首页 > 最新文献

Contemporary Security Policy最新文献

英文 中文
Protecting hidden infrastructure: The security politics of the global submarine data cable network 保护隐藏的基础设施:全球海底数据电缆网络的安全政治
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-03-29 DOI: 10.1080/13523260.2021.1907129
Christian Bueger, Tobias Liebetrau
ABSTRACT Undersea communication cables are the core critical infrastructure of the digital age. 99% of all transoceanic digital communication—financial transactions, emails, or voice messaging—is transported through undersea fiber-optic cables. The global submarine cable network is a critical infrastructure that does not receive the analytical attention it deserves. We argue that cable security is a core dimension of current and future international security governance. We present the first systematic survey of the academic discourses that investigate the politics, governance, and protection of submarine data cables. Three rather narrow literatures study the cables (1) as under threat from hybrid warfare and terrorism, or treat the cable network narrowly as a (2) technical or (3) regulatory problem. We demonstrate the need for broadening out the research agenda and addressing key questions of security governance and geopolitics of this increasingly critical infrastructure.
摘要海底通信电缆是数字时代的核心关键基础设施。99%的跨洋数字通信——金融交易、电子邮件或语音信息——都是通过海底光纤电缆传输的。全球海底电缆网络是一个关键的基础设施,没有得到应有的分析关注。我们认为,有线电视安全是当前和未来国际安全治理的核心内容。我们对研究海底数据电缆的政治、治理和保护的学术话语进行了首次系统调查。三篇相当狭窄的文献研究了电缆(1)受到混合战争和恐怖主义的威胁,或将电缆网络狭隘地视为(2)技术或(3)监管问题。我们表明,有必要扩大研究议程,解决这一日益关键的基础设施的安全治理和地缘政治等关键问题。
{"title":"Protecting hidden infrastructure: The security politics of the global submarine data cable network","authors":"Christian Bueger, Tobias Liebetrau","doi":"10.1080/13523260.2021.1907129","DOIUrl":"https://doi.org/10.1080/13523260.2021.1907129","url":null,"abstract":"ABSTRACT Undersea communication cables are the core critical infrastructure of the digital age. 99% of all transoceanic digital communication—financial transactions, emails, or voice messaging—is transported through undersea fiber-optic cables. The global submarine cable network is a critical infrastructure that does not receive the analytical attention it deserves. We argue that cable security is a core dimension of current and future international security governance. We present the first systematic survey of the academic discourses that investigate the politics, governance, and protection of submarine data cables. Three rather narrow literatures study the cables (1) as under threat from hybrid warfare and terrorism, or treat the cable network narrowly as a (2) technical or (3) regulatory problem. We demonstrate the need for broadening out the research agenda and addressing key questions of security governance and geopolitics of this increasingly critical infrastructure.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2021.1907129","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45065496","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
The regulation of private military and security companies: Analyzing power in multi-stakeholder initiatives 私营军事和安保公司的监管:多利益相关者倡议中的权力分析
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-03-05 DOI: 10.1080/13523260.2021.1897225
B. Prem
ABSTRACT This article studies the limitations of multi-stakeholder initiatives (MSIs) relating to Private Military and Security Companies (PMSCs). It draws attention to three distinct ways in which power operates in and around MSIs: rules, structural positions, and discourses. Based on an analysis of two MSIs, it shows that these governance initiatives strengthen the perspectives of stakeholders that consider PMSCs as normal and legitimate security actors. Western governments and like-minded actors have used the Swiss Initiative and the International Code of Conduct for Security Service Providers to bypass the less privatization-friendly process in the United Nations. MSIs equally perform an important legitimizing function for PMSCs through their discourses and practices. Finally, participants of the MSIs have relegated critical voices, weakening their ability to partake in governing the PMSC industry. By studying the limitations of MSIs through a power-analytical lens, this article therefore points at an important but overlooked dimension.
本文研究了与私营军事和安全公司(PMSCs)相关的多利益相关者倡议(msi)的局限性。它让人们注意到权力在msi内部和周围运作的三种不同方式:规则、结构位置和话语。基于对两个msi的分析,本文表明,这些治理举措加强了将PMSCs视为正常和合法安全行为者的利益相关者的观点。西方政府和志同道合的行动者利用《瑞士倡议》和《安全服务提供者国际行为准则》绕过了联合国对私有化不那么友好的程序。msi同样通过其话语和实践为PMSCs发挥重要的合法化功能。最后,msi的参与者降低了批评的声音,削弱了他们参与管理PMSC行业的能力。通过从功率分析的角度研究msi的局限性,本文指出了一个重要但被忽视的维度。
{"title":"The regulation of private military and security companies: Analyzing power in multi-stakeholder initiatives","authors":"B. Prem","doi":"10.1080/13523260.2021.1897225","DOIUrl":"https://doi.org/10.1080/13523260.2021.1897225","url":null,"abstract":"ABSTRACT This article studies the limitations of multi-stakeholder initiatives (MSIs) relating to Private Military and Security Companies (PMSCs). It draws attention to three distinct ways in which power operates in and around MSIs: rules, structural positions, and discourses. Based on an analysis of two MSIs, it shows that these governance initiatives strengthen the perspectives of stakeholders that consider PMSCs as normal and legitimate security actors. Western governments and like-minded actors have used the Swiss Initiative and the International Code of Conduct for Security Service Providers to bypass the less privatization-friendly process in the United Nations. MSIs equally perform an important legitimizing function for PMSCs through their discourses and practices. Finally, participants of the MSIs have relegated critical voices, weakening their ability to partake in governing the PMSC industry. By studying the limitations of MSIs through a power-analytical lens, this article therefore points at an important but overlooked dimension.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2021.1897225","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41347097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The ambiguity of hybrid warfare: A qualitative content analysis of the United Kingdom's political–military discourse on Russia's hostile activities 混合战争的模糊性:英国对俄罗斯敌对活动的政治-军事话语的定性内容分析
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-02-18 DOI: 10.1080/13523260.2021.1885921
Silvie Janičatová, P. Mlejnková
ABSTRACT Since the annexation of Crimea in 2014, hybrid warfare has become a widely used yet ambiguous term to describe Russia's hostile activities. In academic publications and policy documents, there have been a plethora of different definitions and concepts to make sense of hybrid warfare. This article takes a bottom-up approach and analyzes the discourse of political and military representatives in the United Kingdom to explore how they understand hybrid warfare by Russia and what the implications are for defense policy. Using qualitative content analysis with quantitative aspects, the results show not only a range of different terms used to describe Russia's hostile activities, but also that the discussed topics do not reflect one particular definition of hybrid warfare. The analysis further reveals that representatives highlight non-military aspects of hybrid warfare over the military ones and consider the role of defense policy dependent on the nature of a particular hybrid threat.
自2014年吞并克里米亚以来,混合战争已经成为一个被广泛使用但又模棱两可的术语来描述俄罗斯的敌对活动。在学术出版物和政策文件中,有大量不同的定义和概念来解释混合战争。本文采用自下而上的方法,分析了英国政治和军事代表的话语,以探讨他们如何理解俄罗斯的混合战争以及对国防政策的影响。通过定量方面的定性内容分析,结果不仅显示了用于描述俄罗斯敌对活动的一系列不同术语,而且所讨论的主题并没有反映混合战争的一个特定定义。分析进一步表明,代表们强调混合战争的非军事方面,而不是军事方面,并考虑国防政策的作用取决于特定混合威胁的性质。
{"title":"The ambiguity of hybrid warfare: A qualitative content analysis of the United Kingdom's political–military discourse on Russia's hostile activities","authors":"Silvie Janičatová, P. Mlejnková","doi":"10.1080/13523260.2021.1885921","DOIUrl":"https://doi.org/10.1080/13523260.2021.1885921","url":null,"abstract":"ABSTRACT Since the annexation of Crimea in 2014, hybrid warfare has become a widely used yet ambiguous term to describe Russia's hostile activities. In academic publications and policy documents, there have been a plethora of different definitions and concepts to make sense of hybrid warfare. This article takes a bottom-up approach and analyzes the discourse of political and military representatives in the United Kingdom to explore how they understand hybrid warfare by Russia and what the implications are for defense policy. Using qualitative content analysis with quantitative aspects, the results show not only a range of different terms used to describe Russia's hostile activities, but also that the discussed topics do not reflect one particular definition of hybrid warfare. The analysis further reveals that representatives highlight non-military aspects of hybrid warfare over the military ones and consider the role of defense policy dependent on the nature of a particular hybrid threat.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2021.1885921","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44453369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Peace operations are what states make of them: Why future evolution is more likely than extinction 和平行动是由国家决定的:为什么未来的进化比灭绝更有可能
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-02-08 DOI: 10.1080/13523260.2021.1882802
K. P. Coleman, Paul D. Williams
ABSTRACT Peace operations are a highly resilient international institution for managing armed conflict. Their resilience derives from what constructivists in International Relations theory call collective intentionality and the malleable constitutive rules that define and structure such missions. Despite a range of current constraints, challenges, and crises, peace operations are unlikely to become extinct unless a critical mass of states consistently withdraw material support for them and explicitly denigrate the concept of peace operations itself. We see little evidence that both these things are likely to occur. However, the constitutive rules guiding peace operations are likely to continue to evolve due to ideational and material changes. While the proliferation of actors and mission types makes precise predictions impossible, we expect an evolution both in how various actors define their own peace operations and how these actors relate to each other.
和平行动是管理武装冲突的一个具有高度弹性的国际机构。它们的弹性源于国际关系理论中的建构主义者所说的集体意向性,以及定义和构建此类使命的可塑构成规则。尽管目前存在一系列限制、挑战和危机,但除非大量国家持续撤回对和平行动的物质支持,并明确诋毁和平行动本身的概念,否则和平行动不太可能消失。几乎没有证据表明这两件事都可能发生。但是,指导和平行动的构成规则可能会由于理念和物质上的变化而继续演变。虽然行动者和任务类型的激增使精确的预测变得不可能,但我们期望各种行动者如何定义自己的和平行动以及这些行动者如何相互关联方面都将发生变化。
{"title":"Peace operations are what states make of them: Why future evolution is more likely than extinction","authors":"K. P. Coleman, Paul D. Williams","doi":"10.1080/13523260.2021.1882802","DOIUrl":"https://doi.org/10.1080/13523260.2021.1882802","url":null,"abstract":"ABSTRACT Peace operations are a highly resilient international institution for managing armed conflict. Their resilience derives from what constructivists in International Relations theory call collective intentionality and the malleable constitutive rules that define and structure such missions. Despite a range of current constraints, challenges, and crises, peace operations are unlikely to become extinct unless a critical mass of states consistently withdraw material support for them and explicitly denigrate the concept of peace operations itself. We see little evidence that both these things are likely to occur. However, the constitutive rules guiding peace operations are likely to continue to evolve due to ideational and material changes. While the proliferation of actors and mission types makes precise predictions impossible, we expect an evolution both in how various actors define their own peace operations and how these actors relate to each other.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2021.1882802","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47769579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
The crafting of alliance cohesion among insurgents: The case of al-Qaeda affiliated groups in the Sahel region 叛乱分子之间的联盟凝聚力:萨赫勒地区基地组织附属团体的案例
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-01-22 DOI: 10.1080/13523260.2021.1876455
Troels Burchall Henningsen
ABSTRACT In spite of several international interventions to contain and degrade militant groups in the Sahel region, al-Qaeda affiliated groups have managed to retain their alliance and even spread and intensify their use of violence. This article explains the cohesion of the insurgency alliance as the outcome of a number of sound strategic decisions. By applying a framework of irregular strategy, the article examines the processes of early adaption to pre-existing social networks and the subsequent shaping through political, violent, and communicative lines of effort. Although the primary purpose of the strategy was not alliance cohesion, the result is that al-Qaeda related networks cooperate across ethnic and social cleavages, despite the many setbacks and dilemmas that local politics generate. The article adds an agency-oriented perspective to the growing literature on insurgency fragmentation and cohesion, which are major factors in the outcome of civil wars.
摘要尽管国际社会多次干预以遏制和削弱萨赫勒地区的激进组织,但与基地组织有关联的组织仍设法保持了联盟关系,甚至传播和加强了暴力使用。本文将叛乱联盟的凝聚力解释为一系列合理战略决策的结果。通过应用非规则策略的框架,本文考察了早期适应预先存在的社会网络的过程,以及随后通过政治、暴力和沟通渠道形成的过程。尽管该战略的主要目的不是联盟凝聚力,但其结果是,尽管当地政治造成了许多挫折和困境,但与基地组织有关的网络在种族和社会分裂中进行了合作。这篇文章为越来越多的关于叛乱分裂和凝聚力的文献增加了一个以机构为导向的视角,这是内战结果的主要因素。
{"title":"The crafting of alliance cohesion among insurgents: The case of al-Qaeda affiliated groups in the Sahel region","authors":"Troels Burchall Henningsen","doi":"10.1080/13523260.2021.1876455","DOIUrl":"https://doi.org/10.1080/13523260.2021.1876455","url":null,"abstract":"ABSTRACT In spite of several international interventions to contain and degrade militant groups in the Sahel region, al-Qaeda affiliated groups have managed to retain their alliance and even spread and intensify their use of violence. This article explains the cohesion of the insurgency alliance as the outcome of a number of sound strategic decisions. By applying a framework of irregular strategy, the article examines the processes of early adaption to pre-existing social networks and the subsequent shaping through political, violent, and communicative lines of effort. Although the primary purpose of the strategy was not alliance cohesion, the result is that al-Qaeda related networks cooperate across ethnic and social cleavages, despite the many setbacks and dilemmas that local politics generate. The article adds an agency-oriented perspective to the growing literature on insurgency fragmentation and cohesion, which are major factors in the outcome of civil wars.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2021.1876455","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44225142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
The dual-use security dilemma and the social construction of insecurity 双重安全困境与不安全的社会建构
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-01-06 DOI: 10.1080/13523260.2020.1866845
Amir Lupovici
ABSTRACT In this article I introduce the concept of the “dual-use security dilemma,” specifically through elaborating on two main aspects that shape this dilemma. First, inspired by traditional security scholarship, I focus on the spiral dynamics of actors responding to the insecurities raised by dual-use technologies that affect this type of dilemma. Second, I further develop a securitization reading of the traditional security dilemma, tracing how social constructions of insecurities and the justification of extraordinary measures affect the dynamics of the security dilemma. Combining these two aspects, I suggest that enunciators shape the dynamics of the dual-use security dilemma by using specific rationales of insecurity to mobilize support for measures against opponents holding dual-use technologies, whose response further fuels insecurity that spirals over time. The innovative theoretical and policy implications of this research become especially important given the rise of dual-use cyber technologies.
摘要在本文中,我引入了“军民两用安全困境”的概念,特别是通过阐述造成这一困境的两个主要方面。首先,受传统安全学术的启发,我关注的是行动者对影响这种困境的两用技术带来的不安全感做出反应的螺旋式动态。其次,我进一步发展了对传统安全困境的证券化解读,追溯了不安全的社会结构和非常措施的正当性如何影响安全困境的动态。结合这两个方面,我建议宣言者利用不安全的具体理由,动员支持针对持有双重用途技术的反对者的措施,从而塑造双重用途安全困境的动态,这些反对者的反应进一步加剧了随着时间的推移而加剧的不安全。鉴于两用网络技术的兴起,这项研究的创新理论和政策意义变得尤为重要。
{"title":"The dual-use security dilemma and the social construction of insecurity","authors":"Amir Lupovici","doi":"10.1080/13523260.2020.1866845","DOIUrl":"https://doi.org/10.1080/13523260.2020.1866845","url":null,"abstract":"ABSTRACT In this article I introduce the concept of the “dual-use security dilemma,” specifically through elaborating on two main aspects that shape this dilemma. First, inspired by traditional security scholarship, I focus on the spiral dynamics of actors responding to the insecurities raised by dual-use technologies that affect this type of dilemma. Second, I further develop a securitization reading of the traditional security dilemma, tracing how social constructions of insecurities and the justification of extraordinary measures affect the dynamics of the security dilemma. Combining these two aspects, I suggest that enunciators shape the dynamics of the dual-use security dilemma by using specific rationales of insecurity to mobilize support for measures against opponents holding dual-use technologies, whose response further fuels insecurity that spirals over time. The innovative theoretical and policy implications of this research become especially important given the rise of dual-use cyber technologies.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2020.1866845","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44345568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Everyday visuality and risk management: Representing (in)security in UN peacekeeping 日常可视化和风险管理:代表联合国维和行动的安全
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-01-02 DOI: 10.1080/13523260.2020.1847800
E. Krahmann
ABSTRACT Visuality is a central aspect of everyday security governance. In the recent visual turn in International Relations, however, the more mundane and routine visualities of security have been widely neglected. To address this gap, this article proposes a framework for analyzing the messages of security and risk conveyed by different modes of visual representations, ranging from press photos and educational images to outwardly appearances. Taking the United Nations Organization Stabilization Mission in the Democratic Republic of the Congo (MONUSCO) as an example, it shows that everyday visual representations reflect and contribute to security risk management in four ways: (1) They assist in the construction of self and other identities with regard to security, (2) they help to identify potential vulnerabilities, (3) they are used to educate people how to detect, assess, and behave in risky situations, and (4) they are employed to deter violent attacks.
摘要可视化是日常安全治理的一个核心方面。然而,在最近国际关系的视觉转向中,更世俗和常规的安全视觉被广泛忽视。为了解决这一差距,本文提出了一个框架,用于分析从新闻照片、教育图像到外表的不同视觉表现模式所传达的安全和风险信息。以联合国组织刚果民主共和国稳定特派团(联刚稳定团)为例,它表明,日常视觉表现在四个方面反映并有助于安全风险管理:(1)它们有助于构建安全方面的自我和其他身份,(3)它们被用来教育人们如何在危险的情况下发现、评估和行为,(4)它们被用于阻止暴力袭击。
{"title":"Everyday visuality and risk management: Representing (in)security in UN peacekeeping","authors":"E. Krahmann","doi":"10.1080/13523260.2020.1847800","DOIUrl":"https://doi.org/10.1080/13523260.2020.1847800","url":null,"abstract":"ABSTRACT Visuality is a central aspect of everyday security governance. In the recent visual turn in International Relations, however, the more mundane and routine visualities of security have been widely neglected. To address this gap, this article proposes a framework for analyzing the messages of security and risk conveyed by different modes of visual representations, ranging from press photos and educational images to outwardly appearances. Taking the United Nations Organization Stabilization Mission in the Democratic Republic of the Congo (MONUSCO) as an example, it shows that everyday visual representations reflect and contribute to security risk management in four ways: (1) They assist in the construction of self and other identities with regard to security, (2) they help to identify potential vulnerabilities, (3) they are used to educate people how to detect, assess, and behave in risky situations, and (4) they are employed to deter violent attacks.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2020.1847800","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43855275","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Predictors of support for a ban on killer robots: Preventive arms control as an anticipatory response to military innovation 支持禁止杀人机器人的预测因素:预防性军备控制作为对军事创新的预期反应
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-01-02 DOI: 10.1080/13523260.2020.1845935
Ondřej Rosendorf
ABSTRACT Many see the advent of lethal autonomous weapon systems as the next revolution in military affairs. Currently, some 30 countries share the view that these weapons should be preemptively banned, but we know relatively little about their motivations. This study contributes to the growing literature on “killer robots” by theorizing preventive arms control as an anticipatory response to military innovation. I suggest that states prefer preventive arms control when they lack capacities or incentives to pursue innovation in the first place. I analyze a cross-sectional dataset on national positions toward the ban on autonomous weapons and demonstrate that the probability of support for preventive prohibition decreases with increasing financial and technological capacities. Both democracies and autocracies are less likely to support the ban than mixed regimes. Conversely, states with strong humanitarian orientation and high socialization within specific arms control regimes are more likely to support the ban.
摘要许多人将致命自主武器系统的出现视为军事领域的下一次革命。目前,大约有30个国家同意应该先发制人地禁止这些武器,但我们对它们的动机知之甚少。这项研究通过将预防性军备控制理论化为对军事创新的预期反应,为越来越多的关于“杀手机器人”的文献做出了贡献。我建议,当各国首先缺乏追求创新的能力或动机时,它们更喜欢预防性军备控制。我分析了一个关于各国对禁止自主武器立场的横断面数据集,并表明支持预防性禁止的可能性随着财政和技术能力的提高而降低。与混合政权相比,民主政体和独裁政体都不太可能支持这项禁令。相反,在特定军备控制制度下具有强烈人道主义倾向和高度社会化的国家更有可能支持这项禁令。
{"title":"Predictors of support for a ban on killer robots: Preventive arms control as an anticipatory response to military innovation","authors":"Ondřej Rosendorf","doi":"10.1080/13523260.2020.1845935","DOIUrl":"https://doi.org/10.1080/13523260.2020.1845935","url":null,"abstract":"ABSTRACT Many see the advent of lethal autonomous weapon systems as the next revolution in military affairs. Currently, some 30 countries share the view that these weapons should be preemptively banned, but we know relatively little about their motivations. This study contributes to the growing literature on “killer robots” by theorizing preventive arms control as an anticipatory response to military innovation. I suggest that states prefer preventive arms control when they lack capacities or incentives to pursue innovation in the first place. I analyze a cross-sectional dataset on national positions toward the ban on autonomous weapons and demonstrate that the probability of support for preventive prohibition decreases with increasing financial and technological capacities. Both democracies and autocracies are less likely to support the ban than mixed regimes. Conversely, states with strong humanitarian orientation and high socialization within specific arms control regimes are more likely to support the ban.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2020.1845935","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43113579","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Addressing the security needs of adolescent girls in protracted crises: Inclusive, responsive, and effective? 解决长期危机中少女的安全需求:包容、积极响应和有效?
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2021-01-02 DOI: 10.1080/13523260.2020.1826149
E. Gordon, Katrina Lee-Koo
ABSTRACT Adolescent girls face significant and often unique forms of insecurity in protracted crises. Yet, their specific needs tend to be overlooked by international agencies, and they are rarely consulted as programs are developed and implemented. Drawing from field research conducted in four crisis contexts—Lake Chad (Niger, Nigeria, and Cameroon), South Sudan and Uganda, Lebanon (Beirut), and Bangladesh (Cox’s Bazar)—this article explores the experiences of insecurity that adolescent girls face in crisis contexts, and the extent to which responses to their needs are inclusive, responsive, and effective. Employing literature from inclusive peacebuilding, the article argues that marginalizing adolescent girls in the development and implementation of programs compromises the ability for such programs to be responsive to their needs. Moreover, it misses the opportunity to employ their skills, knowledge, and strengths to build resilience and security within their communities.
在旷日持久的危机中,青春期女孩面临着重大且往往是独特形式的不安全感。然而,国际机构往往忽视了他们的具体需求,在制定和实施方案时很少征求他们的意见。根据在乍得湖(尼日尔、尼日利亚和喀麦隆)、南苏丹和乌干达、黎巴嫩(贝鲁特)和孟加拉国(考克斯巴扎尔)四个危机背景下进行的实地研究,本文探讨了青春期女孩在危机背景下面临的不安全体验,以及对她们的需求做出包容、反应迅速和有效的回应的程度。本文引用了包容性和平建设的文献,认为在项目的制定和实施中将少女边缘化会损害这些项目满足她们需求的能力。此外,他们失去了利用他们的技能、知识和优势在社区内建立复原力和安全的机会。
{"title":"Addressing the security needs of adolescent girls in protracted crises: Inclusive, responsive, and effective?","authors":"E. Gordon, Katrina Lee-Koo","doi":"10.1080/13523260.2020.1826149","DOIUrl":"https://doi.org/10.1080/13523260.2020.1826149","url":null,"abstract":"ABSTRACT Adolescent girls face significant and often unique forms of insecurity in protracted crises. Yet, their specific needs tend to be overlooked by international agencies, and they are rarely consulted as programs are developed and implemented. Drawing from field research conducted in four crisis contexts—Lake Chad (Niger, Nigeria, and Cameroon), South Sudan and Uganda, Lebanon (Beirut), and Bangladesh (Cox’s Bazar)—this article explores the experiences of insecurity that adolescent girls face in crisis contexts, and the extent to which responses to their needs are inclusive, responsive, and effective. Employing literature from inclusive peacebuilding, the article argues that marginalizing adolescent girls in the development and implementation of programs compromises the ability for such programs to be responsive to their needs. Moreover, it misses the opportunity to employ their skills, knowledge, and strengths to build resilience and security within their communities.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2021-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2020.1826149","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46871983","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Changes to the editorial board 编辑委员会的变动
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2020-11-25 DOI: 10.1080/13523260.2020.1849961
H. Dijkstra
{"title":"Changes to the editorial board","authors":"H. Dijkstra","doi":"10.1080/13523260.2020.1849961","DOIUrl":"https://doi.org/10.1080/13523260.2020.1849961","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2020-11-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1080/13523260.2020.1849961","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48522859","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Contemporary Security Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1