• Volume Archive
  • Harvard NSLA

Harvard National Security Journal

Volume 15, Issue 2

by Harvard National Security Journal | May 19, 2024 | Featured , Main Articles , Volume 15 | 0 Comments

Volume 15, Issue 2 is out!

Book Review: Hidden in Plain Sight: Redefining the Field of National Security (reviewing Race and National Security (Matiangai Sirleaf ed., Oxford Univ. Press 2023))

by Aziza Ahmed | May 19, 2024 | Book Reviews , Featured , Main Articles , Volume 15 | 0 Comments

The Significance of a Judicial Power to Identify Major Questions and Shield State Secrets for the Future of Foreign Affairs and National Security Governance

by Karen C. Sokol | May 19, 2024 | Featured , Main Articles , Volume 15 | 0 Comments

Large Constellations of Small Satellites: The Good, the Bad, the Ugly, and the Illegal

by David A. Koplow | May 19, 2024 | Featured , Main Articles , Volume 15 | 0 Comments

Performative Economic Sanctions: How Sanctions Work Without Economic Harm

by Katniss Xuejiao Li | May 19, 2024 | Featured , Main Articles , Volume 15 | 0 Comments

Main Edition

by Harvard National Security Journal | May 19, 2024 | Featured , Main Articles , Volume 15

by Aziza Ahmed | May 19, 2024 | Book Reviews , Featured , Main Articles , Volume 15

Aziza Ahmed [*] [This essay is available in PDF at this link] Throughout his campaign for presidency, Trump called for a ban on Muslims entering the United States. As President, he kept his word. Only days after he took office, the new administration released the first version of the Executive Order: Protecting the Nation From Foreign Terrorist Entry Into the United States.1 The first Executive Order, however, did not say the word Muslim. Instead, it listed only Muslim-majority countries as necessary for restrictions on entry. The...

by Karen C. Sokol | May 19, 2024 | Featured , Main Articles , Volume 15

Karen C. Sokol [*] [This essay is available in PDF at this link] Foreign relations and national security law scholars devote significant attention to the expansion of executive power resulting from broad delegations of statutory authority or inaction by Congress and from the considerable deference that courts often afford the executive in cases challenging its actions in the spheres of foreign affairs and national security. Recent decisions of the Roberts Court, however, make clear that scholars should pay just as much—and in some...

by David A. Koplow | May 19, 2024 | Featured , Main Articles , Volume 15

David A. Koplow [*] [This essay is available in PDF at this link] The most exciting and far-reaching contemporary developments regarding human activities in outer space arise from the recent drastic reductions in the costs of building, launching, and operating satellites, and from the concomitant sudden emergence of large constellations of small, inexpensive, privately-owned spacecraft. These satellites—devoted to highly remunerative functions such as communications (bringing high-speed, affordable internet to underserved...

by Katniss Xuejiao Li | May 19, 2024 | Featured , Main Articles , Volume 15

Katniss Xuejiao Li[*] [This essay is available in PDF at this link] This Article proposes and develops a concept of performative economic sanctions, challenging the traditional notion that sanctions must inflict eco- nomic harm to be effective. It examines the sanctions practices of China and Russia, unveiling a strategic approach that is different from the conventional model of coercive sanctions. Unlike typical sanctions which aimed at economic harm on the targets, performative sanctions leverage rhetoric that appeals to...

How Private Actors Are Impacting U.S. Economic Sanctions

by Maryam Jamshidi | Dec 15, 2023 | Main Articles , Volume 15

Maryam Jamshidi[*] [This essay is available in PDF at this link] Economic and trade sanctions are typically understood as the exclusive province of governments and intergovernmental organizations. Private parties have, however, long played a role in sanctions regimes. For example, private plaintiffs holding unsatisfied, terrorism-related civil judgments have used various U.S. federal statutes to enforce those judgments against assets blocked by U.S. sanctions. Most recently, plaintiffs with judgments against the Taliban have used...

Online Edition

National security and domestic terrorism: the legal and legal policy implications of creating a domestic terrorism organization list.

by Thomas Edward Brzozowski | Mar 29, 2023 | Online Edition

Exploring the Application of Force Majeure for AI Mistakes in Armed Conflict

by Fatemah Albader | Jan 29, 2023 | Online Edition

Expanding Lawful Influence Operations

by Justin Malzac | Apr 12, 2022 | Online Edition

The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China’s Culpability, Part IV: Questions for the Record—Federal Government Response to Coronavirus and U.S. Public Health Leadership Role

by Chimène Keitner | Mar 3, 2022 | Online Edition

3D Printed Speech: 3D-Printer Code Under Constitutional Scrutiny

by Andrew Huang | Feb 13, 2022 | Online Edition

The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China’s Culpability, Part III: Questions for the Record—Private Litigation Will Likely Fail to Secure Relief for U.S. Victims

by Chimène Keitner | Oct 20, 2021 | Online Edition

Shining Light on the “Going Dark” Phenomenon: U.S. Efforts to Overcome the Use of End-to-End Encryption by Islamic State Supporters

by Ryan Pereira | Sep 3, 2021 | Online Edition , Student Articles

by Robert M. Chesney | Aug 20, 2021 | Features , Online Edition

The Foreign Sovereign Immunities Act, Coronavirus, and Addressing China’s Culpability, Part II: Questions for the Record—Benefits to the United States from Foreign Sovereign Immunity

by Chimène Keitner | Mar 30, 2021 | Online Edition

National Security - Science topic

Sérgio Luiz Cruz Aguilar

  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

IMAGES

  1. (DOC) The national security concept and the current requirements

    research papers on national security

  2. An Analysis of National Security in United States

    research papers on national security

  3. (PDF) CYBER SECURITY THREAT AND PAKISTAN'S PREPAREDNESS: AN ANALYSIS OF

    research papers on national security

  4. (PDF) National Security in Nigeria: The Role of the Library

    research papers on national security

  5. (PDF) National Security

    research papers on national security

  6. Personal and National Security Research Paper Example

    research papers on national security

COMMENTS

  1. Mapping the knowledge of national security in 21st century a ...

    The study explores the intellectual structure, development, and evolution of national security research through bibliometric analysis of research articles on national security from 2000 to 2017. The analysis incorporates 54,572 references cited by 5,827 authors from 817 journals in which national security appeared.

  2. (PDF) NATIONAL SECURITY: THEORY AND PRACTICE - ResearchGate

    NATIONAL SECURITY: THEORY AND PRACTICE. January 2021. Edition: I. Publisher: Wydawnictwo Towarzystwa Wiedzy Obronnej (The Publishing House of the Society of Defence Knowledge) ISBN: ISBN...

  3. Harvard National Security Journal

    The Harvard National Security Journal (NSJ) is the nation’s leading journal in the field of national security and law. The main edition publishes scholarly, practical articles by professors, legal practitioners, and national security professionals twice a year.

  4. Full article: National security: between theory and practice

    National security is at the nexus of the domestic and the international, and provides a conceptual lens for understanding and articulating emerging challenges in a connected world, such as in the cyber domain, where sovereignty is challenged by transnational risks.

  5. 31388 PDFs | Review articles in NATIONAL SECURITY - ResearchGate

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on NATIONAL SECURITY. Find methods information, sources, references or conduct a literature...

  6. A HOLISTIC APPROACH TO PROTECTING NATIONAL SECURITY ...

    The final chapter is a deep dive into what insider threats are and how they impact national security, before tying the entire thesis portfolio together by introducing risk management and security intelligence into the scenario. The research question of ‘how insider threats impact national security’ drove the chapter’s research.

  7. Framing national security secrecy: A conceptual review

    The paper illustrates possible frictions, overlaps, and synergies between different rationales for national security secrecy, thus broadening the existing conceptualization away from transparency and secrecy as direct opposites.

  8. Intelligence and National Security | Taylor & Francis Online

    Intelligence and National Security is widely regarded as the world's leading scholarly journal focused on the role of intelligence and secretive agencies in international relations. It examines this aspect of national security from a variety of perspectives and academic disciplines, with insightful articles research and written by leading ...

  9. National Security and Terrorism | RAND - RAND Corporation

    RAND conducts a broad array of national security research for the U.S. Department of Defense and allied ministries of defense. Our federally funded research and development centers (FFRDCs) explore threat assessment, military acquisition, technology, recruitment and personnel management, counterinsurgency, intelligence, and readiness.

  10. The Role of Social Science Research in National Security

    EXAMPLES OF MINERVA PROJECTS DESCRIBED BY DOD AS SHAPING SOCIAL SCIENCE RESEARCH RELEVANT TO NATIONAL SECURITY • Terrorism, Governance, and Development • Spatio-Temporal Game Theory and Real Time Machine Learning for Adversarial Groups in the Wild • Africa’s Youth Bulge and National Security