首页 > 最新文献

Contemporary Security Policy最新文献

英文 中文
Letting sleeping bears lie: Ukraine’s cautious approach to uncertainty before the war 放下沉睡的熊:乌克兰在战前对不确定性的谨慎态度
1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-09-21 DOI: 10.1080/13523260.2023.2257966
Samuel M. Seitz
International relations theory has long suggested that uncertainty during militarized crises pushes states to adopt escalatory behavior. However, the leadup to the Russo-Ukrainian War challenges this view, with Kyiv downplaying the risk of conflict and adopting a cautious foreign policy. I argue that Ukrainian behavior in the leadup to the war demonstrates the need to disaggregate between types of uncertainty. While uncertainty over an adversary’s intentions and capabilities can push a state to adopt escalatory behavior, uncertainty regarding a potential adversary’s military strategy and regarding the level of support it can expect from third parties incentivizes a state to assume a more cautious posture. The piece concludes with a reflection on disciplinary blind spots regarding the impact of uncertainty on state decision-making and offers suggestions for overcoming them.
长期以来,国际关系理论一直认为,军事化危机期间的不确定性促使国家采取升级行为。然而,俄乌战争的前奏挑战了这一观点,基辅淡化了冲突的风险,并采取了谨慎的外交政策。我认为,乌克兰在战争爆发前的行为表明,有必要在不同类型的不确定性之间进行分解。虽然对对手意图和能力的不确定性会促使一个国家采取升级行为,但对潜在对手军事战略的不确定性以及对第三方支持水平的不确定性会激励一个国家采取更谨慎的姿态。文章最后反思了不确定性对国家决策影响的学科盲点,并提出了克服这些盲点的建议。
{"title":"Letting sleeping bears lie: Ukraine’s cautious approach to uncertainty before the war","authors":"Samuel M. Seitz","doi":"10.1080/13523260.2023.2257966","DOIUrl":"https://doi.org/10.1080/13523260.2023.2257966","url":null,"abstract":"International relations theory has long suggested that uncertainty during militarized crises pushes states to adopt escalatory behavior. However, the leadup to the Russo-Ukrainian War challenges this view, with Kyiv downplaying the risk of conflict and adopting a cautious foreign policy. I argue that Ukrainian behavior in the leadup to the war demonstrates the need to disaggregate between types of uncertainty. While uncertainty over an adversary’s intentions and capabilities can push a state to adopt escalatory behavior, uncertainty regarding a potential adversary’s military strategy and regarding the level of support it can expect from third parties incentivizes a state to assume a more cautious posture. The piece concludes with a reflection on disciplinary blind spots regarding the impact of uncertainty on state decision-making and offers suggestions for overcoming them.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Emulating underdogs: Tactical drones in the Russia-Ukraine war 模仿弱者:俄乌战争中的战术无人机
1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-09-21 DOI: 10.1080/13523260.2023.2257964
Kerry Chávez, Ori Swed
ABSTRACTEarly studies on state drone proliferation argued that it would be temperate, constrained by high financial, technical, and infrastructural requisites and fielded according to the logic of scarce, exquisite airpower. While this rationale has held for limited conflicts, the high attrition and massive demand of a total war compelled strong standing armies to follow a different model of adoption: emulating weaker violent nonstate actors leveraging low-cost commercial platforms. The Russia-Ukraine war has captured this trend. Despite earlier expectations of armies maintaining advanced airpower for strategic ends, underdog Ukraine, followed by Russia have developed heavy reliance on commercial drone technologies for tactical aims. Framing this in military and battlefield innovation literature and drawing on studies on commercial drone use among violent nonstate actors, we argue that this constitutes a new trajectory involving mixed military arsenals enhanced with dual-use commercial platforms.KEYWORDS: Dronesunmanned aerial vehiclesinterstate conflictmilitary innovationmodern warfare Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Islamic State is a prime example, but certainly not the only one. Many VNSAs from Houthi rebels, Burmese resistors, Syrian fighters, African insurgents, and Mexican cartels use commercial drones in one, some, or all the ways listed to advance their agendas.
关于国家无人机扩散的早期研究认为,它将是有节制的,受到高财政、技术和基础设施要求的限制,并根据稀缺、精致的空中力量的逻辑进行部署。虽然这种理论适用于有限的冲突,但全面战争的高消耗和巨大需求迫使强大的常备军遵循一种不同的采用模式:模仿较弱的暴力非国家行为体,利用低成本的商业平台。俄乌战争抓住了这一趋势。尽管早些时候的预期是,军队将为战略目的保持先进的空中力量,但处于劣势的乌克兰,以及紧随其后的俄罗斯,已经严重依赖商用无人机技术来实现战术目标。在军事和战场创新文献中构建这一框架,并借鉴对暴力非国家行为者商业无人机使用的研究,我们认为这构成了一个新的轨迹,涉及双重用途商业平台增强的混合军事武器库。关键词:无人机;国家间冲突;军事创新;现代战争披露声明作者未报告潜在的利益冲突。注1伊斯兰国是一个典型的例子,但肯定不是唯一的。许多来自胡塞叛军、缅甸抵抗分子、叙利亚武装分子、非洲叛乱分子和墨西哥贩毒集团的vnsa,都以上述一种、几种或所有方式使用商用无人机来推进他们的议程。
{"title":"Emulating underdogs: Tactical drones in the Russia-Ukraine war","authors":"Kerry Chávez, Ori Swed","doi":"10.1080/13523260.2023.2257964","DOIUrl":"https://doi.org/10.1080/13523260.2023.2257964","url":null,"abstract":"ABSTRACTEarly studies on state drone proliferation argued that it would be temperate, constrained by high financial, technical, and infrastructural requisites and fielded according to the logic of scarce, exquisite airpower. While this rationale has held for limited conflicts, the high attrition and massive demand of a total war compelled strong standing armies to follow a different model of adoption: emulating weaker violent nonstate actors leveraging low-cost commercial platforms. The Russia-Ukraine war has captured this trend. Despite earlier expectations of armies maintaining advanced airpower for strategic ends, underdog Ukraine, followed by Russia have developed heavy reliance on commercial drone technologies for tactical aims. Framing this in military and battlefield innovation literature and drawing on studies on commercial drone use among violent nonstate actors, we argue that this constitutes a new trajectory involving mixed military arsenals enhanced with dual-use commercial platforms.KEYWORDS: Dronesunmanned aerial vehiclesinterstate conflictmilitary innovationmodern warfare Disclosure statementNo potential conflict of interest was reported by the author(s).Notes1 Islamic State is a prime example, but certainly not the only one. Many VNSAs from Houthi rebels, Burmese resistors, Syrian fighters, African insurgents, and Mexican cartels use commercial drones in one, some, or all the ways listed to advance their agendas.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136102036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Farewell by the outgoing editor: Publishing research from the Paris attacks to the war against Ukraine 即将卸任的编辑告别:出版从巴黎袭击到乌克兰战争的研究报告
1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-09-20 DOI: 10.1080/13523260.2023.2254597
Hylke Dijkstra
{"title":"Farewell by the outgoing editor: Publishing research from the Paris attacks to the war against Ukraine","authors":"Hylke Dijkstra","doi":"10.1080/13523260.2023.2254597","DOIUrl":"https://doi.org/10.1080/13523260.2023.2254597","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"2016 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136309263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Roots of Ukrainian resilience and the agency of Ukrainian society before and after Russia’s full-scale invasion 乌克兰复原力的根源和俄罗斯全面入侵前后乌克兰社会的机构
1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-09-20 DOI: 10.1080/13523260.2023.2258620
Anastasiia Kudlenko
When Russia launched a full-scale invasion of Ukraine on February 24, 2022, Ukrainians did not crumble under the unprecedented attack but showed steely resolve to fight for independence and the right to decide their own fate. In the Western media and scholarly analysis, the Ukrainian resilience is often associated with the leadership of the state, in particular President Zelensky. This article offers a different take on the issue of resilience in war and looks at the value foundations of Ukrainian identity, the decentralized nature of Ukrainian society and the vision of a better future as part of the Euro-Atlantic community to better understand Ukraine’s agency in response to Russia’s invasion. It draws on the original data, collected from interviews of three categories of Ukrainians, affected by the war: refugees, internally displaced people, and those living close to the frontlines.
当俄罗斯在2022年2月24日对乌克兰发动全面入侵时,乌克兰人没有在前所未有的攻击下崩溃,而是表现出了争取独立和决定自己命运的权利的钢铁般的决心。在西方媒体和学术分析中,乌克兰的韧性通常与国家领导层,尤其是泽连斯基总统联系在一起。本文从不同的角度探讨了乌克兰在战争中的复原力问题,并着眼于乌克兰身份认同的价值基础、乌克兰社会的分散性,以及作为欧洲-大西洋共同体一部分的美好未来的愿景,以更好地理解乌克兰应对俄罗斯入侵的机构。它利用了对受战争影响的三类乌克兰人的采访收集的原始数据:难民、国内流离失所者和生活在前线附近的人。
{"title":"Roots of Ukrainian resilience and the agency of Ukrainian society before and after Russia’s full-scale invasion","authors":"Anastasiia Kudlenko","doi":"10.1080/13523260.2023.2258620","DOIUrl":"https://doi.org/10.1080/13523260.2023.2258620","url":null,"abstract":"When Russia launched a full-scale invasion of Ukraine on February 24, 2022, Ukrainians did not crumble under the unprecedented attack but showed steely resolve to fight for independence and the right to decide their own fate. In the Western media and scholarly analysis, the Ukrainian resilience is often associated with the leadership of the state, in particular President Zelensky. This article offers a different take on the issue of resilience in war and looks at the value foundations of Ukrainian identity, the decentralized nature of Ukrainian society and the vision of a better future as part of the Euro-Atlantic community to better understand Ukraine’s agency in response to Russia’s invasion. It draws on the original data, collected from interviews of three categories of Ukrainians, affected by the war: refugees, internally displaced people, and those living close to the frontlines.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"58 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136263814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Remember Kabul? Reputation, strategic contexts, and American credibility after the Afghanistan withdrawal 还记得喀布尔吗?阿富汗撤军后的声誉、战略背景和美国信誉
IF 5.9 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-09-05 DOI: 10.1080/13523260.2023.2253406
D.G. Kim, J. Byun, Jiyoung Ko
{"title":"Remember Kabul? Reputation, strategic contexts, and American credibility after the Afghanistan withdrawal","authors":"D.G. Kim, J. Byun, Jiyoung Ko","doi":"10.1080/13523260.2023.2253406","DOIUrl":"https://doi.org/10.1080/13523260.2023.2253406","url":null,"abstract":"","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"1 1","pages":""},"PeriodicalIF":5.9,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44746711","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privatizing security and authoritarian adaptation in the Arab region since the 2010–2011 uprisings 自2010-2011年起义以来,阿拉伯地区的安全私有化和独裁适应
IF 5.9 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-06-02 DOI: 10.1080/13523260.2023.2214757
E. Moussa
ABSTRACT Some Arab countries have since 2011 experienced intense security market diversification with considerable outsourcing of domestic security and guarding services. To date, scholars and security experts predominantly conceive this development within security reform processes or as an inevitable outcome of a chaotic post-uprisings period. Instead, this article situates some Arab states’ increasing reliance on private security actors within the evolving power dynamics and diverse challenges facing ruling elites and populations alike. Addressing how privatizing security contributes to perpetuating authoritarian practices post-2010, the article argues that contemporary security privatization and outsourcing provide alternative agents and strategies for control, while offering new venues to enrich and strengthen ruling elites. Guided by critical security studies and drawing on interviews, fieldwork and official documents, the article advances three ways through which outsourcing security supports practices of authoritarian adaptation: cultivating networks of patronage, diversifying ruling elites’ bases of security, and curbing constant sources of unrest.
自2011年以来,一些阿拉伯国家经历了激烈的安全市场多元化,国内安全和警卫服务外包相当大。迄今为止,学者和安全专家主要认为这种发展是在安全改革过程中发生的,或者是混乱的后起义时期的必然结果。相反,这篇文章将一些阿拉伯国家在不断变化的权力动态和统治精英和民众所面临的各种挑战中越来越依赖私人安全行为者。在探讨安全私有化如何助长2010年后的专制做法时,文章认为,当代安全私有化和外包为控制提供了替代代理和策略,同时提供了丰富和加强统治精英的新场所。在重要安全研究的指导下,通过访谈、实地调查和官方文件,本文提出了外包安全支持威权适应实践的三种方式:培养庇护网络,使统治精英的安全基础多样化,以及遏制持续的动荡来源。
{"title":"Privatizing security and authoritarian adaptation in the Arab region since the 2010–2011 uprisings","authors":"E. Moussa","doi":"10.1080/13523260.2023.2214757","DOIUrl":"https://doi.org/10.1080/13523260.2023.2214757","url":null,"abstract":"ABSTRACT Some Arab countries have since 2011 experienced intense security market diversification with considerable outsourcing of domestic security and guarding services. To date, scholars and security experts predominantly conceive this development within security reform processes or as an inevitable outcome of a chaotic post-uprisings period. Instead, this article situates some Arab states’ increasing reliance on private security actors within the evolving power dynamics and diverse challenges facing ruling elites and populations alike. Addressing how privatizing security contributes to perpetuating authoritarian practices post-2010, the article argues that contemporary security privatization and outsourcing provide alternative agents and strategies for control, while offering new venues to enrich and strengthen ruling elites. Guided by critical security studies and drawing on interviews, fieldwork and official documents, the article advances three ways through which outsourcing security supports practices of authoritarian adaptation: cultivating networks of patronage, diversifying ruling elites’ bases of security, and curbing constant sources of unrest.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"462 - 490"},"PeriodicalIF":5.9,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41621114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does plausible deniability work? Assessing the effectiveness of unclaimed coercive acts in the Ukraine war 合理的否认有效吗?评估乌克兰战争中无人认领的胁迫行为的有效性
IF 5.9 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-05-31 DOI: 10.1080/13523260.2023.2212464
Costantino Pischedda, Andrew Cheon
ABSTRACT States conduct unclaimed coercive acts, imposing costs on adversaries to signal resolve but denying (or not claiming) responsibility. Some scholars posit that unclaimed acts have considerable potential to coerce targets, while containing escalation risks. Others suggest that unclaimed coercive efforts tend to fail and trigger escalation. We assess these competing perspectives about the effects of unclaimed attacks with a vignette experiment exposing US-based respondents to a scenario where, after Russia warns of unpredictable consequences if NATO continues providing weapons to Ukraine, an explosion occurs at a NATO base in Poland used to funnel weapons to Ukraine. Intelligence agencies and independent analysts identify Russia as the likely culprit, while not ruling out the possibility of an accident. We randomize whether Russia claimed or denied responsibility for the explosion and find that unclaimed acts have lower coercive leverage than claimed ones, but the two do not significantly differ in escalation risk.
摘要国家实施无人认领的胁迫行为,向对手施加代价以表明决心,但否认(或不声称)责任。一些学者认为,无人认领的行为有很大的潜力胁迫目标,同时遏制升级风险。其他人则认为,无人认领的胁迫努力往往会失败并引发事态升级。我们通过一项小插曲实验评估了这些关于无人认领袭击影响的相互竞争的观点,该实验将美国受访者暴露在一种情况下,即在俄罗斯警告如果北约继续向乌克兰提供武器将产生不可预测的后果后,北约在波兰的一个基地发生爆炸,该基地用于向乌克兰输送武器。情报机构和独立分析人士认定俄罗斯可能是罪魁祸首,但不排除发生事故的可能性。我们随机分析了俄罗斯是否声称或否认对爆炸负责,发现无人认领的行为比声称的行为具有更低的强制杠杆,但两者在升级风险方面没有显著差异。
{"title":"Does plausible deniability work? Assessing the effectiveness of unclaimed coercive acts in the Ukraine war","authors":"Costantino Pischedda, Andrew Cheon","doi":"10.1080/13523260.2023.2212464","DOIUrl":"https://doi.org/10.1080/13523260.2023.2212464","url":null,"abstract":"ABSTRACT States conduct unclaimed coercive acts, imposing costs on adversaries to signal resolve but denying (or not claiming) responsibility. Some scholars posit that unclaimed acts have considerable potential to coerce targets, while containing escalation risks. Others suggest that unclaimed coercive efforts tend to fail and trigger escalation. We assess these competing perspectives about the effects of unclaimed attacks with a vignette experiment exposing US-based respondents to a scenario where, after Russia warns of unpredictable consequences if NATO continues providing weapons to Ukraine, an explosion occurs at a NATO base in Poland used to funnel weapons to Ukraine. Intelligence agencies and independent analysts identify Russia as the likely culprit, while not ruling out the possibility of an accident. We randomize whether Russia claimed or denied responsibility for the explosion and find that unclaimed acts have lower coercive leverage than claimed ones, but the two do not significantly differ in escalation risk.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"345 - 371"},"PeriodicalIF":5.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47515747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity 从零开始:美国公众如何评估网络安全中零日漏洞的使用
IF 5.9 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-05-25 DOI: 10.1080/13523260.2023.2216112
Marcelo M. Leal, P. Musgrave
ABSTRACT Zero-day vulnerabilities are software and hardware flaws that are unknown to computer vendors. As powerful means of carrying out cyber intrusions, such vulnerabilities present a dilemma for governments. Actors that develop or procure such vulnerabilities may retain them for future use; alternatively, agencies possessing such vulnerabilities may disclose the flaws to affected vendors so they can be patched, thereby denying vulnerabilities not only to adversaries but also themselves. Previous research has explored the ethics and implications of this dilemma, but no study has investigated public opinion regarding zero-day exploits. We present results from a survey experiment testing whether conditions identified as important in the literature influence respondents’ support for disclosing or stockpiling zero-day vulnerabilities. Our results show that respondents overwhelmingly support disclosure, a conclusion only weakly affected by the likelihood that an adversary will independently discover the vulnerability. Our findings suggest a gap between public preferences and current U.S. policy.
零日漏洞是计算机供应商不知道的软件和硬件缺陷。作为实施网络入侵的有力手段,此类漏洞让各国政府进退两难。开发或获取此类漏洞的行为者可能会保留这些漏洞以备将来使用;或者,拥有此类漏洞的机构可能会向受影响的供应商披露漏洞,以便修补漏洞,从而不仅拒绝对手,而且拒绝自己的漏洞。之前的研究已经探讨了这种困境的伦理和影响,但没有研究调查过公众对零日漏洞的看法。我们提出了一项调查实验的结果,该实验测试了文献中确定的重要条件是否会影响受访者对披露或储存零日漏洞的支持。我们的结果显示,受访者压倒性地支持披露,这一结论只受到对手独立发现漏洞的可能性的微弱影响。我们的研究结果表明,公众的偏好与美国当前的政策之间存在差距。
{"title":"Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity","authors":"Marcelo M. Leal, P. Musgrave","doi":"10.1080/13523260.2023.2216112","DOIUrl":"https://doi.org/10.1080/13523260.2023.2216112","url":null,"abstract":"ABSTRACT Zero-day vulnerabilities are software and hardware flaws that are unknown to computer vendors. As powerful means of carrying out cyber intrusions, such vulnerabilities present a dilemma for governments. Actors that develop or procure such vulnerabilities may retain them for future use; alternatively, agencies possessing such vulnerabilities may disclose the flaws to affected vendors so they can be patched, thereby denying vulnerabilities not only to adversaries but also themselves. Previous research has explored the ethics and implications of this dilemma, but no study has investigated public opinion regarding zero-day exploits. We present results from a survey experiment testing whether conditions identified as important in the literature influence respondents’ support for disclosing or stockpiling zero-day vulnerabilities. Our results show that respondents overwhelmingly support disclosure, a conclusion only weakly affected by the likelihood that an adversary will independently discover the vulnerability. Our findings suggest a gap between public preferences and current U.S. policy.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"437 - 461"},"PeriodicalIF":5.9,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47896119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Explaining state participation in ten universal WMD treaties: A survival analysis of ratification decisions 解释国家参与十项世界性大规模杀伤性武器条约:对批准决定的生存分析
IF 5.9 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-05-16 DOI: 10.1080/13523260.2023.2211899
Jan Karlas
ABSTRACT Much of what we know about state participation in universal weapons of mass destruction (WMD) treaties is based on research about the Nuclear Non-Proliferation Treaty (NPT). This article instead analyzes the ratification of all ten current WMD treaties. Using a survival analysis of ratification events (1960–2022), it challenges conventional wisdom. It shows that security threats—a factor stressed by neorealists and research on the NPT—provide only a weak and incomplete explanation. Instead, three types of costs and benefits influence ratification decisions: policy change costs, benefits from the secondary functions of treaties, and benefits from the conformity with the ratification behavior of regional peers. More specifically, the article finds that the possession and pursuit of WMD delays ratification. The country’s support for the liberal hegemonic order, the level of its economic development, and a high regional ratification rate of the respective treaty increase the probability of ratification.
摘要我们对国家参与普遍性大规模杀伤性武器条约的了解大多基于对《核不扩散条约》的研究。相反,本文分析了目前所有十项大规模杀伤性武器条约的批准情况。通过对批准事件(1960-2022年)的生存分析,它挑战了传统智慧。它表明,安全威胁——新现实主义者和《不扩散条约》研究者强调的一个因素——只能提供一个软弱和不完整的解释。相反,有三种类型的成本和收益会影响批准决定:政策变化成本、条约次要功能带来的收益以及与区域同行批准行为一致带来的收益。更具体地说,该条款认为,拥有和追求大规模毁灭性武器会推迟批准。该国对自由霸权秩序的支持、其经济发展水平以及各自条约的高地区批准率都增加了批准的可能性。
{"title":"Explaining state participation in ten universal WMD treaties: A survival analysis of ratification decisions","authors":"Jan Karlas","doi":"10.1080/13523260.2023.2211899","DOIUrl":"https://doi.org/10.1080/13523260.2023.2211899","url":null,"abstract":"ABSTRACT Much of what we know about state participation in universal weapons of mass destruction (WMD) treaties is based on research about the Nuclear Non-Proliferation Treaty (NPT). This article instead analyzes the ratification of all ten current WMD treaties. Using a survival analysis of ratification events (1960–2022), it challenges conventional wisdom. It shows that security threats—a factor stressed by neorealists and research on the NPT—provide only a weak and incomplete explanation. Instead, three types of costs and benefits influence ratification decisions: policy change costs, benefits from the secondary functions of treaties, and benefits from the conformity with the ratification behavior of regional peers. More specifically, the article finds that the possession and pursuit of WMD delays ratification. The country’s support for the liberal hegemonic order, the level of its economic development, and a high regional ratification rate of the respective treaty increase the probability of ratification.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"410 - 436"},"PeriodicalIF":5.9,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43128963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The rules-based order as rhetorical entrapment: Comparing maritime dispute resolution in the Indo-Pacific 以规则为基础的秩序作为修辞陷阱:比较印太地区的海事争端解决
IF 5.9 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2023-04-27 DOI: 10.1080/13523260.2023.2204266
Rebecca Strating
ABSTRACT In response to challenges to Asia’s security order, regional powers such Australia, India, and Japan have adopted new “Indo-Pacific” strategic narratives to promote and defend the “rules-based order.” These narratives use China’s maritime disputes with smaller neighbors in the South China Sea as a key example of Beijing’s revisionist intentions. Yet such narratives expose “rules-based order” advocates to risks of “rhetorical entrapment” as other actors compel them to abide by the standards they have set. To what extent have Indo-Pacific powers been forced to follow the rules in their own asymmetrical maritime disputes? This article examines three Indo-Pacific cases: Timor Sea Compulsory Conciliation between Australia and Timor-Leste, the Chagos Island Marine Protected Area Arbitration between the United Kingdom and Mauritius, and the Bay of Bengal Maritime Boundary Arbitration between India and Bangladesh. To varying degrees, this article finds that strategic narratives constrained the policy options of all three Indo-Pacific powers.
摘要为了应对对亚洲安全秩序的挑战,澳大利亚、印度和日本等地区大国采用了新的“印太”战略叙事,以促进和捍卫“基于规则的秩序”。这些叙事将中国与南中国海较小邻国的海洋争端作为北京修正主义意图的一个关键例子。然而,这种叙事使“基于规则的秩序”倡导者面临“修辞陷阱”的风险,因为其他行为者迫使他们遵守他们制定的标准。印太大国在多大程度上被迫在自己不对称的海洋争端中遵守规则?本文审查了三个印度-太平洋案件:澳大利亚和东帝汶之间的帝汶海强制调解、英国和毛里求斯之间的查戈斯岛海洋保护区仲裁以及印度和孟加拉国之间的孟加拉湾海洋边界仲裁。本文发现,战略叙事在不同程度上制约了三个印太大国的政策选择。
{"title":"The rules-based order as rhetorical entrapment: Comparing maritime dispute resolution in the Indo-Pacific","authors":"Rebecca Strating","doi":"10.1080/13523260.2023.2204266","DOIUrl":"https://doi.org/10.1080/13523260.2023.2204266","url":null,"abstract":"ABSTRACT In response to challenges to Asia’s security order, regional powers such Australia, India, and Japan have adopted new “Indo-Pacific” strategic narratives to promote and defend the “rules-based order.” These narratives use China’s maritime disputes with smaller neighbors in the South China Sea as a key example of Beijing’s revisionist intentions. Yet such narratives expose “rules-based order” advocates to risks of “rhetorical entrapment” as other actors compel them to abide by the standards they have set. To what extent have Indo-Pacific powers been forced to follow the rules in their own asymmetrical maritime disputes? This article examines three Indo-Pacific cases: Timor Sea Compulsory Conciliation between Australia and Timor-Leste, the Chagos Island Marine Protected Area Arbitration between the United Kingdom and Mauritius, and the Bay of Bengal Maritime Boundary Arbitration between India and Bangladesh. To varying degrees, this article finds that strategic narratives constrained the policy options of all three Indo-Pacific powers.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":"44 1","pages":"372 - 409"},"PeriodicalIF":5.9,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45017288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Contemporary Security Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1