Journal of Strategic Security最新文献

筛选
英文 中文
A Social Network Analysis of Mexico’s Dark Network Alliance Structure 墨西哥暗网联盟结构的社会网络分析
Journal of Strategic Security Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2046
Nathan P. Jones, Irina A. Chindea, Daniel Weisz Argomedo, John Sullivan
{"title":"A Social Network Analysis of Mexico’s Dark Network Alliance Structure","authors":"Nathan P. Jones, Irina A. Chindea, Daniel Weisz Argomedo, John Sullivan","doi":"10.5038/1944-0472.15.4.2046","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2046","url":null,"abstract":"This article assesses Mexico’s organized crime alliance and subgroup network structures. Through social network analysis (SNA) of data from Lantia Consultores, a consulting firm in Mexico that specializes in the analysis of public policies, it demonstrates differential alliance structures within Mexico’s bipolar illicit network system. The Cártel de Jalisco Nueva Generación’s (CJNG) alliance structure is top-down and hierarchical, while the Sinaloa Cartel is denser, particularly in the broader Tierra Caliente region. Additionally, our analysis found a sparse overall network with many isolates (groups with no relations to other groups) and disconnected components. Further, we identified organized crime networks that might fill future power vacuums based on their network positions, following state or rival high-value targeting of major cartels. The implications of these findings are discussed, and policy recommendations are provided.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44460001","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Asal, Victor, Brian J. Phillips, and R. Karl Rethemeyer. Insurgent Terrorism: Intergroup Relationships and the Killing of Civilians. Oxford University Press, 2022 Asal,Victor,Brian J.Phillips和R.Karl Rethemeyer。叛乱恐怖主义:集团间关系和杀害平民。牛津大学出版社,2022
Journal of Strategic Security Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2088
Tricia Bacon
{"title":"Asal, Victor, Brian J. Phillips, and R. Karl Rethemeyer. Insurgent Terrorism: Intergroup Relationships and the Killing of Civilians. Oxford University Press, 2022","authors":"Tricia Bacon","doi":"10.5038/1944-0472.15.4.2088","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2088","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45108019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Technology, Data, & The Future of Warfare: A Review Essay by James Torrence 技术、数据与战争的未来:詹姆斯·托伦斯的评论文章
Journal of Strategic Security Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2087
J. Torrence
{"title":"Technology, Data, & The Future of Warfare: A Review Essay by James Torrence","authors":"J. Torrence","doi":"10.5038/1944-0472.15.4.2087","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2087","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41435516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Go Big or Go Home? Right-Sizing Security Cooperation to Fragile States 做大还是回家?适应脆弱国家的安全合作规模
Journal of Strategic Security Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2034
Randell Yi
{"title":"Go Big or Go Home? Right-Sizing Security Cooperation to Fragile States","authors":"Randell Yi","doi":"10.5038/1944-0472.15.4.2034","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2034","url":null,"abstract":"This article tests two competing candidate theories of security cooperation provision contained in the literature against a subset of stated strategic objectives by assessing whether the amount of aid spent over time correlates with intended outcomes. One is based on the principal-agent problem, while the other derives from the organizational behavior model. The focus is solely on fragile states since they represent the most policy-relevant and challenging cases. Quantitative analysis utilizes existing datasets to provide proxy measures for neopatrimonialism, praetorianism, and combat effectiveness, corresponding to political, political/military, and military dimensions of security cooperation efficacy, respectively. The results challenge the conventional wisdom that increasing foreign aid merely feeds corruption and that to bolster foreign militaries is to beg for a coup. Controlling for economic aid and GDP per capita, both small and large military assistance packages strongly correlate with a reduction in neopatrimonialism and deaths due to violent conflict and terrorism in recipient nations. While small aid programs appear to temper the risk of a coup, this relationship does not hold for large ones. This research also calls into question the oft-assumed degree to which principal-agent problems and organizational behavior hamper effective aid provision.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41356349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Military Leadership by Intellectual Officers: A Case Study of the IDF 智力军官的军事领导:以色列国防军的案例研究
Journal of Strategic Security Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2044
Haim Yogev, R. Cohen, Eyal Lewin
{"title":"Military Leadership by Intellectual Officers: A Case Study of the IDF","authors":"Haim Yogev, R. Cohen, Eyal Lewin","doi":"10.5038/1944-0472.15.4.2044","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2044","url":null,"abstract":"Morris Janowitz believed that for an army to be victorious it needs to be led by as many intellectual forces as possible, just as any organization needs organizational intellectualism to prosper. It is agreed in scholarly literature that the intellectual must author various articles and manifestos to express their viewpoints, mindset, and philosophy in the public sphere. Based on Janowitz’s belief and using the Israeli Defense Forces (IDF) as a case study, this research offers a model for a generic research methodology that can be practiced elsewhere. The mission was to find the extent to which the higher echelons of the Israeli military engage in writing academic articles concerning matters of strategy and army professionalism. Among other conclusions, the authors point out that, with certain reservations considered, the number of articles authored by the IDF’s senior officers proved to be low. If publication indeed reflects intellectualism, the few articles produced over seven decades by the IDF’s leading echelon ought to sound a warning for Israel’s military decision-makers.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43475792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing Elections Through International Law: A Tool for Combatting Disinformation Operations? 通过国际法确保选举:打击虚假信息操作的工具?
Journal of Strategic Security Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2033
İrem Işık, Ömer Bi̇ldi̇k, Tayanç Molla
{"title":"Securing Elections Through International Law: A Tool for Combatting Disinformation Operations?","authors":"İrem Işık, Ömer Bi̇ldi̇k, Tayanç Molla","doi":"10.5038/1944-0472.15.4.2033","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2033","url":null,"abstract":"According to the U.S. Department of Justice, in 2014, the Russian government-connected Internet Research Agency (IRA) initiated an information operation on social media platforms to manipulate the U.S. population concerning the 2016 U.S. presidential elections. This has revealed that social media platforms enable the spread of fake news among the masses globally and can thus become a means of disrupting the electoral process for foreign actors. This article addresses state-sponsored disinformation operations on social media that target foreign voters. It considers it crucial to counter such operations to protect the security and integrity of the elections in the digital age, which is a vital national interest. Despite some mitigation efforts given after 2016, social media platforms continued to be exploited by the States seeking to influence the outcome of foreign elections through the dissemination of false information. This article argues that international law could play an essential role in combating state-sponsored disinformation operations. In this regard, it elaborates on sovereignty and non-intervention principles, and the right to self-determination.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46786786","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
1939: A People’s History of the Coming of the Second World War. By Frederick Taylor. New York: W. W. Norton & Company. 2019. 1939年:第二次世界大战来临之际的人民史。弗雷德里克·泰勒著。纽约:W.W.Norton&Company。2019
Journal of Strategic Security Pub Date : 2021-10-01 DOI: 10.5038/1944-0472.14.3.1975
Edward J. Hagerty
{"title":"1939: A People’s History of the Coming of the Second World War. By Frederick Taylor. New York: W. W. Norton & Company. 2019.","authors":"Edward J. Hagerty","doi":"10.5038/1944-0472.14.3.1975","DOIUrl":"https://doi.org/10.5038/1944-0472.14.3.1975","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47759210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Validity of the Assessment and Treatment of Radicalization Scale: A Psychometric Instrument for Measuring Severity of Extremist Muslim Beliefs 极端主义穆斯林信仰严重程度的心理测量工具——激进化量表评估与治疗的效度
Journal of Strategic Security Pub Date : 2021-10-01 DOI: 10.5038/1944-0472.14.3.1934
Y. Karimi, A. Kholi, Anne Hesselink, Johannes H Prinsloo, Stella Bhawanie, J. Andreu, Adekunle G. Ahmed, Wagdy Loza
{"title":"The Validity of the Assessment and Treatment of Radicalization Scale: A Psychometric Instrument for Measuring Severity of Extremist Muslim Beliefs","authors":"Y. Karimi, A. Kholi, Anne Hesselink, Johannes H Prinsloo, Stella Bhawanie, J. Andreu, Adekunle G. Ahmed, Wagdy Loza","doi":"10.5038/1944-0472.14.3.1934","DOIUrl":"https://doi.org/10.5038/1944-0472.14.3.1934","url":null,"abstract":"The Assessment and Treatment of Radicalization Scale (ATRS) is designed to quantitatively measure Muslim extremists’ ideologies regarding risk areas that are reported in the literature. Utilizing the scale, in this study, using a convenience sample of 1769 from 10 countries (Australia, Canada, Egypt, India, Iran, Iraq, Nigeria, Pakistan, Spain, and South Africa) responded to the ATRS. Results supported previous findings about the reliability and validity of the Assessment and Treatment of Radicalization Scale (ATRS, formerly known as Belief Diversity Scale BDS, Loza, 2007) for assessing Muslim extremists. Suggested cut off scores to use for identifying possible extremists are provided.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41406554","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing the Power Transition Theory with Relative Military Power 用相对军事力量检验权力转移理论
Journal of Strategic Security Pub Date : 2021-10-01 DOI: 10.5038/1944-0472.14.3.1884
Charles J. Koch
{"title":"Testing the Power Transition Theory with Relative Military Power","authors":"Charles J. Koch","doi":"10.5038/1944-0472.14.3.1884","DOIUrl":"https://doi.org/10.5038/1944-0472.14.3.1884","url":null,"abstract":"This article tests the power transition theory using relative military power within a dyad pair. The author hypothesizes that when a dyad pair achieves relative military power parity, the two states are likely to initiate war. Furthermore, when a dyad pair no longer maintains relative military power parity, the probability of war between the two states decreases. Although the sample population used to test this hypothesis is small (n=3), the mixed-method analysis indicates support to the power transition theory. Furthermore, results are more substantial when using military expenditure and surplus domestic when compared to results using military personnel and surplus domestic product. No statistically significant difference exists (p=.99) when comparing military expenditure and surplus domestic product with a combination of military expenditure, military personnel, and surplus domestic product. These results indicate that relative military power possesses the potential to provide researchers an additional quantitative measure to test the power transition theory. Although these initial results are promising, further research is required to test a larger sample population of dyads.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46010253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
MS-13: The Making of America’s Most Notorious Gang. By Steven Dudley. Toronto, Canada: Hanover Square Press, 2020. MS-13:美国最臭名昭著的帮派的形成。史蒂文·达德利著。加拿大多伦多:汉诺威广场出版社,2020年。
Journal of Strategic Security Pub Date : 2021-10-01 DOI: 10.5038/1944-0472.14.3.1978
Pamela Ruiz
{"title":"MS-13: The Making of America’s Most Notorious Gang. By Steven Dudley. Toronto, Canada: Hanover Square Press, 2020.","authors":"Pamela Ruiz","doi":"10.5038/1944-0472.14.3.1978","DOIUrl":"https://doi.org/10.5038/1944-0472.14.3.1978","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2021-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44015331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信