首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 273 毫秒
1.
2.
Entering the twenty-first century, China has demonstrated an assertive foreign policy, not only in employing various types of economic and military leverage but also in conducting the Three Warfares (三战) – psychological warfare, public opinion warfare, and legal warfare. This article attempts to identify the motives and methods of China’s Three Warfares by analyzing its history, logic, and agents. Based on this analysis, the author also presents the position of the Three Warfares in China’s foreign policy and the warfares’ impact on the international security environment involving other major powers and China’s neighbors.  相似文献   

3.
This article explores the dynamics of social cohesion on the frontline. It attempts to show how micro-level solidarities largely depend on macro level organisational processes. I argue that frontline social cohesion is often the product of social development linked with the organisational structure. This general argument is applied to the case studies of two armed forces involved in the 1991–1995 Wars of Yugoslav Succession – the Croatian Army (HV) and the Bosnian Serb Army (VRS). Drawing on in-depth interviews with the former combatants I show how HV social cohesion played an important role in winning the war and how these networks of micro-level solidarity were shaped by long term organisational development.  相似文献   

4.
This article attempts to place in historical perspective the latest effort by Colombia’s military (Colmil) to defeat the now half century old insurgency of the Fuerzas Armadas Revolucionarias de Colombia – Ejército del Pueblo (FARC-EP). It argues that the ‘surge’ initiated under President Álvaro Uribe in 2002 with the assistance of the United States can only be fully analyzed in the context of the Colmil’s intellectual framework for counter-insurgency. Specifically, this article will explain how the protracted engagement with counter-insurgency has shaped the Colmil’s understanding of the nature of the conflict, as well as its attitudes towards its adversary, civil authority and the instrumentality of force. An understanding of the Colmil’s strategic tradition can also help to explain their apprehensions about the ongoing peace negotiations with the FARC-EP.  相似文献   

5.
Abstract

The concept of order is often neglected in the study of conflict – seemingly such a ‘disordering’ process. With the recent increase in the examination of rebel governance however, bringing order back into our understanding of rebel and insurgent groups has much to offer in exploring the everyday politics which connect authorities, rebel movements and the population itself, in a complex mass of intersubjective and power-based interactions and negotiations. Rebels both shape and are shaped by existing forms of order in complex and ongoing ways. This article explores how varying elements interact in the negotiation, framing and enforcement of order and develops an original analytical framework to examine the perpetual negotiations of rebel movements in their attempts to cement their control.  相似文献   

6.
Abstract

A tremendous amount of important work has been done recently on operationalising the protection of civilians as a military task. The bulk of the discussion has focused on how militaries should respond to direct attacks on civilians. This is an important issue, but thinking about civilian protection should also include a serious examination of the ways in which the approach of military organisations to the problem of ‘spoiler’ groups can affect the level and dynamics of attacks on civilians – importantly, where armed groups are interested in violent control of civilian populations, attempts to ‘dislodge’ them from areas of control may substantially increase the level of violence against civilians (beyond the dangers to be expected from being near areas where active fighting is taking place). In 2009, the United Nations mission in the Democratic Republic of Congo (MONUC) supported the Congolese military in operations to dismantle the Hutu-dominated FDLR (Forces Démocratiques de Libération du Rwanda, Democratic Forces for the Liberation of Rwanda) militia group, at massive human cost. Critics have primarily focused on MONUC's failure to protect civilians from direct attack, consonant with the general discourse on tactics for civilian protection. These criticisms are valid, but in this paper I argue that two crucial additional considerations should be kept in mind: the way that military operations can affect violence against civilians, and the way that moralising the approach to armed groups, even those which have committed serious abuses, can limit military and political options – potentially in ways that increase civilian risk in the name of protecting them.  相似文献   

7.
Why did the Palestinian Authority established in 1994 create 12 security forces when Eritrea, which achieved independence in 1994, made do with one conventional army? This article attempts to explain the variation in the structure of national security systems in Third World states as a function of two basic factors: the state's political and social heterogeneity and the state's relative importance to US foreign policy and security concerns. Authoritarian one-party and centralizing states tend to fragment their security forces more than states that cultivate social or political pluralism. Fragmentation is a classic exercise of divide and rule. But a tradeoff exists between fragmentation and assuring internal security on the one hand, and ensuring offensive capabilities to ward off external enemies, on the other. Hence the importance of a strong foreign ally – preferably the United States. According to this model, centralized homogenous states enjoying US protection will tend to fragment or bifurcate their security systems most.  相似文献   

8.
A military cannot hope to improve in wartime if it cannot learn. Ideally, in wartime, formal learning ceases and the application of knowledge begins. But this is optimistic. In 1942, USAAF Eighth Air Force assumed it had the means necessary for victory. In reality, its technique and technology were only potentially – rather than actually – effective. What remained was to create the practice of daylight bombing – to learn. This article (1) recovers a wartime learning process that created new knowledge, (2) tests existing tacit hypotheses in military adaptation research, and (3) offers additional theoretical foundation to explain how knowledge is created in wartime  相似文献   

9.
This article argues that, under certain conditions, allowing insurgents into the political process – through elections or government posts – can be a useful tool in the peace process and can help end insurgencies. However, bringing insurgents into the political process is unlikely to end insurgencies on its own, particularly if insurgents, the government, or the population believes that force is still a viable means of defeating the opponent and changing the status quo. The article begins with a brief overview of the causes of insurgency and on conflict resolution for internal wars. The article then considers two examples of insurgents that have entered the political process – the Irish Republican Army (IRA) in Northern Ireland and Hezbollah in Lebanon – and the differing degrees of success in transforming these insurgents to non-violent participants in the political process. It concludes by suggesting how insurgents can be brought into the political process as part of conflict resolution and the implications for Afghanistan.  相似文献   

10.
Many contemporary academics and policy analysts have revisited the Anglo-German rivalry before 1914 to predict what may await China and the United States in the twenty-first century. However, few, if indeed any, have specified in what sense this comparison can be made. This paper attempts to fill this gap with a detailed analysis of the strategic parallels between the Anglo-German rivalry then and the China–US competition now through the lens of the Crowe Memorandum. The author argues that the basic parallel between the rise of Germany and the rise of China lies in the challenges they posed or pose to the dominant maritime power and system leader – Great Britain then and the United States today. This parallel also explains the similarity between the Triple Entente initiated by Great Britain prior to 1914 and the Rebalance to Asia launched by the United States in 2011. Furthermore, as in the case of the Anglo-German rivalry before 1914, the most crucial problem underlying the mounting China–US competition in recent years has been America’s deepening apprehension about the development of China’s anti-access/area-denial (A2/AD) and naval capabilities. This development, from the US perspective, is threatening to deprive the US of its most crucial instrument to influence the strategic equilibrium on the East Asian littorals. Based on the lessons of the Anglo-German rivalry prior to 1914, the essay also examines the potential for mitigating, if not eliminating, the mounting competition and misgivings between China and the United States.  相似文献   

11.
Advances in the study of civil war have led to the proliferation of event count data, and to a corresponding increase in the use of (zero-inflated) count models for the quantitative analysis of civil conflict events. Our ability to effectively use these techniques is met with two current limitations. First, researchers do not yet have a definitive answer as to whether zero-inflated count models are a verifiably better approach to civil conflict modeling than are ‘less assuming’ approaches such as negative binomial count models. Second, the accurate analysis of conflict-event counts with count models – zero-inflated or otherwise – is severely limited by the absence of an effective framework for the evaluation of predictive accuracy, which is an empirical approach that is of increasing importance to conflict modelers. This article rectifies both of these deficiencies. Specifically, this study presents count forecasting techniques for the evaluation and comparison of count models' predictive accuracies. Using these techniques alongside out-of-sample forecasts, it then definitively verifies – for the first time – that zero-inflated count models are superior to comparable non-inflated models for the study of intrastate conflict events.  相似文献   

12.
After only ten years in existence, the African Union (AU) has already made its mark on the landscape of peace and security in Africa. This paper seeks to explore the relationship between the AU's leading collaborative interstate security policy, the African Peace and Security Architecture (APSA), and sustainable peace in the Horn of Africa. It examines four countries – Djibouti, Eritrea, Ethiopia, and Kenya – and how engaging with the APSA through early warning systems can contribute to developing the elements necessary for sustainable peace, namely regional stability, conflict management, and good governance.  相似文献   

13.
Abstract

The signing of a new treaty on the equitable sharing of the Nile waters – signed last May in Kampala by Rwanda, Ethiopia, Uganda and Tanzania – has the potential of derailing relations with Sudan and Egypt. According to the latter countries, this new agreement replaces the 1959 Nile agreement – that awarded them with 90 per cent control over the Nile water – giving other Nile Basin countries the possibility to implement water-related projects in agriculture and energy. This new development, according to Egypt and Sudan, places their water level security in jeopardy. Furthermore, the use of land grabs and water consumption for food security by wealthy foreign countries contributes to the sensitive situation the nine Nile Basin countries are now facing. Water is a red line when it comes to Egypt and Sudan and the future of the whole region depends on whether this line will be crossed.  相似文献   

14.
States confronting cross-border intrusions of terrorism, illegal immigration, and/or drug trafficking weigh the costs of such intrusions against the costs of imposing barriers to prevent or curb the intrusions. In such situations, the degree of national security afforded a state depends, in large measure, upon the degree of border openness the state chooses. Depending upon the intensity and frequency of the intrusions – expressed in terms of opportunity-cost functions – a state might have little choice but to pursue a border policy of zero openness. It is this relationship of border openness to national security that explains why many states choose to construct security fences. In the 49 cases of security fences examined, many – among them Israel vis-à-vis the West Bank, India vis-à-vis Pakistan, Turkey vis-à-vis Greece in Cyprus – the construction of security fences becomes more complicated by their placement on lands whose sovereignties are disputed.  相似文献   

15.
ABSTRACT

While many militaries have tried to capitalize on the potential of information operations in internal war, few have succeeded. I argue that military information campaigns fall short of expectations for two reasons. First, the theory of influence militaries generally embrace – communications as a non-lethal weapons system – is largely invalid. While treating information as a weapons system makes it easier to integrate it into the existing military planning system, this overstates the independent effects of communications on behavior and understates the importance of interactive effects of what commercial marketing theory refers to as the “marketing mix” – product, price, promotion, and placement. It would be more appropriate to treat military information operations as a form of marketing: a composite effort to induce a specific behavior in a target audience by applying a combination of material and ideational instruments. The marketing model suggests that the efficacy of information operations will depend not simply on the message and its delivery (promotion) but on the behavior the sender seeks to induce (the product), the costs of that behavior (the price), and the opportunities available for such behavior (the placement).  相似文献   

16.
War and drugs share many characteristics – both are destructive of human life, highly profitable to some, and efforts to regulate them have failed. In fact, at various times throughout history, war and drugs have been intertwined, prolonging human suffering, bedeviling political leaders and enriching a select few. The pernicious role of drugs in organized political violence is often overlooked. Drugs have been the cause of war, the funding for military operations, used by combatants and a part of the post-war political landscape. The insidious nature of drugs is especially visible in a certain type of war – small wars – yet is virtually unexamined by scholars and decision-makers.  相似文献   

17.
This article – based on interviews with Norwegian Provincial Reconstruction Team (PRT) commanders and the lessons-learned database of the Norwegian Armed Forces – argues that what appear to be an inability or unwillingness to learn and adapt in war may have other explanations. The ambiguity of experiences makes lessons contested, contradictory, and fluid interpretations of confusing events. Consequently, they do not provide unequivocal guidance for adaptation. Even when lessons learned are fairly clear and agreed upon, adaptation does not automatically follow, as force autonomy may be quite limited, at least for small states in coalition operations conducted in partnership with indigenous forces.  相似文献   

18.
ABSTRACT

When on the wrong end of an asymmetry in the projection of hard power, weaker sides countenance the grim arithmetic of avoiding direct and massed confrontations. Invariably, insurgents have over the ages tended to employ indirect tactical methods to render their stronger opponents ineffective. Ultimately – interest asymmetry, regime type, asymmetries of strategy, and external intervention – combine in a complex interplay and pattern, to militate against a strong side. In Sudan, these factors interacted throughout the civil wars to produce regional autonomy and finally an independent South Sudan in 2011. Similar strategic logic had confronted many large African states battling insurgencies in Ethiopia, Angola, Nigeria, Zaire, and apartheid-era South Africa. Oftentimes, weakening public resolve has caused these governments to accommodate, capitulate or withdraw even if they try not to blink. Notwithstanding the regime type, it can be concluded that the majority of strong actors are prone to fail in a protracted, asymmetric conflict. Hence, the notion of linking victory in counterinsurgency to the degree of openness (democratic polyarchies); or closeness (totalitarianism) – is still valid but highly contestable in the case of Africa’s large dysfunctional states.  相似文献   

19.
Can peacekeeping participation help reform military institutions in democratizing states? Drawing on evidence from Nepal – one of the world's largest troop contributors to UN peacekeeping operations – this essay illustrates that participation in peace missions can sometimes undermine security sector reform and deteriorate civil–military relations. Furthermore, this analysis shows that peacekeeping participation will not necessarily reorient troops away from their conventional internal roles (such as counterinsurgency) or improve civilian control over the armed forces. Hence, civilians can lose control over soldiers just as frequently when they are deployed overseas as when they are at home.  相似文献   

20.
Few would disagree that European militaries have experienced dramatic changes since the end of the Cold War. Much of the discussion on these changes to date has referred to the concept of professionalism. However, this approach became outdated as professions in post-industrialist societies entered a state of crisis as a result of growing competition from a variety of competitors. The present study adapts a new framework from the sociology of knowledge literature – sociology of expertise – into one, sociology of security expertise, which is suitable for study of contemporary armed forces. Its utility is demonstrated through analysis of five European professional military education institutions. The analysis shows that European military organisations are transiting, albeit in various degrees, from one form of social organisation of military knowledge production – associated with the military education model common to traditional military colleges – toward another, which is related to the military education model of national defence universities. Hence it is highly probable that European military organisations lose, either voluntary or unintentionally, their professional character and can no longer be unquestionably assumed to be military professions. Hence, they should be analysed hereafter using the sociology of security expertise framework.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号