共查询到20条相似文献,搜索用时 140 毫秒
1.
2.
Christopher J. Eberle 《Journal of Military Ethics》2013,12(1):54-67
My aim in this paper is to reflect on a very narrow question: under what conditions might a cyber-attack provide a just cause for war? I begin by articulating what makes for a just cause, briefly address the problem of attribution, and then discuss three broad categories of cyber-attack: those that clearly do not satisfy the just cause requirement, those that clearly do satisfy the just cause requirement, and three ambiguous cases – the destruction of property, the emplacement of logic bombs, and the failure to prevent cyber-attacks. My conclusions are exploratory and suggestive rather than definitive, partly by virtue of the extreme paucity of literature on the moral assessment of cyberwar. 相似文献
3.
Rajesh Rajagopalan 《Small Wars & Insurgencies》2013,24(1):44-68
The Indian Army has a uniquely political approach to counterinsurgency that has had great success. This essay examines the development of this doctrine over the last five decades, and the political and operational factors that influenced its development. The most important of these factors was, and remains, the Army's positional‐war orientation, which puts great emphasis on the need to prepare for conventional war. Though the doctrine has undergone some evolution, such changes have been constrained by the positional‐war orientation. 相似文献
4.
Sandor Fabian 《Defense & Security Analysis》2019,35(3):308-325
Following Russia’s annexation of Crimea and its initial actions in eastern Ukraine in 2014, the term hybrid warfare has received much public attention. Many have argued that the Russian actions we saw in Ukraine were part of a completely new strategy while others have suggested that there was nothing new in Russia’s actions. This article takes a critical look at these claims. Through the assessment of the history of the term hybrid warfare and a rigorous analysis of the so-called Gerasimov doctrine, this study finds that the Russian hybrid warfare strategy is rather a western myth than a formal comprehensive Russian strategic concept. Additionally, through the assessment of the Russian use of information operations and the way she has utilised the cyberspace in several recent conflicts, the study finds that against all claims Russia did not make these areas its main battlefield, but rather has been using them in support of its traditional concepts. 相似文献
5.
James K. Wither 《Small Wars & Insurgencies》2013,24(3-4):611-635
This article examines British Army operations in Iraq. It focuses on the causes of the army's apparent failure to live up to its reputation for the conduct of small wars. The paper discusses the British experience of small wars in the context of Iraq, the influence of doctrine and strategy, and the political and moral factors that shaped the army's performance. The paper's conclusions suggest that the Iraq War may cause a significant reappraisal, not just of military doctrine and strategy, but also of Britain's role in future small wars. 相似文献
6.
Harald Høiback 《战略研究杂志》2013,36(6):879-900
‘Doctrine’ has been part of military vernacular for at least a century. Nonetheless, it is a concept which is rather under-explored. The aim of this article is thus to break doctrine down into its component parts in order to grasp what a military doctrine actually is. Thereafter, the article points out different ways to utilise doctrine as a military devise. A doctrine cannot be, or rather should not be, all things to all men. On the contrary, doctrine can be a tool of command, tool of education or a tool of change. The main upshot of the article is that the future of doctrine is far brighter than its critics want us to believe. 相似文献
7.
8.
9.
This article examines the evolution of the current British military joint intelligence doctrine. We argue that military intelligence doctrine is dogged by an intrinsic tension between the ethos and expectations of military doctrine and those of the professional practice of intelligence. We further argue not only that prior iterations of UK joint intelligence doctrine failed to effectively deal with this intelligence doctrine dilemma, but also that measures in the current doctrine to address this problem directly created their own problems. Moreover, as a result, otherwise sound innovations in the current UK intelligence doctrine have proven unsuitable to wider diffusion in more recent intelligence doctrine such as the new NATO intelligence doctrine which, otherwise, draws extensively on its British precursor. 相似文献
10.
震网病毒被认为是史上第一种"网络物理战"武器,文章介绍了两个版本震网病毒的作用机理,分析了网络物理战的作战思想,提出了层次化的网络空间、过程中的网络漏洞和网络物理威慑等新概念,并总结了其对网络战研究的启示。 相似文献
11.
Shashank Joshi 《战略研究杂志》2013,36(4):512-540
For six years, India has sought to implement an army doctrine for limited war, ‘Cold Start’, intended to enable a Cold War era force optimised for massive offensives to operate under the nuclear threshold. This article asks whether that is presently feasible, and answers in the negative. Doctrinal change has floundered on five sets of obstacles, many of which are politically rooted and deep-seated, thereby leaving the Army unprepared to respond to challenges in the manner envisioned by the doctrine's architects. 相似文献
12.
Douglas Mastriano 《Defense & Security Analysis》2017,33(1):68-76
Recent events demonstrate the complex and adaptive approach employed by Russia to reassert influence in Europe. The changing face of Russia’s strategy commenced in 2007 when it launched a crippling cyber-attack against Estonia. This was followed by a large Russian conventional attack against Georgia in 2008, occupying two large areas of the nation. 2014 witnessed the Russian annexation of Crimea where in just a week, Russia seized control of Crimea “without firing a shot.” The annexation of Crimea was rapidly followed by a Russian inspired and led subversive war in eastern Ukraine. The common thread among these diverse Russian operations is its use of ambiguity to confound and confuse decision makers in the West. 相似文献
13.
This article analyses the doctrine development of the People’s Liberation Army (PLA) coping with the Soviet military threat between 1969 and 1989. In the 1970s, the PLA applied a doctrine of ‘active defence and luring the enemy into depth’ based on its traditional operational art. In 1980, the PLA decided to focus its doctrine on positional defence. In 1986, the PLA introduced ‘integrated operations and prioritised strike’, a generalised doctrine that originated from its war history. Many organisational and intellectual challenges in peacetime doctrine development contributed to the PLA’s operational idealism, including its aging leadership, command structure, attitude towards its previous experience, limited analysis of contemporary military developments, and failure in test and validation of doctrines. In the post-Cold War decade, many of these challenges persisted in spite of military modernization efforts. The ongoing military reform has to address these challenges and improve the PLA doctrine development in peacetime. 相似文献
14.
Russell Parkin 《Small Wars & Insurgencies》2013,24(1):118-140
This article had its genesis in a background study for the development of a new Australian Army counter-insurgency doctrine. Archival research showed that the Australian counter-insurgency doctrine employed in such post-1945 conflicts as Burma, Malaya, Borneo and Vietnam originated in the jungle campaigns of the South West Pacific Area during World War II. The historical record also showed that the Army's counter-insurgency doctrine, as with its World War II-jungle warfare doctrine, was a pragmatic amalgam of Australian experience and British doctrine. The article traces this process through the development of a series of doctrine manuals. It also considers the contribution of key individuals to both counter-insurgency theory and practice. This distinctively Australian approach to the development of doctrine was responsible for producing a highly successful manual, The Division in Battle: Pamphlet No. 11, Counter-Revolutionary Warfare (DIB 11), which the Army used during its involvement in Vietnam. 相似文献
15.
M. A. Thomas 《Defence Studies》2019,19(2):149-169
In the mid-2000s, the United States Army was embroiled in counterinsurgency missions in Iraq and Afghanistan that required deeper understanding of local social systems. The Army turned to systems thinking and design thinking to model and understand the world, define problems, and develop approaches to strategic and operational challenges. However, the Army’s approach as expressed in publications and doctrine encourages the development of complicated, unsupported, and unfalsifiable hypotheses. The risk is that the Army will act on incorrect assumptions and develop plans that are fragile. 相似文献
16.
17.
基于系统动力学的网络空间作战指挥效能评估? 总被引:1,自引:0,他引:1
针对网络空间作战指挥效能评估问题,运用系统动力学方法进行了研究。通过层次熵分法对网络空间作战指挥效能评估指标体系进行了指标权重赋值,依托系统动力学方法建立了指挥效能评估模型并进行了仿真实验,分析了不同条件下指标对指挥效能的影响情况,为研究如何提高网络空间作战指挥效能提供决策依据。 相似文献
18.
随着中美实力差距不断缩小和信息技术的发展与扩散,网络安全成为中美新的竞争点和摩擦点,中美在网络安全问题上展开新一轮的博弈,具体体现为网络空间治理权之争、中美网络安全战略博弈和网络技术优势的夺取。 相似文献
19.
Robert M. Cassidy 《Small Wars & Insurgencies》2013,24(3):334-359
This study examines the war that the United States has waged since September 2001 as a global counterinsurgency. Placing the war against al-Qaeda and its allied groups and organizations in the context of a global insurgency also presents implications for doctrine, interagency coordination and military cultural change. The first part of the article offers a distilled analysis of al-Qaeda and its associated networks. The second section examines the US military in the context of the Western way of war, with the attendant military-cultural impediments to adapting to an enemy who embraces a very different approach to war. The third section aims to define and describe the nature of the war that America and its coalition partners are trying to wage. The concluding section offers the most value as it refines and distills the work of several international security and military thinkers to arrive at some imperatives for successfully prosecuting this type of war to its end. 相似文献
20.
Cyberspace experiences worrying trends that could have a negative impact on the international strategic landscape. The lack or erosion of norms and risky practices and behaviors could lead to greater uncertainty and thus greater instability. Set against a context of renewed competition between great powers, these developments are also tied to the strategic structure of cyberspace. This forum is devoted to discussing factors leading to stability or and instability. 相似文献