BMET 23A27 - Quantitative Methods for Security Studies

This workshop provides an advanced introduction to quantitative methods in the field of Security Studies. It is designed to equip students with both the theoretical foundations and practical tools necessary to engage critically and effectively with data-driven research in international security. Over the course of twelve sessions (24 hours in total), participants will learn how to identify, collect, structure, analyse, and interpret quantitative data related to armed conflicts, political violence, non-state actors, and institutional responses. The workshop is structured in four parts. The first part provides a conceptual and methodological toolbox, introducing students to key datasets, statistical techniques, and the fundamentals of research design. The second part consists of empirical case studies on topics such as interstate disputes, armed groups, and micro-level patterns of violence, helping students understand how different types of data can be used to investigate specific security phenomena. The third part focuses on text-as-data approaches, covering techniques such as text classification, framing analysis, topic modeling, and semantic scaling, with applications to policy documents, institutional discourse, and strategic narratives. The final part of the workshop is an interactive lab in which students work in small groups to design and present original research projects. Each group is assigned a prompt and relevant datasets, and must define a research question, select appropriate methods, identify potential challenges, and outline a strategy for empirical analysis. This practical segment allows students to consolidate the skills acquired during the workshop and receive feedback from both the instructor and their peers. Throughout the workshop, students will work with a wide range of data sources—spanning from classical datasets such as the Correlates of War and Polity IV to more recent georeferenced datasets, web-scraped data, and large corpora of institutional texts. Special attention will be given to the trade-offs inherent in quantitative analysis, particularly when dealing with sensitive or incomplete data in high-stakes policy contexts. The workshop also explores how data-driven approaches shape our understanding of contemporary conflicts, drawing extensively on the findings and methodologies of the DATAWAR project at Sciences Po-CERI. By the end of the course, students will have developed technical skills in quantitative analysis and will be encouraged to critically reflect on the political and epistemological implications of using data in security research. The final sessions will be dedicated to a group-based research design lab, where students will apply the concepts learned to develop and present original research proposals.
Mattia SGUAZZINI
Séminaire
English
No prior programming experience is required for this course. However, it is recommended that you bring a laptop to class with some basic tools already installed, as they will be useful for hands-on activities. In particular, having R (version 3 or later) and RStudio installed locally is encouraged. In addition, it is important to ensure that access to a Google account is available, as Google Colab will be used for certain exercises. Institutional university accounts typically include access to Colab, but it should be verified that the account is active and that Google Colab can be opened and used without issues.
Autumn 2025-2026
1°) Class participation: 10% Students are expected to actively participate in class discussions, contribute to collective reflections on readings, and engage in Q&A sessions following lectures and presentations. 2°) Contribution to group work: 30% During the final sessions, students will work in small groups to develop a research design in response to a given prompt. This includes defining the research question, formulating hypotheses, selecting appropriate data and methods, and identifying potential limitations. Each group will present their work to the class. Assessment will focus on the quality of collaboration, clarity of presentation, and ability to respond to feedback. 3°) Individual research design paper: 60%. Students will submit a short written research design based on the tools and concepts discussed in class. The paper should include a research question, research design and hypothesis, methodology, data sources, and a brief discussion of limitations.
Beaumais, L., Lambert, I., Lindemann, T., Makki, S., Ramel, F., & Sangar, E. (Eds.). (2025). Quantifying International Conflicts: Data on War or Data for War. Palgrave Macmillan.
Grimmer, J., Roberts, M. E., & Stewart, B. M. (2022). Text as Data: A New Framework for Machine Learning and the Social Sciences. Princeton University Press.
Hanania, R. (2020). The humanitarian turn at the UNSC: Explaining the development of international norms through machine learning algorithms. Journal of Peace Research, 58(4), 655–670.
Isoaho, K., Gritsenko, D., and Mäkelä, E., 2021. Topic modeling and text analysis for qualitative policy research. Policy Studies Journal, 49 (1), 300–324
Kellstedt, P. M., & Whitten, G. D. (2018). The fundamentals of political science research. Cambridge University Press.
King, Gary, Robert O. Keohane, and Sidney Verba. (1994). Designing Social Inquiry: Scientific Inference in Qualitative Research. Princeton University Press.
McCauley, A., & Ruggeri, A. (2020). From Questions and Puzzles to Research Project. In L. Curini & R. Franzese Jr. (Eds.), The SAGE Handbook of Research Methods in Political Science and International Relations (Vol. 1, pp. 113–127). SAGE Publications.
Valeriano, B., & Maness, R. C. (2014). Cyber War versus Cyber Realities: Cyber Conflict in the International System. Oxford University Press.
Sewerin, S., Kaack, L. H., Küttel, J., Widmer, T., & Donges, J. F. (2023). Towards understanding policy design through text-as-data approaches: The policy design annotations (POLIANNA) dataset. Scientific Data, 10, 896.
Sguazzini, M., & Mazziotti di Celso, M. (2024). Unveiling military strategic narratives on social media: A civil–military relations perspective. European Security, 34(2), 294–323.