首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
My aim in this paper is to reflect on a very narrow question: under what conditions might a cyber-attack provide a just cause for war? I begin by articulating what makes for a just cause, briefly address the problem of attribution, and then discuss three broad categories of cyber-attack: those that clearly do not satisfy the just cause requirement, those that clearly do satisfy the just cause requirement, and three ambiguous cases – the destruction of property, the emplacement of logic bombs, and the failure to prevent cyber-attacks. My conclusions are exploratory and suggestive rather than definitive, partly by virtue of the extreme paucity of literature on the moral assessment of cyberwar.  相似文献   

2.
Case summary, by James Cook (Case Study Editor):

In the final issue of the 2015 volume of the Journal of Military Ethics, we published a case study entitled “Coining an Ethical Dilemma: The Impunity of Afghanistan’s Indigenous Security Forces”, written by Paul Lushenko. The study detailed two extra-judicial killings (EJKs) by Afghan National Police (ANP) personnel in an area stabilized and overseen by a US-led Combined Task Force (CTF). To deter further EJKs following the first incident, the CTF’s commander reported the incidents up his chain of command and used the limited tools at his disposal to influence local indigenous officials directly. Apparently, the ANP unit took no notice. In his commentary on the case study, Paul Robinson considered moral compromise in war more generally. Coalition troops in Afghanistan, for instance, have encountered not just EJKs but also sexual abuse of minors, killing of non-combatants, kidnapping, torture, and widespread corruption. What should the soldier on the ground do if indigenous personnel violate Laws of Armed Conflict (LOAC) with impunity? Refusing to serve will not right or prevent moral wrongs, while staying on to fight the good but futile fight will mire the soldier in moral compromise. “?… [S]oldiers faced with this dilemma have no good options. The systemic failings surrounding them mean that it is probable that nothing they do will help”. In a concluding note, I suggested that while an individual soldier may indeed have no good options, as Paul Robinson suggests, that soldier’s military and nation at large are obliged to do what they can. At least, they must keep to the moral high ground so as not to give indigenous security forces an excuse to misbehave, and determine the nature of crimes such as EJKs: are they outlaw acts or in fact endorsed by the indigenous culture and perhaps even government? Below Colonel Dave Barnes, himself a veteran of Operation Enduring Freedom, analyzes Paul Lushenko’s case study at “?…?the local, tactical level: If a commander is in this situation – where her unit witnesses an EJK or other war crime – what should she do?”  相似文献   

3.
ABSTRACT

International efforts to hold the government of President Bashar al-Assad accountable for the use of chemical weapons in the Syrian Civil War have entered a new phase. For the first time, the Organisation for the Prohibition of Chemical Weapons (OPCW), the international organization responsible for implementing the 1993 Chemical Weapons Convention, has been empowered to identify the perpetrators of chemical attacks in Syria. The Investigation and Identification Team (IIT), which was formed to conduct the OPCW’s new attribution mission, has announced its intention to investigate and identify the perpetrators of nine chemical attacks in Syria, including the April 7, 2018, attack in Douma. This article reviews recent efforts to attribute chemical attacks in Syria, describes what we know about the nine incidents to be investigated, summarizes what is known about the Syrian government officials, military commanders, and chemical-warfare scientists suspected of being responsible for these attacks, discusses what to expect during the next phase of the attribution process, and offers insights into how the international community can move beyond attribution to accountability. Accountability is necessary to provide justice for victims and to prevent future incidents by demonstrating that perpetrators of chemical attacks will be identified and punished.  相似文献   

4.
With the words quoted above, the new Secretary of State for Defence in the Thatcher government revealed for the first time the existence of a project that have remained a closely guarded secret, even from amny Cabinet members of four governments, since the late 1960s. Despite the passage of more thatn 20 years since Mr Pym's announcement, the story of the Chevaline project still remains largely unknown outside a small group of select politicians, officials and scientists. This article sets out to use recently declassified documents and what is in the public domain to tell the story of Chevaline from the secret debates about the need to improve Britain's Polaris deterrent force shortly after it was deployed in the late 1960s to the official announcement of the project in 1980 and its eventual operational deployment in 1982. In particular, attention is focused on three main questions: Why was the project kept secret for so long? Why did the improvement programme take so long to come to fruition? Why, given the spiralling costs involved, was it not cancelled? In order to consider these questions relating to what Pym described as ‘the front end’ of the Poaris missile, it is necessary to begin by looking at the background to the project.  相似文献   

5.
Introduction     
ABSTRACT

The new nuclear history can make a critical contribution by forcing us to reconsider or reframe the theoretical premises of the concepts we apply to our understanding of the present – and with which we try to navigate the future. It bears on fundamental questions, such as: How should the US manage its alliances? Should it establish a multilateral nuclear policy dialogue in Asia? In what depth should it discuss issues of doctrine and targeting with its Asian allies? What capabilities might reassure European allies in light of current Russian revisionism? Could nuclear war be limited and controlled in an East Asian maritime arena? Do nuclear weapons strengthen an alliance, or do they introduce a divisive bone of contention? Is extended nuclear deterrence (END) stabilizing or is it on the contrary pushing the allies to ask for more? What is the relationship between nuclear and conventional forces in END credibility? How do nuclear alliances contribute to international security and international order? The lessons and insights from these papers, which look at five historical cases of US extended deterrence during the Cold War, should help us think about crucial current issues, and be of use both to historians who want to have a better understanding of the Cold War past and to policymakers who are currently grappling with these issues.  相似文献   

6.
This analytical article asks the question: to what degree did the media contribute to the Rwandan genocide and what might have been done about it? In examining the historical development of mass media in Rwanda, this paper argues that while hate media clearly contributed to the dynamics that led to genocide, its role should not be overstated. While it is commonly believed that hate media was a major cause of the genocide, instead it was a part of a larger social process. The use of violent discourse was at least as important as, for example, the availability of weapons in carrying out the genocide. Put another way, violent discourse was necessary but not sufficient by itself to cause the genocide of 1994. In arguing this thesis, Rwandan history is examined to demonstrate the processes of communication in the formation of destructive attitudes and behaviour. Next, analysis of the methods and content of propaganda campaigns is discussed. Finally, an overview of the requirements and organizations for third parties to conduct international communication interventions is presented in the last section.  相似文献   

7.
We investigate the problem of scheduling a fleet of vehicles to visit the customers located on a path to minimize some regular function of the visiting times of the customers. For the single‐vehicle problem, we prove that it is pseudopolynomially solvable for any minsum objective and polynomially solvable for any minmax objective. Also, we establish the NP‐hardness of minimizing the weighted number of tardy customers and the total weighted tardiness, and present polynomial algorithms for their special cases with a common due date. For the multivehicle problem involving n customers, we show that an optimal solution can be found by solving or O(n) single‐vehicle problems. © 2013 Wiley Periodicals, Inc. Naval Research Logistics 61: 34–43, 2014  相似文献   

8.
归因理论对英语教学的启示   总被引:1,自引:0,他引:1  
本文通过对归因理论的阐述和对学生学业状况的归因倾向分析,提出了归因理论对英语教学的启示:一要关注学生的归因反应;二要研究学生的归因倾向,引导学生正确归因;三要重视培养学生的情感智力和认知技能;四要对教师自身的教学工作进行正确的归因。  相似文献   

9.
In this paper, I critically analyse the doctrine of the Responsibility to Protect (RtoP), as it relates to the responsibility of intervening forces towards the people they claim to protect and the challenges that the situation in Libya now poses in the region and for the African Union (AU). I focus most of my attention on the coercive elements of the RtoP framework (Pillar III). This is the most contested element in the framework. Three questions guide this article: were there legitimate grounds to justify an external intervention in Libya? In the words of Hugh Roberts in Who Said Gaddafi Had to Go, ‘[w]hat if anything has Libya got in exchange for all the death and destruction that have been visited on it’ since 2011? What are the practical implications and consequences of the North Atlantic Treaty Organization (NATO) intervention, led by the United States (US), for regional peace? I discuss the problems surrounding the US–NATO intervention, followed by an analysis of the various positions and narratives leading up to the intervention, the framing and justifications provided for the intervention, and an analysis of the AU's proposal for the resolution of the Libyan crisis. I analyse the various debates that took place in the US (Pentagon/White House), at the United Nations, among scholars in the West and in Africa, and among various actors who tried to broker a ceasefire in Libya before and during the intervention. I conclude with a discussion of the implications for regional peace.  相似文献   

10.
Abstract

The war on al-Qaeda and its affiliates appears to be endless but every war must end. Winding down the conflicts in Afghanistan and Iraq has been difficult, but both were embedded in what was then called the ‘war on terrorism.’ What does ‘success’ in that war mean? With the death of bin Laden and the increase in drone operations, how far is the US from achieving it? Can this war end? The article analyzes the ongoing US response to the 9/11 attacks in historical context, revealing four patterns common to all prolonged wars: means become ends, tactics become strategy, boundaries are blurred, and the search for a perfect peace replaces reality. It concludes by laying out an effective strategy for ending the war.  相似文献   

11.
Theorizing about Taliban operations in Afghanistan has its limits and it is possible that Kabul-centric strategies do not adequately address the unique circumstances of each region in the country. How exactly has the Taliban gone about attaining its objectives in Kandahar province and how have those approaches evolved since 2002? And how have the Taliban adapted to coalition forces' attempts to compete with the insurgency and stamp it out? The answers to these questions are critical in the formulation of any counterinsurgency approach to Afghanistan.  相似文献   

12.
Radicalism or radicalisation has become a serious political and academic theme in recent years and any incident involving Muslims now almost automatically acquires the cachet, as events in 2016 and 2017 have shown. However, despite vast sums and resources expended on the subject no one can define what they mean by ‘it’. This should make us pause and question what precisely it is that causes so much alarm and is it worth the resources, time and effort employed to respond to it?  相似文献   

13.
This article describes the Distributed Interaction Campaign Model (DICM), an exploratory campaign analysis tool and asset allocation decision‐aid for managing geographically distributed and swarming naval and air forces. The model is capable of fast operation, while accounting for uncertainty in an opponent's plan. It is intended for use by commanders and analysts who have limited time for model runs, or a finite budget. The model is purpose‐built for the Pentagon's Office of Net Assessment, and supports analysis of the following questions: What happens when swarms of geographically distributed naval and air forces engage each other and what are the key elements of the opponents’ force to attack? Are there changes to force structure that make a force more effective, and what impacts will disruptions in enemy command and control and wide‐area surveillance have? Which insights are to be gained by fast exploratory mathematical/computational campaign analysis to augment and replace expensive and time‐consuming simulations? An illustrative example of model use is described in a simple test scenario. © 2016 Wiley Periodicals, Inc. Naval Research Logistics 63: 562–576, 2016  相似文献   

14.
This paper revisits the controversy over the cancellation of the US Skybolt air-launched ballistic missile in 1962. Cancellation provoked an acute crisis in Anglo-US relations, which historians and political scientists on both sides of the Atlantic have generally sought to explain in terms of mis-communication. This approach may be termed the 'muddle' thesis. Other analysts have been more suspicious of British intentions and tactics in the run-up to cancellation - the 'mischief' thesis. In order to assess these interpretations, the paper poses three questions. First, were the British fully informed about what was likely to happen, or just selective listeners to Washington opinion? Second, had the British government really staked its hopes unequivocally on Skybolt, or was it from the outset hedging its bets? And third, how were alternatives to Skybolt evaluated? The flows of information between Washington and London are examined to establish what was known, when, and what other choices were open to the British government.  相似文献   

15.
The last decade has seen several advances in the study of deterrence. These advances have sparked some strong disagreements regarding interpretation of the models and what their contributions signify. This paper appraises the discussions from a model theoretic perspective. It is argued that when comparing rivalling models three aspects; (i) target, (ii) criteria and (iii) type of purpose should be taken into account in order to make a proper appraisal. Informed by these aspects it is evident that the three deterrence models analysed address different aspects, in different ways and to different ends. From this perspective, the so-called Perfect Deterrence model must be recognised as a clear advancement in the research field. Model comparison will always be context relative and a plurality of models should be viewed favourably.  相似文献   

16.
The Persistent Military Security Dilemma between China and India   总被引:1,自引:0,他引:1  
This paper evaluates to what extent the improving Sino-Indian relations coincide with a mitigation of military threat perceptions. A critical review of the demilitarisation of the border, the military strategies with respect to the Indian Ocean and nuclear arms programmes, reveals that the two countries are still locked in a military security dilemma. Distrust still results in military balancing. The outcome is a complex and multi-level military balance of power that might not bring about peace but enhances stability.  相似文献   

17.
A defender wants to detect as quickly as possible whether some attacker is secretly conducting a project that could harm the defender. Security services, for example, need to expose a terrorist plot in time to prevent it. The attacker, in turn, schedules his activities so as to remain undiscovered as long as possible. One pressing question for the defender is: which of the project's activities to focus intelligence efforts on? We model the situation as a zero‐sum game, establish that a late‐start schedule defines a dominant attacker strategy, and describe a dynamic program that yields a Nash equilibrium for the zero‐sum game. Through an innovative use of cooperative game theory, we measure the harm reduction thanks to each activity's intelligence effort, obtain insight into what makes intelligence effort more effective, and show how to identify opportunities for further harm reduction. We use a detailed example of a nuclear weapons development project to demonstrate how a careful trade‐off between time and ease of detection can reduce the harm significantly.  相似文献   

18.
This article analyses the political relationship between Ethiopia and Egypt. It aims to provide an analytical framework to unpack this complex relationship and assess the impacts that the Nile River has on the nature of this relationship. It further identifies geopolitical factors determining the impacts of the Nile River on frameworks of actions and political opportunity structures in which political actors operate. Accordingly, the different combinations of these determinants lead to the formation of political actors and ensuing actions that can fuel conflict, sustain the status quo or build peace. The article seeks to provide tentative answers to the following questions: what can be done or what mechanisms might be used to reduce the risk of conflict? What parties should participate and what will be their roles? And how can modern technology and science contribute to a possible solution?  相似文献   

19.
Book reviews     
Jurgen Brauer's comment presents what he calls a replication of an earlier study by Higgs and Kilduff (1993) and uses it to criticize the adequacy of the Higgs‐Kilduff model. In several respects, however, Brauer has not actually performed a replication: he uses different data, a different sample period, and arrives at different results. His criticisms rest on his own setup, not that of Higgs and Kilduff. Therefore they have no strict applicability to the latter. Moreover, Brauer's stepwise model has no bearing on the Higgs‐Kilduff model, as it violates that model's specification requirements.  相似文献   

20.
ABSTRACT

The recent rise in the defence budgets among the NATO members reawakens the free-riding dilemma. This article provides an analysis of the defence spending of two new member states, the Czech Republic and Lithuania. Based on the free-riding theory, we explain why some of the new NATO members decide to increase their defence budgets (Lithuania), and others do not (Czech Republic). In contrast to the majority of works which focus either on the US as the biggest spender or on the “old” members of the Alliance, we explain under what circumstances some of the small European states who became new NATO members started to increase their defence budgets even though they do not have to, and the literature suggests that free-riding is easier. In the process, we identify three crucial factors that in?uence the decision-making process in this regard: the level of threat perception, economic situation, and the US pressure.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号