Johannes Karreth, Jaroslav Tir, Jason Quinn, Madhav Joshi
{"title":"Civil war mediation in the shadow of IGOs: The path to comprehensive peace agreements","authors":"Johannes Karreth, Jaroslav Tir, Jason Quinn, Madhav Joshi","doi":"10.1177/00223433231211766","DOIUrl":"https://doi.org/10.1177/00223433231211766","url":null,"abstract":"Recent research shows that comprehensive peace agreements (CPAs) are effective in ending civil wars and improving post-conflict conditions, but CPAs emerge in only a fraction of civil wars. This study provides systematic evidence about the origins of CPAs and the role of international actors in facilitating their signing. We argue that mediation is more likely to be successful and that CPAs are more likely to emerge in those civil war countries that are members in a higher number of IGOs with high economic leverage. Using their financial and institutional leverage, these IGOs can help the combatants overcome the credible commitment problems associated with entering into mediation, and with making sufficient concessions and compromises to reach and sign a CPA. Analyzing all intrastate armed conflicts from 1989 to 2011, we find that a conflict country’s memberships in IGOs with high economic leverage increase the odds of (1) mediation occurring and (2) mediation subsequently leading to the signing of CPAs. This finding is robust to common sources of spurious relationships between international institutions and the behavior of conflict parties. Participating in IGOs with high economic leverage carries important positive consequences for civil war management and enhances the impact of mediation on getting conflict parties to sign CPAs.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"31 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gendering hawkishness in the war room: Evidence from Pakistani politicians","authors":"Fahd Humayun","doi":"10.1177/00223433231211762","DOIUrl":"https://doi.org/10.1177/00223433231211762","url":null,"abstract":"Can representation in foreign policy deliberations – in particular, increased female representation – impact deliberators’ support for interstate conflict resolution? While existing work on gender representation in IR suggests that increased female representation should moderate intragroup hawkishness, making conflict resolution more viable, I offer empirical evidence that qualifies this idea, based on a survey experiment on 149 male and 55 female elite Pakistani legislators. Politicians of both sexes were randomly assigned to ‘listen in’ on a hypothetical national security deliberation that was either all-male or gender-mixed. I find that politicians’ decisionmaking in these hypothetical committees was informed simultaneously by notions of committee competence and by inferences about the social desirability of hawkish outcomes in deliberative settings. Specifically, respondents assigned to gender-mixed committees became less supportive of external conflict resolution. I show how different mechanisms accounted for this increased hawkishness for men and women. Female politicians assigned to gender-mixed committees became more conscious and wary of how their participation, the result of increased representation, would be perceived, compelling them to opt for more hawkish policies. Male politicians, in contrast, attempted to overcompensate for the increased visibility of female representation by resorting to greater levels of aggression.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"1 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"If it bleeps it leads? Media coverage on cyber conflict and misperception","authors":"Christos Makridis, Lennart Maschmeyer, Max Smeets","doi":"10.1177/00223433231220264","DOIUrl":"https://doi.org/10.1177/00223433231220264","url":null,"abstract":"What determines media coverage on cyber conflict (CC)? Media bias fostering misperception is a well-established problem in conflict reporting. Because of the secrecy and complexity surrounding cyber operations (COs), where most data moreover come from marketing publications by private sector firms, this problem is likely to be especially pronounced in reporting on cyber threats. Because media reporting shapes public perception, such bias can shape conflict dynamics and outcomes with potentially destabilizing consequences. Yet little research has examined media bias systematically. This study connects existing literature on media reporting bias with the CC literature to formulate four theoretical explanations for variation in reporting on COs based on four corresponding characteristics of a CO. We introduce a new dataset of COs reporting by the private sector, which we call the Cyber Conflict Media Coverage Dataset, and media reporting on each of these operations. Consequently, we conduct a statistical analysis to identify which of these characteristics correlate with reporting quantity. This analysis shows that the use of novel techniques, specifically zero-day exploits, is a highly significant predictor of coverage quantity. Operations targeting the military or financial sector generate less coverage. We also find that cyber effect operations tend to receive more coverage compared to espionage, but this result is not statistically significant. Nonetheless, the predictive models explain limited variation in news coverage. These findings indicate that COs are treated differently in the media than other forms of conflict, and help explain persistent threat perception among the public despite the absence of catastrophic cyberattacks.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"39 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyberattacks and public opinion – The effect of uncertainty in guiding preferences","authors":"Eric Jardine, Nathaniel Porter, Ryan Shandler","doi":"10.1177/00223433231218178","DOIUrl":"https://doi.org/10.1177/00223433231218178","url":null,"abstract":"When it comes to cybersecurity incidents – public opinion matters. But how do voters form opinions in the aftermath of cyberattacks that are shrouded in ambiguity? How do people account for the uncertainty inherent in cyberspace to forge preferences following attacks? This article seeks to answer these questions by introducing an uncertainty threshold mechanism predicting the level of attributional certainty required for the public to support economic, diplomatic or military responses following cyberattacks. Using a discrete-choice experimental design with 2025 US respondents, we find lower attributional certainty is associated with less support for retaliation, yet this mechanism is contingent on the suspected identity of the attacker and partisan identity. Diplomatic allies possess a reservoir of good will that amplifies the effect of uncertainty, while rivals are less often given the benefit of the doubt. We demonstrate that uncertainty encourages the use of cognitive schemas to overcome ambiguity, and that people fall back upon pre-existing and politically guided views about the suspected country behind an attack. If the ambiguity surrounding cyberattacks has typically been discussed as an operational and strategic concern, this article shifts the focus of attention to the human level and positions the mass public as a forgotten yet important party during cyber conflict.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"21 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Public opinion on trading with the enemy: Trade’s effects on the risk of war","authors":"Celeste Beesley, Eliza Riley Oak","doi":"10.1177/00223433231214406","DOIUrl":"https://doi.org/10.1177/00223433231214406","url":null,"abstract":"While studies show that the public disapproves of trade with adversaries, political discourse has historically used security rhetoric to both justify and oppose trade with threatening states. Does emphasizing the potential of trade to exacerbate or mitigate security risks sway public opinion? Is public opinion malleable regardless of the level of threat? These questions become increasingly important as security and economic interactions between states become more intertwined. In a 2019 survey experiment, Ukrainian citizens report more optimism about the effects of trade with Russia (engaged in conflict with Ukraine since 2014) when told that trade decreases security risks. They are more pessimistic when presented with information that trade increases the risk of conflict. In contrast, attitudes about trade with a non-threatening trading partner (the European Union) are unaffected. This study demonstrates that the security effects of trade can both improve and worsen attitudes about trade with politically salient adversaries, even in the context of actual conflict. However, security rhetoric is unlikely to change public opinion about trade with non-threatening states unless they are viewed as reliable allies. Public opinion about trade, thus, responds to rhetoric about security, rather than representing an inflexible constraint on firms’ and states’ trade with adversaries.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"42 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cyber and contentious politics: Evidence from the US radical environmental movement","authors":"Thomas Zeitzoff, Grace Gold","doi":"10.1177/00223433231221426","DOIUrl":"https://doi.org/10.1177/00223433231221426","url":null,"abstract":"Much of the focus of cyber conflict has been on interstate conflict. This article focuses on two interrelated questions in the important but neglected area of cyber contentious politics. First, how does the public feel about the use of different eco tactics including cyber-based tactics carried out by activists involved in the radical environmental movement, a movement that uses protest and sabotage in service of environmental causes? Second, how do anti-technology sentiment and concerns about climate change influence support for different eco tactics? To answer these questions, we conduct a survey and survey experiment on a nationally diverse sample of Americans. We find that Americans are less supportive of certain eco tactics, particularly those that involve property destruction or physical sabotage compared to cyber-based tactics. We further show that anti-technology sentiment and perceived threat from climate change are correlated with increased support for eco direct actions. Using a survey experiment we show that cyber direct actions that result in sabotage are viewed as more acceptable than kinetic actions even though they both result in the same level of destruction. Finally, we include qualitative data from interviews with activists to better understand the strategy and role that new technology and tactics play in the broader radical environmental movement.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"39 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The women and men that make peace: Introducing the Mediating Individuals (M-IND) dataset","authors":"Joakim Kreutz, Magda Lorena Cárdenas","doi":"10.1177/00223433231211761","DOIUrl":"https://doi.org/10.1177/00223433231211761","url":null,"abstract":"This article presents new data on the individuals who mediate (M-IND) in all active UCDP dyads and lethal MIDs, 1989–2019. The dataset contributes to the systematic study of conflict management in several important respects: it covers both international and internal conflicts, it covers low-intensity violence, and it provides information on individual mediators, who appointed them, and type of mediation. Besides presenting the data collection and descriptive statistics, the article engages with the literatures on multiparty mediation and women, peace and security. M-IND shows that women more commonly are appointed as mediators by nongovernmental organizations than by states and international organizations. Our analysis suggests that greater equality in mediation efforts correlates with the use of more varied mediation strategies and is associated with a greater chance of reaching peace agreements.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"37 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Introduction: Cyber-conflict – Moving from speculation to investigation","authors":"Ryan Shandler, Daphna Canetti","doi":"10.1177/00223433231219441","DOIUrl":"https://doi.org/10.1177/00223433231219441","url":null,"abstract":"Investigating cyber conflict is enormously difficult. The domain is complex, quality data are sparse, international affairs are shrouded in secrecy, and despite its seeming ubiquity, cyber power has only recently entered the battlefield. In the face of these challenges, we must rise to meet the challenges of cybersecurity research by deploying creative methods that collect verifiable and probatory data, and which allow for predictive models of cyber behavior. Against this backdrop, our special issue offers a vision of cybersecurity research that embraces a culture of rigorous inquiry based on theoretically robust, and policy relevant investigation. We highlight two key features. First, research at the intersection of cybersecurity and political science must incorporate the human dimension of cyber conflict. A human security approach to cybersecurity places people as the primary objects of security and recognizes that individual-level analyses can shed light on macro-level trends. Second, cyber research must adopt rigorous, empirical methods. We embrace a broad tent of empirical data collection techniques – spanning qualitative and quantitative, experimental, and observational research. What is integral is that all scholarship abides by the highest standards of replicability and falsifiability. The articles contained in this special issue collectively form a proof of concept that expands the horizons of cybersecurity research from a substantive viewpoint (adding a human dimension to the prevalent military/strategic analyses), and from a methodological perspective (propounding the importance of empirical scrutiny). Together, these 10 pieces of scholarship collectively affirm that there is now a critical mass of substantively diverse and empirically rigorous research in the field of cybersecurity, and that we as a community are capable of making bold, theoretically grounded, and empirically tested claims that verify how cyber power is or is not altering the nature of peace, conflict and international relations.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"10 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Controlling a moving world: Territorial control, displacement and the spread of civilian targeting in Iraq","authors":"Sigrid Weber","doi":"10.1177/00223433231202823","DOIUrl":"https://doi.org/10.1177/00223433231202823","url":null,"abstract":"How do armed actors respond to population movements during civil wars? I argue that displacement alters local balances of control between territorial rulers and challengers. Local territorial rulers have incentives to govern violently if displaced persons perceived as members of opposing loyalty groups move into their territories and challengers spoil local governance by inflicting harm on civilians if incoming supporters of a local ruler reinforce the governor’s control. To test these dynamics, I use a combination of manual coding and machine learning to create a novel monthly dataset of territorial control, one-sided violence against moving populations and displacement patterns disaggregated by ethno-religious groups in the war against the Islamic State (2014–2017) in Iraq. Using negative binomial count models, I find that territorial challengers and rulers distinctively respond to population movements in Iraq. The paper extends previous theories of civilian victimization and territorial control by conceptualizing local populations as a dynamic element that explains where fleeing civilians become moving targets.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"10 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity","authors":"Jon R Lindsay","doi":"10.1177/00223433231217664","DOIUrl":"https://doi.org/10.1177/00223433231217664","url":null,"abstract":"Most cyber intrusions are a form of intelligence rather than warfare, but intelligence remains undertheorized in international relations (IR). This article develops a theory of intelligence performance at the operational level, which is where technology is most likely to affect broader political and military outcomes. It uses the pragmatic method of abduction to bootstrap general theory from the historical case of Bletchley Park in World War II. This critical case of computationally enabled signals intelligence anticipates important later developments in cybersecurity. Bletchley Park was uncommonly successful due to four conditions drawn from contemporary practice of cryptography: radio networks provided connectivity; German targets created vulnerability; Britain invested in bureaucratic organization; and British personnel exercised discretion. The method of abduction is used to ground these particular conditions in IR theory, revisit the evaluation of the case, and consider historical disanalogies. The result is a more generalizable theory that can be applied to modern cybersecurity as well as traditional espionage. The overarching theme is that intelligence performance in any era depends on institutional context more than technological sophistication. The political distinctiveness of intelligence practice, in contrast to war or coercive diplomacy, is deceptive competition between rival institutions in a cooperatively constituted institutional environment. Because cyberspace is highly institutionalized, furthermore, intelligence contests become pervasive in cyberspace.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"30 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}