首页 > 最新文献

Journal of Strategic Security最新文献

英文 中文
A Hierarchical Multi-Authority Access Control Scheme for Secure and Efficient Data Sharing in Cloud Storage 一种安全高效的云存储数据共享分级多权限访问控制方案
Q2 Social Sciences Pub Date : 2022-04-01 DOI: 10.5038/1944-0472.15.1.1970
Smita Athanere, Ramesh Thakur
Enterprises choose to keep their data on the cloud to allow for flexible and efficient data exchange among their authorized staff when dealing with huge data. However, during the sharing of sensitive data, data security and users privacy has become major challenges. Most of the existing studies have several limitations, including weak model security, single point of failure, and lack of efficiency during user revocation. This article proposes cloud storage based Hierarchical Multi-authority Access Control Scheme (HMA-ACS) for secure and efficient data sharing. Through theoretical analysis, this article proves that the proposed mechanism efficiently performs cryptographic key operations and secured plus adaptive in the standard model while supporting the access policies. Furthermore, the proposed approach evaluated and compared recent state-of-art schemes in terms of storage overhead, computation overhead, average encryption, and decryption performance. Experimental results analysis shows that the proposed solution is resistant to many types of security threats and ensures data privacy when sharing data in the cloud.
企业选择将数据保存在云上,以便在处理巨大数据时,授权员工之间进行灵活高效的数据交换。然而,在敏感数据共享过程中,数据安全和用户隐私成为主要挑战。现有的大多数研究都有一些局限性,包括模型安全性弱、单点故障以及用户撤销过程中缺乏效率。本文提出了基于云存储的分层多权限访问控制方案(HMA-ACS),以实现安全高效的数据共享。通过理论分析,本文证明了所提出的机制在支持访问策略的同时,有效地执行了密钥操作,并在标准模型中具有安全性和自适应性。此外,所提出的方法在存储开销、计算开销、平均加密和解密性能方面评估并比较了最新的技术方案。实验结果分析表明,该解决方案能够抵御多种类型的安全威胁,并确保了在云中共享数据时的数据隐私。
{"title":"A Hierarchical Multi-Authority Access Control Scheme for Secure and Efficient Data Sharing in Cloud Storage","authors":"Smita Athanere, Ramesh Thakur","doi":"10.5038/1944-0472.15.1.1970","DOIUrl":"https://doi.org/10.5038/1944-0472.15.1.1970","url":null,"abstract":"Enterprises choose to keep their data on the cloud to allow for flexible and efficient data exchange among their authorized staff when dealing with huge data. However, during the sharing of sensitive data, data security and users privacy has become major challenges. Most of the existing studies have several limitations, including weak model security, single point of failure, and lack of efficiency during user revocation. This article proposes cloud storage based Hierarchical Multi-authority Access Control Scheme (HMA-ACS) for secure and efficient data sharing. Through theoretical analysis, this article proves that the proposed mechanism efficiently performs cryptographic key operations and secured plus adaptive in the standard model while supporting the access policies. Furthermore, the proposed approach evaluated and compared recent state-of-art schemes in terms of storage overhead, computation overhead, average encryption, and decryption performance. Experimental results analysis shows that the proposed solution is resistant to many types of security threats and ensures data privacy when sharing data in the cloud.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41413081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Promoting Cognitive Complexity Among Violent Extremist Youth in Northern Pakistan 促进巴基斯坦北部暴力极端主义青年的认知复杂性
Q2 Social Sciences Pub Date : 2022-04-01 DOI: 10.5038/1944-0472.15.1.1943
F. Peracha, S. Savage, R. Khan, Asma Ayub, Andleeb Zahra
This article reports on the results of an intervention to promote cognitive complexity (measured by integrative complexity, IC) and perspective taking for youth detained for violent extremism at the Sabaoon Center for Deradicalization and Rehabilitation in northern Pakistan. Participants are sixty-four males (mean age 19.77, SD = 3.26) comprising three cohorts: CVE Detained, CVE Reintegrated, and PVE At-risk.The Sabaoon IC intervention consists of eight sessions with action learning contextualized according to an assessment of the push, pull and personal factors that shape the life experience of the youth. Pre and post testing results show significant gain in IC in the overall sample (Cohen's d= -1.80, 95% CI[-.87,-.49]), and in each cohort, indicating significantly increased ability to perceive validity in one's own changing views and others' differing views along with reduction in derogating or dehumanizing outgroups. Oral presentations showed expected IC scores showing differentiation, with the Reintegrated cohort showing higher order integrations and expressed confidence to be change-makers in their communities.Two subscales from the Violent Extremist Beliefs Survey (concerning beliefs about inter-religious harmony and risk-taking behaviors) showed expected changes, but self-report perspective taking and empathy measures were insignificant.Limitations: The entire Sabaoon sample was selected for the intervention, and due to time and operational constraints, it was not feasible to recruit a control group matched on important variables.Implications for using IC measurement and method for detained and at risk populations are discussed.
本文报道了巴基斯坦北部Sabaoon去极端化和康复中心对因暴力极端主义而被拘留的青年进行干预以提高认知复杂性(以综合复杂性,IC衡量)和视角的结果。参与者为64名男性(平均年龄19.77岁,SD = 3.26),包括三个队列:CVE拘留组、CVE重新整合组和PVE高危组。Sabaoon IC干预包括八个课程,根据对影响青少年生活经历的推动、拉动和个人因素的评估,以行动学习为背景。前后测试结果显示,在整个样本中(Cohen’s d= -1.80, 95% CI[- 0.87,- 0.49]),以及在每个队列中,IC都有显着增加,表明在自己不断变化的观点和他人不同的观点中感知有效性的能力显著增强,同时贬低或贬低外群体的能力也显著增强。口头报告显示,预期的IC分数显示出差异,重新整合的队列显示出更高的整合顺序,并表示有信心成为社区的变革者。暴力极端主义信念调查的两个子量表(关于宗教间和谐和冒险行为的信念)显示出预期的变化,但自我报告的观点采取和共情措施不显著。局限性:我们选择了整个Sabaoon样本进行干预,由于时间和操作的限制,无法招募在重要变量上匹配的对照组。讨论了在拘留和危险人群中使用IC测量和方法的含义。
{"title":"Promoting Cognitive Complexity Among Violent Extremist Youth in Northern Pakistan","authors":"F. Peracha, S. Savage, R. Khan, Asma Ayub, Andleeb Zahra","doi":"10.5038/1944-0472.15.1.1943","DOIUrl":"https://doi.org/10.5038/1944-0472.15.1.1943","url":null,"abstract":"This article reports on the results of an intervention to promote cognitive complexity (measured by integrative complexity, IC) and perspective taking for youth detained for violent extremism at the Sabaoon Center for Deradicalization and Rehabilitation in northern Pakistan. Participants are sixty-four males (mean age 19.77, SD = 3.26) comprising three cohorts: CVE Detained, CVE Reintegrated, and PVE At-risk.\u0000The Sabaoon IC intervention consists of eight sessions with action learning contextualized according to an assessment of the push, pull and personal factors that shape the life experience of the youth. Pre and post testing results show significant gain in IC in the overall sample (Cohen's d= -1.80, 95% CI[-.87,-.49]), and in each cohort, indicating significantly increased ability to perceive validity in one's own changing views and others' differing views along with reduction in derogating or dehumanizing outgroups. Oral presentations showed expected IC scores showing differentiation, with the Reintegrated cohort showing higher order integrations and expressed confidence to be change-makers in their communities.\u0000Two subscales from the Violent Extremist Beliefs Survey (concerning beliefs about inter-religious harmony and risk-taking behaviors) showed expected changes, but self-report perspective taking and empathy measures were insignificant.\u0000Limitations: The entire Sabaoon sample was selected for the intervention, and due to time and operational constraints, it was not feasible to recruit a control group matched on important variables.\u0000Implications for using IC measurement and method for detained and at risk populations are discussed.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41321803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Votes, Drugs and Violence: The Political Logic of Criminal Wars in Mexico. By Guillermo Trejo and Sandra Ley. New York: Cambridge University Press, 2020. ISBN 978-1-108-79527-2. 投票、毒品和暴力:墨西哥刑事战争的政治逻辑。吉列尔莫·特雷霍和桑德拉·莱伊。纽约:剑桥大学出版社,2020年。是978-1-108-79527-2。
Q2 Social Sciences Pub Date : 2022-04-01 DOI: 10.5038/1944-0472.15.1.2016
H. Campbell
{"title":"Votes, Drugs and Violence: The Political Logic of Criminal Wars in Mexico. By Guillermo Trejo and Sandra Ley. New York: Cambridge University Press, 2020. ISBN 978-1-108-79527-2.","authors":"H. Campbell","doi":"10.5038/1944-0472.15.1.2016","DOIUrl":"https://doi.org/10.5038/1944-0472.15.1.2016","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46287960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cultural Intelligence in the Study of Intelligence 智力研究中的文化智力
Q2 Social Sciences Pub Date : 2022-04-01 DOI: 10.5038/1944-0472.15.1.2006
Brian Alcorn, Beth Eisenfeld
Intelligence officers often interact in culturally diverse settings different from the settings in which they grew up. Yet, there is a lack of academic research about the integration of culture and the study of intelligence. Researchers have made Cultural Intelligence (CQ) measurable via the Cultural Intelligence Scale (CQS) and successfully applied it in the business world as a predictor of success in multi-cultural environments. This article describes an application of the CQS, using the Observer Report questionnaire to assess the memoirs of three successful intelligence officers to ascertain the degree that CQ applies to the success of officers in United States Intelligence Community (USIC) in multicultural environments. The study results indicated each intelligence officer possessed a high degree of cultural intelligence that assisted in the course of their duties and the CQS is a good assessment tool to measure cultural intelligence.Keywords: Cultural intelligence, Cultural Intelligence Scale, CQS, Cultural Intelligence Quotient
情报人员经常在不同于他们成长环境的多元文化环境中进行互动。然而,关于文化与智力研究的整合,学术界的研究还比较缺乏。研究人员通过文化智力量表(CQS)来测量文化智力,并成功地将其应用于商业世界,作为在多文化环境中成功的预测因素。本文描述了CQS的应用,使用观察员报告问卷来评估三位成功的情报官员的回忆录,以确定CQ在多元文化环境中适用于美国情报界(USIC)官员成功的程度。研究结果表明,每个情报官员都具有高度的文化智力,有助于他们履行职责,CQS是衡量文化智力的良好评估工具。关键词:文化智力,文化智力量表,CQS,文化智商
{"title":"Cultural Intelligence in the Study of Intelligence","authors":"Brian Alcorn, Beth Eisenfeld","doi":"10.5038/1944-0472.15.1.2006","DOIUrl":"https://doi.org/10.5038/1944-0472.15.1.2006","url":null,"abstract":"Intelligence officers often interact in culturally diverse settings different from the settings in which they grew up. Yet, there is a lack of academic research about the integration of culture and the study of intelligence. Researchers have made Cultural Intelligence (CQ) measurable via the Cultural Intelligence Scale (CQS) and successfully applied it in the business world as a predictor of success in multi-cultural environments. This article describes an application of the CQS, using the Observer Report questionnaire to assess the memoirs of three successful intelligence officers to ascertain the degree that CQ applies to the success of officers in United States Intelligence Community (USIC) in multicultural environments. The study results indicated each intelligence officer possessed a high degree of cultural intelligence that assisted in the course of their duties and the CQS is a good assessment tool to measure cultural intelligence.\u0000Keywords: Cultural intelligence, Cultural Intelligence Scale, CQS, Cultural Intelligence Quotient","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42534031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Capital of Spies: Intelligence Agencies in Berlin During the Cold War. By Sven Felix Kellerhoff and Bernd von Kostka. Translated by Linden Lyons. Philadelphia and Oxford, Casemate Publishers, 2021. 间谍之都:冷战时期柏林的情报机构。作者:Sven Felix Kellerhoff和Bernd von Kostka。林登·莱昂斯译。费城和牛津,Casemate出版社,2021年。
Q2 Social Sciences Pub Date : 2022-04-01 DOI: 10.5038/1944-0472.15.1.2017
Edward J. Hagerty
Recommended Citation Hagerty, Edward J.. "Capital of Spies: Intelligence Agencies in Berlin During the Cold War. By Sven Felix Kellerhoff and Bernd von Kostka. Translated by Linden Lyons. Philadelphia and Oxford, Casemate Publishers, 2021.." Journal of Strategic Security 15, no. 1 (2022) : 164-167. DOI: https://doi.org/10.5038/1944-0472.15.1.2017 Available at: https://digitalcommons.usf.edu/jss/vol15/iss1/9
推荐引文爱德华·J·哈格蒂:《间谍之都:冷战期间柏林的情报机构》,斯文·费利克斯·凯勒霍夫和伯恩德·冯·科斯特卡著。林登·莱昂斯译。费城和牛津,Casemate出版社,2021年。《战略安全杂志》第15期,第1期(2022):164-167页。DOI:https://doi.org/10.5038/1944-0472.15.1.2017网址:https://digitalcommons.usf.edu/jss/vol15/iss1/9
{"title":"Capital of Spies: Intelligence Agencies in Berlin During the Cold War. By Sven Felix Kellerhoff and Bernd von Kostka. Translated by Linden Lyons. Philadelphia and Oxford, Casemate Publishers, 2021.","authors":"Edward J. Hagerty","doi":"10.5038/1944-0472.15.1.2017","DOIUrl":"https://doi.org/10.5038/1944-0472.15.1.2017","url":null,"abstract":"Recommended Citation Hagerty, Edward J.. \"Capital of Spies: Intelligence Agencies in Berlin During the Cold War. By Sven Felix Kellerhoff and Bernd von Kostka. Translated by Linden Lyons. Philadelphia and Oxford, Casemate Publishers, 2021..\" Journal of Strategic Security 15, no. 1 (2022) : 164-167. DOI: https://doi.org/10.5038/1944-0472.15.1.2017 Available at: https://digitalcommons.usf.edu/jss/vol15/iss1/9","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42569824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Evolution of Aviation Terrorism - El Al Israeli Airlines, Case Study 航空恐怖主义的演变——以色列航空公司案例研究
Q2 Social Sciences Pub Date : 2022-04-01 DOI: 10.5038/1944-0472.15.1.1945
Łukasz Szymankiewicz
The research problem of this article is the process of evolution of aviation terrorism over the years as illustrated by attacks against El Al airlines, with special reference to the research perspective of the security system. The author embarks on verifying the hypothesis that aviation terrorism is changing phenomenon which has been accompanied over the years by increasingly brutal methods and effects of the attacks, transforming aviation terrorism from a medium of communication to a tool for causing maximum damage. Employing the genealogical method, the author analysed 52 terrorist attacks from the years 1968 to 2012, whereby he attempted to answer the research question of "How has the phenomenon of aviation terrorism evolved over the years?"
本文的研究问题是航空恐怖主义多年来的演变过程,如针对El Al航空公司的袭击,特别参考了安全系统的研究视角。作者开始验证这样一种假设,即航空恐怖主义正在改变多年来伴随着越来越残酷的袭击方法和影响而来的现象,将航空恐怖主义从一种传播媒介转变为造成最大损害的工具。作者采用系谱法分析了1968年至2012年的52起恐怖袭击事件,试图回答“航空恐怖主义现象多年来是如何演变的?”
{"title":"Evolution of Aviation Terrorism - El Al Israeli Airlines, Case Study","authors":"Łukasz Szymankiewicz","doi":"10.5038/1944-0472.15.1.1945","DOIUrl":"https://doi.org/10.5038/1944-0472.15.1.1945","url":null,"abstract":"The research problem of this article is the process of evolution of aviation terrorism over the years as illustrated by attacks against El Al airlines, with special reference to the research perspective of the security system. The author embarks on verifying the hypothesis that aviation terrorism is changing phenomenon which has been accompanied over the years by increasingly brutal methods and effects of the attacks, transforming aviation terrorism from a medium of communication to a tool for causing maximum damage. Employing the genealogical method, the author analysed 52 terrorist attacks from the years 1968 to 2012, whereby he attempted to answer the research question of \"How has the phenomenon of aviation terrorism evolved over the years?\"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49419785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Policing in France. Edited by Jacques de Maillard and Wesley G. Skogan. New York and London: Routledge, 2021. 法国的治安。雅克·德·美拉德和韦斯利·g·斯科根编辑。纽约和伦敦:劳特利奇出版社,2021。
Q2 Social Sciences Pub Date : 2022-04-01 DOI: 10.5038/1944-0472.15.1.2019
John Sullivan
{"title":"Policing in France. Edited by Jacques de Maillard and Wesley G. Skogan. New York and London: Routledge, 2021.","authors":"John Sullivan","doi":"10.5038/1944-0472.15.1.2019","DOIUrl":"https://doi.org/10.5038/1944-0472.15.1.2019","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47613755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making War on the World: How Transnational Violence Reshapes Global Order. By Mark Shirk. New York: Columbia University Press, 2022. 向世界发动战争:跨国暴力如何重塑全球秩序。Mark Shirk著。纽约:哥伦比亚大学出版社,2022。
Q2 Social Sciences Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2089
R. Maass
{"title":"Making War on the World: How Transnational Violence Reshapes Global Order. By Mark Shirk. New York: Columbia University Press, 2022.","authors":"R. Maass","doi":"10.5038/1944-0472.15.4.2089","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2089","url":null,"abstract":"","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43185940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Domains of Peace: Cyberspace and the First Global Expression Without War 和平的领域:网络空间和第一个没有战争的全球表达
Q2 Social Sciences Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2042
Matthew S. Flynn
The ongoing war in Ukraine appears to validate war as it always is. A look at the evolution of domains offers something different. When this step is taken, it becomes clear that humanity chooses the violence defining war. Cyber realities today reveal how technological innovation has stymied war, taking humanity into a pre-existing condition repudiating war and leaving cyberspace as the first global expression without war. Once accepting that truth, nations can contemplate the discovery of a domain offering an expression of peace as a cognitive battlespace overrides the physical application of use of force. This feat means peace finds an equal footing with war. To accept that reality so clearly manifest in the prospect of a digital peace presents a referendum on humanity bending to circumstance or twisting reality to remain in a warzone.
乌克兰正在进行的战争似乎证明了战争的合法性。看看领域的演变就会发现一些不同的东西。当迈出这一步时,很明显,人类选择了定义战争的暴力。今天的网络现实揭示了技术创新如何阻碍战争,将人类带入一个预先存在的状态,拒绝战争,使网络空间成为第一个没有战争的全球表达。一旦接受了这一事实,各国就可以考虑发现一个能够表达和平的领域,因为认知上的战场空间压倒了实际使用武力。这一壮举意味着和平找到了与战争平等的立足点。接受数字和平前景中如此明确的现实,就等于对人类屈服于环境或扭曲现实以留在战区进行全民公决。
{"title":"Domains of Peace: Cyberspace and the First Global Expression Without War","authors":"Matthew S. Flynn","doi":"10.5038/1944-0472.15.4.2042","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2042","url":null,"abstract":"The ongoing war in Ukraine appears to validate war as it always is. A look at the evolution of domains offers something different. When this step is taken, it becomes clear that humanity chooses the violence defining war. Cyber realities today reveal how technological innovation has stymied war, taking humanity into a pre-existing condition repudiating war and leaving cyberspace as the first global expression without war. Once accepting that truth, nations can contemplate the discovery of a domain offering an expression of peace as a cognitive battlespace overrides the physical application of use of force. This feat means peace finds an equal footing with war. To accept that reality so clearly manifest in the prospect of a digital peace presents a referendum on humanity bending to circumstance or twisting reality to remain in a warzone.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46429104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fifth Generation Warfare, Hybrid Warfare, and Gray Zone Conflict: A Comparison 第五代战争、混合战争与灰色地带冲突:比较
Q2 Social Sciences Pub Date : 2022-01-01 DOI: 10.5038/1944-0472.15.4.2013
A. Krishnan
Strategists have noted substantial changes in warfare since the end of the Cold War. They have proposed several concepts and theories to account for the fact that the practice of war has largely departed from a Clausewitzian understanding of war and the centrality of physical violence in it. Emerging modes of conflict are less focused on the instrumental use of force to achieve political objectives and are more centered on notions of perception management, narratives, asymmetry or irregular conflict, the adversarial uses of norms, and covert and ambiguous uses of force. This article aims to systematically compare three more recent theories of war or political conflict, namely fifth generation warfare (5GW), hybrid warfare (HW), and gray zone conflict. The article demonstrates that although they have the same intellectual roots, they are also different in terms of what they suggest about the nature of contemporary and near future conflict. Each of them can enrich our understanding of contemporary warfare, which will be the key to mastering these new modes of conflict short of (theater conventional) war.
战略家们注意到,自冷战结束以来,战争发生了重大变化。他们提出了几个概念和理论来解释这样一个事实,即战争实践在很大程度上偏离了克劳塞维茨对战争的理解以及身体暴力在战争中的中心地位。新出现的冲突模式较少关注武力的工具性使用以实现政治目标,而更多地集中在感知管理、叙事、,不对称或非规则冲突,对抗性使用规范,以及隐蔽和模糊的武力使用。本文旨在系统地比较三种较新的战争或政治冲突理论,即第五代战争(5GW)、混合战争(HW)和灰色地带冲突。这篇文章表明,尽管他们有着相同的思想根源,但他们对当代和不久的将来冲突的性质的看法也有所不同。它们中的每一个都可以丰富我们对当代战争的理解,这将是掌握除(战区常规)战争之外的这些新冲突模式的关键。
{"title":"Fifth Generation Warfare, Hybrid Warfare, and Gray Zone Conflict: A Comparison","authors":"A. Krishnan","doi":"10.5038/1944-0472.15.4.2013","DOIUrl":"https://doi.org/10.5038/1944-0472.15.4.2013","url":null,"abstract":"Strategists have noted substantial changes in warfare since the end of the Cold War. They have proposed several concepts and theories to account for the fact that the practice of war has largely departed from a Clausewitzian understanding of war and the centrality of physical violence in it. Emerging modes of conflict are less focused on the instrumental use of force to achieve political objectives and are more centered on notions of perception management, narratives, asymmetry or irregular conflict, the adversarial uses of norms, and covert and ambiguous uses of force. This article aims to systematically compare three more recent theories of war or political conflict, namely fifth generation warfare (5GW), hybrid warfare (HW), and gray zone conflict. The article demonstrates that although they have the same intellectual roots, they are also different in terms of what they suggest about the nature of contemporary and near future conflict. Each of them can enrich our understanding of contemporary warfare, which will be the key to mastering these new modes of conflict short of (theater conventional) war.","PeriodicalId":37950,"journal":{"name":"Journal of Strategic Security","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44187241","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Strategic Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1