Contemporary Security Policy最新文献

筛选
英文 中文
The last atomic Waltz: China’s nuclear expansion and the persisting relevance of the theory of the nuclear revolution 最后的原子华尔兹中国的核扩张与核革命理论的持久相关性
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2024-01-08 DOI: 10.1080/13523260.2023.2291258
Henrik Stålhane Hiim
{"title":"The last atomic Waltz: China’s nuclear expansion and the persisting relevance of the theory of the nuclear revolution","authors":"Henrik Stålhane Hiim","doi":"10.1080/13523260.2023.2291258","DOIUrl":"https://doi.org/10.1080/13523260.2023.2291258","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"14 8","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139445566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The 2024 Bernard Brodie Prize 2024 年伯纳德-布罗迪奖
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2024-01-05 DOI: 10.1080/13523260.2023.2289751
Myriam Dunn Cavelty, Nicole Jenne, Y. Reykers
{"title":"The 2024 Bernard Brodie Prize","authors":"Myriam Dunn Cavelty, Nicole Jenne, Y. Reykers","doi":"10.1080/13523260.2023.2289751","DOIUrl":"https://doi.org/10.1080/13523260.2023.2289751","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"27 5","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139384090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The pervasive informality of the international cybersecurity regime: Geopolitics, non-state actors and diplomacy 国际网络安全制度的普遍非正式性:地缘政治、非国家行为者与外交
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2024-01-03 DOI: 10.1080/13523260.2023.2296739
Arun Sukumar, Dennis Broeders, Monica Kello
{"title":"The pervasive informality of the international cybersecurity regime: Geopolitics, non-state actors and diplomacy","authors":"Arun Sukumar, Dennis Broeders, Monica Kello","doi":"10.1080/13523260.2023.2296739","DOIUrl":"https://doi.org/10.1080/13523260.2023.2296739","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"59 7","pages":""},"PeriodicalIF":5.9,"publicationDate":"2024-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139451416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Message from the incoming editors 新任编辑的致辞
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-12-28 DOI: 10.1080/13523260.2023.2296268
Myriam Dunn Cavelty, Nicole Jenne, Y. Reykers
{"title":"Message from the incoming editors","authors":"Myriam Dunn Cavelty, Nicole Jenne, Y. Reykers","doi":"10.1080/13523260.2023.2296268","DOIUrl":"https://doi.org/10.1080/13523260.2023.2296268","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"66 5","pages":""},"PeriodicalIF":5.9,"publicationDate":"2023-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139151829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Crypto-Atlanticism: The untold preferences of policy elites in neutral and non-aligned states 隐大西洋主义:中立国和不结盟国家政策精英不为人知的偏好
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-12-21 DOI: 10.1080/13523260.2023.2289329
Filip Ejdus, C. Hoeffler
{"title":"Crypto-Atlanticism: The untold preferences of policy elites in neutral and non-aligned states","authors":"Filip Ejdus, C. Hoeffler","doi":"10.1080/13523260.2023.2289329","DOIUrl":"https://doi.org/10.1080/13523260.2023.2289329","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"2 12","pages":""},"PeriodicalIF":5.9,"publicationDate":"2023-12-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138951147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From reluctance to reassurance: Explaining the shift in the Germans’ NATO alliance solidarity following Russia’s invasion of Ukraine 从勉强到放心:解释德国人在俄罗斯入侵乌克兰后对北约联盟声援的转变
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-12-06 DOI: 10.1080/13523260.2023.2286771
Timo Graf, Markus Steinbrecher, Heiko Biehl
{"title":"From reluctance to reassurance: Explaining the shift in the Germans’ NATO alliance solidarity following Russia’s invasion of Ukraine","authors":"Timo Graf, Markus Steinbrecher, Heiko Biehl","doi":"10.1080/13523260.2023.2286771","DOIUrl":"https://doi.org/10.1080/13523260.2023.2286771","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"18 2","pages":""},"PeriodicalIF":5.9,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138594335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(En)Countering epistemic imperialism: A critique of “Westsplaining” and coloniality in dominant debates on Russia’s invasion of Ukraine (反击认识论帝国主义:对有关俄罗斯入侵乌克兰的主流辩论中的 "西部抱怨 "和殖民主义的批判
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-12-04 DOI: 10.1080/13523260.2023.2288468
Tereza Hendl, Olga Burlyuk, Mila O’Sullivan, Aizada Arystanbek
{"title":"(En)Countering epistemic imperialism: A critique of “Westsplaining” and coloniality in dominant debates on Russia’s invasion of Ukraine","authors":"Tereza Hendl, Olga Burlyuk, Mila O’Sullivan, Aizada Arystanbek","doi":"10.1080/13523260.2023.2288468","DOIUrl":"https://doi.org/10.1080/13523260.2023.2288468","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"64 3","pages":""},"PeriodicalIF":5.9,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138604985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The role of insurers in shaping international cyber-security norms about cyber-war 保险公司在制定有关网络战争的国际网络安全规范方面的作用
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-11-16 DOI: 10.1080/13523260.2023.2279033
Josephine Wolff
{"title":"The role of insurers in shaping international cyber-security norms about cyber-war","authors":"Josephine Wolff","doi":"10.1080/13523260.2023.2279033","DOIUrl":"https://doi.org/10.1080/13523260.2023.2279033","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"210 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139270184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Saving face in the cyberspace: responses to public cyber intrusions in the Gulf 在网络空间挽回颜面:对海湾地区公共网络入侵的回应
1区 社会学
Contemporary Security Policy Pub Date : 2023-11-01 DOI: 10.1080/13523260.2023.2271794
Yehonatan Abramson, Gil Baram
{"title":"Saving face in the cyberspace: responses to public cyber intrusions in the Gulf","authors":"Yehonatan Abramson, Gil Baram","doi":"10.1080/13523260.2023.2271794","DOIUrl":"https://doi.org/10.1080/13523260.2023.2271794","url":null,"abstract":"How do states “save face” following a cyber intrusion directed at them? Recent scholarship demonstrates that the covert nature of cyber intrusions allows states to respond with restraint, avoiding escalation. But what happens when cyber intrusions become public and are highly visible? This article examines the rhetorical strategies employed by authoritarian Gulf states to mitigate the image-related costs associated with a public cyber intrusion. Drawing on the conceptual language of image-repair and crisis communication theories and employing discourse analysis of original data in Arabic, we identify three types of face-saving strategies: diminishing, self-complimenting, and accusing. Our findings indicate that intrusions involving leaking or faking information bring about unique “face-saving” strategies that do not only deal with the intrusion itself but also with the subsequent information crisis. Overall, the article identifies how states employ diverse rhetorical strategies—beyond attribution—to narrate cyber intrusions and keep cyber conflict contained.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"167 3","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135372070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Career connections: transnational expert networks and multilateral cybercrime negotiations 职业联系:跨国专家网络与多边网络犯罪谈判
1区 社会学
Contemporary Security Policy Pub Date : 2023-11-01 DOI: 10.1080/13523260.2023.2274775
James Shires
{"title":"Career connections: transnational expert networks and multilateral cybercrime negotiations","authors":"James Shires","doi":"10.1080/13523260.2023.2274775","DOIUrl":"https://doi.org/10.1080/13523260.2023.2274775","url":null,"abstract":"ABSTRACTThe Council of Europe’s Budapest Convention on cybercrime (2001) remains a key landmark in multilateral governance on cybersecurity. Negotiated over two decades ago, this regional agreement gains renewed significance today through its enduring impact, its rarity as a binding multilateral agreement on cyber-issues, and its role in shaping the debate on free speech and the criminalization of online content. This article asks how the almost-total exclusion of content crimes from the Convention can be explained. Drawing on new documents published for the twentieth anniversary of the Convention, including detailed testimonials from its chair and principal drafters, the article highlights the importance of long-term career connections among technically-savvy and diplomatically experienced negotiators, creating a transnational policy network that overcame differences and power imbalances. Understanding how the Budapest Convention resolved disagreements helps contextualize current crises in multilateral cybersecurity and cybercrime governance and provides a path away from growing digital authoritarianism.KEYWORDS: CybersecuritycybercrimemultilateralismgovernanceBudapest Conventionexpertise AcknowledgmentsI thank the editors of the special issue at The Hague Program on International Cyber Security for the opportunity to contribute to this issue, and the editors and reviewers at Contemporary Security Policy for their guidance and feedback. I also thank the team of the International Security Programme at Chatham House for their support in writing this article, and for enabling my participation in various cybercrime forums as a non-state multistakeholder organization.Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 It should be noted that issues of unreliability and unduly positive memory are common across qualitative methods, including interviews. In this way, while commemorative materials pose specific challenges for interpretation, these challenges are equivalent to those faced by other methodological routes; in each case, the guiding principle must be to incorporate critical analysis of such factors into the interpretation.2 Workshop held under the Chatham House Rule on 8 February 2023.3 The standard term used in this area is now child sexual abuse material (CSAM), avoiding problematic associations and conflations with adult pornography, legal in many jurisdictions.4 While many Arab states subsequently adopted national cybercrime laws, their first iterations did not refer to the Arab Convention, and it was ratified (phrased more loosely as “certification or acceptance or ratification” in the Arabic original) by only 11 of the 22 members of the League of Arab states (most recently Bahrain in 2017).Additional informationNotes on contributorsJames ShiresJames Shires is a senior research fellow in cyber policy at Chatham House. He is a co-founder and trustee of the European Cyber Conflict Research Initiative ","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"152 2","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信