Office Hours (Fall 2021)
By appointment only (he is on sabbatical for the Fall 2021 semester)
Dr. Stephen Nemeth teaches courses in International Relations, with a focus on terrorism, conflict studies, and international environmental politics. His research focuses on the influence of organizational and spatial attributes of domestic terrorism. His work on terrorist organizations focuses on the ways that organizational characteristics – such as size, age, ideology, and sponsorship – affect their level of activity and their interactions with other terrorist organizations. His spatial research uses Geographic Information Systems (GIS) to determine why some locations suffer more domestic terrorism than others.
His work has been published in Journal of Politics, Journal of Conflict Resolution, and Political Research Quarterly. One of his co-authored projects on resolving maritime disputes has also been featured on the Piracy Studies blog, the research portal for maritime security issues.
International Relations, Terrorism, Civil Wars, Environmental Politics
Google Scholar profile: https://scholar.google.com/citations?user=VuHMzvEAAAAJ&hl=en
- Nemeth, Stephen C. and Holley E. Hansen. Forthcoming. "Political Competition and Right-Wing Terrorism: A County-Level Analysis of the United States." Political Research Quarterly. Available via OnlineFirst.
- Hansen, Holley E., Stephen C. Nemeth, and Jacob A. Mauslein. 2020. United Nations peacekeeping and terrorism: short-term risks and long-term benefits. International Interactions, 46 (2): 199-226.
- Hansen, Holley, Stephen Nemeth, and Jacob Mauslein. 2020. Ethnic Political Exclusion and Terrorism: Analyzing the Local Conditions for Violence. Conflict Management and Peace Science, 37 (3): 280-300.
- Nemeth, Stephen and Jacob Mauslein. 2020. Generosity is a Dangerous Game: Aid Allocation and the Risks of Terrorism. Terrorism and Political Violence 32 (2): 382-400.
- Nemeth, Stephen and Jacob Mauslein. 2019. Geography and the Certainty of Terrorism Event Coding. Journal of Global Security Studies 4(2): 227-240.