Skip to main content (Press Enter).
Proposals may leverage existing data or, with justification, collect new data. Preference may be given to studies by experts capable of analyzing source material in the original languages and to studies that exploit materials that have not been previously translated. The DOD also values geospatially-referenced data across multiple geographic scales gathered in the course of research. It is expected that collecting viable empirical data relevant to context and situation may require field research, which is looked upon favorably.
Researchers are encouraged to incorporate novel research methods. Well-theorized models linking micro and macro analyses and cross-method approaches, such as simultaneously using both inductive and deductive analytic strategies, and qualitative and quantitative methods are also of interest. Proposals should be fundamentally rooted in the existing social science research literature and have a clear basic science component that describes the future utility of the insights the research will generate for social science.
Disciplinary approaches of interest include, but are not limited to: anthropology, area studies, cognitive science, demography, economics, history, human geography, political science, psychology, sociology, and computational sciences. Interdisciplinary approaches are strongly encouraged, especially when mutually informing and/or cross-validating (methodological integration). Researchers need not focus exclusively on the contemporary period, but they must be able to explain the relevance of findings to contemporary DOD strategic priorities.
The 2017 Interest Areas are situated within DOD strategic priorities that reflect the general, department-wide interests and those more specific to each Service. There is, of course, overlap and collaboration between the respective interest areas, but in framing their proposals researchers are encouraged to consider both the area of interest and the general context of needs it represents:
General Interest Area: Sociality, Security, and Interconnectivity
Special Interest Area 1: Understanding the Social Impact of Autonomy
Special Interest Area 2: Societal Resilience and Sociopolitical (In)stability
Special Interest Area 3: Power and Deterrence for Shaping Operations
Special Interest Area 4: Military Cyber Defense
White Papers due: March 21, 2017
Instructions for white papers
Invitations for full proposals will be sent: May 3, 2017
Full proposals due on grants.gov: June 21, 2017
Awards announced: September 5, 2017
Sociality, Security, and Interconnectivity
POC: David Montgomery, OSD (Policy) Strategy & Force Development and ASD (R&E) Basic Research, firstname.lastname@example.org
This interest area focuses on the myriad of factors contributing to social stability and conflict.
Recognizing that all issues of security exist within a social context, the Department of Defense seeks to enhance the basic social scientific understanding of factors contributing to social stability or conflict; processes of community formation and dissolution—including how communities construct meaning and value that drive political and collective action; and the impact of differing cultural visions on security at micro, mezzo, and macro levels. Most generally, this interest area concerns a focus on conflict vis-à-vis the mechanisms of sociality. It is interested in research that offers innovative, interdisciplinary insights into thematic topics including:
Societal Resilience and Sociopolitical (In)stability
POC: Lisa Troyer, Army Research Office, email@example.com
This topic area focuses on the relationship between events and stability.
The Department of Defense hopes to better anticipate and potentially mitigate instability and conflict through basic scientific research on factors that affect resilience to "shock" events (e.g., violent attacks, economic turbulence, social unrest, public health crises, environmental change). Such events have the potential to unsettle existing social structures, processes, and institutions, including markets, governance structures, population shifts, kin groups, educational systems, and delivery of healthcare, making regions vulnerable to upheaval and risks to the well-being of the population. Yet, some systems exhibit greater resilience to these shocks than others and the Department of Defense is interested in promoting greater understanding of contributors to resilience. The social structures, processes, and institutions that impact resilience and instability exist in a global system with complex relationships between components that are difficult to predict and model. They entail interdependencies between social systems (e.g., norms, values, governance, demographic trends), natural systems (e.g., environmental systems, including shifts in resource availabilities due to human-caused and naturally occurring changes), and physical systems (e.g., human-built systems like megacities, social infrastructure that includes communication, transportation, and cyber systems), which often span groups and nation states. This Minerva interest area aims to harness innovative, multidisciplinary social science research to better predict these dynamics. Areas of interest include, but are not limited to, dynamics of ungoverned, misgoverned, and contested regions; population migration and urbanization; effects of demographic trends on sociopolitical (in)stability and opportunity; security implications of changes in resource availability and resource control, including illicit trade and trafficking in all domains; and global interdependencies across trade and political systems. Approaches could incorporate different levels of analyses from small groups to cross-cultural interactions across large-scale collectives.
Understanding the Social Impact of Autonomy
POC: Benjamin Knott, Air Force Office of Scientific Research, firstname.lastname@example.org
This topic area explores the relationship between autonomy and sociality, looking at how one impacts the other.
The technologies of autonomous systems including artificial intelligence, machine learning, and robotics will be transformative to the DoD as well as have tremendous societal and economic impacts. Autonomous systems will revolutionize military operations across all services, complement and augment the capabilities of our warfighters and peacekeepers, and enhance national and homeland security. In addition these technologies will have sweeping social impacts, changing many aspects of how we live, learn, and communicate, including the potential to increase economic prosperity. The DoD is investing heavily in this area and recently commissioned a Defense Science Board Summer Study on Autonomy to make "recommendations to identify the science, engineering, and policy problems that must be solved to permit greater operational use of autonomy across all warfighting domains." While significant resources are being invested in developing the collection of technologies needed to achieve robust autonomous systems, many questions remain about the policy of autonomy including the use and ethics of autonomous weapons systems, the effects of robotics on the performance of human-machine teams, social impacts and support from local populations for US interests, and the economics / logistics of pervasive autonomy. Support is needed from the social science community to examine the social, cultural, psychological, political, economic, and ethical impacts of these advances.
Sample topics include:
The disruptive effects of autonomous systems on military affairs and society at large
Psychological effects on human operators of autonomous systems (e.g., it is known that the operators of remote UAVs often experience PTSD and other problems even though they are not directly vulnerable to harm)
Issues of reliance and trust when humans team with intelligent autonomous systems which are expected to learn and therefore evolve their behavior over time
The unintended consequences of autonomous / robotic systems on attitudes, trust, and support for US operations
Effects of autonomous / robotic systems on decision makers willingness to take risks and use force
The societal impacts of military autonomy technology crossing over to civilian applications
How social and moral norms shape the adoption of autonomy
How does reliance on autonomy shape individual and organizational decisions. For example, in human organizations, delegating serves to increase the moral distance from the consequences of one's actions. Might operating through a combat robot decrease empathy and increase dehumanization of others?
Power and Deterrence for Shaping Operations
POC: Martin Kruger, Office of Naval Research, email@example.com
This topic area focuses on the relationship between power projection and deterrence strategies.
Power is projected (e.g. conventional attack, cyber/information attack, economic action, diplomatic pressure) and deterrence strategies (if-then threat involving power) are used to make it more likely that “someone” will make a decision that is more favorable to someone’s interests and values. Compared with the relative certainty and stability of the cold war, the pace of introduction of new global threats has seemingly increased in recent years. These threats are coming from resurgent near peers, rogue states as well as cross border networked terrorist organizations. Unfortunately as the numbers of hot spots raises so have power projection and deterrence options (e.g. information warfare, cyber-attacks tied to economic consequence). The current lack of decision support tools makes selecting the best power and deterrence strategies to a decision shaping objective for very diverse global hot spots challenging. New fundamental theory is needed to understand the potential and limitations of power and deterrence options and to understand how to develop predictive capabilities.
Example of power projection includes everything from information warfare/cyber to action intended to affect economic conditions; diplomacy to kinetic attacks. Deterrence strategies can include those options as threats as well as carrot and stick approaches (e.g. aid funding, Foreign Military Sales (FMS), stability force training).
This interest area asks if it is possible to know how effective a power or deterrence strategy will be in shaping the future of a specific hot spot and whether there are any generalized theories that would allow lessons learned in one region to be applied to another region. Theories that establish causality between action and outcome and action and prediction is desired.
The overall objective of this research track is to offer new theories, models, and approaches to power projection and deterrence strategies and their ability to shape an area of interest. The research hopes to make it easier for US and allies to identify the best power and /or deterrence strategy for a given situation and to recognize when a threat has selected a power/deterrence strategy that is predicted to be their most dangerous option for the US and allies.
Areas of interest include the use of power projection/deterrence actions on/between non-state institutions, rising military powers and rogue states and the use by those states on US and Allies.
Beyond conventional deterrence and power projection
2017 Minerva Topics of Interest (PDF)
Military Cyber Defense
POC: Harold Hawkins, Office of Naval Research, firstname.lastname@example.org
This topic area explores the increasing role cyber plays in understanding security.
The potential for disruptive cyber attacks by malicious state and non-state actors on the military capabilities of the U.S. and its allies is a major and growing concern of the Department of Defense. The significance of these attacks relates to their capacity to compromise the effectiveness of military operations under hostile conditions where timely and accurate cyber performance is essential to mission success. This Minerva interest area seeks innovative multidisciplinary research, entailing contributions from Social, Behavioral, Statistical and Computer sciences, to develop empirically validated conceptual frameworks, formal models and computational tools to address two major issues of concern. The first is the ability of military personnel to quickly detect that their assets are the targets of cyber attack rather than due to degradations caused by system (hardware or software) malfunction or, for example, atmospheric interference or own force sources. Under many conditions, the latter causes of cyber disruption are more common than is cyber attack. As a consequence, troubleshooting activities, some highly time-consuming, could initially be focused on these more likely causes. An additional challenge in detecting malicious attack is that such attacks could produce consequences that are not immediately noticeable. The resulting delays in appropriately responding to cyber attack have the potential to compromise mission effectiveness in high tempo operations. Consequently, validated approaches are needed to quickly and effectively determine that military units are under cyber attack.
A second cyberattack issue of military concern is determining the state or non-state source of the attack. A number of factors could be considered when determining source attribution, including the target, the target systems disrupted, attack timing, hostility context, and signature characteristics of the attack. An overarching conceptual framework and specific computational toolsets are needed to integrate these and other sources of information to determine likely attack sources and the uncertainty associated with this determination. Desirable features of proposed solutions include: (1) the design of user interfaces that enable easy use in confusing high tempo operations environments and support rapid decision-making, and (2) modeling that is robust enough to support analysis without reach back or updates from higher command levels because of the possible compromise of cross-echelon communications in a cyberattack environment.
Because the techniques and sources of cyber attack will evolve over time, becoming more diverse and challenging, the conceptual frameworks and analytic tools sought in this Minerva Interest Area must be developed to be modular and capable of extensive scale-up. Finally, the frameworks and tool sets should be empirically validated. A possible validation strategy would be to develop, tune, and then evaluate the efficacy of frameworks and tools using an existing cyber incident data set that contains ground truth. At least one such data set exists in the public domain (Dyadic Cyber Incident and Dispute data set). In this suggested strategy, part of the data set would be used to develop approaches and the remainder would be exploited to test the validity of these approaches.