首页 > 最新文献

Contemporary Security Policy最新文献

英文 中文
From reluctance to reassurance: Explaining the shift in the Germans’ NATO alliance solidarity following Russia’s invasion of Ukraine 从勉强到放心:解释德国人在俄罗斯入侵乌克兰后对北约联盟声援的转变
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-12-06 DOI: 10.1080/13523260.2023.2286771
Timo Graf, Markus Steinbrecher, Heiko Biehl
{"title":"From reluctance to reassurance: Explaining the shift in the Germans’ NATO alliance solidarity following Russia’s invasion of Ukraine","authors":"Timo Graf, Markus Steinbrecher, Heiko Biehl","doi":"10.1080/13523260.2023.2286771","DOIUrl":"https://doi.org/10.1080/13523260.2023.2286771","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138594335","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(En)Countering epistemic imperialism: A critique of “Westsplaining” and coloniality in dominant debates on Russia’s invasion of Ukraine (反击认识论帝国主义:对有关俄罗斯入侵乌克兰的主流辩论中的 "西部抱怨 "和殖民主义的批判
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-12-04 DOI: 10.1080/13523260.2023.2288468
Tereza Hendl, Olga Burlyuk, Mila O’Sullivan, Aizada Arystanbek
{"title":"(En)Countering epistemic imperialism: A critique of “Westsplaining” and coloniality in dominant debates on Russia’s invasion of Ukraine","authors":"Tereza Hendl, Olga Burlyuk, Mila O’Sullivan, Aizada Arystanbek","doi":"10.1080/13523260.2023.2288468","DOIUrl":"https://doi.org/10.1080/13523260.2023.2288468","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138604985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The role of insurers in shaping international cyber-security norms about cyber-war 保险公司在制定有关网络战争的国际网络安全规范方面的作用
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-11-16 DOI: 10.1080/13523260.2023.2279033
Josephine Wolff
{"title":"The role of insurers in shaping international cyber-security norms about cyber-war","authors":"Josephine Wolff","doi":"10.1080/13523260.2023.2279033","DOIUrl":"https://doi.org/10.1080/13523260.2023.2279033","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139270184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Saving face in the cyberspace: responses to public cyber intrusions in the Gulf 在网络空间挽回颜面:对海湾地区公共网络入侵的回应
1区 社会学 Q1 Social Sciences Pub Date : 2023-11-01 DOI: 10.1080/13523260.2023.2271794
Yehonatan Abramson, Gil Baram
How do states “save face” following a cyber intrusion directed at them? Recent scholarship demonstrates that the covert nature of cyber intrusions allows states to respond with restraint, avoiding escalation. But what happens when cyber intrusions become public and are highly visible? This article examines the rhetorical strategies employed by authoritarian Gulf states to mitigate the image-related costs associated with a public cyber intrusion. Drawing on the conceptual language of image-repair and crisis communication theories and employing discourse analysis of original data in Arabic, we identify three types of face-saving strategies: diminishing, self-complimenting, and accusing. Our findings indicate that intrusions involving leaking or faking information bring about unique “face-saving” strategies that do not only deal with the intrusion itself but also with the subsequent information crisis. Overall, the article identifies how states employ diverse rhetorical strategies—beyond attribution—to narrate cyber intrusions and keep cyber conflict contained.
在针对政府的网络入侵之后,政府如何“挽回颜面”?最近的学术研究表明,网络入侵的隐蔽性使国家能够克制地作出反应,避免事态升级。但是,当网络入侵变得公开且高度可见时,会发生什么呢?本文考察了海湾独裁国家为减轻与公共网络入侵相关的形象成本而采用的修辞策略。利用形象修复和危机沟通理论的概念语言,并利用阿拉伯语原始数据的话语分析,我们确定了三种类型的面子保全策略:减少,自我赞美和指责。我们的研究结果表明,涉及泄露或伪造信息的入侵带来了独特的“面子”策略,不仅可以处理入侵本身,还可以处理随后的信息危机。总的来说,这篇文章确定了国家如何使用不同的修辞策略-除了归因-来叙述网络入侵并保持网络冲突。
{"title":"Saving face in the cyberspace: responses to public cyber intrusions in the Gulf","authors":"Yehonatan Abramson, Gil Baram","doi":"10.1080/13523260.2023.2271794","DOIUrl":"https://doi.org/10.1080/13523260.2023.2271794","url":null,"abstract":"How do states “save face” following a cyber intrusion directed at them? Recent scholarship demonstrates that the covert nature of cyber intrusions allows states to respond with restraint, avoiding escalation. But what happens when cyber intrusions become public and are highly visible? This article examines the rhetorical strategies employed by authoritarian Gulf states to mitigate the image-related costs associated with a public cyber intrusion. Drawing on the conceptual language of image-repair and crisis communication theories and employing discourse analysis of original data in Arabic, we identify three types of face-saving strategies: diminishing, self-complimenting, and accusing. Our findings indicate that intrusions involving leaking or faking information bring about unique “face-saving” strategies that do not only deal with the intrusion itself but also with the subsequent information crisis. Overall, the article identifies how states employ diverse rhetorical strategies—beyond attribution—to narrate cyber intrusions and keep cyber conflict contained.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135372070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Career connections: transnational expert networks and multilateral cybercrime negotiations 职业联系:跨国专家网络与多边网络犯罪谈判
1区 社会学 Q1 Social Sciences Pub Date : 2023-11-01 DOI: 10.1080/13523260.2023.2274775
James Shires
ABSTRACTThe Council of Europe’s Budapest Convention on cybercrime (2001) remains a key landmark in multilateral governance on cybersecurity. Negotiated over two decades ago, this regional agreement gains renewed significance today through its enduring impact, its rarity as a binding multilateral agreement on cyber-issues, and its role in shaping the debate on free speech and the criminalization of online content. This article asks how the almost-total exclusion of content crimes from the Convention can be explained. Drawing on new documents published for the twentieth anniversary of the Convention, including detailed testimonials from its chair and principal drafters, the article highlights the importance of long-term career connections among technically-savvy and diplomatically experienced negotiators, creating a transnational policy network that overcame differences and power imbalances. Understanding how the Budapest Convention resolved disagreements helps contextualize current crises in multilateral cybersecurity and cybercrime governance and provides a path away from growing digital authoritarianism.KEYWORDS: CybersecuritycybercrimemultilateralismgovernanceBudapest Conventionexpertise AcknowledgmentsI thank the editors of the special issue at The Hague Program on International Cyber Security for the opportunity to contribute to this issue, and the editors and reviewers at Contemporary Security Policy for their guidance and feedback. I also thank the team of the International Security Programme at Chatham House for their support in writing this article, and for enabling my participation in various cybercrime forums as a non-state multistakeholder organization.Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 It should be noted that issues of unreliability and unduly positive memory are common across qualitative methods, including interviews. In this way, while commemorative materials pose specific challenges for interpretation, these challenges are equivalent to those faced by other methodological routes; in each case, the guiding principle must be to incorporate critical analysis of such factors into the interpretation.2 Workshop held under the Chatham House Rule on 8 February 2023.3 The standard term used in this area is now child sexual abuse material (CSAM), avoiding problematic associations and conflations with adult pornography, legal in many jurisdictions.4 While many Arab states subsequently adopted national cybercrime laws, their first iterations did not refer to the Arab Convention, and it was ratified (phrased more loosely as “certification or acceptance or ratification” in the Arabic original) by only 11 of the 22 members of the League of Arab states (most recently Bahrain in 2017).Additional informationNotes on contributorsJames ShiresJames Shires is a senior research fellow in cyber policy at Chatham House. He is a co-founder and trustee of the European Cyber Conflict Research Initiative
摘要欧洲委员会关于网络犯罪的布达佩斯公约(2001年)仍然是网络安全多边治理的一个重要里程碑。这一区域性协议是在二十多年前谈判达成的,如今因其持久的影响、其作为一项具有约束力的网络问题多边协议的罕见性,以及其在塑造关于言论自由和将网络内容定为犯罪的辩论方面的作用,重新获得了重要意义。本文探讨如何解释《公约》几乎完全排除内容犯罪。本文借鉴了为纪念《公约》通过20周年而发表的新文件,包括主席和主要起草者的详细证词,强调了在精通技术和外交经验丰富的谈判代表之间建立长期职业联系的重要性,建立了一个克服分歧和权力不平衡的跨国政策网络。了解《布达佩斯公约》如何解决分歧,有助于了解当前多边网络安全和网络犯罪治理危机的背景,并提供一条远离日益增长的数字威权主义的道路。关键词:网络安全网络犯罪多边主义治理布达佩斯公约专业知识感谢海牙国际网络安全项目特刊的编辑给我机会为本期特刊撰稿,感谢当代安全政策的编辑和审稿人提供的指导和反馈。我还要感谢查塔姆研究所国际安全项目的团队,感谢他们支持我撰写这篇文章,并使我能够作为一个非国家的多方利益相关者组织参与各种网络犯罪论坛。披露声明作者未报告潜在的利益冲突。注1:应该注意的是,不可靠性和过度正面记忆的问题在定性方法中很常见,包括访谈。这样,虽然纪念性材料对解释提出了具体的挑战,但这些挑战与其他方法论路线所面临的挑战是等同的;在每一种情况下,指导原则必须是在解释中纳入对这些因素的批判性分析在这一领域使用的标准术语现在是儿童性虐待材料(CSAM),避免了与成人色情制品的有问题的联系和合并,在许多司法管辖区是合法的虽然许多阿拉伯国家随后通过了国家网络犯罪法,但它们的第一次迭代并未提及《阿拉伯公约》,而且在阿拉伯国家联盟的22个成员国中,只有11个国家批准了该公约(在阿拉伯语原文中更宽松地称为“认证或接受或批准”)(最近一次是2017年的巴林)。本文作者是查塔姆研究所(Chatham House)网络政策高级研究员。他是欧洲网络冲突研究倡议(ECCRI)的联合创始人和受托人,也是海牙国际网络安全项目的非常驻副研究员。他定期发表演讲,并在网络安全和全球政治方面发表了大量文章,包括《中东网络安全政治》(赫斯特/牛津大学出版社,2021年)和《网络空间与不稳定》(主编,爱丁堡大学出版社,2023年)。完整的出版物清单可在https://www.jamesshires.com/research上找到。
{"title":"Career connections: transnational expert networks and multilateral cybercrime negotiations","authors":"James Shires","doi":"10.1080/13523260.2023.2274775","DOIUrl":"https://doi.org/10.1080/13523260.2023.2274775","url":null,"abstract":"ABSTRACTThe Council of Europe’s Budapest Convention on cybercrime (2001) remains a key landmark in multilateral governance on cybersecurity. Negotiated over two decades ago, this regional agreement gains renewed significance today through its enduring impact, its rarity as a binding multilateral agreement on cyber-issues, and its role in shaping the debate on free speech and the criminalization of online content. This article asks how the almost-total exclusion of content crimes from the Convention can be explained. Drawing on new documents published for the twentieth anniversary of the Convention, including detailed testimonials from its chair and principal drafters, the article highlights the importance of long-term career connections among technically-savvy and diplomatically experienced negotiators, creating a transnational policy network that overcame differences and power imbalances. Understanding how the Budapest Convention resolved disagreements helps contextualize current crises in multilateral cybersecurity and cybercrime governance and provides a path away from growing digital authoritarianism.KEYWORDS: CybersecuritycybercrimemultilateralismgovernanceBudapest Conventionexpertise AcknowledgmentsI thank the editors of the special issue at The Hague Program on International Cyber Security for the opportunity to contribute to this issue, and the editors and reviewers at Contemporary Security Policy for their guidance and feedback. I also thank the team of the International Security Programme at Chatham House for their support in writing this article, and for enabling my participation in various cybercrime forums as a non-state multistakeholder organization.Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 It should be noted that issues of unreliability and unduly positive memory are common across qualitative methods, including interviews. In this way, while commemorative materials pose specific challenges for interpretation, these challenges are equivalent to those faced by other methodological routes; in each case, the guiding principle must be to incorporate critical analysis of such factors into the interpretation.2 Workshop held under the Chatham House Rule on 8 February 2023.3 The standard term used in this area is now child sexual abuse material (CSAM), avoiding problematic associations and conflations with adult pornography, legal in many jurisdictions.4 While many Arab states subsequently adopted national cybercrime laws, their first iterations did not refer to the Arab Convention, and it was ratified (phrased more loosely as “certification or acceptance or ratification” in the Arabic original) by only 11 of the 22 members of the League of Arab states (most recently Bahrain in 2017).Additional informationNotes on contributorsJames ShiresJames Shires is a senior research fellow in cyber policy at Chatham House. He is a co-founder and trustee of the European Cyber Conflict Research Initiative ","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135371551","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategic narratives and the multilateral governance of cyberspace: The cases of European Union, Russia, and India 网络空间的战略叙事与多边治理:欧盟、俄罗斯和印度的案例
1区 社会学 Q1 Social Sciences Pub Date : 2023-10-29 DOI: 10.1080/13523260.2023.2266906
André Barrinha, Rebecca Turner
{"title":"Strategic narratives and the multilateral governance of cyberspace: The cases of European Union, Russia, and India","authors":"André Barrinha, Rebecca Turner","doi":"10.1080/13523260.2023.2266906","DOIUrl":"https://doi.org/10.1080/13523260.2023.2266906","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136133618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice 全球网络体制综合体中的威权多边主义:国际外交实践的双重转型
1区 社会学 Q1 Social Sciences Pub Date : 2023-10-22 DOI: 10.1080/13523260.2023.2269809
Mark Raymond, Justin Sherman
Multilateralism is regarded as a constitutive feature of the contemporary liberal international order and is associated with liberal values. However, for twenty-five years, authoritarian states have advocated the expansion of multilateral governance modalities for cybersecurity issues while major consolidated democracies have often opposed them. We explain this puzzle by distinguishing an overlooked variant of authoritarian multilateralism from the better-understood liberal variant. A Russo-Chinese coalition has employed various strategies within and beyond the United Nations to facilitate the adoption of this authoritarian variant for key cyber-governance processes, to achieve both specific cybersecurity goals and broader aims in contesting the liberal international order. Liberal democracies oppose instantiating authoritarian multilateralism, but they have also altered their understanding of multilateralism to encompass more space for private and multistakeholder governance alongside it, leading to a double transformation of the practice of multilateralism. The article concludes by discussing the implications of our analysis for multilateralism.
多边主义被视为当代自由主义国际秩序的构成特征,并与自由主义价值观联系在一起。然而,25年来,专制国家一直主张扩大网络安全问题的多边治理模式,而主要巩固的民主国家却经常反对这些模式。我们通过区分被忽视的专制多边主义变体和被更好理解的自由主义变体来解释这个难题。中俄联盟在联合国内外采取了各种策略,以促进在关键的网络治理过程中采用这种专制形式,以实现具体的网络安全目标和挑战自由国际秩序的更广泛目标。自由民主国家反对专制多边主义的实例化,但它们也改变了对多边主义的理解,为私人和多方利益相关者的治理提供了更多空间,从而导致多边主义实践的双重转变。文章最后讨论了我们的分析对多边主义的影响。
{"title":"Authoritarian multilateralism in the global cyber regime complex: The double transformation of an international diplomatic practice","authors":"Mark Raymond, Justin Sherman","doi":"10.1080/13523260.2023.2269809","DOIUrl":"https://doi.org/10.1080/13523260.2023.2269809","url":null,"abstract":"Multilateralism is regarded as a constitutive feature of the contemporary liberal international order and is associated with liberal values. However, for twenty-five years, authoritarian states have advocated the expansion of multilateral governance modalities for cybersecurity issues while major consolidated democracies have often opposed them. We explain this puzzle by distinguishing an overlooked variant of authoritarian multilateralism from the better-understood liberal variant. A Russo-Chinese coalition has employed various strategies within and beyond the United Nations to facilitate the adoption of this authoritarian variant for key cyber-governance processes, to achieve both specific cybersecurity goals and broader aims in contesting the liberal international order. Liberal democracies oppose instantiating authoritarian multilateralism, but they have also altered their understanding of multilateralism to encompass more space for private and multistakeholder governance alongside it, leading to a double transformation of the practice of multilateralism. The article concludes by discussing the implications of our analysis for multilateralism.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135461653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Imperialism, supremacy, and the Russian invasion of Ukraine 帝国主义,霸权主义和俄罗斯入侵乌克兰
1区 社会学 Q1 Social Sciences Pub Date : 2023-10-02 DOI: 10.1080/13523260.2023.2259661
Kseniya Oksamytna
Few predicted the Russian full-scale invasion of Ukraine and especially its brutality. Similarly, Ukraine’s capable and determined resistance came as a surprise to many. Ukraine, viewed through the Russian lenses, was erroneously characterized as “weak” and “fragmented.” In turn, Russia was seen as a modern power seeking a “sphere of influence” through attraction and occasional meddling in neighbors’ affairs. The Ukraine–Russia relations were misconstrued as “brotherly.” I argue that Russia should be understood as a colonial power whose aggression aims to re-establish supremacy over the Ukrainian nation. This desire arose from Ukrainians' increased acceptance in Europe, which Russians perceived as a transgression of hierarchies. The brutality of the invasion was aggravated by the Russian forces’ realization that Ukrainians not only rejected their “rescue mission” but did not need one in the first place. Misconceptions about the Russian invasion can be addressed through interdisciplinarity, engagement with postcolonial scholarship, and attention to facts.
几乎没有人预料到俄罗斯会全面入侵乌克兰,尤其是其暴行。同样,乌克兰有能力、有决心的抵抗也让很多人感到意外。从俄罗斯的视角来看,乌克兰被错误地描述为“软弱”和“支离破碎”。反过来,俄罗斯被视为一个通过吸引和偶尔干涉邻国事务来寻求“势力范围”的现代大国。乌克兰和俄罗斯的关系被误解为“兄弟关系”。我认为,俄罗斯应该被理解为一个殖民大国,其侵略的目的是重新建立对乌克兰民族的霸权。这种愿望源于乌克兰人在欧洲越来越被接受,俄罗斯人认为这是对等级制度的侵犯。俄罗斯军队意识到,乌克兰人不仅拒绝了他们的“救援任务”,而且从一开始就不需要这样的任务,这加剧了入侵的残暴。对俄罗斯入侵的误解可以通过跨学科、参与后殖民学术和关注事实来解决。
{"title":"Imperialism, supremacy, and the Russian invasion of Ukraine","authors":"Kseniya Oksamytna","doi":"10.1080/13523260.2023.2259661","DOIUrl":"https://doi.org/10.1080/13523260.2023.2259661","url":null,"abstract":"Few predicted the Russian full-scale invasion of Ukraine and especially its brutality. Similarly, Ukraine’s capable and determined resistance came as a surprise to many. Ukraine, viewed through the Russian lenses, was erroneously characterized as “weak” and “fragmented.” In turn, Russia was seen as a modern power seeking a “sphere of influence” through attraction and occasional meddling in neighbors’ affairs. The Ukraine–Russia relations were misconstrued as “brotherly.” I argue that Russia should be understood as a colonial power whose aggression aims to re-establish supremacy over the Ukrainian nation. This desire arose from Ukrainians' increased acceptance in Europe, which Russians perceived as a transgression of hierarchies. The brutality of the invasion was aggravated by the Russian forces’ realization that Ukrainians not only rejected their “rescue mission” but did not need one in the first place. Misconceptions about the Russian invasion can be addressed through interdisciplinarity, engagement with postcolonial scholarship, and attention to facts.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135790682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Drones have boots: Learning from Russia’s war in Ukraine 无人机有靴子:借鉴俄罗斯在乌克兰的战争
1区 社会学 Q1 Social Sciences Pub Date : 2023-10-02 DOI: 10.1080/13523260.2023.2262792
Dominika Kunertova
Before Russia’s 2022 invasion of Ukraine, security studies scholars were myopic about small drones’ enabling functions and tactical benefits. They were preoccupied with drone impacts on international security and the ethical dimensions of counterterrorism drone strikes. Similarly, literature on the revolution in military affairs has examined emerging drone technologies based on their strategic advantages. “Low-tech” drone innovations have received less attention. The war has highlighted the collective magnitude of these omissions. At first, scholars followed extant predictions by concluding that large drones did not revolutionize warfare, proliferated slowly, and were too costly and complex to operate. Yet, one year into the war, thousands of drones—scouts, loitering grenades, drone bomblets, and suicide drones—are defying the field’s assumptions of their uselessness sans air superiority. Contrary to most theoretical expectations, small drones in Ukraine are changing battlefield dynamics from lower airspace. Scholars must begin to study drone diversity in modern wars.
在俄罗斯2022年入侵乌克兰之前,安全研究学者对小型无人机的启用功能和战术效益持短视态度。他们专注于无人机对国际安全的影响,以及反恐无人机袭击的道德层面。同样,关于军事革命的文献也根据新兴无人机技术的战略优势对其进行了研究。“低技术含量”的无人机创新受到的关注较少。这场战争凸显了这些遗漏的总体规模。起初,学者们遵循了现有的预测,得出结论认为,大型无人机不会给战争带来革命性的变化,扩散速度缓慢,而且操作起来过于昂贵和复杂。然而,战争开始一年后,成千上万的无人机——侦察兵、漫游手榴弹、无人机小炸弹和自杀式无人机——正在挑战这个领域的假设,即它们在没有空中优势的情况下毫无用处。与大多数理论预期相反,乌克兰的小型无人机正在从低空改变战场动态。学者们必须开始研究现代战争中无人机的多样性。
{"title":"Drones have boots: Learning from Russia’s war in Ukraine","authors":"Dominika Kunertova","doi":"10.1080/13523260.2023.2262792","DOIUrl":"https://doi.org/10.1080/13523260.2023.2262792","url":null,"abstract":"Before Russia’s 2022 invasion of Ukraine, security studies scholars were myopic about small drones’ enabling functions and tactical benefits. They were preoccupied with drone impacts on international security and the ethical dimensions of counterterrorism drone strikes. Similarly, literature on the revolution in military affairs has examined emerging drone technologies based on their strategic advantages. “Low-tech” drone innovations have received less attention. The war has highlighted the collective magnitude of these omissions. At first, scholars followed extant predictions by concluding that large drones did not revolutionize warfare, proliferated slowly, and were too costly and complex to operate. Yet, one year into the war, thousands of drones—scouts, loitering grenades, drone bomblets, and suicide drones—are defying the field’s assumptions of their uselessness sans air superiority. Contrary to most theoretical expectations, small drones in Ukraine are changing battlefield dynamics from lower airspace. Scholars must begin to study drone diversity in modern wars.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135790542","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
What we got wrong: The war against Ukraine and security studies 我们错在哪里:对乌克兰的战争和安全研究
1区 社会学 Q1 Social Sciences Pub Date : 2023-10-02 DOI: 10.1080/13523260.2023.2261298
Hylke Dijkstra, Myriam Dunn Cavelty, Nicole Jenne, Yf Reykers
{"title":"What we got wrong: The war against Ukraine and security studies","authors":"Hylke Dijkstra, Myriam Dunn Cavelty, Nicole Jenne, Yf Reykers","doi":"10.1080/13523260.2023.2261298","DOIUrl":"https://doi.org/10.1080/13523260.2023.2261298","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135902434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Contemporary Security Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1