首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 614 毫秒
1.
2.
3.
ABSTRACT

The India–Pakistan near war of February–March 2019 highlights India’s ongoing evolution in strategic thought and practice since its emergence in 1998 as an overt nuclear-weapon possessor. These changes, involving an increasing willingness to engage in the intentional escalation of conflict with a nuclear-armed rival willing to be the first to use nuclear weapons, challenge certain academic assumptions about the behavior of nuclear-weapon states. In particular, they undermine the expectations of the nuclear-revolution theory—which anticipates nuclear and conventional restraint among nuclear-armed rivals through fear of mutual assured destruction—and the model of nuclear learning which underpins this theory, in which new nuclear-weapon states gradually absorb this restraint through policy-maker learning. This article explores how India’s learning pathway since 1998 has deviated from these expectations. India is instead pursuing its own “revolution,” in the direction of creating capabilities for flexible response and escalation dominance. It concludes by illuminating the similarities between Indian strategic behavior and contemporary practices of other nuclear-armed states, and suggests that New Delhi’s emerging de facto nuclear doctrine and posture is part of a broader empirical challenge to our current conceptions of the nuclear revolution and of nuclear learning.  相似文献   

4.
5.
6.
7.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice.  相似文献   

8.
African states are hampered by unreliable electric energy that has not complemented economic development efforts. Recently, several African states announced plans to pursue nuclear energy in the future. However, several challenges remain for these states, notably insecurity and financial deficiencies. This paper proposes the use of regional integration arrangements to address these challenges faced by African states, as a way of complementing other efforts enabling African states to obtain nuclear energy. The existence of these arrangements and their institutional mechanisms can enable African states to enhance security and cost-effectively develop nuclear power infrastructure.  相似文献   

9.
10.
11.
12.
13.
14.
15.
ABSTRACT

Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation.  相似文献   

16.
17.
18.
19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号