{"title":"The Case for Campaign Analysis: A Method for Studying Military Operations","authors":"Rachel Tecott, Andrew Halterman","doi":"10.1162/isec_a_00408","DOIUrl":null,"url":null,"abstract":"Abstract Military operations lie at the center of international relations theory and practice. Although security studies scholars have used campaign analysis to study military operations for decades, the method has not been formally defined or standardized, and there is little methodological guidance available for scholars interested in conducting or evaluating it. Campaign analysis is a method involving the use of a model and techniques for managing uncertainty to answer questions about military operations. The method comprises six steps: (1) question selection, (2) scenario development, (3) model construction, (4) value assignment, (5) sensitivity analysis, and (6) interpretation and presentation of results. The models that scholars develop to direct analysis are significant intellectual contributions in their own right, and can be adapted by other scholars and practitioners to guide additional analyses. Careful model construction can clarify, but does not obviate, the uncertainty of conflict. To manage uncertainty in parameter values, scholars can use the “input distribution approach” to propagate uncertainty in inputs through to a model's output. Replications and extensions of Wu Riqiang's 2020 analysis of Chinese nuclear survivability and Barry Posen's 1991 analysis of the North Atlantic Treaty Organization's prospects against the Warsaw Pact illustrate the six steps of campaign analysis, the value of transparent models and the input distribution approach, and the potential of campaign analysis to contribute to policy and theory.","PeriodicalId":48667,"journal":{"name":"International Security","volume":"6 1","pages":"44-83"},"PeriodicalIF":4.8000,"publicationDate":"2020-09-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Security","FirstCategoryId":"90","ListUrlMain":"https://doi.org/10.1162/isec_a_00408","RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"INTERNATIONAL RELATIONS","Score":null,"Total":0}
引用次数: 2
Abstract
Abstract Military operations lie at the center of international relations theory and practice. Although security studies scholars have used campaign analysis to study military operations for decades, the method has not been formally defined or standardized, and there is little methodological guidance available for scholars interested in conducting or evaluating it. Campaign analysis is a method involving the use of a model and techniques for managing uncertainty to answer questions about military operations. The method comprises six steps: (1) question selection, (2) scenario development, (3) model construction, (4) value assignment, (5) sensitivity analysis, and (6) interpretation and presentation of results. The models that scholars develop to direct analysis are significant intellectual contributions in their own right, and can be adapted by other scholars and practitioners to guide additional analyses. Careful model construction can clarify, but does not obviate, the uncertainty of conflict. To manage uncertainty in parameter values, scholars can use the “input distribution approach” to propagate uncertainty in inputs through to a model's output. Replications and extensions of Wu Riqiang's 2020 analysis of Chinese nuclear survivability and Barry Posen's 1991 analysis of the North Atlantic Treaty Organization's prospects against the Warsaw Pact illustrate the six steps of campaign analysis, the value of transparent models and the input distribution approach, and the potential of campaign analysis to contribute to policy and theory.
期刊介绍:
International Security publishes lucid, well-documented essays on the full range of contemporary security issues. Its articles address traditional topics of war and peace, as well as more recent dimensions of security, including environmental, demographic, and humanitarian issues, transnational networks, and emerging technologies.
International Security has defined the debate on US national security policy and set the agenda for scholarship on international security affairs for more than forty years. The journal values scholarship that challenges the conventional wisdom, examines policy, engages theory, illuminates history, and discovers new trends.
Readers of IS discover new developments in:
The causes and prevention of war
U.S.-China relations
Great power politics
Ethnic conflict and intra-state war
Terrorism and insurgency
Regional security in Africa, Asia, Europe, and Latin America
U.S. foreign and defense policy
International relations theory
Diplomatic and military history
Cybersecurity and defense technology
Political economy, business, and security
Nuclear proliferation.