首页 > 最新文献

The RUSI Journal最新文献

英文 中文
Afghanistan’s Significance for NATO Strategy 阿富汗对北约战略的重要性
Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2133741
H. Larsen
NATO has reaffirmed crisis management as one of its ‘core tasks’, even as it strengthens collective defence amid Russia’s invasion of Ukraine, and specifically refers to the need to learn from Afghanistan. Henrik Larsen argues that NATO needs to face the uncomfortable realities that can explain the failure of its most ambitious and deadliest operation in its history. Given that the Afghanistan experience makes a strong case against crisis management, he argues that NATO should refine its definition: ‘crisis’ synonymous with the prevention of inter-state conflict rather than diffuse threats such as global terrorism; and ‘management’ synonymous with over-the-horizon rather than open-ended operations or the supply of weapons like the case of Ukraine. ◼
北约重申危机管理是其“核心任务”之一,尽管它在俄罗斯入侵乌克兰期间加强了集体防御,并特别提到需要从阿富汗学习。Henrik Larsen认为,北约需要面对令人不安的现实,这可以解释其历史上最雄心勃勃和最致命的行动失败的原因。鉴于阿富汗的经验对危机管理提出了强有力的反对,他认为北约应该完善其定义:“危机”是预防国家间冲突的同义词,而不是像全球恐怖主义这样的扩散威胁;“管理”是“超视距”的同义词,而不是像乌克兰那样的开放式行动或武器供应。◼
{"title":"Afghanistan’s Significance for NATO Strategy","authors":"H. Larsen","doi":"10.1080/03071847.2022.2133741","DOIUrl":"https://doi.org/10.1080/03071847.2022.2133741","url":null,"abstract":"NATO has reaffirmed crisis management as one of its ‘core tasks’, even as it strengthens collective defence amid Russia’s invasion of Ukraine, and specifically refers to the need to learn from Afghanistan. Henrik Larsen argues that NATO needs to face the uncomfortable realities that can explain the failure of its most ambitious and deadliest operation in its history. Given that the Afghanistan experience makes a strong case against crisis management, he argues that NATO should refine its definition: ‘crisis’ synonymous with the prevention of inter-state conflict rather than diffuse threats such as global terrorism; and ‘management’ synonymous with over-the-horizon rather than open-ended operations or the supply of weapons like the case of Ukraine. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124842624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internet Shutdowns 互联网关闭
Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2156234
Julia Ryng, Guillemette Guicherd, J. Saman, Priyanka Choudhury, Angharad Kellett
The internet is a double-edged sword: civilians can mobilise it to assemble and voice dissent, but illiberal regimes can also weaponise it to consolidate power and suppress any form of opposition. Internet shutdowns – intentional disruptions of internet services – represent one method used to limit citizens’ freedom of expression, information, peaceful assembly and other associated rights in the name of national security. Julia Ryng, Guillemette Guicherd, Judy Al Saman, Priyanka Choudhury and Angharad Kellett examine the cases of Myanmar and Belarus: two distinct political regimes that nonetheless converge on similar strategies of repression. Through this comparative analysis, the authors highlight how future repression is likely to work and how compelling policy responses can be formulated. ◼
互联网是一把双刃剑:平民可以利用它集会并表达不同意见,但不自由的政权也可以利用它来巩固权力并压制任何形式的反对。互联网关闭——故意中断互联网服务——是以国家安全的名义限制公民言论自由、信息自由、和平集会自由和其他相关权利的一种方法。Julia ryung, Guillemette Guicherd, Judy Al Saman, Priyanka Choudhury和Angharad Kellett研究了缅甸和白俄罗斯的案例:两个截然不同的政治政权,却采取了相似的镇压策略。通过这种比较分析,作者强调了未来的压制可能如何发挥作用,以及如何制定令人信服的政策回应。◼
{"title":"Internet Shutdowns","authors":"Julia Ryng, Guillemette Guicherd, J. Saman, Priyanka Choudhury, Angharad Kellett","doi":"10.1080/03071847.2022.2156234","DOIUrl":"https://doi.org/10.1080/03071847.2022.2156234","url":null,"abstract":"The internet is a double-edged sword: civilians can mobilise it to assemble and voice dissent, but illiberal regimes can also weaponise it to consolidate power and suppress any form of opposition. Internet shutdowns – intentional disruptions of internet services – represent one method used to limit citizens’ freedom of expression, information, peaceful assembly and other associated rights in the name of national security. Julia Ryng, Guillemette Guicherd, Judy Al Saman, Priyanka Choudhury and Angharad Kellett examine the cases of Myanmar and Belarus: two distinct political regimes that nonetheless converge on similar strategies of repression. Through this comparative analysis, the authors highlight how future repression is likely to work and how compelling policy responses can be formulated. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128473224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Assessing Dynamics of Control Through Iranian Technology Transfer to Yemen’s Houthis 通过伊朗向也门胡塞武装转让技术来评估控制动态
Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2148557
Henry P. Thompson, Jack Watling
This article examines the scale and significance of Iranian technology transfer to Ansar Allah in Yemen in underpinning the Houthi way of war. Henry Thompson and Jack Watling consider how Iran balances the transfer of manufacturing capabilities versus the provision of complete systems to exercise influence over the Houthis’ strikes on their adversaries. The article argues that the provision of key components gives Iran intimate access to Houthi planning, and therefore extensive indirect influence over how the Houthis fight. This structural dependence enables Iran to exercise command decisions without the need to intrusively exercise control. ◼
本文考察了伊朗向也门的安拉支持者转让技术的规模和意义,以支持胡塞的战争方式。亨利·汤普森和杰克·沃特林考虑了伊朗如何平衡制造能力的转移与提供完整的系统,以对胡塞武装对其对手的袭击施加影响。文章认为,提供关键部件使伊朗能够密切接触胡塞武装的计划,从而对胡塞武装的战斗方式产生广泛的间接影响。这种结构性依赖使伊朗能够行使指挥决策,而无需侵入性地行使控制。◼
{"title":"Assessing Dynamics of Control Through Iranian Technology Transfer to Yemen’s Houthis","authors":"Henry P. Thompson, Jack Watling","doi":"10.1080/03071847.2022.2148557","DOIUrl":"https://doi.org/10.1080/03071847.2022.2148557","url":null,"abstract":"This article examines the scale and significance of Iranian technology transfer to Ansar Allah in Yemen in underpinning the Houthi way of war. Henry Thompson and Jack Watling consider how Iran balances the transfer of manufacturing capabilities versus the provision of complete systems to exercise influence over the Houthis’ strikes on their adversaries. The article argues that the provision of key components gives Iran intimate access to Houthi planning, and therefore extensive indirect influence over how the Houthis fight. This structural dependence enables Iran to exercise command decisions without the need to intrusively exercise control. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121335129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How the Israel Defense Forces Seek to Defeat Non-State Actors 以色列国防军如何寻求击败非国家行为体
Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2150418
Ehud Eilam
The Israel Defense Forces (IDF) have been at war with Hizbullah and Hamas, two powerful non-state actors, several times throughout Israel’s history. In the next war, the IDF will seek to gain a decisive and quick victory, by launching a large-scale offensive, and strive to destroy military targets, such as rockets. It will continue to rely heavily on firepower, mostly from the air, while carrying out a limited manoeuvre on the ground to reduce its casualties. Yet, Ehud Eilam argues, a massive ground offensive might be needed with such a buildup being based on the air force, infantry and intelligence. ◼
在以色列历史上,以色列国防军(IDF)曾多次与真主党和哈马斯这两个强大的非国家行为体交战。在下一次战争中,以色列国防军将寻求通过发动大规模攻势来获得决定性和速战速决的胜利,并努力摧毁军事目标,如火箭。它将继续严重依赖火力,主要来自空中,同时在地面上进行有限的机动以减少伤亡。然而,Ehud Eilam认为,大规模的地面进攻可能需要以空军,步兵和情报为基础的集结。◼
{"title":"How the Israel Defense Forces Seek to Defeat Non-State Actors","authors":"Ehud Eilam","doi":"10.1080/03071847.2022.2150418","DOIUrl":"https://doi.org/10.1080/03071847.2022.2150418","url":null,"abstract":"The Israel Defense Forces (IDF) have been at war with Hizbullah and Hamas, two powerful non-state actors, several times throughout Israel’s history. In the next war, the IDF will seek to gain a decisive and quick victory, by launching a large-scale offensive, and strive to destroy military targets, such as rockets. It will continue to rely heavily on firepower, mostly from the air, while carrying out a limited manoeuvre on the ground to reduce its casualties. Yet, Ehud Eilam argues, a massive ground offensive might be needed with such a buildup being based on the air force, infantry and intelligence. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124403809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Royal Navy and Julian Corbett, 1990–2020 皇家海军和朱利安·科比特,1990-2020
Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2126387
A. Livsey
Sir Julian Stafford Corbett (1854–1922) is perhaps the UK’s most influential maritime thinker, but how influential has he been with the Royal Navy of the past 30 years, and how important should he be? Andrew Livsey shows that the answer to the first question is only slightly. He played a major role in the early editions of Book of Reference 1806, British Maritime Doctrine, but less thereafter. His influence elsewhere is difficult to find and his place in naval tuition has been limited. For the second question, Corbett has a role, but the Royal Navy has much else to consider. ◼
朱利安·斯塔福德·科比特爵士(Julian Stafford Corbett, 1854-1922)或许是英国最有影响力的海事思想家,但在过去30年里,他对皇家海军的影响有多大?他应该有多重要?Andrew Livsey告诉我们,第一个问题的答案只有一点点。他在1806年《英国海事学说》的早期版本中发挥了重要作用,但此后就不那么重要了。他在其他地方的影响力很难找到,他在海军教学中的地位也很有限。对于第二个问题,科比特发挥了作用,但皇家海军还有很多其他需要考虑的问题。◼
{"title":"The Royal Navy and Julian Corbett, 1990–2020","authors":"A. Livsey","doi":"10.1080/03071847.2022.2126387","DOIUrl":"https://doi.org/10.1080/03071847.2022.2126387","url":null,"abstract":"Sir Julian Stafford Corbett (1854–1922) is perhaps the UK’s most influential maritime thinker, but how influential has he been with the Royal Navy of the past 30 years, and how important should he be? Andrew Livsey shows that the answer to the first question is only slightly. He played a major role in the early editions of Book of Reference 1806, British Maritime Doctrine, but less thereafter. His influence elsewhere is difficult to find and his place in naval tuition has been limited. For the second question, Corbett has a role, but the Royal Navy has much else to consider. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124580258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Between Two Rivers 两河之间
Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2154969
S. Schulman
{"title":"Between Two Rivers","authors":"S. Schulman","doi":"10.1080/03071847.2022.2154969","DOIUrl":"https://doi.org/10.1080/03071847.2022.2154969","url":null,"abstract":"","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126188585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Offensive Cyber Operations: Understanding Intangible Warfare 进攻性网络作战:理解无形战争
Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2154473
A. Colasanti
When it comes to cyber, it is common to hear calls for interdisciplinary approaches, be it in the private sector, policy circles or academia. Daniel Moore is someone capable of marrying technical knowledge on information security with strategic studies proficiency. His Offensive Cyber Operations: Understanding Intangible Warfare is an authoritative account of the tactical exploitation of computer technologies and networks in interstate conflicts. The book is a welcome addition to the broader literature on cyber studies as it successfully moves beyond the many hyperbolic narratives of a debate prone to the technological determinism of the revolutions in military affairs. The central argument of the book is that computer network exploitation represents the latest stage in the evolution of ‘intangible warfare’, all those non-kinetic ‘efforts to undermine transmission, reception, and processing of data’ (p. 8) in the larger theatre of operations. In his account of the tactics of warfare that do not have a physical manifestation, Moore explains that the targeting of information and communication technologies (ICTs) for military and intelligence purposes is the result of gradual counter-innovations to military technologies during the 20th century, from the First World War to the Gulf War.
当涉及到网络时,无论是在私营部门、政策圈还是学术界,都经常听到对跨学科方法的呼吁。Daniel Moore是一个能够将信息安全方面的技术知识与战略研究能力相结合的人。他的《进攻性网络作战:理解无形战争》是一本关于在国家间冲突中战术利用计算机技术和网络的权威著作。这本书是广泛的网络研究文献的一个受欢迎的补充,因为它成功地超越了许多关于军事革命的技术决定论的辩论的夸张叙述。本书的中心论点是,计算机网络的利用代表了“无形战争”演变的最新阶段,所有这些非动能的“破坏数据传输、接收和处理的努力”(第8页)都在更大的作战领域。在他对没有物理表现的战争战术的描述中,摩尔解释说,从第一次世界大战到海湾战争,20世纪军事技术逐渐反创新的结果是将信息和通信技术(ict)用于军事和情报目的。
{"title":"Offensive Cyber Operations: Understanding Intangible Warfare","authors":"A. Colasanti","doi":"10.1080/03071847.2022.2154473","DOIUrl":"https://doi.org/10.1080/03071847.2022.2154473","url":null,"abstract":"When it comes to cyber, it is common to hear calls for interdisciplinary approaches, be it in the private sector, policy circles or academia. Daniel Moore is someone capable of marrying technical knowledge on information security with strategic studies proficiency. His Offensive Cyber Operations: Understanding Intangible Warfare is an authoritative account of the tactical exploitation of computer technologies and networks in interstate conflicts. The book is a welcome addition to the broader literature on cyber studies as it successfully moves beyond the many hyperbolic narratives of a debate prone to the technological determinism of the revolutions in military affairs. The central argument of the book is that computer network exploitation represents the latest stage in the evolution of ‘intangible warfare’, all those non-kinetic ‘efforts to undermine transmission, reception, and processing of data’ (p. 8) in the larger theatre of operations. In his account of the tactics of warfare that do not have a physical manifestation, Moore explains that the targeting of information and communication technologies (ICTs) for military and intelligence purposes is the result of gradual counter-innovations to military technologies during the 20th century, from the First World War to the Gulf War.","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122997367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Prosecuting the Post-Digital Hyper-War 起诉后数字超级战争
Pub Date : 2022-07-29 DOI: 10.1080/03071847.2022.2144431
M. Crilly
The ubiquity and pervasiveness of digital technologies in modern societies portend a new type of conflict, a hyper-war of conflicting narratives, concepts and ideas. This multi-dimensional physical, virtual and cognitive battlespace is challenging the Westphalian model of multi-domain but mono-dimensional physical battle: it is moving conflict beyond the digital augmentation of Industrial Age platforms, into a new post-digital era. In this think piece, Martin Crilly reflects on how UK Defence will require imagination, ingenuity and inspiring leaders to successfully navigate this transition. ◼
现代社会中无处不在的数字技术预示着一种新型的冲突,一种相互冲突的叙述、概念和思想的超级战争。这种多维物理、虚拟和认知的战斗空间正在挑战威斯特伐利亚的多域单维物理战斗模式:它正在将冲突从工业时代平台的数字增强转移到新的后数字时代。在这篇思考文章中,Martin Crilly反思了英国国防部将如何需要想象力、独创性和鼓舞人心的领导者来成功地度过这一转变。◼
{"title":"Prosecuting the Post-Digital Hyper-War","authors":"M. Crilly","doi":"10.1080/03071847.2022.2144431","DOIUrl":"https://doi.org/10.1080/03071847.2022.2144431","url":null,"abstract":"The ubiquity and pervasiveness of digital technologies in modern societies portend a new type of conflict, a hyper-war of conflicting narratives, concepts and ideas. This multi-dimensional physical, virtual and cognitive battlespace is challenging the Westphalian model of multi-domain but mono-dimensional physical battle: it is moving conflict beyond the digital augmentation of Industrial Age platforms, into a new post-digital era. In this think piece, Martin Crilly reflects on how UK Defence will require imagination, ingenuity and inspiring leaders to successfully navigate this transition. ◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132163978","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Forgotten Success 被遗忘的成功
Pub Date : 2022-05-18 DOI: 10.1080/03071847.2022.2072764
L. Risso
Abstract By collecting and destroying the weapons that had been handed over by rebel Albanian fighters, Operation Essential Harvest ended violence in North Macedonia and paved the way for constitutional change. Through interviews with political and military leaders, and analysis of official sources published by NATO at the time, Linda Risso demonstrates how early diplomatic intervention, the personal commitment of key leaders and a perfectly executed military operation achieved the expected goals within the given timeframe, and contributed significantly to the prevention of another ethnic conflict in the Western Balkans.◼
通过收缴和销毁阿尔巴尼亚叛军上交的武器,“重要收获行动”结束了北马其顿的暴力冲突,为宪法改革铺平了道路。通过对政治和军事领导人的采访,以及对当时北约发布的官方资料的分析,琳达·里索展示了早期的外交干预、关键领导人的个人承诺和一次完美执行的军事行动是如何在给定的时间框架内实现预期目标的,并为防止西巴尔干地区再次发生种族冲突做出了重大贡献
{"title":"A Forgotten Success","authors":"L. Risso","doi":"10.1080/03071847.2022.2072764","DOIUrl":"https://doi.org/10.1080/03071847.2022.2072764","url":null,"abstract":"Abstract By collecting and destroying the weapons that had been handed over by rebel Albanian fighters, Operation Essential Harvest ended violence in North Macedonia and paved the way for constitutional change. Through interviews with political and military leaders, and analysis of official sources published by NATO at the time, Linda Risso demonstrates how early diplomatic intervention, the personal commitment of key leaders and a perfectly executed military operation achieved the expected goals within the given timeframe, and contributed significantly to the prevention of another ethnic conflict in the Western Balkans.◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131586327","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decaying National Security and the Rise of Imagined Tribalism 衰落的国家安全与想象中的部落主义的兴起
Pub Date : 2022-05-17 DOI: 10.1080/03071847.2022.2072763
B. Murphy
In an era where the exchange of information has been radically transformed by new technologies, Brian Murphy argues that states should no longer be considered the imagined communities that underpin dominant concepts of national security. He contends that national security experts should think in terms of ‘imagined tribes’ instead.◼
在一个信息交换被新技术彻底改变的时代,布莱恩•墨菲(Brian Murphy)认为,国家不应再被视为支撑主导国家安全概念的想象共同体。他认为,国家安全专家应该从“想象中的部落”的角度来思考
{"title":"Decaying National Security and the Rise of Imagined Tribalism","authors":"B. Murphy","doi":"10.1080/03071847.2022.2072763","DOIUrl":"https://doi.org/10.1080/03071847.2022.2072763","url":null,"abstract":"In an era where the exchange of information has been radically transformed by new technologies, Brian Murphy argues that states should no longer be considered the imagined communities that underpin dominant concepts of national security. He contends that national security experts should think in terms of ‘imagined tribes’ instead.◼","PeriodicalId":221517,"journal":{"name":"The RUSI Journal","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126522945","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
The RUSI Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1