Journal of Peace Research最新文献

筛选
英文 中文
Civil war mediation in the shadow of IGOs: The path to comprehensive peace agreements 政府间组织阴影下的内战调解:通往全面和平协定之路
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-02-01 DOI: 10.1177/00223433231211766
Johannes Karreth, Jaroslav Tir, Jason Quinn, Madhav Joshi
{"title":"Civil war mediation in the shadow of IGOs: The path to comprehensive peace agreements","authors":"Johannes Karreth, Jaroslav Tir, Jason Quinn, Madhav Joshi","doi":"10.1177/00223433231211766","DOIUrl":"https://doi.org/10.1177/00223433231211766","url":null,"abstract":"Recent research shows that comprehensive peace agreements (CPAs) are effective in ending civil wars and improving post-conflict conditions, but CPAs emerge in only a fraction of civil wars. This study provides systematic evidence about the origins of CPAs and the role of international actors in facilitating their signing. We argue that mediation is more likely to be successful and that CPAs are more likely to emerge in those civil war countries that are members in a higher number of IGOs with high economic leverage. Using their financial and institutional leverage, these IGOs can help the combatants overcome the credible commitment problems associated with entering into mediation, and with making sufficient concessions and compromises to reach and sign a CPA. Analyzing all intrastate armed conflicts from 1989 to 2011, we find that a conflict country’s memberships in IGOs with high economic leverage increase the odds of (1) mediation occurring and (2) mediation subsequently leading to the signing of CPAs. This finding is robust to common sources of spurious relationships between international institutions and the behavior of conflict parties. Participating in IGOs with high economic leverage carries important positive consequences for civil war management and enhances the impact of mediation on getting conflict parties to sign CPAs.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"31 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gendering hawkishness in the war room: Evidence from Pakistani politicians 战争室中的鹰派性别化:来自巴基斯坦政治家的证据
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-02-01 DOI: 10.1177/00223433231211762
Fahd Humayun
{"title":"Gendering hawkishness in the war room: Evidence from Pakistani politicians","authors":"Fahd Humayun","doi":"10.1177/00223433231211762","DOIUrl":"https://doi.org/10.1177/00223433231211762","url":null,"abstract":"Can representation in foreign policy deliberations – in particular, increased female representation – impact deliberators’ support for interstate conflict resolution? While existing work on gender representation in IR suggests that increased female representation should moderate intragroup hawkishness, making conflict resolution more viable, I offer empirical evidence that qualifies this idea, based on a survey experiment on 149 male and 55 female elite Pakistani legislators. Politicians of both sexes were randomly assigned to ‘listen in’ on a hypothetical national security deliberation that was either all-male or gender-mixed. I find that politicians’ decisionmaking in these hypothetical committees was informed simultaneously by notions of committee competence and by inferences about the social desirability of hawkish outcomes in deliberative settings. Specifically, respondents assigned to gender-mixed committees became less supportive of external conflict resolution. I show how different mechanisms accounted for this increased hawkishness for men and women. Female politicians assigned to gender-mixed committees became more conscious and wary of how their participation, the result of increased representation, would be perceived, compelling them to opt for more hawkish policies. Male politicians, in contrast, attempted to overcompensate for the increased visibility of female representation by resorting to greater levels of aggression.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"1 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
If it bleeps it leads? Media coverage on cyber conflict and misperception 如果它哔哔作响,它就会引导?媒体对网络冲突和误解的报道
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-01-31 DOI: 10.1177/00223433231220264
Christos Makridis, Lennart Maschmeyer, Max Smeets
{"title":"If it bleeps it leads? Media coverage on cyber conflict and misperception","authors":"Christos Makridis, Lennart Maschmeyer, Max Smeets","doi":"10.1177/00223433231220264","DOIUrl":"https://doi.org/10.1177/00223433231220264","url":null,"abstract":"What determines media coverage on cyber conflict (CC)? Media bias fostering misperception is a well-established problem in conflict reporting. Because of the secrecy and complexity surrounding cyber operations (COs), where most data moreover come from marketing publications by private sector firms, this problem is likely to be especially pronounced in reporting on cyber threats. Because media reporting shapes public perception, such bias can shape conflict dynamics and outcomes with potentially destabilizing consequences. Yet little research has examined media bias systematically. This study connects existing literature on media reporting bias with the CC literature to formulate four theoretical explanations for variation in reporting on COs based on four corresponding characteristics of a CO. We introduce a new dataset of COs reporting by the private sector, which we call the Cyber Conflict Media Coverage Dataset, and media reporting on each of these operations. Consequently, we conduct a statistical analysis to identify which of these characteristics correlate with reporting quantity. This analysis shows that the use of novel techniques, specifically zero-day exploits, is a highly significant predictor of coverage quantity. Operations targeting the military or financial sector generate less coverage. We also find that cyber effect operations tend to receive more coverage compared to espionage, but this result is not statistically significant. Nonetheless, the predictive models explain limited variation in news coverage. These findings indicate that COs are treated differently in the media than other forms of conflict, and help explain persistent threat perception among the public despite the absence of catastrophic cyberattacks.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"39 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyberattacks and public opinion – The effect of uncertainty in guiding preferences 网络攻击与公众舆论--不确定性对引导偏好的影响
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-01-30 DOI: 10.1177/00223433231218178
Eric Jardine, Nathaniel Porter, Ryan Shandler
{"title":"Cyberattacks and public opinion – The effect of uncertainty in guiding preferences","authors":"Eric Jardine, Nathaniel Porter, Ryan Shandler","doi":"10.1177/00223433231218178","DOIUrl":"https://doi.org/10.1177/00223433231218178","url":null,"abstract":"When it comes to cybersecurity incidents – public opinion matters. But how do voters form opinions in the aftermath of cyberattacks that are shrouded in ambiguity? How do people account for the uncertainty inherent in cyberspace to forge preferences following attacks? This article seeks to answer these questions by introducing an uncertainty threshold mechanism predicting the level of attributional certainty required for the public to support economic, diplomatic or military responses following cyberattacks. Using a discrete-choice experimental design with 2025 US respondents, we find lower attributional certainty is associated with less support for retaliation, yet this mechanism is contingent on the suspected identity of the attacker and partisan identity. Diplomatic allies possess a reservoir of good will that amplifies the effect of uncertainty, while rivals are less often given the benefit of the doubt. We demonstrate that uncertainty encourages the use of cognitive schemas to overcome ambiguity, and that people fall back upon pre-existing and politically guided views about the suspected country behind an attack. If the ambiguity surrounding cyberattacks has typically been discussed as an operational and strategic concern, this article shifts the focus of attention to the human level and positions the mass public as a forgotten yet important party during cyber conflict.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"21 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public opinion on trading with the enemy: Trade’s effects on the risk of war 与敌国进行贸易的公众舆论:贸易对战争风险的影响
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-01-30 DOI: 10.1177/00223433231214406
Celeste Beesley, Eliza Riley Oak
{"title":"Public opinion on trading with the enemy: Trade’s effects on the risk of war","authors":"Celeste Beesley, Eliza Riley Oak","doi":"10.1177/00223433231214406","DOIUrl":"https://doi.org/10.1177/00223433231214406","url":null,"abstract":"While studies show that the public disapproves of trade with adversaries, political discourse has historically used security rhetoric to both justify and oppose trade with threatening states. Does emphasizing the potential of trade to exacerbate or mitigate security risks sway public opinion? Is public opinion malleable regardless of the level of threat? These questions become increasingly important as security and economic interactions between states become more intertwined. In a 2019 survey experiment, Ukrainian citizens report more optimism about the effects of trade with Russia (engaged in conflict with Ukraine since 2014) when told that trade decreases security risks. They are more pessimistic when presented with information that trade increases the risk of conflict. In contrast, attitudes about trade with a non-threatening trading partner (the European Union) are unaffected. This study demonstrates that the security effects of trade can both improve and worsen attitudes about trade with politically salient adversaries, even in the context of actual conflict. However, security rhetoric is unlikely to change public opinion about trade with non-threatening states unless they are viewed as reliable allies. Public opinion about trade, thus, responds to rhetoric about security, rather than representing an inflexible constraint on firms’ and states’ trade with adversaries.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"42 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber and contentious politics: Evidence from the US radical environmental movement 网络和有争议的政治:美国激进环保运动的证据
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-01-30 DOI: 10.1177/00223433231221426
Thomas Zeitzoff, Grace Gold
{"title":"Cyber and contentious politics: Evidence from the US radical environmental movement","authors":"Thomas Zeitzoff, Grace Gold","doi":"10.1177/00223433231221426","DOIUrl":"https://doi.org/10.1177/00223433231221426","url":null,"abstract":"Much of the focus of cyber conflict has been on interstate conflict. This article focuses on two interrelated questions in the important but neglected area of cyber contentious politics. First, how does the public feel about the use of different eco tactics including cyber-based tactics carried out by activists involved in the radical environmental movement, a movement that uses protest and sabotage in service of environmental causes? Second, how do anti-technology sentiment and concerns about climate change influence support for different eco tactics? To answer these questions, we conduct a survey and survey experiment on a nationally diverse sample of Americans. We find that Americans are less supportive of certain eco tactics, particularly those that involve property destruction or physical sabotage compared to cyber-based tactics. We further show that anti-technology sentiment and perceived threat from climate change are correlated with increased support for eco direct actions. Using a survey experiment we show that cyber direct actions that result in sabotage are viewed as more acceptable than kinetic actions even though they both result in the same level of destruction. Finally, we include qualitative data from interviews with activists to better understand the strategy and role that new technology and tactics play in the broader radical environmental movement.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"39 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938922","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The women and men that make peace: Introducing the Mediating Individuals (M-IND) dataset 缔造和平的男女:介绍调解个人 (M-IND) 数据集
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-01-30 DOI: 10.1177/00223433231211761
Joakim Kreutz, Magda Lorena Cárdenas
{"title":"The women and men that make peace: Introducing the Mediating Individuals (M-IND) dataset","authors":"Joakim Kreutz, Magda Lorena Cárdenas","doi":"10.1177/00223433231211761","DOIUrl":"https://doi.org/10.1177/00223433231211761","url":null,"abstract":"This article presents new data on the individuals who mediate (M-IND) in all active UCDP dyads and lethal MIDs, 1989–2019. The dataset contributes to the systematic study of conflict management in several important respects: it covers both international and internal conflicts, it covers low-intensity violence, and it provides information on individual mediators, who appointed them, and type of mediation. Besides presenting the data collection and descriptive statistics, the article engages with the literatures on multiparty mediation and women, peace and security. M-IND shows that women more commonly are appointed as mediators by nongovernmental organizations than by states and international organizations. Our analysis suggests that greater equality in mediation efforts correlates with the use of more varied mediation strategies and is associated with a greater chance of reaching peace agreements.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"37 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction: Cyber-conflict – Moving from speculation to investigation 导言:网络冲突--从猜测走向调查
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-01-30 DOI: 10.1177/00223433231219441
Ryan Shandler, Daphna Canetti
{"title":"Introduction: Cyber-conflict – Moving from speculation to investigation","authors":"Ryan Shandler, Daphna Canetti","doi":"10.1177/00223433231219441","DOIUrl":"https://doi.org/10.1177/00223433231219441","url":null,"abstract":"Investigating cyber conflict is enormously difficult. The domain is complex, quality data are sparse, international affairs are shrouded in secrecy, and despite its seeming ubiquity, cyber power has only recently entered the battlefield. In the face of these challenges, we must rise to meet the challenges of cybersecurity research by deploying creative methods that collect verifiable and probatory data, and which allow for predictive models of cyber behavior. Against this backdrop, our special issue offers a vision of cybersecurity research that embraces a culture of rigorous inquiry based on theoretically robust, and policy relevant investigation. We highlight two key features. First, research at the intersection of cybersecurity and political science must incorporate the human dimension of cyber conflict. A human security approach to cybersecurity places people as the primary objects of security and recognizes that individual-level analyses can shed light on macro-level trends. Second, cyber research must adopt rigorous, empirical methods. We embrace a broad tent of empirical data collection techniques – spanning qualitative and quantitative, experimental, and observational research. What is integral is that all scholarship abides by the highest standards of replicability and falsifiability. The articles contained in this special issue collectively form a proof of concept that expands the horizons of cybersecurity research from a substantive viewpoint (adding a human dimension to the prevalent military/strategic analyses), and from a methodological perspective (propounding the importance of empirical scrutiny). Together, these 10 pieces of scholarship collectively affirm that there is now a critical mass of substantively diverse and empirically rigorous research in the field of cybersecurity, and that we as a community are capable of making bold, theoretically grounded, and empirically tested claims that verify how cyber power is or is not altering the nature of peace, conflict and international relations.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"10 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controlling a moving world: Territorial control, displacement and the spread of civilian targeting in Iraq 控制一个移动的世界:伊拉克的领土控制、流离失所和平民攻击目标的扩散
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-01-30 DOI: 10.1177/00223433231202823
Sigrid Weber
{"title":"Controlling a moving world: Territorial control, displacement and the spread of civilian targeting in Iraq","authors":"Sigrid Weber","doi":"10.1177/00223433231202823","DOIUrl":"https://doi.org/10.1177/00223433231202823","url":null,"abstract":"How do armed actors respond to population movements during civil wars? I argue that displacement alters local balances of control between territorial rulers and challengers. Local territorial rulers have incentives to govern violently if displaced persons perceived as members of opposing loyalty groups move into their territories and challengers spoil local governance by inflicting harm on civilians if incoming supporters of a local ruler reinforce the governor’s control. To test these dynamics, I use a combination of manual coding and machine learning to create a novel monthly dataset of territorial control, one-sided violence against moving populations and displacement patterns disaggregated by ethno-religious groups in the war against the Islamic State (2014–2017) in Iraq. Using negative binomial count models, I find that territorial challengers and rulers distinctively respond to population movements in Iraq. The paper extends previous theories of civilian victimization and territorial control by conceptualizing local populations as a dynamic element that explains where fleeing civilians become moving targets.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"10 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity 被黑客绑架:利用布莱切利公园案例构建可推广至网络安全的情报绩效理论
IF 3.6 1区 社会学
Journal of Peace Research Pub Date : 2024-01-30 DOI: 10.1177/00223433231217664
Jon R Lindsay
{"title":"Abducted by hackers: Using the case of Bletchley Park to construct a theory of intelligence performance that generalizes to cybersecurity","authors":"Jon R Lindsay","doi":"10.1177/00223433231217664","DOIUrl":"https://doi.org/10.1177/00223433231217664","url":null,"abstract":"Most cyber intrusions are a form of intelligence rather than warfare, but intelligence remains undertheorized in international relations (IR). This article develops a theory of intelligence performance at the operational level, which is where technology is most likely to affect broader political and military outcomes. It uses the pragmatic method of abduction to bootstrap general theory from the historical case of Bletchley Park in World War II. This critical case of computationally enabled signals intelligence anticipates important later developments in cybersecurity. Bletchley Park was uncommonly successful due to four conditions drawn from contemporary practice of cryptography: radio networks provided connectivity; German targets created vulnerability; Britain invested in bureaucratic organization; and British personnel exercised discretion. The method of abduction is used to ground these particular conditions in IR theory, revisit the evaluation of the case, and consider historical disanalogies. The result is a more generalizable theory that can be applied to modern cybersecurity as well as traditional espionage. The overarching theme is that intelligence performance in any era depends on institutional context more than technological sophistication. The political distinctiveness of intelligence practice, in contrast to war or coercive diplomacy, is deceptive competition between rival institutions in a cooperatively constituted institutional environment. Because cyberspace is highly institutionalized, furthermore, intelligence contests become pervasive in cyberspace.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"30 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信