首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   13篇
  免费   2篇
  2018年   3篇
  2017年   2篇
  2014年   3篇
  2013年   3篇
  2008年   1篇
  2002年   2篇
  1999年   1篇
排序方式: 共有15条查询结果,搜索用时 15 毫秒
11.
The growth of the African Internet, and services related to the Internet, has been rapid over the last decade. Following this market expansion, a variety of service providers have started to provide access. A fast-growing market puts pressure on the providers to deliver services first and only then seek to secure the networks. Over time, industrialised nations have become more able to detect and trace cyber attacks against their networks. These tracking features are constantly developing and the precision in determining the origin of an attack is increasing. A state-sponsored cyber attacker, such as intelligence agencies and electronic warfare units, will seek to avoid detection, especially when the attacks are politically sensitive intelligence-gathering and intrusion forays into foreign states' networks. One way for the attacker to create a path that links the attacks and the originating country is by actions through a proxy. The less technologically mature developing nations offer an opportunity for cyber aggression due to their lower level of security under the quick expansion of the Internet-based market. Developing countries could be used as proxies, without their knowledge and consent, through the unauthorised usage of these countries' information systems in an attempt to attack a third country by a state-sponsored offensive cyber operation. If the purpose of the cyber attack is to destabilise a targeted society and the attack succeeds, the used proxies are likely to face consequences in their relations with foreign countries, even if the proxy was unaware of the covert activity.  相似文献   
12.
The term “Gray Zone” is gaining in popularity as a way of describing contemporary security challenges. This article describes the “short-of-war” strategies – the fait accompli, proxy warfare, and the exploitation of ambiguous deterrence situations, i.e. “salami tactics” – that are captured by the term and offers several explanations for why state and non-state actors are drawn to these strategies. The analysis highlights why defense postures based on deterrence are especially vulnerable to the short-of-war strategies that populate the “Gray Zone.” The article concludes by suggesting how defense officials might adapt defense policies to life in the “Gray Zone.”  相似文献   
13.
Abstract

The siege of the northern Syrian town of Kobane was lifted in January 2015. The Kurdish defenders there had triumphed against Islamic State (IS). The conflict then moved on. It moved on, though, with the United States, the United Kingdom, and other Western powers having adopted, almost by default, the Kurds as proxy fighters in this conflict. The Kurds, however, are a divided and fractious nation spread across three states and historically famous for fighting among themselves. In employing the Kurds as proxies against IS, as this article shows, these Western powers must be aware of the unintended consequences that can result.  相似文献   
14.
The ongoing civil war in Syria is evolving into a ‘proxy war’, in which both the Baathist regime and its insurgent adversaries are becoming increasingly reliant upon support from external powers. Proxy warfare has a superficial appeal for sponsoring states, as it appears to offer a convenient and risk-free means of fulfilling foreign policy goals, which will not incur the financial and human costs of direct military intervention. Using Syria as a case study, this article shows that the conduct of proxy warfare has several potential political, strategic, and ethical consequences, which any democratic government in particular is obliged to consider before it resorts to this indirect means of foreign intervention.  相似文献   
15.
Airpower, drones and cyber-weapons are employed by states in conjunction with local armed non-state actors in an effort to coercively intervene in the crises of the twenty-first century. While the externalization of the burden of warfare is a return to pre-modern war, it is the change in the underlying socio-political relations between the state and its military agent that is a novel phenomenon in surrogate warfare. This article demonstrates that in a post-Westphalian era characterized by non-state violence, globalized conflicts, a prioritization of risk management in a mediatized environment, the state has to explore new ways to remain relevant as the primary communal security provider. Thereby, the organization of violence has departed from the employment of the state’s soldier as the primary bearer of the burden of warfare to a mode of war where technological and human surrogates enable the state to manage the risks of post-modern conflict remotely. In this article, we conceptually explore surrogate warfare as a socio-political phenomenon within the context of globalized, privatized, securitized and mediatized war.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号