502
Views
0
CrossRef citations to date
0
Altmetric
Articles

Revisiting the relationship between academics and national security practitioners

, ORCID Icon & ORCID Icon
Pages 1-11 | Received 22 Feb 2021, Accepted 22 Feb 2021, Published online: 26 Apr 2021

References

  • Bousquet, A. (2008). Cyberneticizing the American war machine: Science and computers in the Cold War. Cold War History, 8(1), 77–102. doi:10.1080/14682740701791359
  • Buzan, B., & Hansen, L. (2009). The evolution of international security studies. Cambridge University Press. doi:10.1017/CBO9780511817762
  • Chomsky, N. (2002). American power and the new mandarins. New York: New Press.
  • Ekbladh, D. (2012). Present at the creation: Edward Mead earle and the depression-era origins of security studies. International Security, 36(3), 107–141. doi:10.1162/ISEC_a_00067
  • Fergie, D. (2019). Geopolitics turned inwards: The Princeton Military Studies Group and the national security imagination. Diplomatic History, 43(4), 644–670. doi:10.1093/dh/dhz026
  • Freedman, L. (2015). Social science and the Cold War. Journal of Strategic Studies, 38(4), 554–574. doi:10.1080/01402390.2015.1038900
  • Fulbright, J. W. (1970). The arrogance of power. London: Pelican Books.
  • Gilman, N. (2016). The Cold War as intellectual force field. Modern Intellectual History, 13(2), 507–523. doi:10.1017/S1479244314000420
  • Intelligence and Security Committee. (2018). The 2017 attacks: What needs to change?
  • Jackson, R., Smyth, M. B., & Gunning, J. (2009). Critical terrorism studies: A new research agenda. New York: Routledge.
  • Makin-Waite, M. (2020). The Frankfurt school against the Nazis. Historical Materialism. Retrieved from https://www.historicalmaterialism.org/book-review/frankfurt-school-against-nazis
  • Morrison, J. F. (2020). Talking stagnation: Thematic analysis of terrorism experts’ perception of the health of terrorism research. Terrorism and Political Violence, 0(0), 1–21. doi:10.1080/09546553.2020.1804879
  • Phythian, M. (2018). Profiles in intelligence: An interview with professor Richard J. Aldrich. Intelligence and National Security, 33(7), 939–953. doi:10.1080/02684527.2018.1486272
  • Porter, P. (2015). The global village myth: Distance, War, and the limits of power. Washington: Georgetown University Press.
  • Price, D. H. (2014). Return from the natives: How Margaret Mead Won the Second World War and lost the Cold War by Peter Mandler (review). Journal of Interdisciplinary History, 44(4), 564–565.
  • Rau, E. (2006). Combat science: The emergence of operational research in World War II. Endeavour, 29, 156–161. doi:10.1016/j.endeavour.2005.10.002
  • Report of the Royal Commission of Inquiry into the terrorist attack on Christchurch masjidain on 15 March 2019 (New Zealand). (2020). [Report]. Royal commission of inquiry into the attack on Christchurch Mosques on 15 March 2019. Retrieved from https://apo.org.au/node/309951
  • Rohde, J. (2009). Gray matters: Social scientists, military patronage, and democracy in the Cold War. Journal of American History, 96(1), 99–122. doi:10.2307/27694733
  • Roosevelt, F. D. (1940, December 29). Arsenal of democracy. Retrieved from https://web.viu.ca/davies/H101/FDR.Arsenal.speech.1940.htm
  • Sageman, M. (2014). The stagnation in terrorism research. Terrorism and Political Violence, 26(4), 565–580. doi:10.1080/09546553.2014.895649
  • Stampnitzky, L. (2013). Disciplining terror: How experts invented “terrorism.” London: Cambridge University Press.
  • State Coroner of New South Wales. (2017). Inquest into the deaths arising from the Lindt Café siege: Findings and recommendations (Australia, New South Wales) [Report]. State Coroner of New South Wales. Retrieved from https://apo.org.au/node/91471

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.