首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 98 毫秒
1.
ABSTRACT

The United States’ global strategic outlook has shifted markedly since the end of major combat operations in Iraq and Afghanistan. As the United States’ strategic posture shifts, the nature of military operations is simultaneously changing rapidly. Many analysts predict that cyber-operations, autonomous weapons systems, artificial intelligence, and clandestine special forces operations will be central features in future conflicts. Although often overlooked by scholars and policy analysts, defence contractors are integral to the development and implementation of these emerging categories of warfare. This inquiry examines the evolving nature of the American defence industry and the roles corporations play in current theatres of conflict. Surprisingly, rather than becoming less reliant on defence contractors after their much-maligned performance in the wars in Iraq and Afghanistan, American military and intelligence agencies have become more dependent on the private sector as technology becomes increasingly central to warfare.  相似文献   

2.
Abstract

The United States Africa Command (AFRICOM) has been a military success but a strategic messaging failure. The United States’ relationships across Africa cannot be boiled down to military affairs. This paper argues that Africa has many more opportunities than challenges and thus requires a more balanced foreign policy solution from Washington DC than a new military command. For the military engagement that does need to take place, a more low-profile approach would benefit the United States in Africa.  相似文献   

3.
开展维和行动是实现联合国宗旨和维护世界安全与稳定的重要手段。作为联合国安理会五大常任理事国之一,美国是联合国完成维和任务不可或缺的,甚至具有决定性作用的国家。冷战时期美国的非洲维和行动在争吵和小心翼翼中进行,冷战后美国的非洲维和战略经历了积极主动向有选择地介入转变的过程,当前美国的非洲维和行动则是在崇尚自主的前提下推广美国特色的维和,以期最大限度地彰显美国实力、维护美国核心利益。审视美国非洲维和战略的演变,汲取足够的经验教训,有利于更好地根据世情和国情定位中国未来的维和战略。  相似文献   

4.
Some U.S. military leaders have asserted that the United States, Japan, Australia, and India and the Republic of Korea are developing multilateral defense cooperation to deter aggression and uphold norms much like North Atlantic Treaty Organization (NATO) has in Europe. Frequent military exercises and China’s threats to freedom of navigation (FoN) and North Korea’s nuclear missiles comprise the motive force for such cooperation. However, cooperation thus far has been trilateral and minimal, given divergent national interests and dispersed geopolitical locations. Cooperation among Japan, Republic of Korea (ROK), and the United States is increasing given the threat, but ROK’s public opinion is divided about Japan. Australia, Japan, and India have increased cooperation with the United States but are reluctant to conduct FoN operations with the United States to challenge China’s expansionism in the South China Sea. If China becomes more aggressive and blocks FoN or seizes territory, development toward an Asian NATO is possible.  相似文献   

5.
South Korea is threatened by its troubled relationship with North Korea. North Korea possesses a large cache of missiles as well as chemical and biological weapons, and the future potential to mount nuclear weapons on its missiles. The United States is also challenged because of its defense commitments to Seoul. As a countermeasure, the United States and South Korea decided to deploy Terminal High Altitude Area Defense (THAAD) missile defenses in South Korea. However, China has objected. Chinese scholars believe the THAAD radar would be able to track Chinese inter-continental ballistic missiles, thereby weakening their deterrent. A technical analysis does not support this assertion. However, it is vital for South Korea, given its proximity and economic interdependence, to reassure China. South Korea should highlight that THAAD will be deployed by the United States Forces Korea and is not a commitment by Seoul to become part of U.S.-led missile defenses in the Asia-Pacific.  相似文献   

6.
A key organizational challenge for all modern militaries is instituting an effective command-and-control (C2) structure for joint operations. China has been a relative latecomer to joint operations, with a persistent weakness in joint C2. Reforms launched in early 2016 sought to overcome this challenge by establishing a permanent two-level joint C2 structure. Although not a ‘tipping point’ that will lead ineluctably to stronger operational effectiveness, this reform is nonetheless an important milestone in an evolutionary process towards better PLA joint operations. The result could be added operational challenges for several of China’s neighbors and the United States.  相似文献   

7.
房苏杭  姬洪涛 《国防科技》2017,38(1):023-027
美国十分重视地下空间的作战运用,已建成了一批先进的地下指挥防护工程体系与军民结合的地下工程。美国地下空间的作战运用较晚,但发展较快,一些重要城市地下空间的大规模开发与利用,为战时地下空间的作战运用奠定了物质基础。文章研究了美具有代表性的战略指挥防护工程,深入分析美国地下空间的运用特点和发展趋势,对我国地下空间利用具有一定的借鉴意义。  相似文献   

8.
We review the operations research/management science literature on data-driven methods in retail operations. This line of work has grown rapidly in recent years, thanks to the availability of high-quality data, improvements in computing hardware, and parallel developments in machine learning methodologies. We survey state-of-the-art studies in three core aspects of retail operations—assortment optimization, order fulfillment, and inventory management. We then conclude the paper by pointing out some interesting future research possibilities for our community.  相似文献   

9.
Africa is arguably the most important regional setting for United Nations peacekeeping challenges. In the 1990s, extensive efforts have been made by the United Nations in the fleld of peacekeeping with the speciflc aim of reducing the levels of conflicts on the continent. Another significant development relates to the fact that organisations in Africa have started to feature as important peacekeeping instruments in recent years as it is increasingly being accepted that there is a need for such institutions to take care of their own security requirements. However, a key issue at stake is the need to achieve greater consistency with regard to third-party intervention in African conflicts. A look at the more glaring examples of multinational operations in the name of peace and security gives a sense of the magnitude and difficulties often experienced during such endeavours. In addition, both past and current operations have brought to light certain perspectives and lessons that require careful analysis and study. In this article, an overview is given of some of the perils and challenges associated with multinational operations in the realm of peace and security. Specifically, the focus is on Africa and on key issues and challenges regarding the strategic and operational management of such operations in view of the need to consider a more integrated approach towards multinational operations in support of peace and security in Africa.  相似文献   

10.
蔡华悦  未志元 《国防科技》2017,38(5):007-011
世界主要军事力量认识到人工智能这一新科技的影响力,并积极置身于这一新的发展机遇。文章从公开的报道的信息来源,整理分析中、美、俄、以四国的军事人工智能发展现状。研究表明,人工智能技术作为当今科技热点,正在以前所未有的方式影响我们生活的方方面面,也深刻的改变着军事领域的作战方式、作战理论。  相似文献   

11.
Over seven years after the 11 September 2001 attacks on the United States, Afghanistan is again at the forefront of the headlines, faced with a brutal insurgency and a resurgent Taliban. Many scholars and policymakers attribute the instability in Afghanistan to a terrorist sanctuary in the neighboring Federally Administered Tribal Areas (FATA). Pakistan has attempted to eliminate this sanctuary through negotiation and armed force. This paper argues that Pakistani strategy has failed to achieve its desired results because of local tribal norms, the weak nature of previous agreements, military units ill-equipped for a counterinsurgency and counterterrorism role, as well as ideological fissures in the Pakistani establishment. Afterward, the paper argues that the United States and Coalition forces should pursue their strategy remaining cognizant of local tribal norms, step up training efforts for Pakistani forces, promote development of the tribal areas, and cultivate options for eliminating the FATA sanctuary through covert means.  相似文献   

12.
Raising and maintaining military forces have posed enormous challenges for the United States and its allies. Economists have made significant contributions to understanding of how to recruit and manage such forces. This paper highlights key past contributions and discusses challenges for future research. Rapid changes in the roles and missions of military personnel, technology, and the civilian labor market pose serious challenges for future military manpower policy and will challenge economists to develop new approaches to military recruiting and personnel management. Yet the body of past research can continue to provide insight and guidance in making decisions about defense manpower.  相似文献   

13.
Recent tensions between Russia and the United States have sparked debate over the value of the North Atlantic Treaty Organization (NATO). One controversy surrounds the extent to which NATO raises the risk of war through entrapment—a concept that scholars invoke to describe how states might drag their allies into undesirable military conflicts. Yet scholars have advanced different, even conflicting arguments about how entrapment risks arise. I offer a typology that distinguishes between the mechanisms through which entrapment risks allegedly emerge on the basis of their institutional, systemic, reputational, and transnational ideological sources. I use the 2008 Russo-Georgian War to illustrate how the purported mechanisms of entrapment fare in elucidating that conflict. In analyzing why entrapment risks emerge, and thinking counterfactually about The 2008 War, I argue that scholars need to disentangle the various mechanisms that drive both alliance formation and war to make sure that entrapment risks do indeed exist.  相似文献   

14.
This work is about how the United States military has become dependent on networked technology. As arguably the largest contributor to national security, it has become so dependent that its chief doctrine integrates networked technology into nearly every specialty, with particularly intense focus on Network Centric Warfare. As the military’s old guard is replaced by the highly technical Millenial Generation, there is cause to pause when assuming this techno-acuity brings nothing but advantage and success. Vulnerabilities stemming from such extensive dependence offer opportunities for exploitation that have not gone unnoticed. The first step to moving forward from this point is to fully understand the extent to which the military has become dependent on computer networks. It might be the Millenials’ war today, but it would be quite unwise for the United States military to think about it and fight it in a purely Millenial way.  相似文献   

15.
Why did the United States fail to stop Israeli acquisition of nuclear weapons? Existing research argues that patrons such as the U.S. should have an easy time halting proliferation by militarily and economically vulnerable clients. Nevertheless, Israel acquired nuclear weapons with relatively little American opposition. Utilizing extensive primary source research, we argue that problematic intelligence-policy relations hindered U.S. efforts to arrest Israeli proliferation as (1) policymakers often gave mixed guidance to the intelligence community, resulting in (2) limited information on Israeli efforts that reinforced policy ambiguity. The results carry implications for understanding the dynamics of nuclear proliferation and intelligence-policy relations.  相似文献   

16.
In recent years, China has made stunning progress in its satellite reconnaissance capabilities. Starting from almost no capacity for live surveillance ten years ago, today the PLA has gained the capability to support real-time tactical naval operations from space. China's suite of electro-optical, synthetic aperture radar, and electronic intelligence satellites would be key to its anti-access/area denial capabilities, through which the PLA could deny the United States military the capability to operate with impunity close to its shores. Furthermore, these achievements suggest a shift towards more military-dedicated space assets and form the contours of a crucial support system for expanded PLA operations.  相似文献   

17.
The United States’ Air Force (USAF) has developed and used unmanned aerial vehicle (UAV) technology to monitor and assassinate dangerous terrorists in Afghanistan, Iraq, Libya, Pakistan, Somalia, Syria, and Yemen. Currently, there are few countries that possess armed UAV and since the US created much of this technology, the USAF is usually part of the training that automatically accompanies the purchase of its UAVs. The research question this article attempts to answer is, “What is the extent of the United States’ Air Force assistance in the training and proliferation of UAV technology to foreign militaries?”  相似文献   

18.
The U.S. system for procuring and utilizing deceased‐donor organs for transplantation has been studied and written about in many articles. The purpose of this paper is to examine the interactions between the elements that comprise this system, and point out improvement opportunities that may be affected through operations research/management techniques. The authors demonstrate the need for developing data‐driven and analytic tools. In fact, data is used to generate hypotheses and support claims throughout the paper. The paper also points out the need to fully leverage data that is available to researchers, and to seek data that is currently not deposited in a centralized archive.  相似文献   

19.
This essay contends that allies are vital for counterterrorism, but what we ask of them and their institutional form is quite different from what was asked of traditional alliance partners during the Cold War and its immediate aftermath. Despite these differences, some of the alliance dilemmas that plagued the United States in the past are likely to remain, though they will have different manifestations relevant to the war on terrorism. This essay concludes by arguing that, for purposes of the war on terrorism, the list of key allies has shifted and offers recommendations for improving US alliances.  相似文献   

20.
The Federal Aviation Administration (FAA) and the airline community within the United States have adopted a new paradigm for air traffic flow management, called Collaborative Decision Making (CDM). A principal goal of CDM is shared decision‐making responsibility between the FAA and airlines, so as to increase airline control over decisions that involve economic tradeoffs. So far, CDM has primarily led to enhancements in the implementation of Ground Delay Programs, by changing procedures for allocating slots to airlines and exchanging slots between airlines. In this paper, we discuss how these procedures may be formalized through appropriately defined optimization models. In addition, we describe how inter‐airline slot exchanges may be viewed as a bartering process, in which each “round” of bartering requires the solution of an optimization problem. We compare the resulting optimization problem with the current procedure for exchanging slots and discuss possibilities for increased decision‐making capabilities by the airlines. © 2005 Wiley Periodicals, Inc. Naval Research Logistics, 2006  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号