首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
Abstract

China has a strong interest in pursuing a smart power strategy towards Southeast Asia and has worked laboriously to engage with regional countries economically, socially, and politically. But China has been only partially successful in achieving its goals in the region. This paper argues that China’s security policy towards Southeast Asia significantly contradicts many other objectives that Beijing wishes to accomplish. Given the deep-seated, narrowly-defined national interests of the Chinese military in the South China Sea disputes, it is likely that the People’s Liberation Army (PLA) will continue to pose the main obstacle to the effective implementation of a Chinese smart strategy in Southeast Asia.  相似文献   

2.
ABSTRACT

France’s so-called exceptionalism in multilateral security policy is often explained with its Gaullist political culture. However, a closer look shows that Gaullism cannot easily capture different French policies, particularly toward NATO. To unearth what can explain policy variance, this paper asks the question of whether French political parties value NATO differently and, if so, to what effect? Looking at French governments from 1991 to 2014, I argue that political parties in France carry different values, which lead them to interpret NATO’s role for France’s security policy differently. As a result, French parties in power encouraged, delayed, or halted NATO institutional transformation at specific junctures. This argument builds on the insights of the study of ideational factors in IR and the study of party politics in Comparative Politics. Through an analysis of French governments’ policy preferences toward NATO, this paper stresses that institutional transformation can be understood through the study of veto points in conjunction with national preference formation.  相似文献   

3.
ABSTRACT

No issue deserves more scrutiny than the mechanisms whereby popular unrest unleashes civil wars. We argue that one institution – two-tiered security systems – is particularly pernicious in terms of the accompanying civil war risk. These systems’ defining characteristic is the juxtaposition of small communally stacked units that protect regimes from internal adversaries with larger regular armed forces that deter external opponents. These systems aggravate civil war risks because stacked security units lack the size to repress widespread dissent, but inhibit rapid regime change through coup d’état. Regular militaries, meanwhile, fracture when ordered to employ force against populations from which they were recruited.  相似文献   

4.
ABSTRACT

German security and defence policy has undergone substantial transformation. This transformation requires an unprecedented level of political leadership, suggesting that Germany needs to solve the dilemma of how to supply leadership to increasingly demanding partners. What are the conditions under which German leadership can unfold in security and defence policy? To what degree do German role-conceptions of international agency and role-expectations of German leadership coincide? What kind of leadership outputs are produced? This study offers a comprehensive analysis of German security and defence policy in terms of supply (role conceptions) and demand (role expectations). We outline three leadership role conceptions present in the German strategic debate, which we then assess in the context of the Wendtian theory of cultures of anarchy. We then analyse Berlin's leadership in terms of outputs via the case study on Anchor Army and the Framework Nations Concept. We conclude that while Germany has tried to match leadership role expectations both rhetorically and in action, Berlin's leadership inputs have so far been insufficient. This has led to an imbalance in terms of role conceptions and expectations hampering effective German leadership in security and defence policy.  相似文献   

5.
This article investigates how key actors within the US defence policy community realigned their interests to forge a new consensus on the redirection of US defence strategy following the ‘peace shock’ they faced with the collapse of bipolarity. This consensus centred on the idea that achieving US security in the ‘age of uncertainty’ demanded overwhelming US military power, which was widely interpreted as necessitating military capabilities to fight multiple major theatre wars simultaneously against regional ‘Third World’ adversaries. This helped to preserve many of the principal pillars of US Cold War defence policy through deflecting calls for more radical organisational changes and deeper cuts to defence budgets.  相似文献   

6.
Analysis of the failures of African security forces generally focuses on structural issues such as corruption of senior leadership, insufficient equipment and training, and coup d’état fears driving mistrust of armies that are too strong or effective. However, less examined is the role that sub-state identity plays; using Libya, South Sudan, and Mali as case studies, this paper examines how ethnicity inhibits the development of national armies, divides them, and exposes a critical flaw that adversaries are able to exploit. Given the increasingly ethnic nature of conflict throughout the world, and the rising threat that ethnic conflicts in Africa pose to regional and Western partners, it may be prudent for researchers, policymakers and other stakeholders to examine the critical role that sub-state identity plays in undermining African security forces.  相似文献   

7.
ABSTRACT

With the world’s ninth largest economy and comprising nearly 60% of South America’s GDP, 47% of its territory, and 49% of its population, Brazil has become a regional power and an important actor in world affairs over recent decades. This scenario has led the government to re-evaluate its role in the world order, resulting in the enactment of the National Defence Policy, whose objective was to consolidate the country as a regional power while at the same time addressing national security issues, promoting economic development through a series of defence programmes, restructuring the defence industrial base, fostering innovation through technology and knowledge transfer to Brazil, and indigenous research and development. However, the policy’s implementation suffers from several challenges discussed in this article, which may test the capability and competence of Brazilian policymakers, military, industrialists, and other individuals and organisations involved in its implementation.  相似文献   

8.
ABSTRACT

Cyber attack against Critical National Infrastructure is a developing capability in state arsenals. The onset of this new instrument in national security has implications for conflict thresholds and military ethics. To serve as a legitimate tool of policy, cyber attack must operate in accordance with moral concerns. To test the viability of cyber attack, this paper provides a new perspective on cyber ethics. Cyber attack is tested against the criteria of the common good. This involves identifying the four core components of the common good from a conflict perspective: respect for the person; social wellbeing; peace and security; and solidarity. The fate of these components is assessed in relation to the six key characteristics of cyber attack from a moral standpoint: security; the role or absence of violence; discrimination; proportionality; cyberharm; and the threshold of conflict. It is concluded that the common good must be incorporated into developing state cyber strategies.  相似文献   

9.
ABSTRACT

This article introduces the key tenets of French foreign and security policy during the Cold War, and illustrates the deep challenges to the French consensus raised by the emergence of a unipolar system. There is a growing gap between the rhetoric of French security policy, emphasizing ‘autonomy’ and ‘sovereignty’ out of habit from the Cold War, and the actual security practices showing a gradual embedding within the transatlantic security structures. In the absence of a new transpartisan grand narrative relevant for the contemporary international system, such embedding is easily portrayed in France as a ‘treason’ from a romanticized Gaullist foreign policy.  相似文献   

10.
India’s nuclear doctrine and posture has traditionally been shaped by minimum deterrence logic. This logic includes assumptions that possession of only a small retaliatory nuclear force generates sufficient deterrent effect against adversaries, and accordingly that development of limited nuclear warfighting concepts and platforms are unnecessary for national security. The recent emergence of Pakistan’s Nasr tactical nuclear missile platform has generated pressures on Indian minimum deterrence. This article analyzes Indian official and strategic elite responses to the Nasr challenge, including policy recommendations and attendant implications. It argues that India should continue to adhere to minimum deterrence, which serves as the most appropriate concept for Indian nuclear policy and best supports broader foreign and security policy objectives. However, the form through which Indian minimum deterrence is delivered must be rethought in light of this new stage of regional nuclear competition.  相似文献   

11.
Abstract

The mandate of South Africa's recently appointed National Planning Commission includes addressing ‘defence and security matters’. This article seeks to outline the central elements of the threat environment facing South Africa in the foreseeable future. It is argued that South Africa faces no meaningful existential threat from conventional military forces but that its security forces will need to be prepared to address possible raids and attacks by conventional military forces both on home soil and on vital interests beyond the nation's borders. Other threats highlighted include the threats posed by potential insurgencies, by terrorism, and by crime, social unrest and banditry. Also addressed is the danger of so-called hybrid threats, in which two or more of the single threat types outlined here are combined. Finally, the article challenges the National Planning Commission to rethink South Africa's policy on peace operations in the light of the need to ensure the safety and security of the nation's citizenry.  相似文献   

12.
ABSTRACT

This article examines decision-making mistakes made by U.S. President Nixon and national security advisor Kissinger during the 1971 India-Pakistan crisis and war. It shows that Nixon and Kissinger routinely demonstrated psychological biases that led them to overestimate the likelihood of West Pakistani victory against Bengali rebels as well as the importance of the crisis to broader U.S. policy. The evidence fails to support Nixon and Kissinger’s own framing of the 1971 crisis as a contest between cool-headed realpolitik and idealistic humanitarianism, and instead shows that Kissinger and Nixon’s policy decisions harmed their stated goals because of repeated decision-making errors.  相似文献   

13.

Thomas Schelling argues that armed adversaries face an inherent propensity toward peace or war embodied in their weaponry, geography and military organizations. Inherent propensity is the idea that there are characteristics embodied in the weapons that push adversaries toward peace or war, independent of the goals of the decision‐makers, the political disagreement between adversaries, and misperceptions about mutual resolve and hostility. We theoretically illustrate inherent propensity in conventional and nuclear arms settings using Lanchester and Intriligator war models. Our work extends the Intriligator‐Brito model, identifies when the competing Richardson and Intriligator‐Brito views of the relationship between arms races and war are correct, illustrates the stabilizing/destabilizing effects of alliances, and highlights the importance of arms quality control in the US‐USSR relationship.  相似文献   

14.
Although soft power is now seen as an indispensable foreign policy tool, its efficacy has rarely been put to a rigorous empirical test. Using data from HARMONIOUS MISSIONs 2010, 2011 and 2013, this article seeks to examine the degree to which the soft power engagement missions of the Chinese hospital ship, the Peace Ark, has advanced Chinese interests. Although any conclusions drawn must be considered preliminary, as so little time has passed between the ship's visits and the current analysis, this research indicates that these missions’ impact on advancing Chinese interests was at best limited. Although observations from a single set of cases are unlikely to settle the debate between soft power advocates and detractors, it is hoped that this research will serve as a catalyst to further empirically based research on this topic.  相似文献   

15.
ABSTRACT

From 1944 to 1973 Australia attempted to acquire atomic weaponry. This ambition was driven by the desire to contribute to defending British interests in Asia, fears of invasion by China, Indonesia, and Japan, great-power war, and the belief that nuclear weapons were merely bigger and better conventional weapons, that they would proliferate, and that US security assurances lacked credibility. Although the pursuit of the bomb was eventually abandoned, this was not the result of US assurances. Rather, geopolitical changes in Australia’s environment meant that a major attack on the continent was unlikely to occur outside the context of a confrontation between the US, China, and the Soviet Union. This article argues that Australia may soon have to rethink its policies towards US extended deterrence and instead focus on developing its own deterrent.  相似文献   

16.

Perceptions of Third World nations as susceptible to communist subversion and revolutionary warfare led the Eisenhower administration to formulate a coordinated internal security strategy known simply as ‘1290d’. Later renamed the Overseas Internal Security Program (OISP), this policy initiative sought to strengthen host‐nation security forces, judicial systems, and public information media in an effort to combat indirect communist intervention strategies. Implementing OISP policy in Latin America proved difficult. In Congress, the administration was criticised for colluding with dictatorial regimes, while Latin Americans feared that the new program would be used as a ‘Trojan Horse’ to penetrate their security structures. After the Cuban Revolution, however, OISP policies developed under Eisenhower came to dominate US‐Latin American security relations for the remainder of the Cold War.  相似文献   

17.

New Zealand's current defence strategy, first expressed in NZ Government (1991), is one of "self-reliance in partnership". We outline the country's defence policy in historical context, examine its current defence expenditure and capabilities, and document the genesis of recent major changes in security policy. We pay particular attention to the role of explicit economic analysis and advice in the formation of these policy changes.  相似文献   

18.

The impact of defence expenditure on the economy has been widely studied through different types of models. However, the results from these studies have not reached definitive conclusions, and have left a gap in the analysis of the impact of defence R&D expenditure at the economy level. Defence R&D has specific characteristics, which lead to market failures: public good, high risk and uncertainty, national security. Also, defence R&D creates two types of externalities: negative (crowding-out), and positive (spin-off). Crowding-out is the major economic debate about defence R&D. This paper analyses the crowding-out hypothesis by applying three types of models for the UK case: supply, demand, and demand-supply models. From these three models the most reliable is chosen and applied to the individual cases of France, Germany, Japan and USA. The paper also reports the results for the pooled data of these five countries, and for four error component models. The results from estimating such models shed light on the defence R&D crowding-out hypothesis.  相似文献   

19.
随着互联网对现实世界的影响越来越大,战略地位越来越突出,获得网络主导权、占据网络制高点成为各国竞相努力的目标。美国在全球网络管理、网络技术、网络文化、网络军事等方面处于霸主地位。美国网络霸权对中国的政治安全、信息安全、文化安全、军事安全造成了极大的威胁。中国应综合采取各种措施,应对美国网络霸权的冲击和挑战,维护国家安全和利益。  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号