Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephen Coulthart is active.

Publication


Featured researches published by Stephen Coulthart.


Intelligence & National Security | 2016

Why do analysts use structured analytic techniques? An in-depth study of an American intelligence agency

Stephen Coulthart

Abstract This article presents findings from the first publicly available survey generalizable to an intelligence agency to explore why analysts use structured analytic techniques (SATs). Mandated by the Intelligence Reform and Terrorism Prevention Act (2004), SATs are simple methodologies supposed to make analysis more transparent and, hopefully, valid. Despite the US government’s investment in training thousands of analysts, there is no solid evidence on how often or why analysts actually use SATs. A survey of 80 analysts and nine follow-up interviews at the State Department’s Bureau of Intelligence and Research reveals a simple, but important, truth: implementing the techniques requires training and compelling evidence they will improve analysis. Other factors, most notably the amount of time pressure an analyst experiences, were not significantly related with the use of the techniques despite anecdotal accounts and conjecture from the literature. Future research should examine other intelligence agencies to cross-validate these findings. If these findings hold in other cases, intelligence agencies should focus on reforming and incorporating evidence into the training process.


Journal of Strategic Security | 2015

Terra Incognita: Mapping American Intelligence Education Curriculum

Stephen Coulthart; Matthew Crosston

For more than two decades, degree-granting intelligence programs have popped up around the U.S., representing the largest and perhaps most enduring investment in American intelligence education. Scholars have addressed issues in American intelligence education, but to date, there has been no focused study that has mapped and analyzed these programs. This article addresses this gap by answering the questions: What are the American intelligence programs and what content is being taught? We answered this question by systematically identifying all 17 American intelligence education programs (1992-2012). The picture that emerges is one of delayed, but rapid growth: most programs were founded after 2005. After collecting and analyzing hundreds of course descriptions using a widely-accepted qualitative data analysis method called constant comparison, we mapped the curricular structure of the intelligence programs in aggregate. The contribution of this research is to increase understanding of the structure of American intelligence curriculum for current and future intelligence educators as well as employers. This article is available in Journal of Strategic Security: http://scholarcommons.usf.edu/jss/vol8/iss3/3


Journal of Conflict Resolution | 2017

Structure and Performance in a Violent Extremist Network The Small-world Solution

Michael Kenney; Stephen Coulthart; Dominick Wright

This study combines network science and ethnography to explore how al-Muhajiroun, a banned Islamist network, continued its high-risk activism despite being targeted for disruption by British authorities. We analyze news reports, interviews, and field notes using social network analysis and qualitative content analysis to test hypotheses pertaining to network structure and performance. Our analysis suggests that the activist network’s structural properties had important implications for its performance during three separate time periods. What began as a centralized, scale-free-like, small-world network centered on a charismatic leader evolved into a more decentralized “small-world-like” network featuring clusters of local activists connected through multiple bridges. This structure allowed the activist network to engage in contentious politics even as its environment became increasingly hostile. We conclude by discussing the implications of al-Muhajiroun’s small-world solution for scholars and policy makers.


Intelligence & National Security | 2017

What’s the problem? Frameworks and methods from policy analysis for analyzing complex problems

Stephen Coulthart

Abstract The importance of problem structuring – the activity of making sense of problems – has been grasped by many scholars of policy analysis, a profession that shares much in common in form and function with intelligence analysis. This article imports some of the lessons, frameworks and methodologies of problem structuring to intelligence analysis from policy analysis. The concept of a Type III error is introduced, the analytical mistake of misunderstanding a problem, along with several methodologies designed to help analysts structure problems. One such methodology from policy analysis, called boundary analysis, is demonstrated on a national security case, the 2014 Syrian chemical weapons destruction process.


Journal of Comparative Policy Analysis: Research and Practice | 2012

Social Cohesion and Counter-Terrorism: A Policy Contradiction?

Stephen Coulthart

Social Cohesion and Counter-Terrorism: A Policy Contradiction? Charles Husband (Professor of Social Analysis, University of Bradford, UK, and fellow, Helsinki Collegium for Advanced Studies, University of Helsinki, Finland. E-mail: c.h.husband@bradford. ac.uk) and Yunis Alam (Lecturer and researcher, University of Bradford, UK. E-mail: m.y.alam1@bradford. ac.uk) Bristol: Policy Press, 2011, 272 pp. £21.99. ISBN: 978-1847428011


Archive | 2015

The Methodological Challenges of Extracting Dark Networks: Minimizing False Positives through Ethnography

Michael Kenney; Stephen Coulthart; Luke M. Gerdes


Global Security and Intelligence Studies | 2016

Academic Intelligence Programs in the United States: Exploring the Training and Tradecraft Debate

Michael Landon-Murray; Stephen Coulthart


Archive | 2017

Can colleges teach intelligence? Three security studies professors argue they can, and should

Stephen Coulthart; Damien Van Puyvelde; Michael Landon-Murray


Archive | 2017

National security relies more and more on dig data. Here's why.

Damien Van Puyvelde; Stephen Coulthart; Shahriar Hossain


International Affairs | 2017

Beyond the buzzword: big data and national security decision-making

Damien Van Puyvelde; Stephen Coulthart; M. Shahriar Hossain

Collaboration


Dive into the Stephen Coulthart's collaboration.

Top Co-Authors

Avatar

Damien Van Puyvelde

University of Texas at El Paso

View shared research outputs
Top Co-Authors

Avatar

Michael Kenney

University of Pittsburgh

View shared research outputs
Top Co-Authors

Avatar

Dominick Wright

United States Military Academy

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge