Pub Date : 2023-10-02DOI: 10.1080/14702436.2023.2277456
M. Sezal
ABSTRACT The contemporary defence sector is dominated by dual-use technologies which have both military and civilian applications. The trade of these technologies is governed by export controls. Designation of technologies as “dual-use” and export control regimes can be considered as securitisation of such technologies. Securitisation refers to the discursive construction of existential threats. This article seeks to understand which actors desire securitisation or its opposite, desecuritisation, of technology. The contribution of this research is twofold. Firstly, securitisation of technology has implications for understanding defence and security in contemporary Europe. Secondly, identifying the actors involved in (de)securitisation allows for the analysis of their different roles in determining security discourses around technologies. The article builds on the literature on securitisation theory. Then it explores the EU-level export control regimes and afterwards focuses on a single case study of the Netherlands both as representative of smaller European states with an SME-heavy defence sector and as an example of an expanded export control regime by a member state. To conduct the analysis, I use the data obtained through a workshop with representatives of Dutch defence companies as well as a survey that has been answered by security and defence experts.
{"title":"Security-defence nexus in flux: (De)securitisation of technology in the Netherlands","authors":"M. Sezal","doi":"10.1080/14702436.2023.2277456","DOIUrl":"https://doi.org/10.1080/14702436.2023.2277456","url":null,"abstract":"ABSTRACT The contemporary defence sector is dominated by dual-use technologies which have both military and civilian applications. The trade of these technologies is governed by export controls. Designation of technologies as “dual-use” and export control regimes can be considered as securitisation of such technologies. Securitisation refers to the discursive construction of existential threats. This article seeks to understand which actors desire securitisation or its opposite, desecuritisation, of technology. The contribution of this research is twofold. Firstly, securitisation of technology has implications for understanding defence and security in contemporary Europe. Secondly, identifying the actors involved in (de)securitisation allows for the analysis of their different roles in determining security discourses around technologies. The article builds on the literature on securitisation theory. Then it explores the EU-level export control regimes and afterwards focuses on a single case study of the Netherlands both as representative of smaller European states with an SME-heavy defence sector and as an example of an expanded export control regime by a member state. To conduct the analysis, I use the data obtained through a workshop with representatives of Dutch defence companies as well as a survey that has been answered by security and defence experts.","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":"86 1","pages":"665 - 686"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139324123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-02DOI: 10.1080/14702436.2023.2277436
G. Giacomello, Oltion Preka
ABSTRACT The European Union defence sector is not only crucial for the EU’s security, but it is also a major industrial asset for EU member states, as it may foster innovation and greater integration among member states, as well as facilitate technology transfer. The understanding of and inferences about the sector, however, are laborious since data on the defence industry in Europe is often contradictory and confused and it is mostly compared at the national not at the European level. As a contribution to address such shortcomings and as opening piece for this Special Issue, this article focuses on the finding, collecting, cleaning, and organizing data on the geographical concentration/location of EU defence industries. This is a fully original descriptive analysis of the current situation, and it provides a reliable basis on the concentration/location of defence companies. This paper represents a firm basis from which to explore (in future research) how defence companies contribute to the technological integration of the EU and it should help the reader to better understand the following articles in this Special Issue.
{"title":"Sources of strength: mapping the defence sector in Europe","authors":"G. Giacomello, Oltion Preka","doi":"10.1080/14702436.2023.2277436","DOIUrl":"https://doi.org/10.1080/14702436.2023.2277436","url":null,"abstract":"ABSTRACT The European Union defence sector is not only crucial for the EU’s security, but it is also a major industrial asset for EU member states, as it may foster innovation and greater integration among member states, as well as facilitate technology transfer. The understanding of and inferences about the sector, however, are laborious since data on the defence industry in Europe is often contradictory and confused and it is mostly compared at the national not at the European level. As a contribution to address such shortcomings and as opening piece for this Special Issue, this article focuses on the finding, collecting, cleaning, and organizing data on the geographical concentration/location of EU defence industries. This is a fully original descriptive analysis of the current situation, and it provides a reliable basis on the concentration/location of defence companies. This paper represents a firm basis from which to explore (in future research) how defence companies contribute to the technological integration of the EU and it should help the reader to better understand the following articles in this Special Issue.","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":"123 4 1","pages":"531 - 560"},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139324615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-15DOI: 10.1080/14702436.2023.2253740
None Archana, OP Soni, Megha Ojha
ABSTRACTThe present review addresses the effectiveness of combat motivation and how it can bring positive change that helps the Military services to improve and be innovative in the current tough environment. It aimed to identify the factors that influence the soldiers to get immune from the perpetual fear of Death. A sample of 415 soldiers has been conducted with the help of a self-structured interview. Exploratory Factor Analysis (EFA) highlights duty, honor, and country; the military slogan and war cry; leadership& training; Regiment pride or community Pride;The desire to win war and go home; Avenging The Matrydom & Atitude Towards Enemy; Personal Gratification and commitment to Brothers in ARMS & Commitment towards nation are the major Combat Motivational factors in the Indian army. Combat Motivation is confirmed as an eighth factor model in the army by confirmatory factor analysis (CFA). The study suggests using commitment-based leadership strategies and tactics in the army that increase the motivation to get immune from the perpetual fear of Death of soldiers from the selected sample. The information obtained from this study can provide a framework to assist Army leaders, Commanders, and training and development for future soldiers.KEYWORDS: Combat motivationthe military systemIndian armymartyrs Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributors ArchanaArchana, is a PhD Research Scholar in the Department of Management Studies, Graphic Era Deemed to be University, Dehradun, India.OP SoniOP Soni, Maj Gen. Prof.(Dr) VSM ,ndc is a Professor and Dean of Department of Management Studies, Graphic Era Deemed to be University, Dehradun, India.Megha OjhaMegha Ojha, is a PhD Research Scholar in the Department of Management Studies Graphic Era Deemed to be University, Dehradun, India.
{"title":"A study on combat motivation: how soldiers get immune to the perpetual fear of death","authors":"None Archana, OP Soni, Megha Ojha","doi":"10.1080/14702436.2023.2253740","DOIUrl":"https://doi.org/10.1080/14702436.2023.2253740","url":null,"abstract":"ABSTRACTThe present review addresses the effectiveness of combat motivation and how it can bring positive change that helps the Military services to improve and be innovative in the current tough environment. It aimed to identify the factors that influence the soldiers to get immune from the perpetual fear of Death. A sample of 415 soldiers has been conducted with the help of a self-structured interview. Exploratory Factor Analysis (EFA) highlights duty, honor, and country; the military slogan and war cry; leadership& training; Regiment pride or community Pride;The desire to win war and go home; Avenging The Matrydom & Atitude Towards Enemy; Personal Gratification and commitment to Brothers in ARMS & Commitment towards nation are the major Combat Motivational factors in the Indian army. Combat Motivation is confirmed as an eighth factor model in the army by confirmatory factor analysis (CFA). The study suggests using commitment-based leadership strategies and tactics in the army that increase the motivation to get immune from the perpetual fear of Death of soldiers from the selected sample. The information obtained from this study can provide a framework to assist Army leaders, Commanders, and training and development for future soldiers.KEYWORDS: Combat motivationthe military systemIndian armymartyrs Disclosure statementNo potential conflict of interest was reported by the author(s).Additional informationNotes on contributors ArchanaArchana, is a PhD Research Scholar in the Department of Management Studies, Graphic Era Deemed to be University, Dehradun, India.OP SoniOP Soni, Maj Gen. Prof.(Dr) VSM ,ndc is a Professor and Dean of Department of Management Studies, Graphic Era Deemed to be University, Dehradun, India.Megha OjhaMegha Ojha, is a PhD Research Scholar in the Department of Management Studies Graphic Era Deemed to be University, Dehradun, India.","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135395175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01Epub Date: 2022-05-05DOI: 10.1017/BrImp.2022.13
Kate Rachel Gould, Matthew Carolan, Jennie Louise Ponsford
Cyberscams, such as romance scams, are prevalent and costly online hazards in the general community. People with Acquired Brain Injury (ABI) may be particularly vulnerable and have greater difficulty recovering from the resultant emotional and financial hardships. In order to build capacity in the neurorehabilitation sector, it is necessary to determine whether clinicians currently encounter this issue and what prevention and intervention approaches have been found effective. This scoping study aimed to explore clinicians' exposure to and experiences with cyberscams in their adult clients with ABI.
Method: Participants were clinicians recruited from multidisciplinary networks across Australia and New Zealand. Eligible participants (n = 101) completed an online customised survey.
Results: More than half (53.46%) the participants had one or more clients affected by cyberscams, predominantly romance scams. Cognitive impairments and loneliness were reportedly associated with increased vulnerability. Cyberscams impacted treatment provision and were emotionally challenging for participants. No highly effective interventions were identified.
Conclusions: These findings indicate that cyberscams are a clinical issue relevant to neurorehabilitation providers, with prevalence studies now required. The lack of effective interventions identified underscores the need for the development of evidence-based prevention and treatment approaches to ultimately help people with ABI safely participate in online life.
网络诈骗(如恋爱诈骗)是普通社区普遍存在的网络危害,代价高昂。后天性脑损伤(ABI)患者可能特别容易受到网络诈骗的侵害,并且在情感和经济上更难恢复。为了提高神经康复部门的能力,有必要确定临床医生目前是否遇到过这一问题,以及哪些预防和干预方法是有效的。本范围界定研究旨在探讨临床医生在其患有 ABI 的成年客户中接触网络诈骗的情况和经历:参与者是从澳大利亚和新西兰的多学科网络中招募的临床医生。符合条件的参与者(n = 101)完成了一项在线定制调查:超过半数(53.46%)的参与者有一位或多位客户受到网络诈骗的影响,主要是恋爱诈骗。据报告,认知障碍和孤独感与易受害性增加有关。网络诈骗影响了治疗的提供,并对参与者的情绪造成挑战。没有发现非常有效的干预措施:这些研究结果表明,网络诈骗是一个与神经康复服务提供者相关的临床问题,现在需要进行流行率研究。由于缺乏有效的干预措施,因此需要开发以证据为基础的预防和治疗方法,最终帮助有损伤的患者安全地参与网络生活。
{"title":"Do we need to know about cyberscams in neurorehabilitation? A cross-sectional scoping survey of Australasian clinicians and service providers.","authors":"Kate Rachel Gould, Matthew Carolan, Jennie Louise Ponsford","doi":"10.1017/BrImp.2022.13","DOIUrl":"10.1017/BrImp.2022.13","url":null,"abstract":"<p><p>Cyberscams, such as romance scams, are prevalent and costly online hazards in the general community. People with Acquired Brain Injury (ABI) may be particularly vulnerable and have greater difficulty recovering from the resultant emotional and financial hardships. In order to build capacity in the neurorehabilitation sector, it is necessary to determine whether clinicians currently encounter this issue and what prevention and intervention approaches have been found effective. This scoping study aimed to explore clinicians' exposure to and experiences with cyberscams in their adult clients with ABI.</p><p><strong>Method: </strong>Participants were clinicians recruited from multidisciplinary networks across Australia and New Zealand. Eligible participants (<i>n</i> = 101) completed an online customised survey.</p><p><strong>Results: </strong>More than half (53.46%) the participants had one or more clients affected by cyberscams, predominantly romance scams. Cognitive impairments and loneliness were reportedly associated with increased vulnerability. Cyberscams impacted treatment provision and were emotionally challenging for participants. No highly effective interventions were identified.</p><p><strong>Conclusions: </strong>These findings indicate that cyberscams are a clinical issue relevant to neurorehabilitation providers, with prevalence studies now required. The lack of effective interventions identified underscores the need for the development of evidence-based prevention and treatment approaches to ultimately help people with ABI safely participate in online life.</p>","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":"12 1","pages":"229-244"},"PeriodicalIF":0.8,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82196773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-23DOI: 10.1080/14702436.2023.2249441
Imoh Antai, R. Hellberg, P. Skoglund
{"title":"Logistics growth in the armed forces: development of a theoretical framework and research propositions","authors":"Imoh Antai, R. Hellberg, P. Skoglund","doi":"10.1080/14702436.2023.2249441","DOIUrl":"https://doi.org/10.1080/14702436.2023.2249441","url":null,"abstract":"","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48735938","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-18DOI: 10.1080/14702436.2023.2246392
Jean-Loup Samaan
{"title":"Indigenous Military Reforms from the Outside: The Paradox of the UAE Armed Forces Modernisation","authors":"Jean-Loup Samaan","doi":"10.1080/14702436.2023.2246392","DOIUrl":"https://doi.org/10.1080/14702436.2023.2246392","url":null,"abstract":"","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42938440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-08-07DOI: 10.1080/14702436.2023.2244445
P. Amarasinghe
{"title":"Sri Lanka’s Easter Sunday Massacre: the lessons for the international community","authors":"P. Amarasinghe","doi":"10.1080/14702436.2023.2244445","DOIUrl":"https://doi.org/10.1080/14702436.2023.2244445","url":null,"abstract":"","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43647076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-21DOI: 10.1080/14702436.2023.2238615
David P. Succi Junior
{"title":"Prepared for what? Brazilian debate on military competence for public security operations","authors":"David P. Succi Junior","doi":"10.1080/14702436.2023.2238615","DOIUrl":"https://doi.org/10.1080/14702436.2023.2238615","url":null,"abstract":"","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41399900","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-03DOI: 10.1080/14702436.2023.2238618
Michelle Black
ABSTRACT “Multi-domain operations” is an emerging concept that many defence organisations are trying to define and to decide how and when to use as part of their operations and warfighting strategies. This article addresses these questions and specifically identifies how the emerging concept of multi-domain operations, along with escalation management, can fit into the future of the North Atlantic Treaty Organization’s (NATO) warfighting needs. This article examines and debates concepts related to multi-domain operations and deterrence and addresses the importance of maintaining this strategic repertoire within the current geopolitical environment. It uses a European case study to illustrate the uses and impact of multi-domain escalation management. Finally, it provides a holistic view of research innovation in this area and its impact on NATO’s potential usage of multi-domain.
{"title":"Multi-domain escalation management: a North Atlantic Treaty Organisation case study","authors":"Michelle Black","doi":"10.1080/14702436.2023.2238618","DOIUrl":"https://doi.org/10.1080/14702436.2023.2238618","url":null,"abstract":"ABSTRACT “Multi-domain operations” is an emerging concept that many defence organisations are trying to define and to decide how and when to use as part of their operations and warfighting strategies. This article addresses these questions and specifically identifies how the emerging concept of multi-domain operations, along with escalation management, can fit into the future of the North Atlantic Treaty Organization’s (NATO) warfighting needs. This article examines and debates concepts related to multi-domain operations and deterrence and addresses the importance of maintaining this strategic repertoire within the current geopolitical environment. It uses a European case study to illustrate the uses and impact of multi-domain escalation management. Finally, it provides a holistic view of research innovation in this area and its impact on NATO’s potential usage of multi-domain.","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":"23 1","pages":"421 - 435"},"PeriodicalIF":0.0,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49664531","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-07-03DOI: 10.1080/14702436.2023.2238616
Luis Simón, Maximilian Ernst
ABSTRACT What does the decision to designate China as a “long-term strategic competitor” imply for U.S. defence strategy? To address this question, we draw on net assessment and competitive strategies, two complementary frameworks developed in the U.S. Department of Defense (DoD) during the Cold War to understand and manage long-term competition with the Soviet Union, respectively. Net assessment and competitive strategies are tailored around specific competitors and follow a characteristically dialectical approach to strategic planning, based on complex, recursive calculations of move and countermove. We argue that the identification of China as a long-term strategic competitor has paved the way for an increasingly systematic application of net assessment and competitive strategies within DoD, even if obstacles to such application still remain.
{"title":"Competition with China and U.S. defence strategy: from net assessment to competitive strategies","authors":"Luis Simón, Maximilian Ernst","doi":"10.1080/14702436.2023.2238616","DOIUrl":"https://doi.org/10.1080/14702436.2023.2238616","url":null,"abstract":"ABSTRACT What does the decision to designate China as a “long-term strategic competitor” imply for U.S. defence strategy? To address this question, we draw on net assessment and competitive strategies, two complementary frameworks developed in the U.S. Department of Defense (DoD) during the Cold War to understand and manage long-term competition with the Soviet Union, respectively. Net assessment and competitive strategies are tailored around specific competitors and follow a characteristically dialectical approach to strategic planning, based on complex, recursive calculations of move and countermove. We argue that the identification of China as a long-term strategic competitor has paved the way for an increasingly systematic application of net assessment and competitive strategies within DoD, even if obstacles to such application still remain.","PeriodicalId":35155,"journal":{"name":"Defence Studies","volume":"23 1","pages":"359 - 380"},"PeriodicalIF":0.0,"publicationDate":"2023-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47159949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}