首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   19篇
  免费   0篇
  2020年   1篇
  2019年   1篇
  2018年   4篇
  2017年   1篇
  2016年   2篇
  2014年   5篇
  2013年   5篇
排序方式: 共有19条查询结果,搜索用时 13 毫秒
1.
What were Russia’s objectives in Eastern Ukraine, and why was it seemingly unable to achieve a successful or decisive outcome? In contrast to Russia’s seizure of Crimea, the uprising in Eastern Ukraine was marked by disorganization and chaos. Using proxy and surrogate actors, along with military exercises and the injection of Russian troops, Russia sought to institutionalize a political entity inside Ukraine to influence its domestic politics. In this article, I analyze the mechanisms by which Russia attempted to implement, and later salvage, its strategy. The article contributes to clearer theoretical and practical understanding of limited force in coercive diplomacy, signaling, and a more rigorous treatment of the role and uses of proxy actors.  相似文献   
2.
Stability among the great powers during the Cold War is widely theorized in terms of nuclear deterrence. Rationality of states and their preference for survival are the basis of nuclear deterrence. The rationality of non-state terrorist groups is different from that of nation-states. Even though they are also rational actors with their own hierarchy of preferences, survival may not be their ultimate goal. Deterrence of nuclear terrorism is therefore different from deterrence against states. South Asia is more vulnerable to nuclear terrorism than any other region of the world for many reasons. This article analyzes the possibility of nuclear terrorism and the ways of deterrence against it in the context of South Asia.  相似文献   
3.
ABSTRACT

Sectarian militants have for years launched attacks from Pakistan across the border to Iran. Finding sanctuary in a neighbouring country can make the difference between success and failure for militants. Conventional wisdom holds that a lasting transnational militancy challenge would typically create serious interstate conflict. Militancy has triggered armed encounters between Iran and Pakistan. This article argues that despite some tension militancy has resulted in deeper cooperation in the ambivalent dyad. Both states’ overarching security concerns, having exhausted other options, the believed involvement of third-party states, and economic potential, have moderately alleviated negative pressure caused by militancy.  相似文献   
4.
Over the past few years there is an apparent re-regionalization of al-Qaeda activity, intensified by the ongoing Middle East turmoil. Its main characteristic is a trend towards the abandonment of focoist strategies and their replacement by more popular-based ones. This article aims at evaluating their capacity to implement such a strategy shift and sustain the required level of violence. As a means of evaluating this capacity, this article proposes the use of a DIME (diplomatic, informational, military, and economic) framework, which will hopefully provide an alternative angle of theorizing and understanding ‘armed non-state actors’ (ANSAs). The model is applied in the case of al-Qaeda in the Arabian Peninsula (AQAP), which appears to have effectively developed the military and informational dimensions, due partly to its own prowess and partly to the Yemeni state's weaknesses and the shortcomings of counterinsurgency. In contrast, the economic and diplomatic dimensions suffer from the lack of resources and the anti-systemic nature of AQAP.  相似文献   
5.
This article presents survey data on the African Peace and Security Architecture (APSA). It focuses explicitly on two aspects: the internal constitution and achievements of the APSA; and coordination and cooperation with external actors, such as Regional Economic Communities, the United Nations and the European Union. The survey, conducted between October 2011 and December 2012, targeted 198 security experts in international organisations, think tanks, academia and non-governmental organisations. It reveals the APSA's current stage of development, achievements and challenges.  相似文献   
6.
ABSTRACT

This study seeks to evaluate the threat of malicious chemical use by non-state actors. It finds that non-state actors have primarily turned to ready-to-use crude chemical weapons (CW) instead of traditional CW agents. Interestingly, the worst crude CW attacks have been more destructive than those employing traditional CW. Scenarios for catastrophic consequences exist, but chemical attacks have typically been used to accomplish tactical goals, which leverage psychological and economic impacts. Therefore, successful efforts to counter CW proliferation by non-state actors must be substantially different from those targeting states.  相似文献   
7.
ABSTRACT

U.S. military aid provides recipient governments the fighting capability they require to undermine domestic militant groups, which can undermine groups’ leadership structures and trigger group splintering. In this environment, brutal attacks against non-combatants become an effective mechanism for targeted groups to signal their resolve and outbid competitors. A large-n analysis of U.S. military aid between 1989 -2011 links higher levels of military aid with higher levels of rebel-perpetrated civilian killings, and deaths due to explosive attacks on non-combatant targets. A closer examination of the case of Pakistan sheds further light on the underlying causal mechanisms.  相似文献   
8.
Pirate attacks against commercial vessels in the Western Indian Ocean and nearby seas reached an unprecedented level in 2011. Despite concerted efforts by the international community and shipping companies to address this threat by conducting naval patrols and equipping commercial vessels with non-lethal defenses, the frequency of pirate attacks continues to increase. The general ineffectiveness of existing anti-piracy measures has sparked interest in expanding the use of armed private security contractors to protect commercial vessels from pirate attacks. This article argues that armed private security contractors can, indeed, enhance the security of commercial vessels because these actors can provide onsite protection for commercial vessels, which should allow them to respond very quickly to pirate attacks, and because these actors are willing to use deadly force against pirates. However, this article also argues that expanding the use of these actors may increase the degree of violence used during pirate attacks, pose threats to the safety of innocent civilians, and violate a number of domestic and international laws.  相似文献   
9.
The Taliban's ‘code of conduct’, which lists rules of discipline for the fighters, has been widely discussed, but do the Taliban try to implement it? This article discusses the structures that the Taliban have put in place for this purpose and their evolution over the years. It assesses that while the Taliban's ‘military justice’ system is still work in progress, the fact that it has attracted a significant investment in human resources bears witness to a serious intent of the leadership. However, the Taliban's concern with the behaviour of their fighting force is driven by their own political calculus, not by any sympathy for the international law of conflict.  相似文献   
10.
Abstract

How do contemporary secessionist movements gain international recognition of their claims to self-determination? I argue that international recognition is forthcoming when a sufficient number of states believe a claim to self-determination ought to be accepted. That is, states recognize claims to self-determination when they perceive them to be legitimate. To convince outsiders of the legitimacy of their claims, separatist movements invoke resonant norms and symbols in a moral economy that structures decision-making. I contrast this argument with prevailing explanations of recognition dynamics. To illustrate the argument, I examine the diplomacy surrounding Kosovo’s independence bid and unilateral secession.  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号