Contemporary Security Policy最新文献

筛选
英文 中文
Letting sleeping bears lie: Ukraine’s cautious approach to uncertainty before the war 放下沉睡的熊:乌克兰在战前对不确定性的谨慎态度
1区 社会学
Contemporary Security Policy Pub Date : 2023-09-21 DOI: 10.1080/13523260.2023.2257966
Samuel M. Seitz
{"title":"Letting sleeping bears lie: Ukraine’s cautious approach to uncertainty before the war","authors":"Samuel M. Seitz","doi":"10.1080/13523260.2023.2257966","DOIUrl":"https://doi.org/10.1080/13523260.2023.2257966","url":null,"abstract":"International relations theory has long suggested that uncertainty during militarized crises pushes states to adopt escalatory behavior. However, the leadup to the Russo-Ukrainian War challenges this view, with Kyiv downplaying the risk of conflict and adopting a cautious foreign policy. I argue that Ukrainian behavior in the leadup to the war demonstrates the need to disaggregate between types of uncertainty. While uncertainty over an adversary’s intentions and capabilities can push a state to adopt escalatory behavior, uncertainty regarding a potential adversary’s military strategy and regarding the level of support it can expect from third parties incentivizes a state to assume a more cautious posture. The piece concludes with a reflection on disciplinary blind spots regarding the impact of uncertainty on state decision-making and offers suggestions for overcoming them.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emulating underdogs: Tactical drones in the Russia-Ukraine war 模仿弱者:俄乌战争中的战术无人机
1区 社会学
Contemporary Security Policy Pub Date : 2023-09-21 DOI: 10.1080/13523260.2023.2257964
Kerry Chávez, Ori Swed
{"title":"Emulating underdogs: Tactical drones in the Russia-Ukraine war","authors":"Kerry Chávez, Ori Swed","doi":"10.1080/13523260.2023.2257964","DOIUrl":"https://doi.org/10.1080/13523260.2023.2257964","url":null,"abstract":"ABSTRACTEarly studies on state drone proliferation argued that it would be temperate, constrained by high financial, technical, and infrastructural requisites and fielded according to the logic of scarce, exquisite airpower. While this rationale has held for limited conflicts, the high attrition and massive demand of a total war compelled strong standing armies to follow a different model of adoption: emulating weaker violent nonstate actors leveraging low-cost commercial platforms. The Russia-Ukraine war has captured this trend. Despite earlier expectations of armies maintaining advanced airpower for strategic ends, underdog Ukraine, followed by Russia have developed heavy reliance on commercial drone technologies for tactical aims. Framing this in military and battlefield innovation literature and drawing on studies on commercial drone use among violent nonstate actors, we argue that this constitutes a new trajectory involving mixed military arsenals enhanced with dual-use commercial platforms.KEYWORDS: Dronesunmanned aerial vehiclesinterstate conflictmilitary innovationmodern warfare Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Islamic State is a prime example, but certainly not the only one. Many VNSAs from Houthi rebels, Burmese resistors, Syrian fighters, African insurgents, and Mexican cartels use commercial drones in one, some, or all the ways listed to advance their agendas.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Farewell by the outgoing editor: Publishing research from the Paris attacks to the war against Ukraine 即将卸任的编辑告别:出版从巴黎袭击到乌克兰战争的研究报告
1区 社会学
Contemporary Security Policy Pub Date : 2023-09-20 DOI: 10.1080/13523260.2023.2254597
Hylke Dijkstra
{"title":"Farewell by the outgoing editor: Publishing research from the Paris attacks to the war against Ukraine","authors":"Hylke Dijkstra","doi":"10.1080/13523260.2023.2254597","DOIUrl":"https://doi.org/10.1080/13523260.2023.2254597","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136309263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Roots of Ukrainian resilience and the agency of Ukrainian society before and after Russia’s full-scale invasion 乌克兰复原力的根源和俄罗斯全面入侵前后乌克兰社会的机构
1区 社会学
Contemporary Security Policy Pub Date : 2023-09-20 DOI: 10.1080/13523260.2023.2258620
Anastasiia Kudlenko
{"title":"Roots of Ukrainian resilience and the agency of Ukrainian society before and after Russia’s full-scale invasion","authors":"Anastasiia Kudlenko","doi":"10.1080/13523260.2023.2258620","DOIUrl":"https://doi.org/10.1080/13523260.2023.2258620","url":null,"abstract":"When Russia launched a full-scale invasion of Ukraine on February 24, 2022, Ukrainians did not crumble under the unprecedented attack but showed steely resolve to fight for independence and the right to decide their own fate. In the Western media and scholarly analysis, the Ukrainian resilience is often associated with the leadership of the state, in particular President Zelensky. This article offers a different take on the issue of resilience in war and looks at the value foundations of Ukrainian identity, the decentralized nature of Ukrainian society and the vision of a better future as part of the Euro-Atlantic community to better understand Ukraine’s agency in response to Russia’s invasion. It draws on the original data, collected from interviews of three categories of Ukrainians, affected by the war: refugees, internally displaced people, and those living close to the frontlines.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136263814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Remember Kabul? Reputation, strategic contexts, and American credibility after the Afghanistan withdrawal 还记得喀布尔吗?阿富汗撤军后的声誉、战略背景和美国信誉
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-09-05 DOI: 10.1080/13523260.2023.2253406
D.G. Kim, J. Byun, Jiyoung Ko
{"title":"Remember Kabul? Reputation, strategic contexts, and American credibility after the Afghanistan withdrawal","authors":"D.G. Kim, J. Byun, Jiyoung Ko","doi":"10.1080/13523260.2023.2253406","DOIUrl":"https://doi.org/10.1080/13523260.2023.2253406","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44746711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privatizing security and authoritarian adaptation in the Arab region since the 2010–2011 uprisings 自2010-2011年起义以来,阿拉伯地区的安全私有化和独裁适应
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-06-02 DOI: 10.1080/13523260.2023.2214757
E. Moussa
{"title":"Privatizing security and authoritarian adaptation in the Arab region since the 2010–2011 uprisings","authors":"E. Moussa","doi":"10.1080/13523260.2023.2214757","DOIUrl":"https://doi.org/10.1080/13523260.2023.2214757","url":null,"abstract":"ABSTRACT Some Arab countries have since 2011 experienced intense security market diversification with considerable outsourcing of domestic security and guarding services. To date, scholars and security experts predominantly conceive this development within security reform processes or as an inevitable outcome of a chaotic post-uprisings period. Instead, this article situates some Arab states’ increasing reliance on private security actors within the evolving power dynamics and diverse challenges facing ruling elites and populations alike. Addressing how privatizing security contributes to perpetuating authoritarian practices post-2010, the article argues that contemporary security privatization and outsourcing provide alternative agents and strategies for control, while offering new venues to enrich and strengthen ruling elites. Guided by critical security studies and drawing on interviews, fieldwork and official documents, the article advances three ways through which outsourcing security supports practices of authoritarian adaptation: cultivating networks of patronage, diversifying ruling elites’ bases of security, and curbing constant sources of unrest.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"462 - 490"},"PeriodicalIF":5.9,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41621114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does plausible deniability work? Assessing the effectiveness of unclaimed coercive acts in the Ukraine war 合理的否认有效吗?评估乌克兰战争中无人认领的胁迫行为的有效性
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-05-31 DOI: 10.1080/13523260.2023.2212464
Costantino Pischedda, Andrew Cheon
{"title":"Does plausible deniability work? Assessing the effectiveness of unclaimed coercive acts in the Ukraine war","authors":"Costantino Pischedda, Andrew Cheon","doi":"10.1080/13523260.2023.2212464","DOIUrl":"https://doi.org/10.1080/13523260.2023.2212464","url":null,"abstract":"ABSTRACT States conduct unclaimed coercive acts, imposing costs on adversaries to signal resolve but denying (or not claiming) responsibility. Some scholars posit that unclaimed acts have considerable potential to coerce targets, while containing escalation risks. Others suggest that unclaimed coercive efforts tend to fail and trigger escalation. We assess these competing perspectives about the effects of unclaimed attacks with a vignette experiment exposing US-based respondents to a scenario where, after Russia warns of unpredictable consequences if NATO continues providing weapons to Ukraine, an explosion occurs at a NATO base in Poland used to funnel weapons to Ukraine. Intelligence agencies and independent analysts identify Russia as the likely culprit, while not ruling out the possibility of an accident. We randomize whether Russia claimed or denied responsibility for the explosion and find that unclaimed acts have lower coercive leverage than claimed ones, but the two do not significantly differ in escalation risk.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"345 - 371"},"PeriodicalIF":5.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47515747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity 从零开始:美国公众如何评估网络安全中零日漏洞的使用
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-05-25 DOI: 10.1080/13523260.2023.2216112
Marcelo M. Leal, P. Musgrave
{"title":"Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity","authors":"Marcelo M. Leal, P. Musgrave","doi":"10.1080/13523260.2023.2216112","DOIUrl":"https://doi.org/10.1080/13523260.2023.2216112","url":null,"abstract":"ABSTRACT Zero-day vulnerabilities are software and hardware flaws that are unknown to computer vendors. As powerful means of carrying out cyber intrusions, such vulnerabilities present a dilemma for governments. Actors that develop or procure such vulnerabilities may retain them for future use; alternatively, agencies possessing such vulnerabilities may disclose the flaws to affected vendors so they can be patched, thereby denying vulnerabilities not only to adversaries but also themselves. Previous research has explored the ethics and implications of this dilemma, but no study has investigated public opinion regarding zero-day exploits. We present results from a survey experiment testing whether conditions identified as important in the literature influence respondents’ support for disclosing or stockpiling zero-day vulnerabilities. Our results show that respondents overwhelmingly support disclosure, a conclusion only weakly affected by the likelihood that an adversary will independently discover the vulnerability. Our findings suggest a gap between public preferences and current U.S. policy.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"437 - 461"},"PeriodicalIF":5.9,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47896119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Explaining state participation in ten universal WMD treaties: A survival analysis of ratification decisions 解释国家参与十项世界性大规模杀伤性武器条约:对批准决定的生存分析
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-05-16 DOI: 10.1080/13523260.2023.2211899
Jan Karlas
{"title":"Explaining state participation in ten universal WMD treaties: A survival analysis of ratification decisions","authors":"Jan Karlas","doi":"10.1080/13523260.2023.2211899","DOIUrl":"https://doi.org/10.1080/13523260.2023.2211899","url":null,"abstract":"ABSTRACT Much of what we know about state participation in universal weapons of mass destruction (WMD) treaties is based on research about the Nuclear Non-Proliferation Treaty (NPT). This article instead analyzes the ratification of all ten current WMD treaties. Using a survival analysis of ratification events (1960–2022), it challenges conventional wisdom. It shows that security threats—a factor stressed by neorealists and research on the NPT—provide only a weak and incomplete explanation. Instead, three types of costs and benefits influence ratification decisions: policy change costs, benefits from the secondary functions of treaties, and benefits from the conformity with the ratification behavior of regional peers. More specifically, the article finds that the possession and pursuit of WMD delays ratification. The country’s support for the liberal hegemonic order, the level of its economic development, and a high regional ratification rate of the respective treaty increase the probability of ratification.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"410 - 436"},"PeriodicalIF":5.9,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43128963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The rules-based order as rhetorical entrapment: Comparing maritime dispute resolution in the Indo-Pacific 以规则为基础的秩序作为修辞陷阱:比较印太地区的海事争端解决
IF 5.9 1区 社会学
Contemporary Security Policy Pub Date : 2023-04-27 DOI: 10.1080/13523260.2023.2204266
Rebecca Strating
{"title":"The rules-based order as rhetorical entrapment: Comparing maritime dispute resolution in the Indo-Pacific","authors":"Rebecca Strating","doi":"10.1080/13523260.2023.2204266","DOIUrl":"https://doi.org/10.1080/13523260.2023.2204266","url":null,"abstract":"ABSTRACT In response to challenges to Asia’s security order, regional powers such Australia, India, and Japan have adopted new “Indo-Pacific” strategic narratives to promote and defend the “rules-based order.” These narratives use China’s maritime disputes with smaller neighbors in the South China Sea as a key example of Beijing’s revisionist intentions. Yet such narratives expose “rules-based order” advocates to risks of “rhetorical entrapment” as other actors compel them to abide by the standards they have set. To what extent have Indo-Pacific powers been forced to follow the rules in their own asymmetrical maritime disputes? This article examines three Indo-Pacific cases: Timor Sea Compulsory Conciliation between Australia and Timor-Leste, the Chagos Island Marine Protected Area Arbitration between the United Kingdom and Mauritius, and the Bay of Bengal Maritime Boundary Arbitration between India and Bangladesh. To varying degrees, this article finds that strategic narratives constrained the policy options of all three Indo-Pacific powers.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"372 - 409"},"PeriodicalIF":5.9,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45017288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信