{"title":"The US Navy and the national security establishment: a critical assessment","authors":"Hogr Tarkhani","doi":"10.1080/14751798.2024.2397169","DOIUrl":"https://doi.org/10.1080/14751798.2024.2397169","url":null,"abstract":"Published in Defense & Security Analysis (Ahead of Print, 2024)","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"101 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142208333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Illusions of control: dilemmas in managing U.S. proxy forces in Afghanistan, Iraq, and Syria","authors":"Lawrence E. Cline","doi":"10.1080/14751798.2024.2388439","DOIUrl":"https://doi.org/10.1080/14751798.2024.2388439","url":null,"abstract":"Published in Defense & Security Analysis (Ahead of Print, 2024)","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"25 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142208336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Purpose and Power: US Grand Strategy from the revolutionary era to the present","authors":"Paul B. Rich","doi":"10.1080/14751798.2024.2375079","DOIUrl":"https://doi.org/10.1080/14751798.2024.2375079","url":null,"abstract":"Published in Defense & Security Analysis (Ahead of Print, 2024)","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"26 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141945826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Military mimicry: the art of concealment, deception, and imitation","authors":"Ron Matthews, Thomas J. Matthews","doi":"10.1080/14751798.2024.2352271","DOIUrl":"https://doi.org/10.1080/14751798.2024.2352271","url":null,"abstract":"Three dominant thematics emerge from the biological mimicry and camouflage literature, namely, concealment, deception, and imitation. These phenomena are interesting in their own right, but concept...","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"114 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141774498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Wanted: a strategy to integrate deterrence","authors":"James J. Wirtz, Jeffrey A. Larsen","doi":"10.1080/14751798.2024.2352943","DOIUrl":"https://doi.org/10.1080/14751798.2024.2352943","url":null,"abstract":"Integrated deterrence is a new term in the defence lexicon, introduced by members of the Biden administration to describe a key concept in current U.S. National Security Strategy. This article unpa...","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141614030","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Fourth Industrial Revolution and Military–Civil Fusion – A New Paradigm for Military Innovation","authors":"Maj. Balázs Taksás","doi":"10.1080/14751798.2024.2357932","DOIUrl":"https://doi.org/10.1080/14751798.2024.2357932","url":null,"abstract":"Published in Defense & Security Analysis (Vol. 40, No. 2, 2024)","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"24 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141501774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The restructuring process of the Polish defence industry in the twenty-first century: doing more of the same while expecting different results","authors":"Piotr Śledź","doi":"10.1080/14751798.2024.2334127","DOIUrl":"https://doi.org/10.1080/14751798.2024.2334127","url":null,"abstract":"This paper examines the restructuring of Poland’s defence industry during and after the country’s systemic transition of the 1990s, seeking to identify the main political, economic, and military ch...","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"27 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140574911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The pedagogy of Cyber-WAR:","authors":"Roman Kolodii","doi":"10.1080/14751798.2024.2326313","DOIUrl":"https://doi.org/10.1080/14751798.2024.2326313","url":null,"abstract":"After Russia’s massive Cyber-attacks on Ukraine’s government and bank sectors in January–February 2022, many analysts alleged that Cyber-power would be a crucial component of Russia’s military vict...","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140574433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The hidden cost of excess capabilities: a threat to future military readiness","authors":"Ivo Peets","doi":"10.1080/14751798.2024.2325220","DOIUrl":"https://doi.org/10.1080/14751798.2024.2325220","url":null,"abstract":"There is an often-neglected aspect of defence and military planning: the presence of excess and excessive capabilities in certain areas, despite existing capability gaps elsewhere. Focusing on Esto...","PeriodicalId":501242,"journal":{"name":"Defense & Security Analysis","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140574909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}