Military & Homeland Security eJournal最新文献

筛选
英文 中文
Securitización e inversiones extranjeras: control del riesgo de ciertas inversiones para la seguridad nacional del Estado (Securitization and Foreign Investment: Screening of Foreign Investment on National Security Grounds) 证券化和外国投资:为国家安全控制某些投资的风险(证券化和外国投资:对国家安全基础上的外国投资进行审查)
Military & Homeland Security eJournal Pub Date : 2019-03-01 DOI: 10.12804/REVISTAS.UROSARIO.EDU.CO/ACDI/A.6528
Carlos Esplugues Mota
{"title":"Securitización e inversiones extranjeras: control del riesgo de ciertas inversiones para la seguridad nacional del Estado (Securitization and Foreign Investment: Screening of Foreign Investment on National Security Grounds)","authors":"Carlos Esplugues Mota","doi":"10.12804/REVISTAS.UROSARIO.EDU.CO/ACDI/A.6528","DOIUrl":"https://doi.org/10.12804/REVISTAS.UROSARIO.EDU.CO/ACDI/A.6528","url":null,"abstract":"El aumento constante de las inversiones extranjeras durante las últimas décadas ha venido acompañado de un cambio en sus parámetros. El origen de las inversiones varía, como lo hace su naturaleza y destino. La posibilidad de que sectores claves de la economía del Estado receptor acaben en manos de inversores extranjeros, en ocasiones pertenecientes o controlados por un Estado foráneo, es vista con prevención en muchos países y acentúa la creciente oposición al libre comercio y a la inversión extranjera. La limitada respuesta -ex post- ofrecida por el marco normativo internacional, lleva a los Estados a diseñar respuetas ex ante, dirigidas a controlar ciertas inversiones que por su origen, condición o destino pueden resultar potencialmente riesgosas para su seguridad nacional.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128843863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Foreign Terrorist Fighters and UK Counter Terrorism Laws 外国恐怖主义战士和英国反恐法
Military & Homeland Security eJournal Pub Date : 2018-11-26 DOI: 10.1163/9789004346888_007
C. Walker
{"title":"Foreign Terrorist Fighters and UK Counter Terrorism Laws","authors":"C. Walker","doi":"10.1163/9789004346888_007","DOIUrl":"https://doi.org/10.1163/9789004346888_007","url":null,"abstract":"How have UK counter-terrorism laws and policies adapted to the phenomenon of ‘foreign terrorist fighters’? For these purposes, the focus will be upon persons linked to conflict or terrorism in Iraq and Syria associated with the rise and establishment of Islamic State (Daesh). This broad agenda covers: the meanings of ‘foreign terrorist fighters’ and the formulation of policy against them; criminal justice, policing and prosecution aspects of response; and non-criminal justice aspects of response, including travel and citizenship measures and the Prevent policy.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133570890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monopolies of Violence in Developing Democracies: Emerging Evidence from India 发展中民主国家的暴力垄断:来自印度的新证据
Military & Homeland Security eJournal Pub Date : 2016-10-18 DOI: 10.2139/ssrn.2854224
Jason Miklian
{"title":"Monopolies of Violence in Developing Democracies: Emerging Evidence from India","authors":"Jason Miklian","doi":"10.2139/ssrn.2854224","DOIUrl":"https://doi.org/10.2139/ssrn.2854224","url":null,"abstract":"Traditional theories about how a state achieves a monopoly of violence are becoming increasingly strained as different forms of democracy have spread across the globe, and as shifting international norms change what is considered legitimate state action. This article assesses five state responses to political violence in India (military, human rights, media, policing, and preventive policy) to argue that India’s growing domestic need to address demands for human security and internationalized need to support human rights underpin its evolving efforts to maintain legitimacy and secure a Weberian monopoly of violence in an internationalized political environment.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132756128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Amphibious Warfare Since World War II 二战以来的两栖战争
Military & Homeland Security eJournal Pub Date : 2015-01-02 DOI: 10.2139/SSRN.2544746
S. W. Bettwy
{"title":"Amphibious Warfare Since World War II","authors":"S. W. Bettwy","doi":"10.2139/SSRN.2544746","DOIUrl":"https://doi.org/10.2139/SSRN.2544746","url":null,"abstract":"The development of amphibious warfare during World War II (WWII) has changed the nature of warfare to the present day. In general, the development is significant because it has enabled a modern military organization to launch, or pretend to launch, a ground offensive from the sea against a shoreline, whether or not the shoreline is defended. During WWII, the United States’ and the United Kingdom’s advanced methods of amphibious warfare in the offense allowed them to establish a western war front, which led to decisive victory against Germany. Japan’s advanced amphibious warfare in the defense significantly affected the United States’ decision to use the atomic bomb to obtain a decisive victory. Since WWII, both the United States and the United Kingdom have continued to use amphibious warfare successfully.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128034335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
5G Technologies: Fundamental Shift in Mobile Networking Philosophy 5G技术:移动网络理念的根本转变
Military & Homeland Security eJournal Pub Date : 2013-11-16 DOI: 10.2139/ssrn.2387193
Adeel Javaid
{"title":"5G Technologies: Fundamental Shift in Mobile Networking Philosophy","authors":"Adeel Javaid","doi":"10.2139/ssrn.2387193","DOIUrl":"https://doi.org/10.2139/ssrn.2387193","url":null,"abstract":"The advent of 5G technologies and ICT networks signify the coming next wave of a globally connected Digital Society. Right now, all over the world, mobile access to the internet is becoming wholly fundamental to doing business in all industries. Flexible working practices facilitated by mobile networks and devices are already essential, and are allowing enterprises to conduct operations across boundaries that previously inhibited growth. Growing mobile access to the internet, cloud-based services and Big Data analytics is allowing anyone, anywhere to leverage “Big Wisdom�? – a whole new kind of globally connected and shared knowledge base. Transformation and convergence of ICT network infrastructure is driving business innovation and growth. Not only is ICT an increasingly effective tool for enhancing efficiency, but it is now a vital driver of economic and societal growth. The development of 5G technologies is a cornerstone for realizing breakthroughs in the transformation of ICT network infrastructure. Ultra-broadband and intelligent-pipe network features that achieve near-instantaneous, “zero distance�? connectivity between people and connected machines – no matter where they are – are just the first step. The European Commission’s Horizon 2020 plan, announced this month, includes roughly $172 million for 5G research and development, and South Korea’s Yonhap News announced that country’s government would spend $475 million on developing a national 5G network, to be completed by 2020. Both proposals cite the transformative effects and massive economic benefits of 5G technology. 5G wireless networks will support 1,000-fold gains in capacity, connections for at least 100 billion devices, and a 10 Gb/s individual user experience capable of extremely low latency and response times. Deployment of these networks will emerge between 2020 and 2030. 5G radio access will be built upon both new radio access technologies (RAT) and evolved existing wireless technologies (LTE, HSPA, GSM and WiFi). Breakthroughs in wireless network innovation will also drive economic and societal growth in entirely new ways. 5G will realize networks capable of providing zero-distance connectivity between people and connected machines. The proposal in this paper is fundamental shift in the mobile networking philosophy compared to existing 3G and near-soon 4G mobile technologies.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117131471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Bearing Silent Witness: A Grandfather's Secret Attestation to German War Crimes in Occupied France 沉默的见证:一位祖父对德国在被占领的法国犯下的战争罪行的秘密证词
Military & Homeland Security eJournal Pub Date : 2013-09-01 DOI: 10.5038/1944-0472.6.3S.37
McKay M Smith
{"title":"Bearing Silent Witness: A Grandfather's Secret Attestation to German War Crimes in Occupied France","authors":"McKay M Smith","doi":"10.5038/1944-0472.6.3S.37","DOIUrl":"https://doi.org/10.5038/1944-0472.6.3S.37","url":null,"abstract":"Scholars have acknowledged that the study of World War II era intelligence can be an extremely arduous undertaking. Intelligence tradecraft, by its very nature, requires that certain information remain secret. It necessitates the sustained concealment of activities or events. Moreover, this government emphasis on secrecy often results in the suppression of sensitive information from historians and citizens alike. Thus, one must turn to declassified records of the past to reshape modern conceptions of history. This article should be regarded as a spirited departure from traditional scholarship. Specifically, it utilizes the case study method to communicate a powerful message related to both law and history. Readers are encouraged to examine this narrative and related analysis in conjunction with the primary source material it references. More importantly, they are asked to apply a socio-legal approach to the personal account contained therein. In the summer of 2011, the author was fortunate to discover a declassified report detailing his grandfather’s experiences as a young airman in World War II. Lt. Raymond Murphy was shot down in 1944 by German anti-aircraft fire on his sixteenth mission as a B-17 Navigator with the U.S. Army Air Corps. When examined from a legal perspective, his report is illustrative of a number of law of war topics, including the foundational principles that gave rise to modern humanitarian law. Unfortunately, Lt. Murphy's account also evidences something far more disturbing, a criminal atrocity committed by German forces at the French village of Oradour-sur-Glane.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"509 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115890263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Fight Terrorism: The Relevance of Qualitative Economics 如何打击恐怖主义:定性经济学的相关性
Military & Homeland Security eJournal Pub Date : 2013-08-05 DOI: 10.3790/AEQ.59.3.197
P. J. Phillips
{"title":"How to Fight Terrorism: The Relevance of Qualitative Economics","authors":"P. J. Phillips","doi":"10.3790/AEQ.59.3.197","DOIUrl":"https://doi.org/10.3790/AEQ.59.3.197","url":null,"abstract":"Using qualitative comparative statics we analyse terrorist choice and government strategy in a context where the qualities or characteristics of the terrorist’s various alternatives are salient to his decision-making. Orthodox choice theory can be used to show what happens when government strategy increases the terrorist’s material or opportunity costs. However, when such a government strategy deliberately or inadvertently emphasises or advertises a particular quality or characteristic of a particular legitimate alternative to political violence, it is possible that this information, intended to alert terrorists to changes in relative costs, increases rather than decreases terrorism. The analysis complements the application of the orthodox model of choice to the study of terrorist behaviour and provides additional insights that are relevant for the development of effective government strategy.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127477590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Lone Wolf Terrorism: Prudence in the Lone Wolf’s Planning and the Time Delay between Acts of Lone Wolf Terrorism 独狼式恐怖主义:独狼式恐怖主义计划的谨慎性与独狼式恐怖主义行动之间的时间延迟
Military & Homeland Security eJournal Pub Date : 2012-09-20 DOI: 10.2139/ssrn.2149894
P. J. Phillips
{"title":"Lone Wolf Terrorism: Prudence in the Lone Wolf’s Planning and the Time Delay between Acts of Lone Wolf Terrorism","authors":"P. J. Phillips","doi":"10.2139/ssrn.2149894","DOIUrl":"https://doi.org/10.2139/ssrn.2149894","url":null,"abstract":"The lone wolf terrorist has been described as a most significant threat. His independent nature makes it difficult for law enforcement to know about the existence of a lone wolf before he strikes. Economic analysis may contribute to the investigative process. For lone wolves who have undertaken acts of terrorism and who remain at large, we may be able to determine whether we should expect the length of time between his most recent attack and his next attack to be longer or shorter than average. When lone wolf terrorism is characterised by ‘copy cat’ acts of violence we may be able to determine whether we should expect an average, below average or above average time delay between the initial attack and the emergence of imitation acts. When an imitation act occurs or when a ‘serial’ lone wolf strikes another time, the length of time between the last act and the next act may contain information that is useful to the development of a profile of the unknown lone wolf terrorist. These results and the operational advice that may be provided to law enforcement and security agencies emerge from the development of an economic theory of the lone wolf terrorist in which particular theoretical attention is given to the ‘prudence’ of the lone wolf’s planning.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122171423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Managing a Secret Project 管理秘密项目
Military & Homeland Security eJournal Pub Date : 2012-03-13 DOI: 10.2139/ssrn.1434696
Edieal J. Pinker, Joseph G. Szmerekovsky, Vera Tilson
{"title":"Managing a Secret Project","authors":"Edieal J. Pinker, Joseph G. Szmerekovsky, Vera Tilson","doi":"10.2139/ssrn.1434696","DOIUrl":"https://doi.org/10.2139/ssrn.1434696","url":null,"abstract":"We consider the problem of scheduling a project when there is an adversary from whom you want to conceal the project’s progress. Interfering with the progress by the adversary is called interdiction. Interdiction may involve hiring away key employees, campaigning for a change in zoning laws, etc. In this paper we take the perspective of a project manager with an adversary. The project manager seeks to limit the adversary’s opportunity to interdict, and, therefore, tries to keep the adversary “in the dark” as long as possible while completing the project on time. In the context of a leader-follower game, we formulate and analyze a new form of project management problem for secret projects where the project manager uses a combination of deception, task scheduling, and crashing to minimize the time between the adversary’s awareness and reaction and the project’s completion. We formulate a novel mixed-integer linear program and determine characteristics of optimal schedules. Using a detailed example of nuclear weapons development we illustrate the interconnectedness of deception, task scheduling, and crashing and the resulting influence on adversary behavior.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115375036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Commanders Emergency Response Program in Afghanistan: Refining U.S. Military Capabilities in Stability and In-Conflict Development Activities 指挥官在阿富汗的紧急反应计划:提高美国在稳定和冲突发展活动中的军事能力
Military & Homeland Security eJournal Pub Date : 2011-09-06 DOI: 10.2139/SSRN.1931023
Gregory Johnson, V. Ramachandran, Julie Walz
{"title":"The Commanders Emergency Response Program in Afghanistan: Refining U.S. Military Capabilities in Stability and In-Conflict Development Activities","authors":"Gregory Johnson, V. Ramachandran, Julie Walz","doi":"10.2139/SSRN.1931023","DOIUrl":"https://doi.org/10.2139/SSRN.1931023","url":null,"abstract":"The U.S. military has become substantially engaged in the development and stabilization space and will likely continue to operate in this space for some time to come. Analyzing the Commanders Emergency Response Program in Afghanistan, we look at the scope and rationale for development related activities carried out by the U.S. military. Acknowledging that tensions have arisen between the development community and the U.S. military in Afghanistan, we discuss the scope for improving the U.S. military’s capabilities in carrying out development-related activities in in-conflict zones. Specifically, we propose five policy changes for the U.S. military - improving education and training for military officers, reforming authorities and doctrine, understanding the dominant sectors of the economy, monitoring outcomes, and increasing awareness of unintended consequences.","PeriodicalId":219968,"journal":{"name":"Military & Homeland Security eJournal","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134347324","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信