The RUSI Journal最新文献

筛选
英文 中文
Afghanistan’s Significance for NATO Strategy 阿富汗对北约战略的重要性
The RUSI Journal Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2133741
H. Larsen
{"title":"Afghanistan’s Significance for NATO Strategy","authors":"H. Larsen","doi":"10.1080/03071847.2022.2133741","DOIUrl":"https://doi.org/10.1080/03071847.2022.2133741","url":null,"abstract":"NATO has reaffirmed crisis management as one of its ‘core tasks’, even as it strengthens collective defence amid Russia’s invasion of Ukraine, and specifically refers to the need to learn from Afghanistan. Henrik Larsen argues that NATO needs to face the uncomfortable realities that can explain the failure of its most ambitious and deadliest operation in its history. Given that the Afghanistan experience makes a strong case against crisis management, he argues that NATO should refine its definition: ‘crisis’ synonymous with the prevention of inter-state conflict rather than diffuse threats such as global terrorism; and ‘management’ synonymous with over-the-horizon rather than open-ended operations or the supply of weapons like the case of Ukraine. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet Shutdowns 互联网关闭
The RUSI Journal Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2156234
Julia Ryng, Guillemette Guicherd, J. Saman, Priyanka Choudhury, Angharad Kellett
{"title":"Internet Shutdowns","authors":"Julia Ryng, Guillemette Guicherd, J. Saman, Priyanka Choudhury, Angharad Kellett","doi":"10.1080/03071847.2022.2156234","DOIUrl":"https://doi.org/10.1080/03071847.2022.2156234","url":null,"abstract":"The internet is a double-edged sword: civilians can mobilise it to assemble and voice dissent, but illiberal regimes can also weaponise it to consolidate power and suppress any form of opposition. Internet shutdowns – intentional disruptions of internet services – represent one method used to limit citizens’ freedom of expression, information, peaceful assembly and other associated rights in the name of national security. Julia Ryng, Guillemette Guicherd, Judy Al Saman, Priyanka Choudhury and Angharad Kellett examine the cases of Myanmar and Belarus: two distinct political regimes that nonetheless converge on similar strategies of repression. Through this comparative analysis, the authors highlight how future repression is likely to work and how compelling policy responses can be formulated. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assessing Dynamics of Control Through Iranian Technology Transfer to Yemen’s Houthis 通过伊朗向也门胡塞武装转让技术来评估控制动态
The RUSI Journal Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2148557
Henry P. Thompson, Jack Watling
{"title":"Assessing Dynamics of Control Through Iranian Technology Transfer to Yemen’s Houthis","authors":"Henry P. Thompson, Jack Watling","doi":"10.1080/03071847.2022.2148557","DOIUrl":"https://doi.org/10.1080/03071847.2022.2148557","url":null,"abstract":"This article examines the scale and significance of Iranian technology transfer to Ansar Allah in Yemen in underpinning the Houthi way of war. Henry Thompson and Jack Watling consider how Iran balances the transfer of manufacturing capabilities versus the provision of complete systems to exercise influence over the Houthis’ strikes on their adversaries. The article argues that the provision of key components gives Iran intimate access to Houthi planning, and therefore extensive indirect influence over how the Houthis fight. This structural dependence enables Iran to exercise command decisions without the need to intrusively exercise control. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How the Israel Defense Forces Seek to Defeat Non-State Actors 以色列国防军如何寻求击败非国家行为体
The RUSI Journal Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2150418
Ehud Eilam
{"title":"How the Israel Defense Forces Seek to Defeat Non-State Actors","authors":"Ehud Eilam","doi":"10.1080/03071847.2022.2150418","DOIUrl":"https://doi.org/10.1080/03071847.2022.2150418","url":null,"abstract":"The Israel Defense Forces (IDF) have been at war with Hizbullah and Hamas, two powerful non-state actors, several times throughout Israel’s history. In the next war, the IDF will seek to gain a decisive and quick victory, by launching a large-scale offensive, and strive to destroy military targets, such as rockets. It will continue to rely heavily on firepower, mostly from the air, while carrying out a limited manoeuvre on the ground to reduce its casualties. Yet, Ehud Eilam argues, a massive ground offensive might be needed with such a buildup being based on the air force, infantry and intelligence. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124403809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Royal Navy and Julian Corbett, 1990–2020 皇家海军和朱利安·科比特,1990-2020
The RUSI Journal Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2126387
A. Livsey
{"title":"The Royal Navy and Julian Corbett, 1990–2020","authors":"A. Livsey","doi":"10.1080/03071847.2022.2126387","DOIUrl":"https://doi.org/10.1080/03071847.2022.2126387","url":null,"abstract":"Sir Julian Stafford Corbett (1854–1922) is perhaps the UK’s most influential maritime thinker, but how influential has he been with the Royal Navy of the past 30 years, and how important should he be? Andrew Livsey shows that the answer to the first question is only slightly. He played a major role in the early editions of Book of Reference 1806, British Maritime Doctrine, but less thereafter. His influence elsewhere is difficult to find and his place in naval tuition has been limited. For the second question, Corbett has a role, but the Royal Navy has much else to consider. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124580258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Between Two Rivers 两河之间
The RUSI Journal Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2154969
S. Schulman
{"title":"Between Two Rivers","authors":"S. Schulman","doi":"10.1080/03071847.2022.2154969","DOIUrl":"https://doi.org/10.1080/03071847.2022.2154969","url":null,"abstract":"","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offensive Cyber Operations: Understanding Intangible Warfare 进攻性网络作战:理解无形战争
The RUSI Journal Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2154473
A. Colasanti
{"title":"Offensive Cyber Operations: Understanding Intangible Warfare","authors":"A. Colasanti","doi":"10.1080/03071847.2022.2154473","DOIUrl":"https://doi.org/10.1080/03071847.2022.2154473","url":null,"abstract":"When it comes to cyber, it is common to hear calls for interdisciplinary approaches, be it in the private sector, policy circles or academia. Daniel Moore is someone capable of marrying technical knowledge on information security with strategic studies proficiency. His Offensive Cyber Operations: Understanding Intangible Warfare is an authoritative account of the tactical exploitation of computer technologies and networks in interstate conflicts. The book is a welcome addition to the broader literature on cyber studies as it successfully moves beyond the many hyperbolic narratives of a debate prone to the technological determinism of the revolutions in military affairs. The central argument of the book is that computer network exploitation represents the latest stage in the evolution of ‘intangible warfare’, all those non-kinetic ‘efforts to undermine transmission, reception, and processing of data’ (p. 8) in the larger theatre of operations. In his account of the tactics of warfare that do not have a physical manifestation, Moore explains that the targeting of information and communication technologies (ICTs) for military and intelligence purposes is the result of gradual counter-innovations to military technologies during the 20th century, from the First World War to the Gulf War.","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122997367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prosecuting the Post-Digital Hyper-War 起诉后数字超级战争
The RUSI Journal Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2144431
M. Crilly
{"title":"Prosecuting the Post-Digital Hyper-War","authors":"M. Crilly","doi":"10.1080/03071847.2022.2144431","DOIUrl":"https://doi.org/10.1080/03071847.2022.2144431","url":null,"abstract":"The ubiquity and pervasiveness of digital technologies in modern societies portend a new type of conflict, a hyper-war of conflicting narratives, concepts and ideas. This multi-dimensional physical, virtual and cognitive battlespace is challenging the Westphalian model of multi-domain but mono-dimensional physical battle: it is moving conflict beyond the digital augmentation of Industrial Age platforms, into a new post-digital era. In this think piece, Martin Crilly reflects on how UK Defence will require imagination, ingenuity and inspiring leaders to successfully navigate this transition. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132163978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Forgotten Success 被遗忘的成功
The RUSI Journal Pub Date : 2022-05-18 DOI: 10.1080/03071847.2022.2072764
L. Risso
{"title":"A Forgotten Success","authors":"L. Risso","doi":"10.1080/03071847.2022.2072764","DOIUrl":"https://doi.org/10.1080/03071847.2022.2072764","url":null,"abstract":"Abstract By collecting and destroying the weapons that had been handed over by rebel Albanian fighters, Operation Essential Harvest ended violence in North Macedonia and paved the way for constitutional change. Through interviews with political and military leaders, and analysis of official sources published by NATO at the time, Linda Risso demonstrates how early diplomatic intervention, the personal commitment of key leaders and a perfectly executed military operation achieved the expected goals within the given timeframe, and contributed significantly to the prevention of another ethnic conflict in the Western Balkans.◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131586327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decaying National Security and the Rise of Imagined Tribalism 衰落的国家安全与想象中的部落主义的兴起
The RUSI Journal Pub Date : 2022-05-17 DOI: 10.1080/03071847.2022.2072763
B. Murphy
{"title":"Decaying National Security and the Rise of Imagined Tribalism","authors":"B. Murphy","doi":"10.1080/03071847.2022.2072763","DOIUrl":"https://doi.org/10.1080/03071847.2022.2072763","url":null,"abstract":"In an era where the exchange of information has been radically transformed by new technologies, Brian Murphy argues that states should no longer be considered the imagined communities that underpin dominant concepts of national security. He contends that national security experts should think in terms of ‘imagined tribes’ instead.◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信