排序方式: 共有91条查询结果,搜索用时 0 毫秒
31.
Thomas C. Bruneau 《战略研究杂志》2013,36(5):638-665
Private security companies (PSCs) currently receive a great deal of attention in the news media, in sensationalist reporting, and increasingly in scholarly books and articles. While the scholarly books and articles make significant contributions to our understanding of this global phenomenon, there are several impediments to analysis that must be recognized and overcome if analysis is to be improved. Three of these impediments are reviewed in this article. The author suggests that US government material is currently available to minimize impediments and offers a framework to make analytical sense of it. Since contracting out is based on contracts, and unless the complexities of awarding and managing contracts are understood, recommendations made to reform the process of contracting out security are unrealistic. 相似文献
32.
边缘计算将数据处理任务放置在网络边缘(靠近数据源)的设备上,可以快速实现实时数据处理,具有低延迟、隐私安全性和灵活性的特点,被认为是人工智能的最后一公里.近年来,边缘计算的飞速发展在不断推动边缘人工智能物联网的发展.对2019年边缘计算的相关研究与成果进行了综合评述,并对未来发展趋势进行了展望.首先,梳理2019年... 相似文献
33.
Douglas Porch 《战略研究杂志》2013,36(2):243-270
While the success of Colombia's fight against illegal armed groups, led by Fuerzas armadas revolucionarias de Colombia – ejército del pueblo (FARC-EP), is generally lauded as evidence of the effectiveness of both COIN doctrine and security assistance, the configuration of Colombia's counter-insurgency effort remains largely unstudied. This article will explain the success of one of those campaigns carried out principally by the Colombian marines (Colmar) in an area of northern Colombia known as the Montes de María. Contingent factors shaped the success of this campaign, beginning with the fact that the Montes de María forms an area where insurgents, relative late comers to the region, found it difficult to put down deep roots. However, operations to eradicate them were complicated by the inexperience of the Colmar, and by constraints placed by Colombia's Constitutional Court on COIN methods modeled on those successfully applied by the British in Malaya and Kenya. Therefore, Colmar officers initiated their five-year campaign by building up a base of popular support in the towns and targeting insurgent logistical networks. This bought time to strengthen the Colmar's combat and intelligence capabilities, and take the offensive that eventually isolated and killed the leader of the FARC in the Montes de María, Martín Caballero. Unfortunately, the failure of the Colombian government to follow up the Colmar victory by installing a regional and local governments viewed as legitimate by the population, and to resolve long standing land tenure issues, has meant that, so far, the Colmar looks to have delivered a tactical victory in a strategic vacuum. 相似文献
34.
ABSTRACTThe present international standard allows non-nuclear weapon states (NNWS) to forego safeguards when nuclear material is used in a “non-proscribed military activity,” though no criteria have been established to determine when NNWS can remove naval nuclear material from safeguards. Though at present, only nuclear-armed states possess nuclear submarines, the global nuclear naval landscape may soon change with the advancement of Brazil's fledgling program and the possible precedent it would set for other NNWS. A framework is needed to shore up nuclear security and prevent nuclear material diversion from the nuclear naval sector. Proposed and existing nonproliferation frameworks, including a Fissile Material Cut-off Treaty and commitments through the nuclear security summits, are insufficient to close this loophole. A Naval Use Safeguards Agreement (NUSA), modeled after the Additional Protocol of the International Atomic Energy Agency, would provide a framework to remove the opacity surrounding nuclear material in the naval sector. Designed for NNWS and encouraged as confidence-building measures for nuclear weapon states, NUSA would explicitly outline those stages in the naval nuclear fuel cycle where safeguards are to be applied and in what context. This viewpoint also further provides direction for targeted research and development in technical naval nuclear safeguards solutions. 相似文献
35.
Ethan M. Orwin 《Small Wars & Insurgencies》2013,24(2):330-351
From 1956 to 1960, the French Army developed a force of Muslim auxiliaries (supplétifs) as a major component of its strategy to combat the National Liberation Front (FLN) insurgency in Algeria. Aside from their military utility in hunting down the guerrillas in the mountains and forests, the supplétifs were instrumental in undermining FLN legitimacy in the countryside. The rapid growth and employment of the supplétif force dismantled FLN political control in the villages, undermined the enemy's unity, and critically weakened the revolutionaries' claim to represent all of Algeria's Muslims. The military and political activities of France's Muslim soldiers also projected an image of Muslim–European unity behind the French cause, and portrayed the French Army as the only legitimate political force in numerous villages. These political successes, however, were limited to the local, tactical level of revolutionary warfare, and the Army was never able to convert the supplétifs into a force of decisive, strategic political significance. They thus had little ultimate impact on the outcome of the conflict. 相似文献
36.
HENNIE VAN VUUREN 《African Security Review》2013,22(3):67-75
Bribery undermines human development and a transition to stable democratic rule. It props up illegitimate regimes as corporations bid for contracts by bribing, in a seeming race to the bottom. The world's wealthy are slowly waking up to this and criminalising this scandalous practice of bribing foreign public officials. However, such measures, if enforced, need to be combined with domestic anti-corruption strategies in the South. If this opportunity is missed, the risk of investing private capital in marginalised economies perceived to be highly corrupt is further upped, making investment-driven economic growth possibly even less unattainable. 相似文献
37.
Inwook Kim 《Contemporary Security Policy》2019,40(2):165-192
The 2016 decision to deploy Terminal High Altitude Area Defense (THAAD) to South Korea has generated multitude of intensely politicized issues and has proved highly controversial. This has made it challenging to alleviate, let alone clarify, points of analytical and policy tensions. We instead disaggregate and revisit two fundamental questions. One is whether THAAD could really defend South Korea from North Korean missiles. We challenge the conventional “qualified optimism” by giving analytical primacy to three countermeasures available to defeat THAAD–use of decoys, tumbling and spiral motion, and outnumbering. These countermeasures are relatively inexpensive to create but exceedingly difficult to offset. Second, we assess the optimal way to ensure South Korean national security against North Korean missiles. By examining the balance of capability and issues of credibility/commitment, we show that the U.S. extended deterrence by punishment remains plentiful and sufficiently credible even without enhancing the current defense capability. 相似文献
38.
Ionut C. Popescu 《战略研究杂志》2018,41(3):438-460
Does a great power need to formulate a long-term Grand Strategy to guide its foreign policy actions? While some scholars continue to debate the competing merits of various grand strategies, a growing literature now emphasizes emergent learning and improvisation as the keys to success, as opposed to implementing a long-term design. In this article, I explore these scholarly arguments by framing the debate as one between two schools of thought, Grand Strategy and Emergent Strategy. After presenting the main arguments and the historical examples associated with each school, I evaluate the two approaches across four categories: the type of international security environment each of them is most suited for, the way each approach deals with short-term vs. long-term priorities, the domestic political conditions needed for each approach to be successful, and the type of presidential management qualities each school demands. Lastly, I discuss the implications of these arguments for the scholarship and the practice of foreign policy and national security strategy. 相似文献
39.
AbstractPost-interventionist security assistance is premised on non-normative security understandings and flexible arrangements between external and local actors. In hybrid political regimes or areas of limited statehood, these forms of assistance, while strengthening specific aspects of a country’s security context, reinforce some domestic actors vis-à-vis others thanks to processes of selective borrowing by local political elites. This paper demonstrates how such processes contribute to the proliferation of hybrid elements in the country’s security sector. In two contrasting case studies, we illustrate how security assistance packages in Lebanon and Tunisia have diluted emerging democratic reforms, producing more coercive manifestation of state power. 相似文献
40.
Since 2012, China’s assertion of its sovereignty claim to the contested Senkaku/Diaoyu Islands has significantly raised the risk of a potentially escalatory political-military crisis with Japan. As circumstances worsen, Japanese Prime Minister Shinzo Abe has championed major institutional reforms aimed at centralizing Japanese security policy decision-making and vastly improving crisis management. This article assesses these reforms’ significance for ameliorating Japan’s long-standing internal crisis management weaknesses, and enhancing its ability to communicate with Beijing promptly under challenging conditions. While significant issues remain, recent developments – especially the establishment of Japan’s first-ever National Security Council – demonstrate significant progress. Bilaterally, however, important firebreaks remain conspicuously absent. 相似文献