首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 46 毫秒
1.
Abstract

Previous research has identified a variety of general mechanisms to explain how insurgents build legitimacy. Yet, there is often a gap between these mechanisms and the interactional dynamics of insurgencies. This article attempts to bridge this gap through a theoretically informed analysis of the Kurdistan Workers’ Party’s (PKK) insurgency in Turkey. I show how the PKK’s efforts to cultivate legitimacy, Turkey’s counterinsurgency strategies, and civilian perceptions of the PKK, all mutually influenced one another. Based on this analysis, I argue that the mechanisms that produce popular legitimacy coevolve with insurgents’ behaviors, states’ interventions, and civilians’ perceptions.  相似文献   

2.
This article addresses what we owe to the civilians of a state with which we are militarily engaged. The old notion of noncombatant immunity needs to be rethought within the context of both human rights and into the postwar phase. No doubt, civilians will be killed in war. However, much more can be done during and after the fighting to protect civilians’ basic human rights from the ills of war. I argue for making belligerents accountable ex post by requiring them to repair destroyed dual-purpose facilities that are essential for securing basic human rights of the civilian populace. I argue also that a belligerent’s targeting decisions should be reviewed ex post by an impartial commission.  相似文献   

3.
Abstract

A tremendous amount of important work has been done recently on operationalising the protection of civilians as a military task. The bulk of the discussion has focused on how militaries should respond to direct attacks on civilians. This is an important issue, but thinking about civilian protection should also include a serious examination of the ways in which the approach of military organisations to the problem of ‘spoiler’ groups can affect the level and dynamics of attacks on civilians – importantly, where armed groups are interested in violent control of civilian populations, attempts to ‘dislodge’ them from areas of control may substantially increase the level of violence against civilians (beyond the dangers to be expected from being near areas where active fighting is taking place). In 2009, the United Nations mission in the Democratic Republic of Congo (MONUC) supported the Congolese military in operations to dismantle the Hutu-dominated FDLR (Forces Démocratiques de Libération du Rwanda, Democratic Forces for the Liberation of Rwanda) militia group, at massive human cost. Critics have primarily focused on MONUC's failure to protect civilians from direct attack, consonant with the general discourse on tactics for civilian protection. These criticisms are valid, but in this paper I argue that two crucial additional considerations should be kept in mind: the way that military operations can affect violence against civilians, and the way that moralising the approach to armed groups, even those which have committed serious abuses, can limit military and political options – potentially in ways that increase civilian risk in the name of protecting them.  相似文献   

4.
Which counterinsurgency approaches are most effective in defeating insurgencies? Counterinsurgency advocates and critics have debated the effectiveness of winning hearts and minds as well as using brute force against ordinary civilians. But little scholarship has sought to systemically compare these counterinsurgency approaches among a broad range of cases. This paper seeks to remedy this gap in the literature with an empirical analysis of 47 counterinsurgency wars from 1945–2000 to evaluate the effectiveness of coercive and persuasive approaches to counterinsurgency. To do so, I use crisp-set qualitative comparative analysis (QCA), or Boolean analysis, to identify the presence or absence of six coercive and persuasive counterinsurgency practices across all cases. This method enables me to highlight how counterinsurgency victory can be produced by combinations of practices rather than a single set of practices that might be expected to be useful across cases. The results demonstrate that many combinations of coercive, persuasive, and mixed counterinsurgency practices can lead to victory. However, more persuasive combinations of practices consistently lead to counterinsurgent victory compared to others, although limited coercion against civilians is constant in all cases of counterinsurgency. These findings cast doubt on the ability of counterinsurgents to refrain from harming civilians and suggest that victory requires a mix of both positive and negative incentives for cooperation.  相似文献   

5.
The Building Security Overseas Strategy is at its core an ‘Intervention to end all Interventions’ – from a Western as well as an African perspective. Two of its main pillars are security sector reform in specific countries and systematic support to the development of the African Peace and Security Architecture. This article addresses the question why such efforts have met little success in francophone Africa. It argues that the failure of Western advisers to understand the sociological dynamics of African armed forces, shaped by a political culture based on personal loyalty to the leader, is at the root of the problem. In that context, the Huntingtonian-type distinction between the civilians and the military does not apply as military and civilians act in concert within common clientelism systems. As a result of the curtailing of the state-formation experience in most African countries, the military never had to demonstrate its performance as a state builder, nor did it have to bargain its legitimacy against the support of the citizens. Partnership in that context will remain a misnomer, at least until African military can credibly demonstrate commitment to state-building grounded in a broad-based social contract.  相似文献   

6.
As US counterinsurgency campaigns draw to a close, doctrine for asymmetric warfare written during the War on Terror has come under heavy criticism. While many have argued that this shift to ‘winning hearts and minds’ is evidence that the United States is taking humanitarianism and nation-building seriously, others argue that a wide gap exists between US counterinsurgency doctrine and the protection of civilians afflicted by conflict. In this article, I show that the latter is true by comparing theories of instrumental and communicative action to US doctrine for operational design, stability operations, and counterinsurgency. I argue that these texts treat the people as an object to be manipulated for the achievement of pre-determined self-interested strategic goals rather than members of a community that jointly designs operations to fulfill shared objectives. However, US doctrine does contain communicative elements that, if prioritized, would better support humanitarian and state-building objectives otherwise subordinated in the War on Terror.  相似文献   

7.
ABSTRACT

Debates on military intervention and small wars often include the claim that soldiers should operate among civilians in order to avoid civilian casualties and to protect civilians against third-party violence. This article, by contrast, points at negative unintended consequences of military operations taking place in close proximity to local populations: it argues that also risk-tolerant militaries cause civilian casualties and that their presence triggers third-party violence against civilians. The British military, in particular the British Army, exported risk-tolerant practices from Northern Ireland to the Balkans, with sporadic success. But in southern Iraq and in Helmand, British ground operations harmed civilians. The findings suggest that the chances for protection are better in operations where levels of violence are relatively low than in counterinsurgency where troops face ruthless and well-endowed enemies operating among civilians.  相似文献   

8.
This article examines the ways in which the two normative concerns of casualty-aversion and civilian protection influenced US military strategy in the particular context of the asymmetric conflict in Somalia in the early 1990s. The article critically evaluates US military operations through the prism of international humanitarian law and examines whether American forces started prioritizing casualty-aversion over the safeguarding of Somali civilians. Finally, by drawing on emerging moral guidelines (such as Michael Walzer's idea of ‘due care’), the article examines whether lower numbers of Somali civilian deaths could have been achieved if marginal increases to the risks faced by US soldiers had been accepted.  相似文献   

9.
This article examines the transitory nature of cyberweapons. Shedding light on this highly understudied facet is important both for grasping how cyberspace affects international security and policymakers’ efforts to make accurate decisions regarding the deployment of cyberweapons. First, laying out the life cycle of a cyberweapon, I argue that these offensive capabilities are both different in ‘degree’ and in ‘kind’ compared with other regarding their temporary ability to cause harm or damage. Second, I develop six propositions which indicate that not only technical features, inherent to the different types of cyber capabilities – that is, the type of exploited vulnerability, access and payload – but also offender and defender characteristics explain differences in transitoriness between cyberweapons. Finally, drawing out the implications, I reveal that the transitory nature of cyberweapons benefits great powers, changes the incentive structure for offensive cyber cooperation and induces a different funding structure for (military) cyber programs compared with conventional weapon programs. I also note that the time-dependent dynamic underlying cyberweapons potentially explains the limited deployment of cyberweapons compared to espionage capabilities.  相似文献   

10.
African security, particularly conflict-related political violence, is a key concern in international relations. This forum seeks to advance existing research agendas by addressing four key themes: domestic politics and peacekeeping; security sector reform programs; peace enforcement; and the protection of civilians. Each of the articles in this forum makes a case for analyzing African agency when it comes to African security. As a way of introduction, this short article sets out the main debates and concludes by providing further directions for future research.  相似文献   

11.
According to the International Committee of the Red Cross (ICRC) publication Interpretive Guidance on the Notion of Direct Participation in Hostilities under International Humanitarian Law, all civilians (including child soldiers) lose their immunity from direct targeting ‘for so long as’ their actions amount to direct participation in hostilities. All civilians can, however, access the revolving door of protection and return to their civilian activities – complete with full immunity from direct targeting – provided the nature of their direct participation was spontaneous and disorganised. Once it can be ascertained that their participation in hostilities amounts to continuous combative functions, they relinquish their access to the revolving door of protection, and can be targeted at all times until they abandon their formal or functional membership of the belligerent group. This piece analyses how the revolving door phenomenon and the notion of continuous combative functions apply in instances where civilian child soldiers are directly participating in hostilities.  相似文献   

12.
This commentary traces the increasing importance of early warning in United Nations (UN) peacekeeping, an emphasis that has emerged in connection with the evolution of protection of civilians mandates in UN peacekeeping missions. It examines the current and emerging practice of early warning in UN peacekeeping as well as the challenges faced, drawing on case studies from the UN missions in South Sudan and the Democratic Republic of the Congo. The authors also propose a set of basic principles upon which early warning in UN peacekeeping operations might be approached in the future.  相似文献   

13.
In 1995, South Africa was in a special position. It was: a new party to the Treaty on the Non-Proliferation of Nuclear Weapons (NPT), the first country to voluntarily renounce nuclear weapons, led by a charismatic leader, and seen as a champion of disarmament principles. Yet South Africa’s new leaders were also interested in affirming their position within the Non-Aligned Movement, which was adamantly opposed to the NPT’s indefinite extension. Why, then, did South Africa decide to support the indefinite extension of the NPT in 1995? Existing scholarship has ascribed too much credit to pressure from the United States, overlooking domestic debates in South Africa and the bifurcation between professional diplomats and political elites. This article, building on new archival sources and in-depth oral-history interviews with major actors, demonstrates that South African diplomats opposed indefinite extension while South African policy elites allocated little attention to the topic until late in the game. The findings contribute to our understanding of South Africa’s norm entrepreneurship, as well as the politics of global nonproliferation.  相似文献   

14.
Recent tensions between Russia and the United States have sparked debate over the value of the North Atlantic Treaty Organization (NATO). One controversy surrounds the extent to which NATO raises the risk of war through entrapment—a concept that scholars invoke to describe how states might drag their allies into undesirable military conflicts. Yet scholars have advanced different, even conflicting arguments about how entrapment risks arise. I offer a typology that distinguishes between the mechanisms through which entrapment risks allegedly emerge on the basis of their institutional, systemic, reputational, and transnational ideological sources. I use the 2008 Russo-Georgian War to illustrate how the purported mechanisms of entrapment fare in elucidating that conflict. In analyzing why entrapment risks emerge, and thinking counterfactually about The 2008 War, I argue that scholars need to disentangle the various mechanisms that drive both alliance formation and war to make sure that entrapment risks do indeed exist.  相似文献   

15.
通过分析吉林"6·3"火灾事故责任的追究,用以"案"说法的形式,从行政法权责一致的原则,分析当前消防监督执法工作问责的风险,探讨防范被问责的对策,力求对消防监督执法责任的落实有指导意义。  相似文献   

16.
Analysis of the failures of African security forces generally focuses on structural issues such as corruption of senior leadership, insufficient equipment and training, and coup d’état fears driving mistrust of armies that are too strong or effective. However, less examined is the role that sub-state identity plays; using Libya, South Sudan, and Mali as case studies, this paper examines how ethnicity inhibits the development of national armies, divides them, and exposes a critical flaw that adversaries are able to exploit. Given the increasingly ethnic nature of conflict throughout the world, and the rising threat that ethnic conflicts in Africa pose to regional and Western partners, it may be prudent for researchers, policymakers and other stakeholders to examine the critical role that sub-state identity plays in undermining African security forces.  相似文献   

17.
ABSTRACT

Traditionally the African concept of security concept has been dominated by land-based conflicts with little attention being paid to maritime threats and the protection of the maritime environment. With the rapid escalation of piracy on the East Coast, the African Union (AU) was compelled to develop a joint strategy to address its changing African Maritime Domain (AMD). This was achieved by the AU’s Africa’s Integrated Maritime Strategy (AIMS 2050) in 2014, culminating in the adoption of a binding maritime security and safety charter in Lomé in 2016. The Lomé Charter should ideally focus the general provisions of AIMS 2050 so that Africa, as a continent, can take responsibility for security and economic empowerment of the AMD. This article considers various maritime security documents against the backdrop of an African context for understanding maritime security, in order to evaluate whether the Lomé Charter, as a manifestation of AIMS 2050, will realise its aspirations. Focussing on security is not sufficient and too much emphasis is placed in the Lomé Charter on restriction rather than development. Strong political will and leadership is required to facilitate implementation, identifying common security concerns to ensure better cooperative and collective strategies in a diverse implementation environment.  相似文献   

18.
The paper reveals how Zimbabwean soldiers who fought in the Democratic Republic of the Congo (1998–2002) were challenged by the terrain of war. While soldiers are trained to live and fight in dreadful wars, I argue that immersing oneself in the war terrain is neither mathematical nor calculative; rather, war tactics to be employed are defined by the context in which soldiers operate in. When soldiers reflect on and about the war, they unconsciously produce accounts that are often not completely heroic, but a life lived in fear as well an issue that they had never anticipated when they set out to war. A main finding of this study is that while these soldiers were deployed to fight against the rebels, they find difficulties in locating physical features from map reading to the ground, distinguishing the enemy from civilian people and deployed for days without eating a proper meal as well as seeing their fellow soldiers dying in the context of war. The paper provides a vantage point in which we can also understand that trained soldiers do not exert total power over war terrains, they are sometimes challenged by the war situation itself.  相似文献   

19.
In Africa, most of the present conflicts are civil, intra-state wars where belligerent groups use guerrilla tactics to achieve various political, economic or ideological objectives. The atrocities and the effect of these on-going wars on innocent civilians, human suffering, poverty and development are beyond comprehension. Not surprisingly, the majority of current peace operations are in Africa, with more than 70 countries contributing forces to these conflict zones. On the continent, South Africa has come to assume a leading role in peace operations and is now a major troop-contributing country to UN and AU missions. In the past 11 years, the South African National Defence Force (SANDF) has taken part in no fewer than 14 peace missions. This article provides a brief background of the conflicts in Burundi, the Democratic Republic of Congo (DRC) and Sudan, the different United Nations (UN) and African Union (AU) mandates under which peacekeepers had to operate as well as their objectives, and the extent of South Africa's involvement in the various missions. In the last section, the major challenges, that these operations have posed are highlighted.  相似文献   

20.
The goal of diplomats is to represent their countries’ interests through diplomacy, not arms. Because they are not military personnel, they may be perceived as at lower risk of being the target of terrorists. However, recent events have called this perception into question. Despite this danger, there has been little research on terrorist attacks against diplomats. Drawing on the terrorism studies literature, this article argues that diplomats are targeted more than non-diplomatic targets in countries where certain U.S. foreign policies are implemented. An empirical analysis of 471 attacks against U.S. diplomats from 1970 to 2011 reveals that while U.S. alliances and foreign aid increase the likelihood of attacks against diplomats, U.S. military intervention and civil war, on the other hand, increase the risk of terrorism against non-diplomatic targets. This finding is relevant because it shows terrorist attacks against diplomats result from certain types of foreign policy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号