{"id":168,"date":"2023-12-11T14:44:32","date_gmt":"2023-12-11T22:44:32","guid":{"rendered":"https:\/\/live-usc-dornsife.pantheonsite.io\/megan-becker\/?page_id=168"},"modified":"2023-12-11T14:58:01","modified_gmt":"2023-12-11T22:58:01","slug":"ir-research","status":"publish","type":"page","link":"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/","title":{"rendered":"IR Research"},"content":{"rendered":"\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-156 size-medium\" src=\"https:\/\/live-usc-dornsife.pantheonsite.io\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/military_security_privatization-300x201.jpg\" alt=\"A paratrooper from 1st Battalion (Airborne), 503rd Infantry Regiment, 173rd Airborne Brigade, watches as an aircraft flies overhead while dropping supplies in Paktika Province, Afghanistan, Nov 9.  (U.S. Army photo by Spc. Micah E. Clare)\" width=\"300\" height=\"201\" srcset=\"https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/military_security_privatization-300x201.jpg 300w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/military_security_privatization-1024x687.jpg 1024w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/military_security_privatization-768x516.jpg 768w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/military_security_privatization-1536x1031.jpg 1536w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/military_security_privatization-2048x1375.jpg 2048w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/military_security_privatization-900x600.jpg 900w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/military_security_privatization-1200x800.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<h2>To Build or To Buy: Understanding the Determinants of Security Privatization<\/h2>\n<p>In recent years, private military companies (PMCs), firms that sell services traditionally provided for by state militaries, such as logistics, training of forces, and participation in combat, have participated frequently in conflicts worldwide. Although the use of PMCs has become increasingly popular, little research has been done to ascertain the determinants of a leader&#8217;s decision to privatize security. Instead, the Political Science literature generally assumes that states hold a monopoly over the use of force. I argue that delegation of security tasks is more common than we assume and that insights from agency theory can help us better understand this phenomenon. Leaders, motivated to retain their positions of power, will choose to privatize when the costs of contracting with PMCs are low (such as with the protection of site-specific appropriable assets, i.e. mines) and the costs of employing the state military are high (when the military and leader have disparate preferences, i.e. after a coup attempt). I test my theory using an original quantitative dataset on the privatization of security in Sub-Saharan Africa, as well as qualitative case studies.<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n\n\n\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h2><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-162 alignright\" src=\"https:\/\/live-usc-dornsife.pantheonsite.io\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/Sub-Sahara_Africa.jpg\" alt=\"Sub Sahara Africa\" width=\"249\" height=\"280\" \/>Of Regimes and Resource Revenue: Contracting for Combat Services in Sub-Saharan Africa<\/h2>\n<p>This paper explores the connection between natural resource wealth in developing states and the decision regimes make to privatize security. The literature on the \u2018resource curse\u2019 is silent on this issue, whereas I offer a theory of why these states privatize security services, particularly those near the tip of the spear, those involving actual participation in combat, as opposed providing support and logistics. The reasoning is not that these regimes are \u2018bad\u2019 or unresponsive, but is rather a product of two factors related to the site-specificity of natural resource wealth: (1) because the economic livelihood of the regime is based on site-specific assets, they are much easier and therefore more likely to be contested and appropriated by internal challengers; and (2) it is easier and therefore less costly to contract for services protecting or reclaiming site-specific assets. Original quantitative and qualitative data on security privatization in sub-Saharan Africa from 1990-2010 supports my theory.<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n\n\n\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h2><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-161 alignright\" src=\"https:\/\/live-usc-dornsife.pantheonsite.io\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/sub-s_africa_private_military-300x200.jpg\" alt=\"Sub Sahara Africa private military\" width=\"300\" height=\"200\" srcset=\"https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/sub-s_africa_private_military-300x200.jpg 300w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/sub-s_africa_private_military.jpg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Military Privatization and Coup-proofing in Sub-Saharan Africa, 1990-2010<em>\u00a0<\/em><\/h2>\n<p>Why do some leaders decide to hire private companies to provide security, rather than producing it internally? And why do regimes privatize some areas of security, but not others? Using contracting theory, this paper argues that regimes facing internal existential threats will be more likely to hire private military companies (PMCs), and that the relationship between the regime and the military will determine what types of services are privatized. When civil-military relations are &#8216;bad&#8217; (there has been a recent coup event) regimes are more likely to hire PMCs to actively participate in combat, ostensibly replacing mutinous forces; when civil-relations are good, PMCs are more frequently hired to train already-existing state forces, adding capacity to loyal forces. In this way, privatization can function as a coup-proofing device for weak regimes. Quantitative and qualitative data from sub-Saharan Africa from 1990-2010 support my theory.<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n\n\n\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h2><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-159 alignright\" src=\"https:\/\/live-usc-dornsife.pantheonsite.io\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/Power_projection-300x199.jpg\" alt=\"Military vessel\" width=\"300\" height=\"199\" srcset=\"https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/Power_projection-300x199.jpg 300w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/Power_projection-1024x678.jpg 1024w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/Power_projection-768x509.jpg 768w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/Power_projection-900x600.jpg 900w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/Power_projection.jpg 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Measuring Power Projection<\/h2>\n<p><strong><em>With Jonathan Markowitz, Therese Anders (PhD Student), Jacob Tucker (UG Alum), and Lauren Cholakian (UG Alum)<\/em><\/strong><\/p>\n<p>Deployments of military force represent some of the most dramatic and closely followed actions on the world stage. Some scholars have boldly asserted that countries have dramatically increased their military activity and presence in the Arctic and the South China Sea, but it is unclear what data these assertions are based upon. Has there been an increase in the frequency or intensity of military deployments? If so, compared to what baseline? Many of these military deployments, or more precisely, what we code as \u2018military activity events,\u2019 may alter the strategic context the ground or at sea, but until they escalate to crises or disputes, they are not be recorded by existing datasets. As a result, the vast majority of shifts in states\u2019 military activity are never recorded by these datasets. This project is a first step to develop a more inclusive indicator of a state\u2019s military activity\u2014measuring the frequency and intensity with which states choose to project power beyond their own borders.<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n\n\n\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h2><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-155 alignright\" src=\"https:\/\/live-usc-dornsife.pantheonsite.io\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/loosetweets-233x300.jpg\" alt=\"Sign the reads: Loose Tweets Sink Ships.\" width=\"233\" height=\"300\" srcset=\"https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/loosetweets-233x300.jpg 233w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/loosetweets.jpg 388w\" sizes=\"(max-width: 233px) 100vw, 233px\" \/>Civil-Military Relations and the U.S. Military&#8217;s Use of Social Media<\/h2>\n<p>How does the US military use its social media channels to communicate and what implications do these communications have for civil-military relations and operational security? Using a unique dataset of all tweets sent by official US military accounts, I am able to identify characteristics of the US military&#8217;s media and messages, as well as the contexts in which they tweet such as location and time. I differentiate between the active and passive sharing of information within these tweets and look particularly at circumstances in which military accounts have unintentionally shared information about ongoing operations or in which they have intentionally obscured the topic or target of the tweet (a practice known as \u2018sub-tweeting\u2019). This paper contributes to a growing literature on the way in which political\/government entities use social media and provides necessary context for the study of civil-military relations in the digital age.<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n\n\n\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h2><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-158 alignright\" src=\"https:\/\/live-usc-dornsife.pantheonsite.io\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/oil-wars-iraq-libya-390x285-1-300x219.jpg\" alt=\"Oil field\" width=\"300\" height=\"219\" srcset=\"https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/oil-wars-iraq-libya-390x285-1-300x219.jpg 300w, https:\/\/dornsife.usc.edu\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/oil-wars-iraq-libya-390x285-1.jpg 390w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Replicating the Resource Curse: Ross (2004) and Prospects for Qualitative Replication<strong>\u00a0<\/strong><\/h2>\n<p><strong><em>With Jonathan Markowitz, Sarah Orsborn (UG Alum) Srividya Dasaraju (UG Alum), Lindsay Lauder (UG Alum), and Isabelle Nazha (UG Alum)<\/em><\/strong><\/p>\n<p><strong><em><br \/>\n<\/em><\/strong><em>Winner of the 2020 Kendra Koivu Award for Best Paper in Qualitative Methods Presented at the APSA Annual Meeting<\/em><\/p>\n<p><em>Draft available here:<a href=\"https:\/\/doi.org\/10.31222\/osf.io\/bd6yk\">10.31222\/osf.io\/bd6yk<\/a><\/em><\/p>\n<p>The \u2018replication crisis\u2019 in quantitative social science has motivated a re-assessment of previous findings and a re-thinking of approaches to research to increase transparency. Unfortunately, these changes have been slower in coming amongst scholars that use qualitative methods. Many have questioned whether applying the model of replicability to qualitative work is appropriate or, even, possible. While the question of appropriateness is outside of the scope of this paper, we do demonstrate that it is indeed possible and can provide illuminating results. We provide a model for qualitative replication using Michael Ross\u2019 (2004) seminal paper on the connection between natural resources and civil war.\u00a0\u00a0The paper, which has been cited approximately 1000 times, uses information from thirteen cases to uncover the mechanisms that connect natural resource wealth to the onset, severity, and duration of civil wars.\u00a0\u00a0Using Ross\u2019 sources and his own case notes, we sought to replicate the study and verify its findings.\u00a0\u00a0We find that roughly twenty percent of the case observations are mis-coded in some way (conceptual issues, measurement issues, missing data), calling in to question the validity of Ross\u2019 findings. However, the replication exercise demonstrates a way forward\u2014how we might design future research to further adjudicate to Ross\u2019 claims and how we might apply lessons from this study to future qualitative replication efforts.<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n\n\n\n\n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h2><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-154 alignright\" src=\"https:\/\/live-usc-dornsife.pantheonsite.io\/megan-becker\/wp-content\/uploads\/sites\/347\/2023\/12\/images.jpg\" alt=\"Natural resource mining field\" width=\"299\" height=\"168\" \/>Resources, Conflict, and Causal Mechanisms: A Re-evaluation<\/h2>\n<div><strong><i>With Jonathan Markowitz and Sarah Orsborn (UG Alum)<\/i><\/strong><\/div>\n<div>What are the pathways that connect natural resource dependence to conflict? Despite a growing literature on the topic, quantitative analyses remain inconclusive. We take a mixed-methods approach, using statistical analysis of cross-national quantitative data to select 45 cases for qualitative study. Taking a medium-N qualitative approach allows us conduct a more thorough investigation of the prevalance of the causal mechanisms suggested in the literature. The study adds to conversations regarding greed and grievance and differences across types of conflict and types of resources.<\/div>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":11,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-168","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IR Research - Megan Becker<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IR Research - Megan Becker\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/\" \/>\n<meta property=\"og:site_name\" content=\"Megan Becker\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-11T22:58:01+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/\",\"url\":\"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/\",\"name\":\"IR Research - Megan Becker\",\"isPartOf\":{\"@id\":\"https:\/\/dornsife.usc.edu\/megan-becker\/#website\"},\"datePublished\":\"2023-12-11T22:44:32+00:00\",\"dateModified\":\"2023-12-11T22:58:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dornsife.usc.edu\/megan-becker\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IR Research\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dornsife.usc.edu\/megan-becker\/#website\",\"url\":\"https:\/\/dornsife.usc.edu\/megan-becker\/\",\"name\":\"Megan Becker\",\"description\":\"USC Dornsife Megan Becker\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dornsife.usc.edu\/megan-becker\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IR Research - Megan Becker","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/","og_locale":"en_US","og_type":"article","og_title":"IR Research - Megan Becker","og_url":"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/","og_site_name":"Megan Becker","article_modified_time":"2023-12-11T22:58:01+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/","url":"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/","name":"IR Research - Megan Becker","isPartOf":{"@id":"https:\/\/dornsife.usc.edu\/megan-becker\/#website"},"datePublished":"2023-12-11T22:44:32+00:00","dateModified":"2023-12-11T22:58:01+00:00","breadcrumb":{"@id":"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dornsife.usc.edu\/megan-becker\/ir-research\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dornsife.usc.edu\/megan-becker\/"},{"@type":"ListItem","position":2,"name":"IR Research"}]},{"@type":"WebSite","@id":"https:\/\/dornsife.usc.edu\/megan-becker\/#website","url":"https:\/\/dornsife.usc.edu\/megan-becker\/","name":"Megan Becker","description":"USC Dornsife Megan Becker","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dornsife.usc.edu\/megan-becker\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/dornsife.usc.edu\/megan-becker\/wp-json\/wp\/v2\/pages\/168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dornsife.usc.edu\/megan-becker\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dornsife.usc.edu\/megan-becker\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dornsife.usc.edu\/megan-becker\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/dornsife.usc.edu\/megan-becker\/wp-json\/wp\/v2\/comments?post=168"}],"version-history":[{"count":3,"href":"https:\/\/dornsife.usc.edu\/megan-becker\/wp-json\/wp\/v2\/pages\/168\/revisions"}],"predecessor-version":[{"id":185,"href":"https:\/\/dornsife.usc.edu\/megan-becker\/wp-json\/wp\/v2\/pages\/168\/revisions\/185"}],"wp:attachment":[{"href":"https:\/\/dornsife.usc.edu\/megan-becker\/wp-json\/wp\/v2\/media?parent=168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}