排序方式: 共有245条查询结果,搜索用时 0 毫秒
41.
Peter Dahl Thruelsen 《Small Wars & Insurgencies》2013,24(4):619-643
This article argues that the debate on security sector reform (SSR) needs to be taken further by taking into consideration the fact that, even though the SSR concept was not originally developed as an element in stabilising states undergoing an insurgency, it is very much being used for exactly that. When conducting counterinsurgency with a focus on the creation of stability, the baseline will ultimately have to be security sector stabilisation (SSS) as a precondition for complete SSR implementation. However, the two must be connected to avoid them undermining each other. This is important if a comprehensive approach to programme implementation and especially sustainability is to guide the programme, and not just isolated ‘train and equip’ stand-alone projects that do not solve either the initial need for stabilisation or the long-term need for accountable security forces. Currently, in Afghanistan the surge for security by the international military is in danger of overtaking the other elements of the SSR, thereby undermining the primary end state and thus risking laying the wrong foundation for the long-term process of SSR. 相似文献
42.
43.
Saskia Baas 《Small Wars & Insurgencies》2013,24(3):518-535
This article discusses the development of a low-intensity conflict in Sudan's eastern region between 1994 and 2006. Drawing on data collected in the region in 2009, recruitment processes within three different insurgent groups are analysed and compared, paying attention to the impact of these processes on insurgents' organisational development and military capacity. The peace process in Eastern Sudan is further discussed, focusing specifically on the disarmament, demobilisation, and reintegration (DDR) programmes for former insurgents. The article finally discusses current developments and draws conclusions regarding the risk of renewed rebellion in Eastern Sudan. 相似文献
44.
Saira Basit 《Small Wars & Insurgencies》2013,24(5-6):1040-1064
ABSTRACTSectarian militants have for years launched attacks from Pakistan across the border to Iran. Finding sanctuary in a neighbouring country can make the difference between success and failure for militants. Conventional wisdom holds that a lasting transnational militancy challenge would typically create serious interstate conflict. Militancy has triggered armed encounters between Iran and Pakistan. This article argues that despite some tension militancy has resulted in deeper cooperation in the ambivalent dyad. Both states’ overarching security concerns, having exhausted other options, the believed involvement of third-party states, and economic potential, have moderately alleviated negative pressure caused by militancy. 相似文献
45.
Christopher Day 《Small Wars & Insurgencies》2013,24(5):811-835
This article explains the demise of Sierra Leone's Revolutionary United Front (RUF) rebellion. It argues that the main cause of this fate was the group's relationship with its primary sponsor, Charles Taylor. The RUF's dependency on Taylor's patronage, coupled with the rebellion's weak organisational endowments harmed the group's prospects of success. Based on original research, the article shows how Taylor used the RUF as a strategic instrument for his own regional interests, which led to the group's unravelling. More broadly, the article speaks about proxy warfare in Africa and how the relationship between resource flows and rebellion are not always beneficial to rebels as one might expect. 相似文献
46.
Charles R. Boehmer 《Defence and Peace Economics》2013,24(3):249-268
This paper extends the joint product model of military alliances to apply to the new strategic doctrine adopted by NATO in the 1990s. In particular, a choice must be made between protecting one's own territory and pooling forces for an alliancewide rapid reaction force. This new model accounts for a host of externalities and their implications for burden sharing, full financing, and allocative efficiency. The Pigouvian taxes that adjust for force thinning and attack deflection are shown to finance optimal border‐protecting forces under a variety of circumstances. Second‐best considerations arise owing to the pure publicness of rapid reaction forces. The ideal toll arrangement does not currently characterize NATO financing, nor is it likely to do so. 相似文献
47.
Artyom Jelnov 《Defence and Peace Economics》2013,24(6):648-657
This paper studies a strategic conflict between a state and a non-state military organization. The non-state military organization decides whether to attack or not to attack the state, while the state decides on its counter-measure. If the state uses a high level of violence against the non-state organization, it may be accused by the international community of ‘non-proportional’ use of force, and both sides of the conflict take this possibility into account. The model predicts that it may be rational for the non-state organization to attack the state, even if as a reaction the state will militarily destroy this organization, due to a positive probability the state will be punished by the international community for non-proportional use of violence. 相似文献
48.
Roland Bensted 《African Security Review》2013,22(3):84-90
Paul Collier has produced a well-written and apparently plausible thesis on ‘greed and grievance’, evidenced in several published texts, which concludes unambiguously that greed, not grievance, is overwhelmingly the cause of conflict. However, Collier has based these findings upon narrowly defined quantitative measures–three defined indices of greed and four indices of grievance. Collier consciously omitted indices which he found difficult to measure, such as suppliers of armaments and opportunities for bureaucratic corruption. However, he appears to have unwittingly omitted some further factors, including governance, management mechanisms for natural resources and the influence that charismatic leadership can have on rebel groups. These omissions can be viewed as a major flaw in Collier's work. They also explain why Collier has diagnosed that civil wars are more likely to occur in some countries in the developing world without offering adequate explanation of why this may be so. 相似文献
49.
This article examines the geopolitical dynamics associated with the African Union (AU) and United Nations hybrid operation in Darfur (UNAMID) from the start of the Darfur conflict in 2003 until the time when UNAMID became fully operational in 2011. It provides an overview of the complex forces and geopolitical dynamics that affected the deployment of UNAMID and shaped its unique hybrid character. It mainly highlights those primary geopolitical factors that hindered the full deployment of UNAMID. It is concluded that this period was a showcase for the newly established AU and its support for its member states, as well as a new approach for the international community to maintain international peace and security in alliance with regional organisations. 相似文献
50.
Erin D. Dumbacher 《The Nonproliferation Review》2013,20(3-4):203-222
ABSTRACTAn arms race in cyberspace is underway. US and Western government efforts to control this process have largely been limited to deterrence and norm development. This article examines an alternative policy option: arms control. To gauge whether arms-control models offer useful lessons for addressing cyber capabilities, this article compiles a new dataset of predominantly twentieth-century arms-control agreements. It also evaluates two case studies of negotiated agreements that regulate dual-use technologies, the 1928 Geneva Protocol prohibiting chemical- and biological-weapon use and the 1944 Chicago Convention on International Civil Aviation. The analysis underscores the limits of norm development for emerging technologies with both civilian and military applications. It finds lessons for developing verifiable, international cooperation mechanisms for cyberwarfare in the regulatory model of international aviation. Conventionally, arms-control agreements take advantage of transparent tests or estimates of arms. To restrict cyberwarfare activities, experts and policy makers must adapt arms-control models to a difficult-to-measure technology at an advanced stage of development and use. Further investigation of international regulatory schemes for dual-use technology of similar diffusion and development to the internet, such as international civil aviation, is needed. 相似文献