首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 531 毫秒
1.

Using a data set of historical battles from 1600 to 1973, this paper analyzes the empirical determinants of tactical success in modern war. Based on a reduced form approach we consider key elements of military theory as production factors for combat success as an output of a military production function. The paper focuses on the relationship of material and non-material factors to battlefield success, and especially on the role of superior force strengths. Contrary to the emphasis on technology which can be found in the recent literature, our estimation results indicate that numerical superiority has retained its crucial role for battlefield performance throughout history. In general, human elements of warfare, like leadership, morale and surprise, have continued to be important determinants of battle outcome despite technological progress in weapons.  相似文献   

2.
ABSTRACT

In No Use: Nuclear Weapons and U.S. National Security Policy, Thomas M. Nichols calls for a constructive rethinking about the history of nuclear weapons and the attitudes that have grown up around them. Despite dramatic reductions since the end of the Cold War, the United States still maintains a robust nuclear triad that far exceeds the needs of realistic deterrence in the twenty-first century. Nichols advocates a new strategy of minimum deterrence that includes deep unilateral reductions to the US nuclear arsenal, a no-first-use pledge, withdrawing US tactical nuclear weapons from Europe, and ending extended nuclear deterrence for allies. The weakest part of his argument eschews nuclear retaliation against small nuclear states that attack the United States, opting instead to use only conventional weapons to guarantee regime change. He admits this will entail enormous cost and sacrifice, but cites the “immorality” of retaliating against a smaller power with few targets worthy of nuclear weaponry, which totally ignores the massive underground facilities constructed to shield military facilities in many of these states. Despite this, Nichols's thoughtful approach to post-Cold War deterrence deserves thoughtful consideration.  相似文献   

3.
ABSTRACT

The transformation of the governance model from a rule of virtue to political realism in China has been a topic of great interest to scholars. In this study, I examine military culture during the Zhou Dynasty and investigate the changes in ethics based on factors such as cultural values, social customs, and political structure to understand the process by which moral values have changed as the governance model transformed from rule of virtue to political realism. I found that military ethics have changed from governance through the use of rituals during the Western Zhou Dynasty to what was called “deception makes an army” during the Eastern Zhou Dynasty.  相似文献   

4.
ABSTRACT

While many militaries have tried to capitalize on the potential of information operations in internal war, few have succeeded. I argue that military information campaigns fall short of expectations for two reasons. First, the theory of influence militaries generally embrace – communications as a non-lethal weapons system – is largely invalid. While treating information as a weapons system makes it easier to integrate it into the existing military planning system, this overstates the independent effects of communications on behavior and understates the importance of interactive effects of what commercial marketing theory refers to as the “marketing mix” – product, price, promotion, and placement. It would be more appropriate to treat military information operations as a form of marketing: a composite effort to induce a specific behavior in a target audience by applying a combination of material and ideational instruments. The marketing model suggests that the efficacy of information operations will depend not simply on the message and its delivery (promotion) but on the behavior the sender seeks to induce (the product), the costs of that behavior (the price), and the opportunities available for such behavior (the placement).  相似文献   

5.
Although most styles of military ethics are hybrids that draw on multiple ethical theories, they are usually based primarily on the model of Aristotelian virtue ethics. Virtue ethics is well-suited for regulating the conduct of soldiers who have to make quick decisions on the battlefield, but its applicability to military personnel is threatened by the growing use of unmanned weapon systems. These weapons disrupt virtue ethics’ institutional and cultural basis by changing what it means to display virtue and transforming the roles soldiers perform and the nature of the military profession itself. I argue that in light of these challenges to virtue ethics, at least as it is traditionally understood within the armed forces, soldiers operating unmanned weapons require a more heavily rule-based approach to military ethics.  相似文献   

6.
ABSTRACT

Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation.  相似文献   

7.
ABSTRACT

Extended deterrence has been a main pillar of the security alliance between the United States and South Korea (Republic of Korea [ROK]) since the end of the Korean War. The changing dynamics of US extended deterrence in Korea, however, affected Seoul’s strategic choices within its bilateral alliance relationship with Washington. Examining the evolution of US extended deterrence in the Korean Peninsula until the Nixon administration, this article explains why South Korea began its nuclear weapons programme in a historical context of the US–ROK alliance relationship. This article argues that President Park Chung-hee’s increasing uncertainty about the US security commitment to South Korea in the 1960s led to his decision to develop nuclear weapons in the early 1970s despite the fact that US tactical nuclear weapons were still stationed in South Korea.  相似文献   

8.
ABSTRACT

Nuclear disarmament is often seen as eventually requiring access to nuclear warheads or to the warhead-dismantlement process to verify that a state has not hidden weapons or weapon-materials despite promising to disarm. This article suggests this view is misplaced, and that what is needed is a verification mechanism able to provide reliable assurances of the absence of fissile materials available for use in weapons after a state has disarmed. Such a mechanism will need an initial declaration of the amount of fissile materials held by a state for all purposes, military and civilian. In a state with a nuclear arsenal awaiting elimination, this declaration would have to include materials that may not be available for verification because they are in nuclear weapons or are in other classified or proliferation-sensitive forms. This article describes a verification arrangement that does not require access to materials in weapons and in sensitive forms while still allowing checks on the overall accuracy of the declaration. Verification of the completeness and correctness of the declaration is deferred to the time when the weapons-relevant material enters the disposition process, at which point it no longer has any sensitive attributes. By removing the focus on monitoring warheads and dismantlement, this new approach could provide a more manageable path to nuclear disarmament.  相似文献   

9.
John Stone 《战略研究杂志》2016,39(7):1023-1043
The bayonet has long been regarded as an obsolete piece of military technology. This article advances a proxemic account of close combat, which points to its continuing utility under modern battlefield conditions. It is argued that bayonet training remains an effective way of preparing soldiers to psychologically dominate contested spaces on the battlefield. Thus, although other weapons and techniques can fulfil the same role, it can nevertheless be argued that the bayonet’s enduring presence is not simply the result of some atavistic military mind-set.  相似文献   

10.

The Soviet Union was able to develop a large military-industrial complex and become the world's second superpower despite deficiencies in its centrally planned economy because defence was given high priority status and special planning, rationing and administrative mechanisms were used to attain national security objectives. However, in the period 1976-85 the effectiveness of priority protection diminished and defence institutions experienced more of the problems typical of the shortage economic system. The heavy defence burden also created growing difficulties for the civilian economy. The attempts by the Gorbachev government to reform the defence sector and improve defence-economic relationships during perestroika (1985-91) uniformly failed. For most of the transition period, the Russian military-industrial complex has been adversely affected by its low priority status, cuts in defence spending, instability of the hybrid politico-economic system, and negative growth of the economy. The armed forces and defence industry have been reduced in size and their outputs of military services and equipment have fallen to low levels. Nevertheless, the Russian armed forces still have over one million troops, significant stocks of sophisticated conventional weapons, and a large nuclear arsenal. The government of President Putin has raised the priority of the defence sector, increased real defence spending, and adopted ambitious plans to revive Russian military power. It is likely, though, that tight resource constraints will hamper efforts to reform the armed forces and to upgrade weapons. By 2010 Russia will be an important, but not dominant, military power in Eurasia.  相似文献   

11.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   

12.
We apply dynamic proximity calculations (density and clustering) from dynamic computational geometry to a military application. The derived proximity information serves as an abstract view of a current situation in the battlefield that can help a military commander achieve situation awareness. We employ Delaunay triangulation as a computational tool in our framework, and study its dynamic update in depth. © 2003 Wiley Periodicals, Inc. Naval Research Logistics, 2004.  相似文献   

13.
ABSTRACT

This article constitutes an attempt to demonstrate the complexity of factors affecting the legitimate acquisition and reasonable exercise by a political community of the right to war as specified in the just war criteria of jus ad bellum. To achieve this purpose, a brief analysis is presented of the intentional participation in World War I of thousands of Polish volunteers forming military units deployed by the Central Powers on the Austrian-Russian front. Considered in light of the standard principles of just war, the military enterprise of the Polish Legions, as they were called, turns out to be a paradoxical instance of warfare which, while being part of a state-to-state aggression, must be deemed compliant with all the principles in question. As a means of explaining this paradox, a modification of the concept of justified intervention is proposed, embracing military efforts aimed at the ultimate defeat of all the (unjustly) warring parties operating within a given territory. In consonance with the classic just war approach, it is also argued that the justification for such an intervention is essentially dependent on its being initiated by, or attributable to, an unquestionable state agent acting in defence of the state’s basic prerogatives.  相似文献   

14.
ABSTRACT

Russian political leaders and military strategists are growing increasingly concerned about “strategic conventional weapons”—a broad category that appears to include all non-nuclear, high-precision, standoff weapons—and about long-range, hypersonic weapons, in particular. These concerns are complex and multifaceted (and, in some cases, contradictory), but chief among them are the beliefs that strategic conventional weapons could prove decisive in a major conflict and that Russia is lagging behind in their development. US programs to develop and acquire such weapons—namely, the Conventional Prompt Global Strike program—are of great concern to Russian strategists, who argue both that the United States seeks such weapons for potential use against Russia—its nuclear forces, in particular—and because strategic conventional weapons are more “usable” than nuclear weapons. Asymmetric responses by Russia include increased reliance on tactical nuclear weapons, efforts to enhance the survivability of its nuclear forces, and investments in air and missile defenses. There is also strong—but not completely conclusive evidence—that Russia is responding symmetrically by attempting to develop a long-range, conventionally armed boost-glide weapon.  相似文献   

15.
This article examines the nuclear command and control (C2) system implemented in Pakistan since 1998, and discusses its potential consequences for the risk of inadvertent or unauthorised use of nuclear weapons. I argue that troubled civil-military relations and Pakistan's doctrine of ‘asymmetric escalation’ account for the creation of a command and control system with different characteristics during peacetime and military crises. Although the key characteristics of Pakistan's nuclear C2 system allow relatively safe nuclear operations during peacetime, operational deployment of nuclear weapons during military standoffs is likely to include only rudimentary protections against inadvertent or unauthorised nuclear release. The implication of this study is that any shift from peacetime to wartime command and control procedures is likely to further destabilise Indo-Pakistani relations during the early stages of a diplomatic or military standoff, and introduce a non-trivial risk of accidental escalation to the nuclear level.  相似文献   

16.
The theory of directed graphs and noncooperative games is applied to the problem of verification of State compliance to international treaties on arms control, disarmament and nonproliferation of weapons of mass destruction. Hypothetical treaty violations are formulated in terms of illegal acquisition paths for the accumulation of clandestine weapons, weapons‐grade materials or some other military capability. The paths constitute the illegal strategies of a sovereign State in a two‐person inspection game played against a multi‐ or international Inspectorate charged with compliance verification. The effectiveness of existing or postulated verification measures is quantified in terms of the Inspectorate's expected utility at Nash equilibrium. A prototype software implementation of the methodology and a case study are presented. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 260–271, 2016  相似文献   

17.
微小RNA(miRNA)是一类小分子单链RNA,不编码蛋白质,但是通过抑制基因表达参与调控许多重要的生物学过程。最新研究发现。miRNA广泛存在于体液中,并且含量稳定。易于检测。其表达的变化可以作为一些非正常生理状态或者肿瘤等病理状态的分子标记。复杂战场环境及太空等特殊环境下人血清miRNA的表达谱可能是相关作业人员健康状态的指标.体液中miRNA的表达谱也可作为评价新型武器毁损效应的检测标志物。因此建立特定因素作用下人体液中miRNA的表达谱并建立快速小型化的检测装备。不仅可以服务于军事活动参与人员状态的监测。还能在武器装备研发中发挥重要的评估作用。  相似文献   

18.

Within the EU France devotes to defence the largest financial and human resources although it is not the richest country, nor has it the largest population or labour force. The cost of nuclear weapons accounts for only a small fraction of this abnormally high French defence effort. If France had restructured its military capabilities at the same rate as its principal Allies during the 1985–1994 period, then French defence outlays would be about 20% less than at present. The fundamental reasons for France's excess defence outlay comprise virtual total dependence on French sources for equipment, produced in very small numbers; a military presence outside of Europe; and too many personnel. These deficiencies, and the consequent absence hitherto of a “peace dividend”, indicate a failure to identify the country's real strategic requirements, and a lack of will to reorganise efficiently French defence. The recently announced reform towards an all‐professional force is unlikely to achieve the potential and desirable improvement in cost‐effectiveness.  相似文献   

19.
20.
《Arms and Armour》2013,10(1):81-94
Abstract

The Royal Armouries collection contains many Indian combination weapons, many of which have neither been published nor displayed. This article sets out to describe three unusual firearm related items. These are what appears to be an elaborate gunner's staff of a unique type, a pair of guns that can be combined and shot as a combination and finally a percussion gun shield.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号