排序方式: 共有264条查询结果,搜索用时 15 毫秒
121.
Maria-Louise Clausen 《Small Wars & Insurgencies》2018,29(3):560-578
AbstractThis article argues that the current conflict in Yemen is better understood as a competition over who controls the state, rather than as a conflict between the state and a non-state actor. It traces the development of the Houthis and shows how the movement managed to seize key government institutions. However, the Houthis lack internal legitimacy and have not been able to position themselves as a nationally relevant political elite. The fragmentation of the Yemeni state has resulted in a shift to more localized struggles over access to resources and power that involve both internal and external actors. 相似文献
122.
Raymond Hinnebusch 《Small Wars & Insurgencies》2018,29(3):391-413
AbstractThe problematic export of the Westphalian system to MENA is examined, taking Syria as exemplar. The export model is juxtaposed to actual non-lineal trajectories, semi-sovereignty and hybrid or failing states. This is manifested in post-uprising Syria in failing statehood, fragmented and overlapping governance, permeable and collapsing borders, the loss of sovereignty to trans-state movements, “competitive regime-building” between the Asad regime and jihadist warlords, and “competitive interventionism” by external powers filling the governance vacuum with their own proxies. The result is heterarchic zones of limited statehood in which state sovereignty is contested by both international (supra-state) penetration and sub-state fragmentation. 相似文献
123.
Grand strategic theorists share an historical emphasis on interstate conflict, yet in contrast to the more frequent intrastate conflicts, these represent only 7 of the some 273 US military deployments since 1900. We argue that these intrastate conflicts limit the utility of regional balances of power in mitigating forms of conflict that the US may consider inimical to its national security interests. When considering potential changes to US force posture and grand strategy, American coercive statecraft should be theorised along a broader strategic continuum encompassing the full range of conflict. 相似文献
124.
Mihail Naydenov 《Defense & Security Analysis》2018,34(1):93-112
Russia has long been pursuing an intended and calculated policy of keeping enough influence in Bulgaria in order to have control over national decisions. Together with the economic, energy, political and information tools used by Russia in its hybrid war against Bulgaria and in its bid to achieve an enduring “state capture,” defence is also a distinct target of Russian subversion now. A list of noticeable subversive actions with tangible effects can be summarised, ranging from fuelling division and manipulating public opinion, preventing the strengthening of the NATO position in the Black Sea, sabotaging defence reform to various options of subverting the modernisation of the Bulgarian Armed Forces and seeking new ways to keep legacy Soviet military equipment in operation as long as possible. This issue must be urgently addressed both nationally and in NATO. 相似文献
125.
Alexander Lanoszka 《Contemporary Security Policy》2018,39(2):234-257
Recent tensions between Russia and the United States have sparked debate over the value of the North Atlantic Treaty Organization (NATO). One controversy surrounds the extent to which NATO raises the risk of war through entrapment—a concept that scholars invoke to describe how states might drag their allies into undesirable military conflicts. Yet scholars have advanced different, even conflicting arguments about how entrapment risks arise. I offer a typology that distinguishes between the mechanisms through which entrapment risks allegedly emerge on the basis of their institutional, systemic, reputational, and transnational ideological sources. I use the 2008 Russo-Georgian War to illustrate how the purported mechanisms of entrapment fare in elucidating that conflict. In analyzing why entrapment risks emerge, and thinking counterfactually about The 2008 War, I argue that scholars need to disentangle the various mechanisms that drive both alliance formation and war to make sure that entrapment risks do indeed exist. 相似文献
126.
CHENG Hong 《国防科技》2018,39(1):001-004
坚持向科技创新要战斗力,落实到国防动员建设领域,就是要紧紧围绕党在新形势下的强军目标,积极适应现代战争形态新变化、世界军事变革新趋势、总体国家安全新要求和军队使命任务新拓展,加强高技术力量平战一体国防动员,搭建起高技术力量在经济与军事、地方与军队、潜力与实力、平时与战时的桥梁和纽带,全面提升国防动员战时应战、急时应急、平时服务能力,为保障军队能打仗、打胜仗提供强大科技支撑。 相似文献
127.
128.
伊拉克战争美军后勤(装备)保障特点及启示 总被引:1,自引:0,他引:1
伊拉克战争中,美军采取多种手段和措施,成功地实施了后勤(装备)保障,在保障准备、保障方法、保障信息化建设等方面呈现出许多新特点,为我军做好新形势下的装备保障工作提供了有益的启示。 相似文献
129.
David Lonsdale 《Journal of Military Ethics》2016,15(2):100-121
The objective of this article is to move ethical discourse on military strategy beyond the confines of the established War Convention. This is achieved by utilising the common good, a concept found in political philosophy and theology. The common good acts as a positive organising concept for socio-political activity. With its focus on peace, development and the flourishing of the individual and community, the common good poses a significant challenge to strategy. This article constructs an approach to strategy that is compatible with the common good. Importantly, it does so whilst respecting the pursuit of victory as an indispensable component of strategy’s true nature. The theory presented in this article is then tested in relation to four different modes of strategy: regular war, irregular war, deterrence, and cyberwar. 相似文献
130.
Ross W. Bellaby 《Journal of Military Ethics》2016,15(4):299-319
The surge in threats aided by or carried out through cyberspace has placed significant pressure on the intelligence community to adapt or leave itself open to attack. Indeed, many in both political and intelligence circles argue for access to ever greater amounts of cyber information in order to catch potential threats before they become real. By collecting all our digital information, the intelligence community argues that it is not only able to detail what people have done or are currently doing but also predict what their next move might be. However, the ethical implications are unclear and the backlash following Edward Snowden’s revelations have shown that such activities are not without controversy. This leaves the debate stuck between the important, ethical role that intelligence can play and the potential for its unrestrained use to cause undue harm. This paper will resolve this by giving greater detail to cyber-intelligence practices, highlighting the different levels of harm that the various intelligence operations can cause. The essence of this paper is not that cyber-intelligence should be banned outright, but that it can be justified given the necessary circumstances. Therefore, the paper will develop a specialised set of Just Cyber-Intelligence Principles, built on the just war tradition, to outline if and when such activities are justified. 相似文献