首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
This article seeks to make sense of North Korean provocations in light of the Sino-US strategic competition in post-Cold War East Asia, where such variables as China’s rise, US’s pivot to Asia, and growing Sino-ROK economic ties are driving the strategic choices of major states in the region. The article examines the main motivations behind Pyongyang’s provocations since the end of the Cold War, discusses their implications for the Sino-US strategic competition in East Asia, and offers predictions about the future of North Korean provocations. The central thesis of the article is that Pyongyang has exploited the Sino-US strategic competition in East Asia for its regime survival. By raising North Korea’s strategic value to China, the intensifying Sino-US competition allows Pyongyang to continue provocations, regardless of Beijing’s explicit opposition.  相似文献   

2.
NATO burden sharing has become an especially timely issue in the past several years as a result of a number of factors, including Russian annexation of Crimea and destabilization of eastern Ukraine in 2014. This article argues that alliance unity among the great democracies of Europe and North America is indispensable to peace and stability on the Eurasian continent. A fractured NATO, and especially, a large divide in purposes or commitments as between the United States and its European security partners, invites aggression and the possibility of inadvertent escalation. Past successes and failures in US-involved multinational peace and stability operations, within and outside of Europe, show that mission accomplishment requires give and take, including the occasional acceptance of unequal costs and benefits among the members, in order to achieve peace and security objectives.  相似文献   

3.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article.  相似文献   

4.
5.
This article explores the nature of the American war in Vietnam in an effort to determine whether it was a response to an indigenous uprising or an external effort by the Communist Party of Vietnam (CPV) to use a wide array of policies and programs to unite North Vietnam and South Vietnam under the party’s leadership. It argues that, although there initially were elements of the South Vietnamese population that rose against the southern leadership, the CPV gained control of their resistance and relegated it to a secondary role in the CPV war effort.  相似文献   

6.
This article analyzes the North Korean nuclear crisis from a balance-of-power perspective. It is in the long-term interests of international peace for a secure and independent North Korea to serve as a buffer between US and Chinese ground forces. However, the conventional military advantage of the South Korean-American alliance over North Korea has grown drastically since the end of the Cold War, threatening North Korea’s survival. Since North Korea lacks any reliable ally, nuclear weapons represent its most cost-effective way to restore a balance of power and thus secure itself. Accepting security guarantees in exchange for its nuclear arsenal is rhetorically appealing but not a viable approach. North Korea’s development of intercontinental ballistic missiles (ICBMs), however, has overcompensated for the post-Cold War imbalance, inviting talk in Washington of waging a preventive war. Persuading North Korea to give up its ICBM capability, not its nuclear arsenal, should therefore be the primary objective of US diplomacy.  相似文献   

7.
Li Chen 《战略研究杂志》2015,38(1-2):183-214
This article analyses the impact of the Korean War on the Chinese People’s Liberation Army (PLA), particularly the period of positional warfare from 1951 to 1953. In the war of movement between October 1950 and June 1951, the PLA relied on its civil war era weapons and experience, including the doctrine of ‘battle of annihilation’. Operations in early 1951 suggested that the civil war legacies of the PLA no longer applied to the realities of combat in Korea. Based on both Soviet aid and domestic mobilisation, the PLA managed to build the material foundation for positional warfare and rapidly improved its logistics. Operationally, on the defensive, the PLA developed combined operations integrating infantry, artillery, and armoured forces. The PLA learned the lessons of the Korean War and strengthened its ties with the Soviet armed forces in order to modernise itself. The Korean War thus transformed the PLA from Civil War victor to Cold War guard.  相似文献   

8.
ABSTRACT

Mexico’s defeat in the war that (in the U.S.) takes the country’s name resulted as much from the strategic context created by unrealized nation-building that followed independence as it did from American tactical supremacy. Three centuries of Spanish empire did not translate into national military excellence due to the decades of revolutionary upheaval that followed the sudden decapitation occasioned by Napoleon’s ouster of the monarchy in Madrid. That the occupation which followed major combat provided salutary lessons learned in dealing with guerrillas rather than a Vietnam-like litany of quagmire eventuated from the conscious designs of military leadership steeped in the same Napoleonic dynamic that had produced our opponent. The United States wisely chose to leave issues of state-building and governance to the Mexicans themselves, while annexing the sparsely populated northern remnant of Spanish empire.  相似文献   

9.
Counterterrorism operations in Kenya have often been hindered by a lack of collaboration, coordination and cooperation among the security agencies involved in such operations. This article examines the relationship between neo-elitism and counterterrorism security interagency activity in Kenya. Using neo-elitism as a framework for analysis, with specific reference to the September 2013 Westgate Mall attack counterterrorism operation, it is argued that the lack of collaboration, coordination and cooperation among Kenya’s counterterrorism security agencies often results in unintended adverse consequences. The interagency conflict over the Westgate operation was primarily about command and control, intelligence sharing and official information shared with the public pertaining to the stages of the siege and operation. These security agencies share similar responsibilities and jurisdictions in the rest of the country’s counterterrorism efforts. The interagency conflicts reveal that the country’s security elites pursue personal and agency-specific interests that are aimed at maintaining organisational supremacy over counterterrorism efforts. Recommendations are offered for how to tackle the problem of interagency conflict in order to enhance the effectiveness of counterterrorism operations in Kenya.  相似文献   

10.
China-U.S. cooperation over the most difficult security problem in Northeast Asia—the North Korean nuclear issue—in essence projects its bigger power game amid the tectonic shifts of Asian geopolitics. The nuclear issue affords a test case to gauge the future posture of China and the United States in East Asia and their partnership in that conflict-prone region. Approaches to resolving this issue must take into account the geopolitical realignment of Asia, Washington's reorientation of relations with its Asian allies, and China's rise as an influential regional player and the subsequent regional response. However, the long-standing mistrust between China and the United States is contributing to a lack of substantial progress in Korean nonproliferation efforts. The declared nuclear test by Pyongyang further put the denuclearization cooperation between China and the Unites States on the line. China-U.S. cooperation in denuclearizing Pyongyang may either produce lasting stability for the region or create ‘‘collateral damage,’’ with the North Korean issue paling in comparison.  相似文献   

11.
This article examines the transitory nature of cyberweapons. Shedding light on this highly understudied facet is important both for grasping how cyberspace affects international security and policymakers’ efforts to make accurate decisions regarding the deployment of cyberweapons. First, laying out the life cycle of a cyberweapon, I argue that these offensive capabilities are both different in ‘degree’ and in ‘kind’ compared with other regarding their temporary ability to cause harm or damage. Second, I develop six propositions which indicate that not only technical features, inherent to the different types of cyber capabilities – that is, the type of exploited vulnerability, access and payload – but also offender and defender characteristics explain differences in transitoriness between cyberweapons. Finally, drawing out the implications, I reveal that the transitory nature of cyberweapons benefits great powers, changes the incentive structure for offensive cyber cooperation and induces a different funding structure for (military) cyber programs compared with conventional weapon programs. I also note that the time-dependent dynamic underlying cyberweapons potentially explains the limited deployment of cyberweapons compared to espionage capabilities.  相似文献   

12.
Cyberspace is an avenue of approach through which a military force can attain objectives of value. Through these cyber avenues of approach, military forces can engage, vet, organize, and direct human agents to accomplish specific activities. Although the objectives of these activities could differ from traditional military objectives, they still have military relevance. This particular manifestation of cyber conflict is neither a new domain of war nor something outside of warfare. Rather, it can be viewed as an emerging avenue of approach in the larger context of military operations, auguring benefits in the integration of cyber activities with operations.  相似文献   

13.
Li Chen 《战略研究杂志》2017,40(5):663-695
This article analyses the doctrine development of the People’s Liberation Army (PLA) coping with the Soviet military threat between 1969 and 1989. In the 1970s, the PLA applied a doctrine of ‘active defence and luring the enemy into depth’ based on its traditional operational art. In 1980, the PLA decided to focus its doctrine on positional defence. In 1986, the PLA introduced ‘integrated operations and prioritised strike’, a generalised doctrine that originated from its war history. Many organisational and intellectual challenges in peacetime doctrine development contributed to the PLA’s operational idealism, including its aging leadership, command structure, attitude towards its previous experience, limited analysis of contemporary military developments, and failure in test and validation of doctrines. In the post-Cold War decade, many of these challenges persisted in spite of military modernization efforts. The ongoing military reform has to address these challenges and improve the PLA doctrine development in peacetime.  相似文献   

14.
In Operation ‘Iraqi Freedom’, as the Coalition's heavy forces fought in the South, in the North a handful of special operations forces, working with Kurdish rebels, clashed with the Iraqi army along the Green Line. In operations reminiscent of those used a year earlier to defeat the Taliban in Afghanistan, the lightly armed and heavily outnumbered Coalition forces called in air strikes to defeat Iraq's regular and Republican Guard army divisions. This article tells the story of these operations and discusses some of their implications for future US military policy. The success of the Afghan model in Iraq goes a long way toward demonstrating the efficacy of new air-heavy tactics and shows the strategic value of using light indigenous allies to replace heavy US land forces in both conventional combat and occupation operations.  相似文献   

15.
This study analyses an arms race between South and North Korea over the period 1963–2000. Despite the strategic importance of the Korean Peninsula, the arms race between South and North Korea has rarely been studied. In this study, the South–North arms race is empirically estimated using Richardson’s action–reaction model. The pattern of South–North arms race between the Cold War (1963–1989) and the post‐Cold War eras (1990–2000) as well as the existence of an arms race is examined comparing both countries’ defence spending, number of military personnel and tactical aircraft.  相似文献   

16.
This article explores the potential impact of U.S. disarmament leadership on the nuclear diplomacy of North Korea and Iran, the “defiant states.” The first part of the article introduces the concept of “interaction capacity,” which measures a state's integration into international society, based on its physical communication systems and its adoption of shared norms. The theory predicts that lower levels of interaction capacity will generate a greater propensity for nuclear defiance, as the affected states reject and try to resist integration pressures. In the second and third parts of the article, this conceptual framework is applied to the cases of North Korea and Iran. The analysis suggests that efforts to reassert U.S. disarmament leadership could increase the alienation of North Korea and Iran, leading to provocation and escalation of nuclear tensions. The final part of the paper explores the policy implications of this analysis for the potentially defunct six-party talks, for hopes of renewed negotiations with Iran, and for the 2010 Review Conference of the Treaty on the Non-Proliferation of Nuclear Weapons.  相似文献   

17.
朝核问题一直是困扰东北亚地区安全的核心问题,自20世纪90年代第一次朝核危机至今.朝核问题不但没有得到妥善解决,反而更加复杂。2006年10月9日,朝鲜宣布成功进行了地下核试验,朝鲜半岛再一次成为全球关注的焦点。在前人研究的基础上,就朝核问题产生的背景,朝核问题对中国边境地区经济、地区稳定以及生态环境等方面产生的影响进行分析和探讨。  相似文献   

18.
ABSTRACT

This article examines Chinese views of North Korea’s nuclear-weapon program during the Donald J. Trump administration. It shows that China has portrayed itself as a responsible country that promotes regional stability, unlike the United States, which has engaged in military brinkmanship with North Korea. Some Chinese foreign-policy experts have asserted that Beijing should back Pyongyang in the event of war because of their shared history of humiliation by great powers, while others have favored working with other regional partners. Another theme in Chinese discourse about North Korea is that Pyongyang is an impetuous, ungrateful regime that impedes Beijing’s ability to attain its core interests of regional stability, economic development, and heightened global influence. This negative assessment of North Korea drove Beijing’s endorsement of stricter UN sanctions in 2017. While Beijing has punished Pyongyang for its wayward policies, China responded favorably to North Korea’s decision in April 2018 to stop nuclear tests and partake in international dialogue. Beijing seeks to help Pyongyang gradually disarm and develop its economy within a Chinese-led East Asian order. The article concludes by explaining how Beijing’s recent, more positive view of Pyongyang is likely to affect its support for American efforts to dismantle North Korea’s nuclear-weapon program.  相似文献   

19.
The Democratic People's Republic of Korea (DPRK) justifies its nuclear weapon arsenal with the concept of deterrence. It means that it will try to miniaturize and modernize its warheads and missiles. This leads to a first-use doctrine of nuclear weapons. Obama's policy of engagement does not offer a solution to the North Korean nuclear issue as yet. In the context of its policy of critical engagement with the DPRK, the European Union has three key interests: regional peace and stability, denuclearization, and human rights. The Conference on Security and Cooperation (CSCE) could be a precedent. The CSCE process was based on three “baskets”: security, economics, and humanitarian. The multilateral Trans-Pacific Partnership is a step in this regard. This article looks at three theoretical approaches: realism, liberal institutionalism, and liberal internationalism. It concludes that a political strategy to create a stable North Korean peninsula has to go beyond nuclear deterrence that is based on the realist notion of balance of power.  相似文献   

20.
Japan has been overlooked as a ‘cyber power’ but it now becoming a serious player in this new strategic domain. Japanese policy-makers have forged a consensus to move cybersecurity to the very core of national security policy, to create more centralized frameworks for cybersecurity, and for Japan’s military institutions to build dynamic cyberdefense capabilities. Japan’s stance has moved rapidly toward the securitization and now militarization of responses to cyber challenges. Japan’s cybersecurity stance has bolstered US–Japan alliance responses to securing all dimensions of the ‘global commons’ and extended its defense perimeter to further deter but potentially raise tensions with China.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号