Carla Martinez Machain, Ph.D.
carlamm@ksu.edu
Kansas State University
Research Interests
Conflict Processes & War
Foreign Policy
Air Power
Troop Deployments
Conflict Outcomes
Civil-military Relations
Military Bases
Military Basing
How do citizens within countries hosting U.S. military personnel view that presence? Using new cross-national survey data from 14 countries, we examine how different forms of exposure to a U.S. military presence in a country affect attitudes toward the U.S. military, government, and people. We find that contact with U.S. military personnel or the receipt of economic benefits from the U.S. presence correlates with stronger support for the U.S. presence, people, and government. This study has profound implications for the role that U.S. installations play in affecting the social fabric of host nations and policy implications for the conduct of U.S. military activities outside the United States.
Under what conditions do states choose to use only air power? Air strikes are one of many tools states use to promote their interests in the international system. Given that not all policy tools are appropriate for all crises, we explore when states choose to use air strikes as a coercive tool. We empirically test both common perceptions and newly derived hypotheses on the characteristics of states that employ air-only campaigns and the settings in which they do so, using newly collected data on the uses of air power during international crises between 1908 and 2006. Looking at the events that trigger the crises and the salience of the issues at stake, alongside the characteristics of the states involved, provides a clearer picture of when states use air power versus other coercive tools. Our research indicates that air-only campaigns are more likely to be initiated by militarily powerful states, but that in higher stakes crises, states are more likely to use ground troops or ground and air forces in combination.
Why is it that some democracies are able to effectively engage in secrecy and mobilize their forces privately, while others are unable to keep enough information secret to effectively carry out such an attack? Recent work by Colaresi (2014) suggests that a democracy's ability to keep information secret depends on its retrospective oversight institutions, which allow democracies to keep information secret in the present with the promise of revealing it to the public in the future. Though Colaresi (2014) finds that states with retrospective oversight have greater military spending, more support for military action, and more success in crises, to our knowledge there has yet to be empirical support for the argument that democracies with greater retrospective oversight can actually conduct foreign policy with greater opacity than those without retrospective oversight. In this research note we empirically explore this question, using data on private mobilizations by democracies with varying levels of retrospective oversight. This gives us greater insight into strategic military choices and shows how military effectiveness can be affected by political institutions.
U.N. peacekeeping missions succeed in preventing the resumption of conflict and saving lives. At the same time, a series of sexual exploitation and abuse scandals since the early 2000s has raised concerns about the conduct of peacekeepers. We examine a related, but generally overlooked, potential negative externality of peacekeeping missions: the forced trafficking of sex workers. We argue that U.N. peacekeepers increase demand for sex work and that this demand may be met through human trafficking for forced prostitution. Using data on U.N. peacekeeping missions between 2001 and 2011, we evaluate the effect of a peacekeeper presence on human sex trafficking in and around the host state. We find that the presence of U.N. peacekeeping forces correlates positively with a state being cited as a destination for forced prostitution. This has important implications for the future deployment of peacekeeping forces around the world.
US noninvasion troops deployed abroad often try to promote greater respect for human rights in the host country. The host country, having an incentive to retain the troop presence, may choose to comply with these requests. We argue that this effect will not be at play in states with high security salience for the United States (US) (for which the US may not be able to credibly threaten to remove the troops). In these cases, US deployments will provide the leader with security from both internal and external threats that is independent of the local population’s support for the leader. Host state leaders thus become less reliant on (and potentially less responsive to) their local populations, which in turn may lead to increased human rights violations. In this article, we use data on both US troop deployments abroad and on human rights violations to test these arguments from 1982 to 2005.
This research note examines how domestic institutions can moderate the relationship between domestic and interstate conflict involvement. Previous work has found that military dictatorships are more likely to become involved in either domestic or international conflicts, compared to party-based autocracies. We argue that the same institutional explanations for why military autocracies are more conflict-prone also make them less capable of successfully carrying out multiple conflicts at the same time. Analyzing interstate and domestic conflict involvement on a sample of dictatorships over the period 1947–2004, we show that military autocracies dealing with internal armed conflict are less likely than their nonmilitary counterparts to become involved in an international conflict.
With a lower risk of casualties and a high degree of precision, air power is an attractive foreign policy tool to powerful states that have increasingly relied upon it in recent years. This paper presents newly collected data on uses and effectiveness of air power in interstate wars from 1914 to 2003. The dataset provides more complete and comparable cases that can be useful in answering questions of not only the coercive effectiveness of air power, but also of the decision to use air power in conflict, of ethical concerns arising from the use of air power, and of the interaction of air power with other military and foreign policy tools. In addition to introducing the dataset and discussing trends in the data, a preliminary empirical application is provided, re-examining the relationship between strategy and air power effectiveness.
This article studies whether the pursuit of counterterrorism militarizes foreign aid flows. It focuses on the case of US foreign aid to sub-Saharan African states, which recently have experienced an increase in the presence of al-Qaeda or its affiliate terrorist organizations. This article argues that as terrorist groups carry out attacks inside a state’s territory, aid towards that state will serve such counterterrorism goals. For one, the state’s executive branch will receive increased military aid to immediately fight al-Qaeda or affiliates. For the other, the United States also steps up aid for civil society and development, which could over time undermine al-Qaeda’s mobilization and recruitment efforts. In an empirical analysis that covers 46 African states from 1996 to 2011, our results largely corroborate the hypothesized patterns for attacks that occur on a country territory and in the neighborhood. We note, though, that the overall composition of aid shifts relative to the military when there are direct attacks, something that does not occur when attacks happen in the neighborhood only. Our article concludes that concerns about militarization of aid are warranted, but that actual manifestations are nuanced.
Diversionary war theory states that leaders may initiate an international conflict in order to invoke internal cohesion and distract the public from domestic issues. Recent developments in diversionary literature suggest the possibility that leaders can alternately divert against domestic targets, such as minority groups. Empirical support for domestic diversion, though, has been mixed. In this paper we seek to reconcile this by further examining the different dynamics at play between actors who are faced with diversionary incentives. We suggest that a major reason why we do not observe many cases of domestic diversion is strategic behavior by minority groups. Much like states do, minority groups that are potential targets of repression engage in strategic conflict avoidance when they observe diversionary incentives to be present. We test our theory through a multivariate probit model that uses the state–minority group dyad as the unit of analysis.
This article explores the role that ground troops play in aerial campaigns. Specifically, it intends to explain how ground troops affect the duration of aerial bombing campaigns. It distinguishes between the effect of ground troops on the duration of aerial campaigns that are selective and on those that are more general and less discriminate (using newly coded data on aerial strategies). The effect of ground troops may vary depending on how air power is being used. Ground troops may increase the duration of aerial campaigns in cases in which selective strategies are used during the aerial bombing campaign. In these cases, states lose the possibility of quick, “clean” victories once ground troops are introduced. In the cases of the less-discriminate bombing campaigns, the effect of ground troops is the opposite: They shorten the duration of the bombing campaign, possibly through the increased effectiveness of a combined arms approach.
This article attempts to answer the question of why major powers engage in more active foreign policy behaviors than minor powers. It does so by comparing two explanations for the increased conflict propensity of major powers. The first explanation focuses on major powers’ observable capabilities, while the second stresses their different behavior. We incorporate both into an ultimatum model of conflict in which a state’s cost of conflict consists of both observable and behavioral components. Using data from the period from 1870 to 2001, we empirically illustrate the observable and behavioral differences between major and minor powers. We then utilize a decomposition model to assess the relative significance of the two explanations. The results suggest that most of the difference in conflict propensity between major and minor powers can be attributed to observable differences.
Major powers often deploy troops abroad with the consent of host states. The stated aim of these deployments is often both to protect the host state and to foster stability in the region. Drawing from an extension of Palmer and Morgan’s two-good theory of foreign policy, the authors explore some of the (perhaps unintended) effects of troop deployments abroad on the foreign policies of the host states. In particular, the authors focus on the effects of US deployments. The authors argue that as the number of US troops deployed to a host state increases, we should expect the host state to reduce its own troop levels, be more likely to initiate militarized interstate disputes, and be less likely to be the target of interstate disputes. The authors test these hypotheses using data on US troop deployments abroad from 1950 to 2005 and discuss implications that their findings may have for US foreign policy.
Global terrorism and local rebellion are observed rather frequently; solutions appear to be rather sparse. A common strategy adopted by governments is to attempt to deter potential rebels from engaging in acts of violence, often by responding to attacks with violent reprisals directed at the populace from which the rebels are recruited. The logic supporting such a strategy follows from a theory of deterrence that we believe is underdeveloped. This theory focuses heavily on the credibility of the deterrent threat and on ensuring that the cost imposed by retaliation is high. This ignores the flip side of the deterrent threat—that is, the promise that if one does not misbehave (by engaging in acts of rebellion), one will not suffer retaliatory punishment. Policy designed to ensure that punishment is swift and severe (and perhaps disproportional) can undermine deterrence and actually encourage more potential rebels to become active. Using a game-theoretic model, we show that successful deterrence requires a strategy in which retaliation is proportionate and directed only at the guilty, as well as being certain. Moreover, potential rebels must believe that the innocent will have attractive opportunities outside of joining the insurgency as well as that the innocent will not be punished. We provide empirical illustrations of our thesis from participants in the Palestinian uprising, including several who have taken up arms against Israel.
Discussion of recent Minerva grant-funded project with colleagues from Boise State, Kansas State, and UT Austin
Cookie Policy
About this Cookie Policy
This Cookie Policy is provided as an addition to this site's Privacy Notice and exists to explain what cookies are and how they are used on this site. Cookies are tiny text files that are stored within your web broswer or hard drive when you visit a website or web applicaiton. These cookies allow servers to deliver content tailored to individual users or understand user behavior.
Types of Cookies we use
This site employs two first-party cookies (served from us and by us that are essential for the site to operate) and two third-party cookies that deliver external services.
First-Party Cookies
We use a server-generated session cookie to remember you when you are logged in to the site. This is essential to making sure that your profile details are those that are updated when you log in to make changes. This also lets us know who is logging into the site and when.
This site also uses a cookie that is created by your browser to remember when you agree to the cookie notice popup. This cookie stores nothing but the word "true" if you have agreed to the terms and is deleted when you close your browser. This cookie's only function is to prevent the cookie notice from popping up every time you refresh the site's homepage.
Third-Party Cookies
This site uses Google Analytics to understand usage trends and server performance. We do not store variables which are personally-identifiable in Google Analytics like browser ids or IP addresses. Google's privacy policy can be found here. If you would prefer have your browser stop supplying information to Google Analytics, Google provides a browser extension to allow you to do so.
This site also uses cookies supplied by Twitter when the Twitter sidebar script is loaded on the homepage. Their cookie policy is available here. Third-party cookies from Twitter are only loaded on this site's homepage and only when you agree to the terms or click the Twitter logo in the navigation bar.
How to Disable Cookies Altogether
Information on how to disable cookies in your browser can be found here. Please keep in mind that disabling cookies will prevent the essential functions of most interactive websites and web applications, this site included.
Privacy Notice
This privacy notice discloses the privacy practices for (womenalsoknowstuff.com). This privacy notice applies solely to information collected by this website. It will notify you of the following:
Information Collection, Use, and Sharing
We are the sole owners of the information collected on this site. We only have access to/collect information that you voluntarily give us via completing your profile or from direct contact from you. We will not sell or rent this information to anyone. However, as you are voluntarily providing your information to a publicly searchable database, anyone using the site will be able to access your information in the directory. We will use your information to respond to you, regarding the reason you contacted us. We will not share your information with any third party outside of our organization. However, anything you enter into your directory profile is publicly searchable and available to anyone using the site. Unless you ask us not to, we may contact you via email in the future to tell you about changes to this privacy policy. Your Access to and Control Over Information You may opt out of any future contacts from us at any time. You can do the following at any time by logging into your account/profile or by contacting us via email.
Security
We take precautions to protect your information. When you submit information via the website, your information is protected both online and offline. Wherever we collect information (provided by you), such as professional information or account passwords, that information is encrypted and transmitted to us in a secure way. You can verify this by looking for a lock icon in the address bar and looking for "https" at the beginning of the address of the Web page. While we use encryption to protect sensitive information transmitted online, we also protect your information offline. We do not have access to your account password, as this information is encrypted and not available to any other site users or administrators. If you forget your password, you may request a password reset. If you feel that we are not abiding by this privacy policy, you should contact us immediately.
Contact Us
If you have any questions about this Privacy Notice, or need to contact us, we can be reached at .
Terms and Conditions
Last updated: August 04, 2019
Please read these Terms and Conditions ("Terms", "Terms and Conditions") carefully before using the http://womenalsoknowstuff.com website (the "Service") operated by Women Also Know Stuff ("us", "we", or "our"). Your access to and use of the Service is conditioned upon your acceptance of and compliance with these Terms. These Terms apply to all visitors, users and others who wish to access or use the Service. By accessing or using the Service you agree to be bound by these Terms. If you disagree with any part of the terms then you do not have permission to access the Service.
Content
Our Service allows you to post, link, store, share and otherwise make available certain information, text, graphics, videos, or other material ("Content"). You are responsible for the Content that you post on or through the Service, including its legality, reliability, and appropriateness. By posting Content on or through the Service, You represent and warrant that: (i) the Content is yours (you own it) and/or you have the right to use it and the right to grant us the rights and license as provided in these Terms, and (ii) that the posting of your Content on or through the Service does not violate the privacy rights, publicity rights, copyrights, contract rights or any other rights of any person or entity. We reserve the right to terminate the account of anyone found to be infringing on a copyright. You retain any and all of your rights to any Content you submit, post or display on or through the Service and you are responsible for protecting those rights. We take no responsibility and assume no liability for Content you or any third party posts on or through the Service. However, by posting Content using the Service you grant us the right and license to use, modify, publicly perform, publicly display, reproduce, and distribute such Content on and through the Service. You agree that this license includes the right for us to make your Content available to other users of the Service, who may also use your Content subject to these Terms. Women Also Know Stuff has the right but not the obligation to monitor and edit all Content provided by users. In addition, Content found on or through this Service are the property of Women Also Know Stuff or used with permission. You may not distribute, modify, transmit, reuse, download, repost, copy, or use said Content, whether in whole or in part, for commercial purposes or for personal gain, without express advance written permission from us.
Accounts
When you create an account with us, you guarantee that you are above the age of 18, are a woman in the academic field of Political Science, and that the information you provide us is accurate, complete, and current at all times. Inaccurate, incomplete, or obsolete information may result in the immediate termination of your account on the Service. You are responsible for maintaining the confidentiality of your account and password, including but not limited to the restriction of access to your computer and/or account. You agree to accept responsibility for any and all activities or actions that occur under your account and/or password, whether your password is with our Service or a third-party service. You must notify us immediately upon becoming aware of any breach of security or unauthorized use of your account.
Intellectual Property
The Service and its original content (excluding Content provided by users), features and functionality are and will remain the exclusive property of Women Also Know Stuff and its licensors. The Service is protected by copyright, trademark, and other laws of both the United States and foreign countries. Our trademarks and trade dress may not be used in connection with any product or service without the prior written consent of Women Also Know Stuff. Links To Other Web Sites Our Service may contain links to third party web sites or services that are not owned or controlled by Women Also Know Stuff Women Also Know Stuff has no control over, and assumes no responsibility for the content, privacy policies, or practices of any third party web sites or services. We do not warrant the offerings of any of these entities/individuals or their websites. You acknowledge and agree that Women Also Know Stuff shall not be responsible or liable, directly or indirectly, for any damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods or services available on or through any such third party web sites or services. We strongly advise you to read the terms and conditions and privacy policies of any third party web sites or services that you visit.
Termination
We may terminate or suspend your account and bar access to the Service immediately, without prior notice or liability, under our sole discretion, for any reason whatsoever and without limitation, including but not limited to a breach of the Terms. If you wish to terminate your account, you may simply discontinue using the Service, or notify us that you wish to delete your account. All provisions of the Terms which by their nature should survive termination shall survive termination, including, without limitation, ownership provisions, warranty disclaimers, indemnity and limitations of liability.
Indemnification
You agree to defend, indemnify and hold harmless Women Also Know Stuff and its licensee and licensors, and their employees, contractors, agents, officers and directors, from and against any and all claims, damages, obligations, losses, liabilities, costs or debt, and expenses (including but not limited to attorney's fees), resulting from or arising out of a) your use and access of the Service, by you or any person using your account and password; b) a breach of these Terms, or c) Content posted on the Service.
Limitation Of Liability
In no event shall Women Also Know Stuff, nor its directors, employees, partners, agents, suppliers, or affiliates, be liable for any indirect, incidental, special, consequential or punitive damages, including without limitation, loss of profits, data, use, goodwill, or other intangible losses, resulting from (i) your access to or use of or inability to access or use the Service; (ii) any conduct or content of any third party on the Service; (iii) any content obtained from the Service; and (iv) unauthorized access, use or alteration of your transmissions or content, whether based on warranty, contract, tort (including negligence) or any other legal theory, whether or not we have been informed of the possibility of such damage, and even if a remedy set forth herein is found to have failed of its essential purpose.
Disclaimer
Your use of the Service is at your sole risk. The Service is provided on an "AS IS" and "AS AVAILABLE" basis. The Service is provided without warranties of any kind, whether express or implied, including, but not limited to, implied warranties of merchantability, fitness for a particular purpose, non-infringement or course of performance. Women Also Know Stuff, its subsidiaries, affiliates, and its licensors do not warrant that a) the Service will function uninterrupted, secure or available at any particular time or location; b) any errors or defects will be corrected; c) the Service is free of viruses or other harmful components; or d) the results of using the Service will meet your requirements.
Exclusions
Some jurisdictions do not allow the exclusion of certain warranties or the exclusion or limitation of liability for consequential or incidental damages, so the limitations above may not apply to you.
Governing Law
These Terms shall be governed and construed in accordance with the laws of the state of Arizona and the United States, without regard to its conflict of law provisions. Our failure to enforce any right or provision of these Terms will not be considered a waiver of those rights. If any provision of these Terms is held to be invalid or unenforceable by a court, the remaining provisions of these Terms will remain in effect. These Terms constitute the entire agreement between us regarding our Service, and supersede and replace any prior agreements we might have had between us regarding the Service.
Changes
We reserve the right, at our sole discretion, to modify or replace these Terms at any time. If a revision is material we will provide at least 30 days notice prior to any new terms taking effect. What constitutes a material change will be determined at our sole discretion. By continuing to access or use our Service after any revisions become effective, you agree to be bound by the revised terms. If you do not agree to the new terms, you are no longer authorized to use the Service.
Contact Us
If you have any questions about these Terms, please contact us at .