首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 328 毫秒
1.
The term “Gray Zone” is gaining in popularity as a way of describing contemporary security challenges. This article describes the “short-of-war” strategies – the fait accompli, proxy warfare, and the exploitation of ambiguous deterrence situations, i.e. “salami tactics” – that are captured by the term and offers several explanations for why state and non-state actors are drawn to these strategies. The analysis highlights why defense postures based on deterrence are especially vulnerable to the short-of-war strategies that populate the “Gray Zone.” The article concludes by suggesting how defense officials might adapt defense policies to life in the “Gray Zone.”  相似文献   

2.
The term “hybrid warfare” is a new one that the West began to use to explain its failure to cope with asymmetric threats. Focusing on the war on global terrorism, the West temporarily withdrew its attention from traditional adversaries, such as Russia, which has used this gap and has audaciously returned to the stage as a global actor. Until the Russian annexation of the Crimean Peninsula in 2014 and inflaming the Ukrainian crisis, most Western authors attributed “hybrid threats” mostly to non-state actors. But the Ukrainian scenario showed the true face of “hybridity” in the modern battlefield when practised by a powerful state actor. Russian “hybrid warfare” in Ukraine has already been seen as a combination of conventional and unconventional methods, that have been complemented with other instruments of national power – diplomatic, economic and information. The purpose of this article is, through an analysis of the Ukrainian scenario, to demonstrate that although the term “hybrid” is new, the concept itself is old and is a continuation of already seen doctrine from the Cold War era. Although “hybrid threats” can come both from state and non-state actors, the Russian interference in Ukraine is proof that they are especially dangerous for the West if, or when, they are initiated from a traditional, sophisticated adversary that has the capacity to use all forms of warfare.  相似文献   

3.
This second part of the review article begins with a definition of military power, when and how it should be used. From a large number of authors, “moral forces” are linked to “codes of conduct”, and the fundamental understandings about the “profession of arms”, based on “fiduciary trust”, “covenanted” service and professional and personal “conscience”. The article covers what authors have written about “culture” and the ethics of “technology” devices and systems, including “cyber” warfare. It concludes with recognition of the increase in ethical sensitivity in this century which is characterized by a phenomenon, the crises of “identity”, personal, national and global.  相似文献   

4.
This article aims to encourage the fostering of more systems thinking, and its greater exploitation, within the domain of contemporary intelligence. With particular focus on “micro systems thinking” and with reference to key intelligence processes, such as intelligence analysis, the utility of many systems dynamics within the intelligence context seeks to be further revealed. Through their greater collective harnessing, including up to “System of Systems” (“SoS”) dynamics, and promoting all that they can offer, more sophisticated overarching operational-to-strategic/policy “ends,” notably that of “defence-in-depth,” can be viably further advanced in a sustainable manner into the future. Arguably, a much-needed transformative impact on contemporary intelligence can also be increasingly realised through comprehensively engaging in and with more systems and SoS thinking. Aiding civil protection tasks, crisis management, emergency planners, and civil contingency practitioners likewise gain.  相似文献   

5.
Up to the present, there is only very little research on how the population perceives terrorism and its threats, even though support from the population is crucial for effective counterterrorism. By eliciting beliefs and subjecting them to content analyses, six factors were found that determine the protection worthiness of a target in the people's view: the potential damage to “people,” “symbolism,” “economy,” “politics,” “nature,” and “image/publicity.” These empirically found factors are in line with factors specified by terrorist target selection models. They differ in the strength of their cognitive representation among participants and, thus, their subjective importance to the people. The first three factors are shared among all participants, whereas the latter ones could only be found in a part of the participant sample. People's judgments of the targets' protection worthiness differ substantially from their judgments of the targets' attractiveness to terrorists, even though the same factors seem to be involved. This study offers an insight into the people's mental model about protection worthiness of targets. Together with classical risk analysis and knowledge about terrorists, these results can form a basis for setting up a holistic scheme for critical infrastructure protection.  相似文献   

6.
“经济自由”与“自由经济”辨析——理想与政策   总被引:3,自引:0,他引:3  
自由主义的实践历史 ,是从争取宗教自由开始 ,继而争取政治自由 ,直到近代和现代 ,却转移集中争取经济自由。“经济自由”虽然是个极重要的课题 ,但是一般论著却把目标 (理想 )性的经济自由混淆作手段 (方法 )性的自由经济 (制度 )。相应地 ,一般论者也把“经济自由主义”错误地狭限于“放任 (自由 )经济制度”以满足一小撮人的经济自由。再者 ,本文认为高寿昌先生早在 6 0年代在外地发表的《经济的自由主义》一文很具卓见和勇气 ,现在试图运用 (广义 )逻辑学把它精确化 ,特别是严格区分“经济自由”与“自由经济(制度 )” ,以显示逻辑分析的重大实用价值  相似文献   

7.
《防务技术》2020,16(5):969-979
Shock wave is emitted into the plate and sphere when a sphere hypervelocity impacts onto a thin plate. The fragmentation and phase change of the material caused by the propagation and unloading of shock wave could result in the formation of debris cloud eventually. Propagation models are deduced based on one-dimensional shock wave theory and the geometry of sphere, which uses elliptic equations (corresponding to ellipsoid equations in physical space) to describe the propagation of shock wave and the rarefaction wave. The “Effective thickness” is defined as the critical plate thickness that ensures the rarefaction wave overtake the shock wave at the back of the sphere. The “Effective thickness” is directly related to the form of the debris cloud. The relation of the “Effective thickness” and the “Optimum thickness” is also discussed. The impacts of Al spheres onto Al plates are simulated within SPH to verify the propagation models and associated theories. The results show that the wave fronts predicted by the propagation models are closer to the simulation result at higher impact velocity. The curvatures of the wave fronts decrease with the increase of impact velocities. The predicted “Effective thickness” is consistent with the simulation results. The analysis about the shock wave propagation and unloading in this paper can provide a new sight and inspiration for the quantitative study of hypervelocity impact and space debris protection.  相似文献   

8.
Most countries put significant amounts of time and effort in writing and issuing high-level policy documents. These are supposed to guide subsequent national defence efforts. But do they? And how do countries even try to ensure that they do? This paper reports on a benchmarking effort of how a few “best of breed” small- to medium-sized defence organisations (Australia, Canada, and New Zealand) deal with these issues. We find that most countries fail to link goals to resources and pay limited attention to specific and rigorous ex-ante or post-hoc evaluation, even when compared to their own national government-wide provisions. We do, however, observe a (modest) trend towards putting more specific goals and metrics in these documents that can be – and in a few rare cases were – tracked. The paper identifies 42 concrete policy “nuggets” – both “do’s and don’ts” – that should be of interest to most defence policy planning/analysis communities. It ends with two recommendations that are in line with recent broader (non-defence) scholarship on the policy formulation-policy implementation gap: to put more rigorous emphasis on implementation (especially on achieving desired policy effects), but to do so increasingly in more experiential (“design”) ways, rather than in industrial-age bureaucratic ones (“PPBS”-systems).  相似文献   

9.
This article provides formulas for estimating the parameters to be used in the basic EOQ lot-size model. The analysis assumes that the true values of these parameters are unknown over known ranges and perhaps nonstationary over time. Two measures of estimator “goodness” are derived from EOQ sensitivity analysis. Formulas are given for computing the minimax choice and the minimum expected value choice for the parameter estimates using both measures of estimator “goodness”. A numerical example is included.  相似文献   

10.
This article argues that the nuclear nonproliferation norm (NNPN) is a social fact with a relatively independent life of its own and that it has a powerful impact on the behavior of both nuclear-weapon states (NWS) and non-nuclear-weapon states (NNWS). It challenges the application of critical constructivist research on norms to the NNPN and the idea that its legitimacy and structural power depend on contestation “all the way down.” State and non-state actors play an important role in explaining the dynamics of the NNPN, but agential constructivism runs the danger of “throwing the baby out with the bath water,” neglecting the structural impact of the NNPN on state behavior. The article examines the limitations of norm-contestation theory, arguing that some norms are more resistant to contestation than others. The NNPN is more difficult to contest than new norms (such as the Responsibility to Protect) because it is rooted in fifty years of nonproliferation nuclear diplomacy. The US-India nuclear deal is not a case of “norm change” but a violation of the NNPN. The “core” of the NNPN has not changed since the US-India nuclear deal. The conflict confronting NWS and NNWS is about the implementation of “type 2” norms (organizing principles) and “type 3” norms (standardized procedures), and not about the “hard core” of the NNPN.  相似文献   

11.
This article describes the results of research into the social phenomenon of “respect” as framed by junior members of the British Army, as part of a wider study into the Values and Standards of the British Army. This research was interview based, using qualitative analysis software to detect, manage, and draw conclusions from the qualitative data recorded in those interviews. The data indicated that the primary situation in which “respect” was visualised by the participants was the unit context, and that it comprised a combination of three different strands: respect for rank or “hierarchical respect,” “professional respect” for a person's military competence, and “personal respect” for an individual's character, personal behaviour, and attributes. The overall respect that an individual is given arises from the combination of these three areas. “Respect” as a concept was, in the soldiers’ characterisation, something that had to be earned (except for the “given” represented by rank) and was not stable: a person's fund of respect could go up or down in social value. Respect was also linked to trust: the more respect a person had, the more they could be trusted. Although the unit context was the primary one for discussing their framing of the concept of respect, many of the participants reported a wider dimension in which every human being deserves a basic level of respect simply for being human, and this level could not be forfeited.  相似文献   

12.
Under the administration of President George W. Bush, Pentagon rhetoric has increasingly articulated a more robust vision of space as a future battlefield. This analysis details some of the ongoing spending for research and development programs identified in current U.S. Air Force, Missile Defense Agency (MDA), and Defense Advanced Research and Planning Agency (DARPA) planning and budget documents related to “space control” and “space force projection.” This analysis finds that current support for “space superiority” and “space control” systems remains largely rhetorical—with little actual budgetary support. Unclassified technology development programs included in the six-year Future Years Defense Plan are a decade or more away from deployment. Programs related to offensive counterspace, space-based missile defense interceptors, and space-based strike total slightly less than $300 million in FY 2006 funding. We conclude significantly higher expenditures in research and development would be required to develop and deploy killer micro satellites, space-based missile defense interceptors, and military space planes.  相似文献   

13.
The malaise that the United States, and the West, have experienced in recent campaigns stems in large part from unclear thinking about war, its political essence, and the strategies needed to join the two. Instead, analysis and response are predicated on entrenched theoretical concepts with limited practical utility. The inadequacy of understanding has spawned new, and not so new, terms to capture unanticipated trends, starting with the re-discovery of “insurgency” and “counterinsurgency” and leading to discussion of “hybrid threats” and “gray-zone” operations. New terminology can help, but the change must go deeper. Challenging analytical orthodoxy, this article sets out a unifying approach for the study of political violence, or more accurately: violent politics. It provides a conceptual foundation that helps to make sense of recent shifts in warfare. In effect, it offers sorely needed theoretical insights into the nature of strategy and guides the process of responding to nontraditional threats.  相似文献   

14.
The authors engage in the debate over waste in military force structure planning by rigorously deconstructing the concept of “redundancy.” First, a typology of redundancy is constructed that provides a common framework for identifying variety among redundant structures. These are labeled “true redundancy,” “expanded capacity,” “portfolio diversification,” and “mission overlap.” Further, a number of mechanisms are identified that produce these types of structures, and show the conditions under which planners may utilize redundant structure in the search for optimization. In sum, the article provides refined concepts for analysts and planners to identify when redundancy is deleterious or beneficial.  相似文献   

15.
在大量数据充斥的“微时代”,各个领域的信息以多样化的方式传播到大学生群体中,碎片化的信息为原有高校思想教育带来了机遇和挑战。本文通过“微时代”对大学生思想教育的影响进行总结,调查、归纳其影响产生的原因。“微时代”对现代大学生思想教育的影响具有正、负两面,而究其产生的原因则是大学生对网络的频繁使用及“微时代”信息的隐蔽性。根据这些原因,本文对现在的大学生思想教育工作进行总结,并对未来的教育提出建议。  相似文献   

16.
This article focuses on Pakistan's policy option of “minimum deterrence” (MD) post-1998 nuclearization of South Asia and explores why “minimum” in reality is not the minimum. It states that the term “minimum” has not been fully defined yet due to which MD stays ambiguous. In addition, it endeavors to elaborate the rudimentary factors responsible for the non-existence of an MD, which, in turn, keeps the Pakistani stance on MD dynamic and evolving.  相似文献   

17.
If the probability of “failure” in a multivariate renewal process of the “success run” type is very small, then if certain conditions are imposed on the components of the renewals, the joint distribution of their total durations is approximately exponential with all mass along one line. This result is applied to a 2-i.i.d. unit repairable system of the “1 out of 2:G, Cold Standby” type.  相似文献   

18.
Decades ago, simulation was famously characterized as a “method of last resort,” to which analysts should turn only “when all else fails.” In those intervening decades, the technologies supporting simulation—computing hardware, simulation‐modeling paradigms, simulation software, design‐and‐analysis methods—have all advanced dramatically. We offer an updated view that simulation is now a very appealing option for modeling and analysis. When applied properly, simulation can provide fully as much insight, with as much precision as desired, as can exact analytical methods that are based on more restrictive assumptions. The fundamental advantage of simulation is that it can tolerate far less restrictive modeling assumptions, leading to an underlying model that is more reflective of reality and thus more valid, leading to better decisions. Published 2015 Wiley Periodicals, Inc. Naval Research Logistics 62: 293–303, 2015  相似文献   

19.
The US government initiated a Defense Counterproliferation Initiative to address the concern that, in the post-Cold War years, the proliferation of nuclear, biological, and chemical weapons would be widespread and create a significant challenge to the US military’s combat operations. In particular, non-nuclear states might use chemical or biological warfare agents against US forces with the belief that nuclear weapons would not be used against them in retaliation. Following the events of September 11, 2001, defense strategy and policy shifted to a wider view of the threat of adversarial use of “weapons of mass destruction” (WMD) and the term “counterproliferation” was replaced by “combating” or “countering WMD.” Over time, the Defense Department increasingly moved away from counterproliferation principles with the detrimental effect of losing capabilities that US forces still need for contemporary adversaries. This shift has been aggravated by other US government agencies’ use of “counterproliferation” in lieu of what would have been termed “nonproliferation” activities in the 1990s. The loss of clarity within the US government on these terms has led to the inability to focus the “whole of government” on this significant national security challenge. To alleviate this challenge, the US government needs a top-down initiative to refocus policy on the distinctly different aspects of WMD with respect to military combat operations, combating terrorism, and homeland security.  相似文献   

20.
It is known to be real that the per unit transportation cost from a specific supply source to a given demand sink is dependent on the quantity shipped, so that there exist finite intervals for quantities where price breaks are offered to customers. Thus, such a quantity discount results in a nonconvex, piecewise linear functional. In this paper, an algorithm is provided to solve this problem. This algorithm, with minor modifications, is shown to encompass the “incremental” quantity discount and the “fixed charge” transportation problems as well. It is based upon a branch-and-bound solution procedure. The branches lead to ordinary transportation problems, the results of which are obtained by utilizing the “cost operator” for one branch and “rim operator” for another branch. Suitable illustrations and extensions are also provided.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号