integration: a challenge to the civil-military relationship
Shaping Global Public Opinion on American Foreign Policy
South China Sea
South China Sea Conflict: Divergence, Self-Interest and Possible Peace
Special Forces, Surveillance, and Biological and Space Weapons
Spies in the Maize: Control and Discipline in the Malawi Young Pioneers
Splitting the American Alliance System: Comparing Russia’s and China’s Wedge Strategy Options
Spoiling: It’s not just for peace processes and doesn’t always need extreme acts of violence
Strategic Communications of Terrorist Organizations: Outreach and Tactics
Strategic Manipulation: How States Use Military Transfers to Get Recipients to Do Their Bidding
Strategic Planning: Russia’s History and Putin
Strategies of Terror: ISIS and other Terrorist Organizations
Syrian Civil War
Tactics of Terror: Assorted Tactics of Terrorist and Insurgent Groups
Taiwan in U.S.-China Power Transition: Rethinking U.S. Security Commitment
Talking terrorism: A narrative approach to the study of violent events
Testing Hypotheses on Great Power Annexation
The Baltic States and European Security
The Concept of Decisiveness in War: How Experiencing War Shifts Beliefs and Affects the Post-War Peace
The consequences of securitised peacekeeping in MINUSMA, Mali
The Defender’s Choice: Deterrence as an action guiding framework
The Dilemma of Software Uniformity and Cybersecurity in South Korea
The Foreigner Dilemma: Explaining Variation in Foreign Fighters Recruitment in Syria and Iraq
The Image Management of ISIS: An Analysis of Images in Social Media as Weapons to Attract, Mobilize and Recruit
The Intersection of Economics and Security
The Methodology of Victory and Defeat in War: Introducing a Dataset on Victory in War
The Micro-Macro Nexus as the Basis of the European Security: Chaos, Disorder, Emergence and Complexity
The Moral Factor in War: Understanding Variation in American Military Effectiveness
The New Great Game: Great Power Politics in Central Asia: Russia, China, the United States and Their Relations with Kazakhstan
The New Veterans: Military Service, Veterans’ Status, and the Obligation to Private Military Contractors
The Nuclear Taboo, Indo-Pakistani Nuclear Relations, and the Prospects for Nuclear Arms Control and Disarmament in South Asia
The Oil Logic of Japan's Surrender
The Perils and Promise of Nationalism and Legitimacy in State Building
The Pivot Toward Europe? Implications of the Ukraine Crisis for NATO’s Role in Asia
The Power of Transformative Positive Shocks and the Marketplace of Ideas
The Quest for Escalation Dominance: Pakistan’s Response of Full Spectrum Deterrence
The Retired Officer and the State: Does the Professional Ethic Still Apply?
The Role of Deterrence in (Re)Defining the Gray Zone
The Sino-African Courtship and the Glaring Lack of Trade Disputes
The Territorial Logic of the Islamic State
Theories of International Conflict: State-Centric vs Nation-Centric Approaches
Theories of Victory in Modern War
Topics in US Military Strategy
Toward a Balanced Multipolar System in Asia
Uncertainty, Security Narratives, and Ontological (In)Security
Understanding Insurgency
United States Security Decisions: Vietnam War and the War on Terror
Violent Women: gendered violence and security.
Voronoi Mapping as a Conflict Prediction Tool
War in the City
What Impacts Public Opinion?
Where are the Ninjas? Special Forces, American Power, and Global Conflict
Who’s Watching Us, and Why Should We Worry? Balancing Security and Liberty in a Surveillance Society
Why Has China Asserted Itself In The Tense Maritime Periphery Instead of The Relatively Unchallenged Central Asian Periphery?
WIIS Roundtable

The International Studies Association

Representing over 100 countries, ISA has more than 6,500 members worldwide and is the most respected and widely known scholarly association in this field. Endeavoring to create communities of scholars dedicated to international studies, ISA is divided into 6 geographic subdivisions of ISA (Regions), 29 thematic groups (Sections) and 4 Caucuses which provide opportunities to exchange ideas and research with local colleagues and within specific subject areas.
Help   |   Thanks   |   Privacy Statement   |   Terms Of Use