首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 343 毫秒
1.
The U.S. spends billions of dollars in its security cooperation program to develop “professional, accountable, and capable security forces” in other nations, part of a grand strategy to improve global stability and counter violent extremism. Despite its great investment in professionalizing foreign militaries, however, the U.S. has no functional definition of military professionalism – a term that until now has been considered too vague and multi-faceted to operationalize. In this article, the author seeks to remedy this oversight, drawing from twenty years of security cooperation fieldwork in Latin America and Africa, as well as a vigorous literature review, to define four important components of military professionalism: (1) formal military education and vocational training, (2) military subordination to elected civilian officials, (3) knowledge and practice of the law of armed conflict and human rights law, and (4) a clearly established program of professional military ethics. This article provides guidelines for U.S. and European officials who work with partner nations to develop more professional military forces and, in particular, for officials managing security assistance programs with developing countries.  相似文献   

2.
The article analyses the Spanish military transformation. This process started in 2004 as a means to adapt the force structure, organization and capabilities of the Spanish military to meet present and future threats in compliance with NATO’s initiatives, thus ensuring the continuity of the equipment modernization, professionalization and the adjustment of the country’s defence architecture to the post-cold war environment. A decade later, although transformation is still a priority for the Ministry of Defence, limited political will, a lack of strategic guidance, poor resource management and the effects of the economic crisis are compromising its development. This article describes the Spanish military transformation and assesses its value in adapting the country’s armed forces to the current and prospective security environment.  相似文献   

3.
In the late 1990s and 2000s, a slew of books and journal articles proposed that a nexus between risk management and warfare was emerging. This article argues that risk management ideas continue to shape recent campaigns against Libya, Islamic State, Syria, and the war on terror from Niger, Yemen to Somalia. It uses existing literature on risk and warfare to examine four key aspects of contemporary interventions. First, the article evaluates the overall strategic context as security concerns shift from terrorism toward renewed great power competition. Second, it re-assesses the risk calculus for military action through the language and grammar of risk invoked by politicians. Third and fourth, it addresses the continuing reliance on air power and the managerial ethos of military operations as important features of war as risk management.  相似文献   

4.
Abstract

From the 1982 Maitatsine Uprising to the 2009 Kala Kato Riot, Nigeria has been bedevilled by ethno-religious uprisings with devastating human and material losses. In almost all these crises the police and the military have featured prominently as agencies tasked with the responsibility of maintaining law and order and suppressing insurrection. While it was not alleged that they precipitated some of these risings perhaps in their attempts to stem or nip them in the bud, they have been accused of escalating the conflict either by their slow and inadequate responses, their partisanship and their arbitrary responses, or by their slackness in managing the crises and their aftermath. However, but for their efforts the security basis of the Nigerian state would have been considerably compromised by religious fundamentalism given the level of preparedness of the groups involved, their resistance and, more importantly, the recurrent nature of the uprisings. This article reflects on the management of ethno-religious uprisings in Nigeria by the police and the military. It considers the nature of the security agencies' involvement in the crises and examines the factors both within the agencies and in the larger Nigerian society which have aided or hindered their effective management of the conflicts.  相似文献   

5.
Risk management is a decision-support process and a vital tool for military planning and decision-making. Today, several nations utilize risk-based approaches to analyze the level of security in military operations. There are both strengths and challenges in applying risk-based approaches to support military decisions. In this article, the challenges related to risk communication are investigated with the aim of describing how a military organization should train to create a good environment for effective risk communication. The analysis finds that it is important for the organization to define and consistently use a shared risk understanding. Such a shared risk understanding will need a systematic development process that focuses on the future decision makers’ and analysts’ education and training. To reach understanding, all involved parties must have the chance to identify the problem, reflect on its implications, test different solutions and develop a solution.  相似文献   

6.
National security conception or securitization theory frames threats and conceptualizes the responses towards them. But in many cases, and especially in the Israeli context, there is a tendency to blur the nature and essence of different threats; security threats become strategic threats and then existential threats. In the Israeli context, because the broad concept of security is perceived, in most cases, as equivalent to military security, the meaning of the strategic threat will be framed, mostly, militarily, derived from military thought.

The article examines the nature of existential threats in the Israeli context and seeks to find the implications of securitization theory in this regard by analyzing the unique role of the military establishment and the influence of the military thought on strategic thought in Israel. The article also deals with the centrality of ‘military wisdom’ in the Israeli ethos and the sense of insecurity embedded in the Israeli narrative that leads to an ‘intellectual symbiosis’ between the political and the military echelons and finds this phenomenon as one of the major explanations for the influence of the military establishment on defining the nature of security threats as well as on the crucial decision to launch wars.  相似文献   

7.
周炎明  兰旭  熊俊芬 《国防科技》2020,41(5):111-118
随着“大智移云物”的出现和发展,战争形态已经发展到智能化战争新阶段。为了打赢未来智能化战争,推进军队财务管理实现智能化,充分利用军事大数据这一新兴重要战略资源尤为必要。本文利用需求分析法和现象分类法,从经费需求测算、预算编制、军费支出和军费绩效评估四个方面分析了军队财务管理领域应用军事大数据的需求。针对当前存在的运用军事大数据观念淡薄、数据采集困难、数据挖掘处理能力较弱、数据安全威胁及军事大数据人才缺乏等五个问题,从大数据应用观念的树立、软硬件设备的更新、数据中心的建设、应用框架的构建、信息化管理制度的完善、数据安全管理和大数据人才队伍建设几个方面提出了在军队财务管理领域应用军事大数据的思路。  相似文献   

8.
It is almost universally accepted that security is achieved by having a strong mititary. South African defence policy and practice is based squarely on such thinking. Yet this thinking can be challenged at a number of levels. In particular, it is not consistent with new thinking about security, in which territorial security is far less important, for example, than poverty and inequality; it is not consistent with present or conceivable future threats faced by the nation; and military expenditure hinders economic growth and thereby development. The article presents a number of alternative ways of achieving security that are, arguably, less costly and more effective than a conventional military. It concludes by sketching some or the broad features of a demilitarised society and some of the major tasks of demilitarisation. Chief among these will be to change the way people think about the military and security.  相似文献   

9.
为提高资金安全管理与防范能力,必须从加强人员管理、实行合理分工、加强银行账户管理、严格库存现金限额、管好财务印鉴及严格票据管理等方面采取相应措施,以确保部队资金安全、规范有序运行。  相似文献   

10.
The search continues for methods to improve security for development in Sub-Saharan Africa. One of the important actors in this security arena is Sub-Saharan African governments’ armies. Much of their capability to meet security challenge depends on how militarily professional they are. The wave of democratic evolution in Africa since 1990 also affected military professionalism. This article reviews three models for assessing how democratisation might affect military professionalism in Sub-Saharan Africa, with special attention to post-conflict states. This should make it possible to decide which analytical methods are most appropriate to measure military professionalism in the particular circumstances of Sub-Saharan African post-conflict democratisation. Depending upon the particular nation-state in question, this decision on analytical methods may be useful for other Sub-Saharan states as well.  相似文献   

11.
This article deals with Scandinavian intelligence cooperation and its significance for Swedish security policy during the first part of the Cold War. First, the development of the cooperation is described. Second, it is related to a wider context. Third, intelligence in Swedish security policy-making is discussed. Common security interests caused the cooperation. For Sweden, it represented an important part of the wider contacts with the West. Although military intelligence was important for Swedish security policy-making in some respects (e.g. military readiness), it did not have a significant influence in others (e.g. the politicians' threat perceptions). One important reason is the Swedish tradition of weak connections between the political and military leadership.  相似文献   

12.
This article provides a detailed look at the history of the Gambia Armed Forces (GAF), a military that has received very little academic attention within the study of African state security forces. It identifies key turning points in the GAF’s history, and highlights the vastly different roles the military played in the state under President Jawara (1965–94) and President Jammeh (1994–2017). Yet, it also highlights important similarities regarding internal patterns within the armed forces and shows the ways in which these continuities may challenge attempts to restructure the security sector. The article draws on archival research and interviews conducted with retired and active duty Gambian military personnel, government officials, and Gambian scholars.  相似文献   

13.
The article focuses on the interface between ethnicity and national security in Nigeria. It critically explores the negative mobilization of ethnicity in Nigeria's fourth republic, and how this has been shaping (and reshaping) the democratization process, particularly in the management of cooperation and conflict over contestations for power and other resources. The re-democratization of Nigeria in 1999 has been preceded with high expectations of meaningful reductions in the high level of insecurity witnessed under the long years of military suzerainty. However, this has not been the case. Rather, what is obtained is an increase in national insecurity on a much larger scale. This article argues that one of the banes of national security in the Nigerian state is ethnic politics, which continues to witness changes in context and character with grave consequences for the future of democracy. The central argument is that ethnicity has always been a major driver of politics and conflicts in Nigeria and the trend is not likely to change anytime soon.  相似文献   

14.
一种基于联动的军队网络安全防护体系   总被引:1,自引:0,他引:1  
网络是军队信息化建设的基础,安全是军队信息化建设的保障。通过分析当前军队网络安全方面所存在的隐患以及防护措施的不足,引入一种基于联动技术的网络安全防护体系。该体系以防火墙为核心,以安全通信协议为基础框架,以PKI/CA体系为安全支撑,能够从整体上对军队网络进行全方位、立体的防护。其逻辑构成为核心安全设备、外围安全设备和安全通信协议3个部分,各种外围安全设备通过不同的安全通信协议如LD- BP、LCSP、ASIP等与核心安全设备(防火墙)进行有机联动,整个体系的安全性可以满足军队对网络安全的要求。  相似文献   

15.
随着互联网对现实世界的影响越来越大,战略地位越来越突出,获得网络主导权、占据网络制高点成为各国竞相努力的目标。美国在全球网络管理、网络技术、网络文化、网络军事等方面处于霸主地位。美国网络霸权对中国的政治安全、信息安全、文化安全、军事安全造成了极大的威胁。中国应综合采取各种措施,应对美国网络霸权的冲击和挑战,维护国家安全和利益。  相似文献   

16.
The Anglo-American military relationship is a vital yet neglected area of study. This article argues that the British military have actively cultivated a relationship with the U.S. military that has contributed to the longevity of the broader so-called “Special Relationship,” even in the Trump era. The article contends that the complexities of the military relationship can best be captured by the theoretical lens provided by Lowndes and Roberts that combines different strands of institutionalism to focus on rules, practices, and narratives. The intense linkages between the United States and United Kingdom have become routinized, enabling them to adapt their peacetime cooperation to conflicts, and thereby address post-Cold War security challenges. The article draws upon semi-structured interviews with senior British military officers as well as policy documents to explore how these patterns of collaboration have become ingrained in patterns of both thinking and behavior.  相似文献   

17.
The article explores Italian Air Force (ITAF) officers’ perceptions of military transformation and of changes in the global security environment. While several studies have addressed the challenges faced by European armed forces in the last two decades, the methods used have been rather uniform, mostly relying on in-depth case studies through qualitative interviews and analysis of strategic documents and budgets. Using data from an original, and unique, survey conducted among ITAF captains (N = 286), this article focuses on servicemen’s attitudes towards the transformations of the global security environment and the changes occurring (and needed) within the Italian Air Force. After describing the “military view” on these topics, the article provides preliminary statistical evidence on the links between individual experiences, views, and change. The research aims to contribute to the broader debate on military transformation by adding a novel dimension of analysis and providing new insights on the micro-level aspects of learning.  相似文献   

18.
Airpower, drones and cyber-weapons are employed by states in conjunction with local armed non-state actors in an effort to coercively intervene in the crises of the twenty-first century. While the externalization of the burden of warfare is a return to pre-modern war, it is the change in the underlying socio-political relations between the state and its military agent that is a novel phenomenon in surrogate warfare. This article demonstrates that in a post-Westphalian era characterized by non-state violence, globalized conflicts, a prioritization of risk management in a mediatized environment, the state has to explore new ways to remain relevant as the primary communal security provider. Thereby, the organization of violence has departed from the employment of the state’s soldier as the primary bearer of the burden of warfare to a mode of war where technological and human surrogates enable the state to manage the risks of post-modern conflict remotely. In this article, we conceptually explore surrogate warfare as a socio-political phenomenon within the context of globalized, privatized, securitized and mediatized war.  相似文献   

19.
The privatization of activities previously performed by government has been a major characteristic of economic policies over the past two decades. This article examines the potential for privatization of military activities in the African context. Four categories in which this has or might occur are mercenaries employed by a government to provide for defence or to supplement its own military; private security company personnel employed to protect economic assets or to advise and train the local military; the contracting out of the provision of goods and services ranging from heavy weapons through to accounting services; and the transfer of non-core activities currently undertaken by the military to other government departments or civilian bodies. Of these, the last is of potential importance in Africa, given the wide range of activities which its militaries have come to perform. Three examples where private sector organisations or other government departments could play a much larger and probably more cost-effective role are peacekeeping, internal security and surveillance, resource protection and rescue activities.  相似文献   

20.
The increasing use of private military and security companies (PMSCs) has attracted considerable scholarly attention due to its corrosive effects on US democracy. Drawing on neoclassical realism, this article provides a comparative dimension to the study of the political drivers of military privatisation by analysing contractor support to US and UK operations in Iraq and Afghanistan. Domestic political constraints have shaped both US and UK response to the need for more boots on the ground, increasing the propensity to use contractors as a force multiplier in spite of their problematic impact on military effectiveness.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号