首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 468 毫秒
1.

Using a data set of historical battles from 1600 to 1973, this paper analyzes the empirical determinants of tactical success in modern war. Based on a reduced form approach we consider key elements of military theory as production factors for combat success as an output of a military production function. The paper focuses on the relationship of material and non-material factors to battlefield success, and especially on the role of superior force strengths. Contrary to the emphasis on technology which can be found in the recent literature, our estimation results indicate that numerical superiority has retained its crucial role for battlefield performance throughout history. In general, human elements of warfare, like leadership, morale and surprise, have continued to be important determinants of battle outcome despite technological progress in weapons.  相似文献   

2.
The state of the German Army’s morale in 1918 is central to our understanding not only of the outcome of World War I, but also of the German Revolution and, indeed, through the pernicious ‘stab-in-the-back-myth’, on Weimar politics and the rise of the Nazis, too. This article presents new evidence from the German archives, blended with statistical analysis, to show that the morale of some units held up better than previously thought almost to the end, and thus to suggest three things. First, it proposes that some historians have placed too much reliance on English-language sources alone, such as British Army intelligence reports, which have various flaws as evidence. Second, it argues that, while historians have increasingly moved away from generalisations about German morale, this process has further to run. Third, it suggests that no single tipping point can be identified, and that morale alone does not provide a sufficient explanation for battlefield defeat. Indeed, much of the data can only be explained if the tactical realities of the war in late 1918 are clearly understood.  相似文献   

3.
《Arms and Armour》2013,10(2):127-148
Abstract

This study is intended to shed some light on a number of issues relating to the famous Aztec weapon called the macuahuitl. This well-known artefact still presents many problems of interpretation, resulting in a polemic that still rages regarding its origin, spatial-temporal distribution and its real role in Mesoamerican cultural development. The subject of warfare in Mesoamerica is still one of the main areas of investigation for many researchers. However, it is common for researchers to analyze the military phenomenon from a completely symbolic standpoint and overlook the practical aspects such as military tactics, weapons systems and battlefield successes. It is against this background that I have developed a programme of investigation that I have called the Research Programme into Military Equipment in Mesoamerica, which considers the phenomenon of war throughout Mesoamerica from various perspectives. I have initially focused this programme on weapons systems among the Mexicas as they relate to the battlefield.  相似文献   

4.
ABSTRACT

While the drone has become synonymous with the War on Terror, the asymmetric iconography of the battlefield is shifting. Commercially available off-the-shelf (COTS) drones are increasingly prevalent features of global battlefields, employed by non-state actors in both visualising such spaces, and the directing and inflicting of harm. As such usage increases, so too do concerns around their evolving adoption, adaptation, and potential portability into homeland spheres. While cognizant of the range of positive drone applications, it is asserted that drones nonetheless remain simultaneously bound to an inverse potential for exploitation. In examining drone risk, this article approaches the consumer drone through a series of sites and spaces through which it is technically and socially constructed. Reflecting upon industry innovation, community-driven experimentation, and evolving airspace – it calls for greater attention to the drone’s malleability, arguing that understandings of COTS drones must remain attentive to both drone potential and potential drone threat.  相似文献   

5.
Abstract

This article answers three questions: What is the nature of the Long War? How is progress (or lack thereof) to be assessed? Where is it likely to go next? An appreciation of Clausewitz shows that practical centers of gravity exist for the Long War, and that the conflict pivots upon the ability to persuasively link ideology to events via a strategic narrative. A close examination of an illustrative case study, the interaction between the US and the late Abu Musab al-Zarqawi in Iraq 2004 – 2006, shows that Al Qaeda has suffered a severe setback, but also that the nature of the war is set to shift yet again. Further tangible progress for the US requires waging the Long War as a global counterinsurgency based on a strategy of ‘selective identification’ (versus pure ‘disaggregation’) as well as an understanding of how to more effectively craft a strategic narrative.  相似文献   

6.
对士气内涵的揭示,一直是个见仁见智的问题。对军队士气的研究应当从外延着手分析,确定真正符合士气本质属性的取舍标准。文章着重澄清以下几个问题:是士气的影响因素还是士气本身;士气能否被科学地测量;士气是否具有跨情境的稳定性;士气能否对战斗力构成影响。  相似文献   

7.
Abstract

How do warlords build their legitimacy and eventually exert authority? The case of Afghan leader Ahmad Shah Massoud demonstrates that warlords do not only build legitimacy through the internal provision of goods and services to the population under their control, but also build their legitimacy by projecting authority externally, through the development of their own form of diplomacy. In this article, I show that warlords develop complex and complementary legitimisation strategies that extend beyond their territorial realms to include consequential relationships with foreign actors.  相似文献   

8.
ABSTRACT

This paper evaluates Boko Haram’s military capabilities and details the process of how its standing army, driven by these capabilities, came to pose a phased threat between 2013 and 2015 in particular. This was a period when military fighting dominated the insurgency in north-east Nigeria. Whereas there is an abundance of literature on Boko Haram’s histories and the impact of its insurgency on north-east Nigeria, analysis of Boko Haram’s military campaigning is still deficient. Attempting to fill this gap, this paper uses field findings and battlefield case studies from north-east Nigeria to highlight how Boko Haram’s overt front – its standing army – came to supplant its guerrilla operations as the main security threat to the frontier area.

This pivot towards military fighting, for a group initially composed of a few ragtag combatants, on the surface might seem surprising. Yet, whereas Boko Haram may lack the popular support required for ‘people’s war’, classic insurgency theories nevertheless hold some explanatory power for this deliberate shift: away from guerrilla warfare as the expedient of the weaker side, and towards the use of a large standing army of locals to swarm, and sometimes successfully overrun, state forces.  相似文献   

9.
分析了现有战场目标识别技术存在的问题,提出了基于数据挖掘的战场目标综合识别总体框架,对目标识别知识表示、目标特征知识挖掘、作战模式知识挖掘以及目标综合识别智能化推理等关键技术进行了研究,并说明了各关键技术在战场目标识别中的应用示例,可为提高战场目标识别的自动化、智能化水平提供借鉴。  相似文献   

10.
Abstract

What are the consequences of military strikes against nuclear facilities? In particular, do they ‘work’ by delaying the target states ability to build the bomb? This article addresses these questions by conducting an analysis of 16 attacks against nuclear facilities from 1942 to 2007. We analyze strikes that occurred during peacetime and raids that took place in the context of an ongoing interstate war. The findings indicate that strikes are neither as uniformly fruitless as the skeptics would suggest, nor as productive as advocates have claimed. There is evidence that the peacetime attacks delayed the target's nuclear program, although the size of this effect is rather modest. The wartime cases were less successful, as attacks often missed their targets either due to operational failure or limited intelligence on the location of critical targets. In our concluding section we show that many of the conditions that were conducive to past success are not present in the contemporary Iran case. Overall, our findings reveal an interesting paradox. The historical cases that have successfully delayed proliferation are those when the attacking state struck well before a nuclear threat was imminent. Yet, this also happens to be when strikes are the least legitimate under international law, meaning that attacking under these conditions is most likely to elicit international censure.  相似文献   

11.
为深入研究信息化战场信息安全保障,提高保障效能,利用OODA环理论对信息化战场信息安全保障过程进行了分析与研究,明确了观察、判断、决策和行动每个阶段的任务与事件,并运用系统动力学方法对基于OODA环的信息化战场信息安全保障过程进行建模分析和模拟仿真,仿真结果表明随着时间推移,保障方得到的信息增多,判断和决策的正确率也随之增加,OODA环周期开始减小,保障效能随之大幅提升。研究结果对于提升信息化战场信息安全保障效能具有一定的参考价值。  相似文献   

12.
ABSTRACT

What do we mean by nuclear proliferation? What does it mean to proliferate? This article investigates both the literal and figurative meaning of the term “proliferation.” It argues that many of the definitions and conceptualizations of nuclear proliferation often used by scholars are either limited in their utility or logically inconsistent. It then reconceptualizes and redefines the term, incorporating an understanding of both its etymological origins and the geopolitical context in which the phenomenon occurs. It concludes by exploring the potential impact that the politicization of the phenomenon may have on the identification of occurrences of proliferation, from both an academic and a policy-making perspective.  相似文献   

13.
ABSTRACT

South Africa's nuclear disarmament is a unique historical case, notable in part for the dramatic shift from deception to cooperation. The unprecedented transparency it demonstrated in order to convince the international community of the veracity of their disarmament is heralded as an exemplar for verifiable denuclearization. Less known is how this case affords insights into how a nuclear weapon program can be clandestinely hidden by the ambiguity provided by an otherwise completely legitimate, peaceful, nuclear energy program. Using a variety of open sources, including newly declassified internal South African and US government reports, it can be shown that South Africa employed a variety of deceptive tactics before it disarmed, and even for nearly two years after becoming a signatory to the Treaty on the Non-Proliferation of Nuclear Weapons. This article reviews that information to derive instructive lessons on the lengths that a nuclear proliferant state might go to conceal its true capabilities and intentions, and to thwart international discovery of the existence and full extent of an existing—or, in this case, a former—nuclear weapon program.  相似文献   

14.
Abstract

The war on al-Qaeda and its affiliates appears to be endless but every war must end. Winding down the conflicts in Afghanistan and Iraq has been difficult, but both were embedded in what was then called the ‘war on terrorism.’ What does ‘success’ in that war mean? With the death of bin Laden and the increase in drone operations, how far is the US from achieving it? Can this war end? The article analyzes the ongoing US response to the 9/11 attacks in historical context, revealing four patterns common to all prolonged wars: means become ends, tactics become strategy, boundaries are blurred, and the search for a perfect peace replaces reality. It concludes by laying out an effective strategy for ending the war.  相似文献   

15.
ABSTRACT

This article explores the paradox of trust in the largest nuclear smuggling operation involving highly enriched uranium (HEU) discussed in open source literature. In the first effort to understand the type, extent, and role of trust in nuclear smuggling enterprises, it draws from literature on trust development in legitimate businesses as well as criminal enterprises. Observed behavioral patterns in this case challenge traditional notions of the internal dynamics of temporary groups engaged in nuclear smuggling and operational realities of such activities. The article seeks to explain why individuals agree (and continue) to operate in this high-risk environment, unbound by close personal ties, without any effort to verify the background, motives, or qualifications of the fellow conspirators. It offers ways to advance current nonproliferation efforts in non-state actor interdiction by exploiting the environment of shallow trust in temporary groups.  相似文献   

16.

Given the challenges posed by failed and failing states, and the likelihood that such failure will continue well into the new millennium, the need for a strategic approach appears evident. Should we respond? If so, how and with what expectations? Answers to such questions require an underlying set of strategic guidelines. This article contributes to developing that strategy by examining common manifestations of state failure and some possible response objectives. It concludes by arguing that careful and tough analysis must guide our choices about where and when to respond, and how ambitiously we set our objectives.  相似文献   

17.
Total war     
Abstract

This article reviews the five volume series, published by Cambridge University Press, on the history of total war from the American Civil War and Wars of German Unification to World War II. The discussion focuses on two questions: how to define total war; and is total war a useful conceptual tool for understanding warfare during this period? Although the editors were unable to come up with a definition of total war, they did identify elements or tendencies that together contributed to the growing totalization of war during the nineteenth and especially twentieth centuries. Regarding the second question, the editors suggest that total war is best thought of as an ideal type, one to which reality can approach but never reach. If this use of total war facilitates comparison between wars (and different aspects of one war) by providing a common standard, it leaves open the question of how to undertake such a comparison.  相似文献   

18.
ABSTRACT

Nuclear assets are one of the cornerstones of credible collective deterrence of the North Atlantic Treaty Organisation. Paradoxically, the most endangered member states are the ones without nuclear capabilities, left with the hope and expectation that the owners of nuclear assets will defend them and that their potential enemies are deterred by these capabilities. However, the expectations from one side, practical commitment of allies from other side may not go in harmony and synchronisation. Is there a capability gap which needs to be fulfilled? If yes then, is the gap in the side of nuclear powers or is it on the side of those endangered states who need to understand what can or cannot realistically be expected? The current article focuses on the question of how the political and military elite of the Baltic states describes their expectations in terms of using Alliance's nuclear capabilities to deter Russia's regional ambitions.  相似文献   

19.
ABSTRACT

Is Currency Warfare defined as, the use of monetary or military force directed against an enemy’s monetary power as part of a military campaign, a just way to fight a war? This article explores the ethics of waging currency warfare against the Just War Tradition’s principles of jus in bello (just conduct in war) and its criteria of discrimination and proportionality. The central argument is that currency warfare is inherently indiscriminate but may be proportionate when policy makers consider the nature of the threat confronted and the targeted currency's level of internationalization, that is, to what degree it is used in foreign transactions or used as a foreign currency reserve. I evaluate this argument against historical cases during the Second World War (1939–1945), the Gulf War (1990–1991), subsequent operations against Saddam Hussein in the early 1990s, and the ongoing campaign against ISIS.  相似文献   

20.
ABSTRACT

The article argues that current conceptual approaches in civil-military relations are deeply flawed resulting in its irrelevance in analyzing major issues including war and the collapse of democracy. After highlighting major flaws in the work of the late Samuel Huntington and those who follow his approach, the article argues that other conceptual approaches, including Security Sector Reform, are also flawed, or in the case of the “military effectiveness” literature, largely irrelevant. In explaining the main causes of the flawed conceptual literature, the article highlights the absence of good data and challenges in methodology. While arguing that military forces are very unlikely to engage in armed combat, it highlights the roles and missions which in the world today are implanted by these forces. As it is virtually impossible to prove effectiveness of the armed forces in these roles and missions, the article proposes a conceptual approach based on requirements.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号