Pub Date : 2023-04-01DOI: 10.5038/1944-0472.15.4.2114
Melisa Perut, Etel Solingen
Recommended Citation Perut, Melisa and Solingen,, Etel Ph.D.. "Digitized Statecraft in Multilateral Treaty Participation: Global Quasi-Legislative Behavior of 193 Sovereign States. By Takashi Inoguchi and Lien Thi Quynh Le. Singapore: Springer Nature, 2021.." Journal of Strategic Security 16, no. 1 (2023) : 96-99. DOI: https://doi.org/10.5038/1944-0472.15.4.2114 Available at: https://digitalcommons.usf.edu/jss/vol16/iss1/8
{"title":"Digitized Statecraft in Multilateral Treaty Participation: Global Quasi-Legislative Behavior of 193 Sovereign States. By Takashi Inoguchi and Lien Thi Quynh Le. Singapore: Springer Nature, 2021.","authors":"Melisa Perut, Etel Solingen","doi":"10.5038/1944-0472.15.4.2114","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2114","url":null,"abstract":"Recommended Citation Perut, Melisa and Solingen,, Etel Ph.D.. \"Digitized Statecraft in Multilateral Treaty Participation: Global Quasi-Legislative Behavior of 193 Sovereign States. By Takashi Inoguchi and Lien Thi Quynh Le. Singapore: Springer Nature, 2021..\" Journal of Strategic Security 16, no. 1 (2023) : 96-99. DOI: https://doi.org/10.5038/1944-0472.15.4.2114 Available at: https://digitalcommons.usf.edu/jss/vol16/iss1/8","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46995299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.5038/1944-0472.15.4.2113
James M. Duggan,
{"title":"Unmanned Combat Aerial Vehicles: Current Types, Ordnance and Operations. By Dan Gettinger. Wien, Austria: Harpia Publishing, 2021.","authors":"James M. Duggan,","doi":"10.5038/1944-0472.15.4.2113","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2113","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44397042","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.5038/1944-0472.15.4.2115
E. Roche
{"title":"The Russia Conundrum: How the West Fell for Putin’s Power Gambit – And How to Fix It. By Mikhail Borisovich Khodorkovsky with Martin Sixsmith. New York: St. Martin’s Press, 2022.","authors":"E. Roche","doi":"10.5038/1944-0472.15.4.2115","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2115","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49427740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.5038/1944-0472.16.1.2049
John P. Sullivan
In his landmark trilogy, The Information Age: Economy, Society and Culture,sociologist Manuel Castells argued that networks, information technology, and global economic flows were altering the nature of politics, power, and states. This article examines the network dynamics Castells wrote about in relation to transnational crime and illicit economic markets. The article further explores Castells’s influence on the study of transnational organized crime, illicit networks, and the global illicit economy.
{"title":"The Information Age: Transnational Organized Crime, Networks, and Illicit Markets","authors":"John P. Sullivan","doi":"10.5038/1944-0472.16.1.2049","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2049","url":null,"abstract":"In his landmark trilogy, \u0000 The Information Age: Economy, Society and Culture,sociologist Manuel Castells argued that networks, information technology, and global economic flows were altering the nature of politics, power, and states. This article examines the network dynamics Castells wrote about in relation to transnational crime and illicit economic markets. The article further explores Castells’s influence on the study of transnational organized crime, illicit networks, and the global illicit economy.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45160753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.5038/1944-0472.16.1.2068
C. Bronk, Nathan P. Jones
This article presents a novel framework called the Policy Informative Cyber Case Analysis for cyberattack incidents. The aim of this framework is to provide a structured documentation and translational assessment tool for cyber incidents of geopolitical significance to a broader policy audience. The article discusses case study method as applied to cyber incidents, situates the framework amongst other useful methods, discusses the application of structured analytic techniques (SAT) such as “chronologies and timelines” and “devil’s advocacy,” presents the framework, and provides conclusions. Cyber incident cases, primarily the 2015 attack on the Ukrainian electric-grid is used throughout to elucidate the utility and application of the framework.
{"title":"Cyber Cases: The PICCA Framework for Documenting Geopolitically Relevant Cyber Action","authors":"C. Bronk, Nathan P. Jones","doi":"10.5038/1944-0472.16.1.2068","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2068","url":null,"abstract":"This article presents a novel framework called the Policy Informative Cyber Case Analysis for cyberattack incidents. The aim of this framework is to provide a structured documentation and translational assessment tool for cyber incidents of geopolitical significance to a broader policy audience. The article discusses case study method as applied to cyber incidents, situates the framework amongst other useful methods, discusses the application of structured analytic techniques (SAT) such as “chronologies and timelines” and “devil’s advocacy,” presents the framework, and provides conclusions. Cyber incident cases, primarily the 2015 attack on the Ukrainian electric-grid is used throughout to elucidate the utility and application of the framework.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49286341","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-04-01DOI: 10.5038/1944-0472.16.1.2062
Mike Anderson
United States professional military advisors play a critical role across the spectrum of conflict within the various services’ strategies in support of the overall National Defense Strategy. In an era of great power competition, the role of advisory forces within the shadow of large-scale conflict, provide a crucial edge for the US military services fulfilling their strategic role. Within each of the services’ unique strategies - the Army’s multidomain operations, the Marine Corps expeditionary advanced base operations nested within the Navy’s broader littoral operations in a contested environment, and the Air Force’s forward projecting agile basing concept - advisors from across the force support developing doctrines with conducting interoperability, providing access, and building relationships with allies and partners across key regions in great power competition. Even so, within each of these services, there is room for maximizing the utility of the advisory forces’ support to the service strategies.
{"title":"Military Advisors, Service Strategies, and Great Power Competition","authors":"Mike Anderson","doi":"10.5038/1944-0472.16.1.2062","DOIUrl":"https://doi.org/10.5038/1944-0472.16.1.2062","url":null,"abstract":"United States professional military advisors play a critical role across the spectrum of conflict within the various services’ strategies in support of the overall National Defense Strategy. In an era of great power competition, the role of advisory forces within the shadow of large-scale conflict, provide a crucial edge for the US military services fulfilling their strategic role. Within each of the services’ unique strategies - the Army’s multidomain operations, the Marine Corps expeditionary advanced base operations nested within the Navy’s broader littoral operations in a contested environment, and the Air Force’s forward projecting agile basing concept - advisors from across the force support developing doctrines with conducting interoperability, providing access, and building relationships with allies and partners across key regions in great power competition. Even so, within each of these services, there is room for maximizing the utility of the advisory forces’ support to the service strategies.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47879039","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.5038/1944-0472.15.3.2057
M. Hampson
{"title":"Mobility, Mobilization, and Counter/Insurgency: The Routes of Terror in an African Context. By Daniel E. Agbiboa. University of Michigan Press, 2022.","authors":"M. Hampson","doi":"10.5038/1944-0472.15.3.2057","DOIUrl":"https://doi.org/10.5038/1944-0472.15.3.2057","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49663385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.5038/1944-0472.15.3.2012
Kathryn M. Lambert
International NGOs (INGOs) operate in insecure environments where they provide life-saving services to the world's neediest populations. This study examines the impact of organizational attributes and activities on INGO vulnerability to insurgent attacks in Afghanistan. The study operationalizes three organizational attributes: 1)sustainability, measured by the organization’s longevity; 2)perceived independence from the Global War on Terrorism (GWOT), measured by whether the INGO operated in Afghanistan before or after September 11, 2001; and 3)religiosity coded as secular, faith-inspired, or faith-based. In addition, the study operationalizes three INGO activities: 1)type of gender-focused activities and programs of each organization; 2)transformational advocacy, measured as promoting democracy, women empowerment, or women’s rights in Afghanistan; and 3)level of exposure to violence in Afghanistan, measured by the number of provinces in which the organization operated. The study uses a matched sample design with a 1:2 ratio. Each victim INGO is matched with two non-victim INGOs by year and province. Matching INGOs on these two factors lessens the impact of structural and environmental factors, such as insurgent control of territory, in the analysis. Binomial logistic regression identified one organizational activity, level of exposure, and one organizational attribute, sustainability, as predictors of attacks against INGOs.
{"title":"INGOs in Afghanistan: Impact of Activities and Attributes on Attack","authors":"Kathryn M. Lambert","doi":"10.5038/1944-0472.15.3.2012","DOIUrl":"https://doi.org/10.5038/1944-0472.15.3.2012","url":null,"abstract":"International NGOs (INGOs) operate in insecure environments where they provide life-saving services to the world's neediest populations. This study examines the impact of organizational attributes and activities on INGO vulnerability to insurgent attacks in Afghanistan. The study operationalizes three organizational attributes: 1)sustainability, measured by the organization’s longevity; 2)perceived independence from the Global War on Terrorism (GWOT), measured by whether the INGO operated in Afghanistan before or after September 11, 2001; and 3)religiosity coded as secular, faith-inspired, or faith-based. In addition, the study operationalizes three INGO activities: 1)type of gender-focused activities and programs of each organization; 2)transformational advocacy, measured as promoting democracy, women empowerment, or women’s rights in Afghanistan; and 3)level of exposure to violence in Afghanistan, measured by the number of provinces in which the organization operated. The study uses a matched sample design with a 1:2 ratio. Each victim INGO is matched with two non-victim INGOs by year and province. Matching INGOs on these two factors lessens the impact of structural and environmental factors, such as insurgent control of territory, in the analysis. Binomial logistic regression identified one organizational activity, level of exposure, and one organizational attribute, sustainability, as predictors of attacks against INGOs.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44126545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.5038/1944-0472.15.3.1999
J. Beloff
The 2020 arrest and subsequent trial of Paul Rusesabagina fostered controversy about Rwanda’s human rights record and the political dominance of President Paul Kagame against oppositional voices. Despite human rights organizations and even the European Union condemning the arrest and questioning the ability for him to receive a fair trial, Rwandans remain resolute in their desire to seek justice against Rusesabagina. He is best known as the African version of Oscar Schindler because of the 2004 movie, Hotel Rwanda. However, the historical narrative of Rusesabagina’s heroism is questioned within Rwanda. Additionally, he is accused of forming ties to numerous terrorist groups which committed deadly attacks in Rwanda. This article examines Rusesabagina’s role during and after the 1994 Genocide against the Tutsi and the impact of his arrest and trial on Rwanda’s foreign relations.
{"title":"The Arrest and Trial of Paul Rusesabagina and its Impact on Rwandan Foreign Affairs","authors":"J. Beloff","doi":"10.5038/1944-0472.15.3.1999","DOIUrl":"https://doi.org/10.5038/1944-0472.15.3.1999","url":null,"abstract":"The 2020 arrest and subsequent trial of Paul Rusesabagina fostered controversy about Rwanda’s human rights record and the political dominance of President Paul Kagame against oppositional voices. Despite human rights organizations and even the European Union condemning the arrest and questioning the ability for him to receive a fair trial, Rwandans remain resolute in their desire to seek justice against Rusesabagina. He is best known as the African version of Oscar Schindler because of the 2004 movie, Hotel Rwanda. However, the historical narrative of Rusesabagina’s heroism is questioned within Rwanda. Additionally, he is accused of forming ties to numerous terrorist groups which committed deadly attacks in Rwanda. This article examines Rusesabagina’s role during and after the 1994 Genocide against the Tutsi and the impact of his arrest and trial on Rwanda’s foreign relations.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46274141","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-10-01DOI: 10.5038/1944-0472.15.3.2058
James J. Torrence
{"title":"Digital Influence Warfare in the Age of Social Media. By James J. F. Forest. Santa Barbara, CA: Praeger, An Imprint of ABC-CLIO, 2021.","authors":"James J. Torrence","doi":"10.5038/1944-0472.15.3.2058","DOIUrl":"https://doi.org/10.5038/1944-0472.15.3.2058","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70478790","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}