共查询到20条相似文献,搜索用时 614 毫秒
1.
2.
3.
Frank O’Donnell 《The Nonproliferation Review》2019,26(5-6):407-426
ABSTRACTThe India–Pakistan near war of February–March 2019 highlights India’s ongoing evolution in strategic thought and practice since its emergence in 1998 as an overt nuclear-weapon possessor. These changes, involving an increasing willingness to engage in the intentional escalation of conflict with a nuclear-armed rival willing to be the first to use nuclear weapons, challenge certain academic assumptions about the behavior of nuclear-weapon states. In particular, they undermine the expectations of the nuclear-revolution theory—which anticipates nuclear and conventional restraint among nuclear-armed rivals through fear of mutual assured destruction—and the model of nuclear learning which underpins this theory, in which new nuclear-weapon states gradually absorb this restraint through policy-maker learning. This article explores how India’s learning pathway since 1998 has deviated from these expectations. India is instead pursuing its own “revolution,” in the direction of creating capabilities for flexible response and escalation dominance. It concludes by illuminating the similarities between Indian strategic behavior and contemporary practices of other nuclear-armed states, and suggests that New Delhi’s emerging de facto nuclear doctrine and posture is part of a broader empirical challenge to our current conceptions of the nuclear revolution and of nuclear learning. 相似文献
4.
5.
6.
7.
International concern over nuclear terrorism has grown during the past few decades. This has driven a broad spectrum of efforts to strengthen nuclear security globally, including the widespread adoption of radiation-detection technology for border monitoring. Detection systems are now deployed at strategic locations for the purported purpose of detecting and deterring the smuggling of nuclear and radioactive materials. However, despite considerable investment in this area, few studies have examined how these programs are implemented or the operational challenges they face on a day-to-day basis. This article seeks to address this with a focus on radiation-detection efforts at maritime facilities. Utilizing practitioner interviews and a survey, this article identifies the factors that influence the planning and use of these systems in this fast-moving environment. The results clearly demonstrate that the implementation of these systems varies significantly across different national and organizational contexts, resulting in a fragmented global nuclear-detection architecture, which arguably undermines efforts to detect trafficked nuclear-threat materials. Greater consideration should therefore be given to developing international standards and guidance, designing and adopting tools to support key parts of the alarm assessment process, and broader sharing of good practice. 相似文献
8.
Mwita Chacha 《African Security Review》2013,22(4):38-50
African states are hampered by unreliable electric energy that has not complemented economic development efforts. Recently, several African states announced plans to pursue nuclear energy in the future. However, several challenges remain for these states, notably insecurity and financial deficiencies. This paper proposes the use of regional integration arrangements to address these challenges faced by African states, as a way of complementing other efforts enabling African states to obtain nuclear energy. The existence of these arrangements and their institutional mechanisms can enable African states to enhance security and cost-effectively develop nuclear power infrastructure. 相似文献
9.
Bruce R. Nardulli 《战略研究杂志》2013,36(4):494-510
10.
11.
12.
13.
14.
15.
Doreen Horschig 《Defense & Security Analysis》2020,36(3):352-371
ABSTRACT Under what conditions are cyber-weapons effective in nuclear counter-proliferation? With continued interest in nuclear proliferation professed by Iran, North Korea, and Saudi Arabia, a discussion of the effectiveness of counter-proliferation measures remains relevant. Cyber-attacks as military option in a state-on-state conflict still requires additional corroborating evidence to make conclusions about its long-term effectiveness. This work analyses the general applicability of cyber-weapons and their usefulness in nuclear counter-proliferation. Through a comparative case study of Operation Orchard, Stuxnet, and recent “Left-of-Launch” operations against North Korea, the essay finds that cyber-operations are not particularly effective against nuclear programmes that are in the later stages of their development. They can disrupt and delay a nuclear programme temporarily, if the attack remains clandestine, but cannot halt nuclear proliferation all together. However, effectiveness increases if they are used in combination with conventional weapons. The article addresses a topic of interest to national-level decision-makers: whether cyber-operations can and should play a role in nuclear counter-proliferation. 相似文献
16.
17.
18.
《Contemporary Security Policy》2012,33(2):111-120
19.