Skip Nav Destination
Close Modal
Update search
NARROW
Format
Journal
Date
Availability
1-5 of 5
Daniel Byman
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Publisher: Journals Gateway
International Security (2024) 48 (4): 137–166.
Published: 01 April 2024
Abstract
View article
PDF
Academic research can inform decision-makers on what actions to take or to avoid to make the world safer, more peaceful, and more equitable. There are many good works on bridging the gap between policymakers and academics but few on how scholars writing in academic journals can influence the policy process. In contrast to most policy-focused research, academic journals have long shelf lives and provide space for scholars to present heavily researched empirical evidence, theories, and analyses. Long, well-researched articles can, over time, shape the broader narrative for how to think about complex issues. Scholars also tend to be more objective and less partisan than policymakers. Despite the potential importance of academic work to the policy debate, many scholars receive little training on why and how to make policy recommendations. To remedy this problem, steps are offered to guide scholars as they begin developing policy recommendations for their articles. These include recognizing the dilemmas that policymakers themselves face, considering the audience before starting to write, identifying and using policy option menus, among others. When crafting recommendations, scholars should consider the long-term implications of their research on current policy as well as recommendations that might lead to more effective approaches. At the same time, scholars should consider the costs and limits of their recommendations.
Journal Articles
Publisher: Journals Gateway
International Security (2021) 46 (1): 53–103.
Published: 19 July 2021
Abstract
View article
PDF
Reconstruction failed in the United States because white Southerners who were opposed to it effectively used violence to undermine Black political power and force uncommitted white Southerners to their side. Although structural factors made it harder to suppress this violence, a series of policy failures proved most important. The Radical Republican-led U.S. government did not deploy enough troops or use them aggressively. Nor did it pursue alternative paths that might have made success more likely, such as arming the Black community. The violence caused Reconstruction to fail, and the victorious white supremacists embedded structural racism into the post-Reconstruction political and social system in the South. Reconstruction's failure illustrates the dangers of half measures. The United States sought to reshape the American South at low cost, in terms of both troop levels and time. In addition, the failure indicates the importance of ensuring that democratization includes the rule of law, not just elections. Most important, Reconstruction demonstrates that a common policy recommendation—compromise with the losers after a civil war—is often fraught, with the price of peace being generations of injustice.
Journal Articles
Publisher: Journals Gateway
International Security (2016) 40 (4): 127–165.
Published: 01 April 2016
Abstract
View article
PDF
This article reviews several recent books on the Islamic State in order to understand its goals, motivations, strategy, and vulnerabilities. It argues that the Islamic State's ideology is powerful but also highly instrumental, offering the group legitimacy and recruiting appeal. Raison d'etat often dominates its decisionmaking. The Islamic State's strength is largely a consequence of the policies and weaknesses of its state adversaries. In addition, the group has many weaknesses of its own, notably its brutality, reliance on foreign fighters, and investment in a state as well as its tendency to seek out new enemies. The threat the Islamic State poses is most severe at the local and regional levels. The danger of terrorism to the West is real but mitigated by the Islamic State's continued prioritization of the Muslim world and the heightened focus of Western security forces on the terrorist threat. A high-quality military force could easily defeat Islamic State fighters, but there is no desire to deploy large numbers of Western ground troops, and local forces have repeatedly shown many weaknesses. In the end, containing the Islamic State and making modest rollback efforts may be the best local outcomes.
Journal Articles
Publisher: Journals Gateway
International Security (2010) 35 (1): 44–74.
Published: 01 July 2010
Abstract
View article
PDF
Speculation about the future of the North Korean regime has been intense for nearly two decades. In the 1990s, economic crises and famine led to predictions of the Kim regime's imminent downfall. Today analysts highlight impending famine as well as threats to the regime's position brought by eroding information control. Several theories of authoritarian control help to explain how Kim Jong-il and his family have remained in power and how this might change over time. The Kim regime has employed a variety of authoritarian “tools” to protect itself both from popular revolt and from internal coups. Its social policies, reliance on certain ideas and nationalism, and use of force prevent the onset of revolution. Through numerous other tools (elite co-optation, manipulation of foreign governments for financial aid, and the “coupproofing” of domestic institutions), the regime protects itself from coups d'état and elite unrest. This framework not only helps to explain the past resilience of the regime, but it suggests that the regime is not in danger of being unseated by coups or revolution. Yet it also suggests that the regime has not adequately prepared for succession after Kim's death. This analysis has implications for policy planning about the future of the Korean Peninsula, as well as for negotiations with and coercive strategies toward Pyongyang.
Journal Articles
Publisher: Journals Gateway
International Security (2003) 28 (1): 47–78.
Published: 01 July 2003