首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   40篇
  免费   0篇
  2019年   1篇
  2018年   1篇
  2017年   3篇
  2016年   7篇
  2015年   5篇
  2014年   1篇
  2013年   22篇
排序方式: 共有40条查询结果,搜索用时 15 毫秒
21.
This article examines the implications of the proliferation of cyberwarfare capabilities for the character and frequency of war. Consideration of strategic logic, perceptions, and bargaining dynamics finds that the size of the effect of the proliferation of cyberwarfare capabilities on the frequency of war will probably be relatively small. This effect will not be constant across all situations; in some cases the advent of cyberwarfare capabilities may decrease the likelihood of war. On the other hand, the use of computer network attack as a brute force weapon will probably become increasingly frequent.  相似文献   
22.
Abstract

Will China's development of a new generation of nuclear weapons impact US-China security relations in important ways? One's answer depends on how one views the following: whether or not Chinese leaders believe that they are only now acquiring a secure second strike capability; the scope of coercive power that secure second strike capability provides to conventionally inferior actors; the meaning of China's ‘No First Use’ Doctrine; and the prospects for escalation control in future crises. Applying Cold War theories and tapping Chinese doctrinal writings this article concludes that China's nuclear modernization program might prove more consequential than is commonly believed.  相似文献   
23.

Deterrence has been a crucial element in fighting terrorism, both in actual politics and rational choice analyses of terrorism. But there are superior strategies to deterrence. One is to make terrorist attacks less attractive. Another to raise the opportunity cost - rather than the material cost - to terrorists. These alternative strategies effectively dissuade potential terrorists. The strategies suggested here build on the "benevolence" system and tend to produce a positive sum game among the interacting parties. In contrast, the deterrence system is based on "threats" and tends to produce a negative sum game interaction.  相似文献   
24.
Five Myths about Nuclear Weapons, by Ward Wilson. Houghton Mifflin Harcourt, 2013. 188 pages, $22.  相似文献   
25.
Nuclear proliferation, lax security standards in the storage of fissile materials, and international apathy in the prosecution of terrorists make nuclear terror a serious threat to the United States and its allies, yet no doctrine of retaliation has been established. To decrease the probability of terrorist use of nuclear weapons, a doctrine of retaliation—a negligence doctrine—should be considered. If the United States can distinguish whose fissile material was used for a nuclear terror event, a negligence doctrine would prescribe retaliation against that state. Where the proximate cause—terrorists—is unavailable for deterrent retaliation, deterring an accessible mediate cause—a state that has failed to adequately secure its fissile material—is one of a few effective alternatives. In the absence of such a negligence doctrine, the United States and its allies are increasingly vulnerable to a nuclear terror attack and the ensuing negative consequences.  相似文献   
26.
The last decade has seen several advances in the study of deterrence. These advances have sparked some strong disagreements regarding interpretation of the models and what their contributions signify. This paper appraises the discussions from a model theoretic perspective. It is argued that when comparing rivalling models three aspects; (i) target, (ii) criteria and (iii) type of purpose should be taken into account in order to make a proper appraisal. Informed by these aspects it is evident that the three deterrence models analysed address different aspects, in different ways and to different ends. From this perspective, the so-called Perfect Deterrence model must be recognised as a clear advancement in the research field. Model comparison will always be context relative and a plurality of models should be viewed favourably.  相似文献   
27.
According to the NATO’s collective defence strategy and the principle of deterrence, “no one should doubt NATO’s resolve if the security of any of its members were to be threatened”. In this sense, credible deterrence acts as a guarantee for peace and stability in the Euro-Atlantic region. However, recent events in Ukraine and Georgia have revealed the potential weaknesses of the current deterrence models. Without any overt fear of retaliation, we have seen Russia’s aggressive steps towards its neighbours, which were planned and executed with great sophistication, initiative, agility and decisiveness. Although contrary to Ukraine and Georgia which are not the members of the Alliance, Estonia, Latvia and Lithuania are granted security guarantees in the NATO framework, the Baltic countries clearly constitute Russia’s point of contact with NATO and are, therefore, also subject to the interests of Russia to test mutual capabilities and commitment, and to send strategic messages to the Alliance. In this context, the article aims to assess how credible is the deterrence posture provided by NATO in avoiding potential aggression on the part of Russia against the Baltic countries.  相似文献   
28.
Over the last two decades, a number of countries (most notably China, Russia and Iran) have been developing so-called anti-access and area denial (A2/AD) capabilities, such as ballistic and cruise missiles, offensive cyber-weapons, electronic warfare, etc. The development of A2/AD capabilities by non-Western countries undermines the foundations of US power projection and global military-technological supremacy. In order to overcome, or at least mitigate, the impending A2/AD challenge, the US Department of Defense (DoD) began to roll out its so-called ‘third’ offset strategy in late 2014. The strategy aims to bring about innovative operational concepts and technologies and spur new doctrinal and organisational debates. This article assesses which of the operational concepts and capabilities informing current US discussions on offset may be relevant in the context of the A2/AD challenges Europeans face on their eastern ‘flank‘ and in their ‘extended southern neighbourhood‘, and which may not. Europeans must grapple with the same conceptual puzzle as the US: how to strike the right balance between defeating A2/AD capabilities and hedging against them, i.e. through alternative strategies that are less dependent on unhindered access and resort to asymmetric forms of warfare. However, they must take into account the geographical features of their eastern flank and extended southern neighbourhood, the level of technological maturity of their challengers, and their own military-technological prowess and political limitations. This suggests a somewhat different approach to offsetting A2/AD than that adopted by the US.  相似文献   
29.
30.
This article predicts that the nuclear weapon states may opt sooner for nuclear elimination than generally expected. This delegitimation of nuclear weapons is due to five factors whose importance has grown since the mid-1990s: nuclear proliferation, the risk of nuclear terrorism, the nuclear taboo, missile defence, and the increased importance of international law. The article starts with categorizing nuclear weapons policies: nuclear primacy, maximum deterrence, minimum deterrence, existential deterrence, and post-existential deterrence. The nuclear weapon states will probably shift their policies from nuclear primacy (US), maximum deterrence (Russia), minimum or existential deterrence (UK, France, Israel, China, India, Pakistan, North Korea) to post-existential deterrence (or elimination), taking one step at a time.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号