首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
ABSTRACT

Today, it is widely held that while authorization may be helpful in assuring that the other jus ad bellum criteria are met, legitimate authority is not itself a condition for just recourse to war. Or, if it is necessary, it is said to be a trivial requirement, as mobilization for war requires some political authorization. Those who would retain the legitimacy requirement have differing views about who the proper authority is. I argue that, reasonably understood, legitimate authorization is necessary for jus ad bellum. Considerations of agency and consent in force combine with the social contract to commit us to deferring to recognized authorities. These obligations are strengthened by the epistemic reliability and pragmatic value conferred by governing institutions and procedures limiting recourse to war. These same rationales imply that the U.N. Security Council should regulate the international use of force. I qualify that if higher authorities fail to act, other subsidiary authorities may then authorize force. However, the move to each subsequent level of authorization must be justified. Understood in this way, the requirement that wars not be fought without legitimate authorization is a non-trivial, necessary procedural jus ad bellum condition.  相似文献   

2.
ABSTRACT

Is Currency Warfare defined as, the use of monetary or military force directed against an enemy’s monetary power as part of a military campaign, a just way to fight a war? This article explores the ethics of waging currency warfare against the Just War Tradition’s principles of jus in bello (just conduct in war) and its criteria of discrimination and proportionality. The central argument is that currency warfare is inherently indiscriminate but may be proportionate when policy makers consider the nature of the threat confronted and the targeted currency's level of internationalization, that is, to what degree it is used in foreign transactions or used as a foreign currency reserve. I evaluate this argument against historical cases during the Second World War (1939–1945), the Gulf War (1990–1991), subsequent operations against Saddam Hussein in the early 1990s, and the ongoing campaign against ISIS.  相似文献   

3.
ABSTRACT

Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation.  相似文献   

4.
According to just war theory, a resort to war is justified only if it satisfies the right intention condition. This article offers a critical examination of this condition, defending the thesis that, despite its venerable history as part of the just war tradition, it ought to be jettisoned. When properly understood, it turns out to be an unnecessary element of jus ad bellum, adding nothing essential to our assessments of the justice of armed conflict.  相似文献   

5.
It is commonly accepted that recourse to war is justifiable only as a last resort. If a situation can be resolved by less harmful means, then war is unjust. It is also commonly accepted that violent actions in war should be necessary and proportionate. Violent actions in war are unjust if the end towards which those actions are means can be achieved by less harmful means. In this article, I argue that satisfaction of the last resort criterion depends in part upon the likelihood of success of non-violent alternatives to war, and that the actual and potential effectiveness of non-violent resistance means that the last resort criterion of the jus ad bellum and the proportionality criterion of the jus in bello are harder to satisfy than is often presumed.  相似文献   

6.
Abstract

This paper analyses the multiple pathways through which legitimacy of armed groups is constructed in conflict-affected states. It adopts a political sociological approach to the study of armed group legitimacy. Such a strategy assists in identifying whether armed groups enjoy legitimacy in a given empirical context and avoids applying pre-determined normative criteria. The focus is on three types of relationships: civilian communities, the state or regime in power and external actors including regional and international sponsors, to discern which types of legitimacy matter for armed groups in different relationships.  相似文献   

7.
The premise of most Western thinking on counterinsurgency is that success depends on establishing a perception of legitimacy among local populations. The path to legitimacy is often seen as the improvement of governance in the form of effective and efficient administration of government and public services. However, good governance is not the only basis for claims to legitimacy, especially in environments where ethnic or religious identities are politically salient. Some experience in Iraq suggests that in environments where such identities are contested, claims to legitimacy may rest primarily on the identity of who governs, rather than on how whoever governs, governs. This article outlines the intellectual foundations of existing policy and doctrine on counterinsurgency, and argues that development and analysis of counterinsurgency strategy would benefit from a greater focus on the role of ethnic and religious identity in irregular warfare.  相似文献   

8.
ABSTRACT

This article constitutes an attempt to demonstrate the complexity of factors affecting the legitimate acquisition and reasonable exercise by a political community of the right to war as specified in the just war criteria of jus ad bellum. To achieve this purpose, a brief analysis is presented of the intentional participation in World War I of thousands of Polish volunteers forming military units deployed by the Central Powers on the Austrian-Russian front. Considered in light of the standard principles of just war, the military enterprise of the Polish Legions, as they were called, turns out to be a paradoxical instance of warfare which, while being part of a state-to-state aggression, must be deemed compliant with all the principles in question. As a means of explaining this paradox, a modification of the concept of justified intervention is proposed, embracing military efforts aimed at the ultimate defeat of all the (unjustly) warring parties operating within a given territory. In consonance with the classic just war approach, it is also argued that the justification for such an intervention is essentially dependent on its being initiated by, or attributable to, an unquestionable state agent acting in defence of the state’s basic prerogatives.  相似文献   

9.
Abstract

This introduction to the double special issue on the theme of rebels and legitimacy aims to set out the parameters for the discussion. It looks at legitimacy as a concept and at legitimation as a process. To date most of the literature on legitimacy has focused on the state. However, rebel groups such as insurgents, terrorists, warlords and guerrillas have all had claims, and continue to claim, legitimacy as well. How and when are these rebels seen as legitimate actors? Existing suggestions of rebel legitimacy focus heavily on state models of social order and the social contract. This first contribution discusses how to conceptualize legitimacy and how to make it operational. A two-pronged approach, borrowing heavily from Max Weber, is proposed. Legitimacy is investigated based on beliefs and belief systems about what is considered legitimate. This is combined with practices whereby legitimacy is enacted, copied and emulated by the population the rebels claim to represent.  相似文献   

10.
Insurgencies thrive in regions where government legitimacy is absent. In the post-war Philippines, Captain Charles T. R. Bohannan of the Army’s Counter Intelligence Corps became actively aware of this dynamic. Bohannan is best known for his later work with Edward Lansdale and Ramon Magsaysay in defeating the Huk Rebellion (1950–1954). Here the author examines Bohannan’s early investigative work against Japanese war criminals, wartime Filipino collaborators, and the rising threat of communist subversion most associated with the Huk. All of these experiences fed into what would be the successful campaign against the Huk, chronicled in his seminal work, Counter Guerrilla Operations: The Philippines Experience, and offers lessons on the investigative (as opposed to tactical or psychological) nature of effective counter-insurgency work, as it relates to both legitimacy in governance and the rise of insurgencies.  相似文献   

11.
Abstract

Although the concept of legitimacy is central to Western counterinsurgency theory, most discourse in this area black-boxes the concept. It hence remains under-specified in many discussions of counterinsurgency. Fortunately, recent research on rebel governance and legitimacy contributes to our understanding of the problems faced by counterinsurgents who want to boost state legitimacy while undermining that of the rebels. Taken together, this research illustrates that a rational choice approach to legitimacy is simplistic; that micro-level factors ultimately drive legitimacy dynamics; and that both cooption of existing legitimate local elites and their replacement from the top–down is unlikely to succeed. Western counterinsurgency doctrine has failed to grasp the difficulties this poses for it.  相似文献   

12.
ABSTRACT

Research concerning authoritarian stability and peace usually investigates co-optation and repression. Recently, several studies argue that traditional legitimacy is also important for stability in monarchies. However, existing research rarely considers how legitimacy constrains rebellions and help the royal family to stay in power. Hence, this article explores the causal links between sources of traditional legitimacy and absence of uprisings. The study investigates the relationship with a case study of the Kingdom of Swaziland. In line with my expectations, I find a causal relationship between sources of traditional legitimacy and absence of popular uprisings. First, the royal family actively uses traditional legitimacy to justify their rule. Second, the Afrobarometer indicates that the Swazi people trust the King more than citizens in other African countries trust their head of state. Third, opposition actors have limited opportunities to mobilize the broader population against the monarchy. Fourth, traditional legitimacy dampens ongoing protests and thereby hinders their escalation into popular uprisings or political violence. Repression is clearly an important explanation for limited rebellion in Swaziland, but this article shows that also traditional legitimacy sources play a role.  相似文献   

13.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   

14.
Abstract

Militias and rebels depart from different angles when it comes to the politics of legitimacy. While rebels have to address the issue of legitimacy early on in order to gain popular support, militias can rely on some kind of ‘borrowed legitimacy’. Based on this observation, the paper introduces militias as special form of organised violence visible in many civil wars and fragile states as well as elaborates on the politics of legitimacy typical for militias. By distinguishing different forms of militia violence (counter-insurgency, counter-rival and counter-crime), the articles shows how militias respond to major challenges in legitimizing violent actions.  相似文献   

15.
We consider the problem of assigning alternatives evaluated on several criteria into ordered categories C1,C2,…,Cp. This problem is known as the multi‐criteria sorting problem and arises in many situations such as classifying countries into different risk levels based on economical and socio‐political criteria, evaluating credit applications of bank customers. We are interested in sorting methods that are grounded on the construction of outranking relations. Among these, the Electre Tri method requires defining multidimensional profiles that represent the “frontier” separating consecutive categories Ch and Ch+1, and assigns an alternative to categories according to how it compares to each of the profiles. The explicit specification of the profiles of consecutive categories can be difficult for decision makers. We develop a new outranking based sorting method that does not require the explicit definition of profiles. We instead require the decision maker to assign a subset of reference alternatives to the categories. To assign the remaining alternatives, each such alternative is compared to reference alternatives, and assigned to categories accordingly. © 2008 Wiley Periodicals, Inc. Naval Research Logistics 2009  相似文献   

16.
This paper discusses soldiers’ moral responsibility in today’s complex conflicts. The point of departure is the increased focus on soldiers as moral decision-makers in war, illustrated by the introduction of core values in the Norwegian Armed Forces. Responsibility is one of these core values, but it is not clear exactly how we should understand responsibility. I use a case where a group of Norwegian soldiers in the International Security Assistance Force (ISAF) sought the cooperation of a group of mujahedeen to solve the military mission of establishing security. As confidence between the parties grew, the soldiers became horrified witnesses to a practice of bacha bazi, where a young boy is dressed up for entertainment and sexual abuse. This situation gives reason to question the limits of role responsibility, the status of soldiers’ legitimacy, and the challenges of making morally sound judgments in a multicultural context. The discussion demonstrates that, even if there are restrictions on the soldiers’ freedom to act, a responsibility reaching beyond or extending their role should be recognized as part of the moral reality of modern soldiers.  相似文献   

17.
ABSTRACT

Revisiting the US-led counterinsurgency campaign in Afghanistan, we examine to what extent the concepts of legitimacy of the Taliban and the US counterinsurgents showed congruence with pre-existing Afghan notions of legitimacy. We move beyond dominant approaches of social contract theory and materialist legitimacy by using a threefold model of legitimacy to assess the different concepts of legitimacy. Both the Taliban and the US, we argue, diverged markedly from historically developed notions of legitimate rule. The article demonstrates that counterinsurgents need to be aware of and adapt to local norms. Moreover, we point towards relevant norms in the case of Afghanistan.  相似文献   

18.
This article addresses what we owe to the civilians of a state with which we are militarily engaged. The old notion of noncombatant immunity needs to be rethought within the context of both human rights and into the postwar phase. No doubt, civilians will be killed in war. However, much more can be done during and after the fighting to protect civilians’ basic human rights from the ills of war. I argue for making belligerents accountable ex post by requiring them to repair destroyed dual-purpose facilities that are essential for securing basic human rights of the civilian populace. I argue also that a belligerent’s targeting decisions should be reviewed ex post by an impartial commission.  相似文献   

19.
Abstract

Previous research has identified a variety of general mechanisms to explain how insurgents build legitimacy. Yet, there is often a gap between these mechanisms and the interactional dynamics of insurgencies. This article attempts to bridge this gap through a theoretically informed analysis of the Kurdistan Workers’ Party’s (PKK) insurgency in Turkey. I show how the PKK’s efforts to cultivate legitimacy, Turkey’s counterinsurgency strategies, and civilian perceptions of the PKK, all mutually influenced one another. Based on this analysis, I argue that the mechanisms that produce popular legitimacy coevolve with insurgents’ behaviors, states’ interventions, and civilians’ perceptions.  相似文献   

20.
Abstract

This article seeks to contribute to the understanding of the role of legitimacy and different forms of legitimation in population-centric counterinsurgency. An analysis of the logic underlying this counterinsurgency concept sheds a light on the former as it identifies legitimacy as the crucial mechanism through which a collaboration strategy seeks to obtain control over the local population. An exploration of Weber’s primary types of legitimate authorities provides the insight that counterinsurgents might operationalize legitimation through either rational-legal ways or by co-opting local power-holders who hold a position as traditional or charismatic leaders. The exact choice of strategy depends on the pattern of legitimacy in the target society and therefore so-called cultural legitimation is pivotal.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号