首页 > 最新文献

Contemporary Security Policy最新文献

英文 中文
Privatizing security and authoritarian adaptation in the Arab region since the 2010–2011 uprisings 自2010-2011年起义以来,阿拉伯地区的安全私有化和独裁适应
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-06-02 DOI: 10.1080/13523260.2023.2214757
E. Moussa
ABSTRACT Some Arab countries have since 2011 experienced intense security market diversification with considerable outsourcing of domestic security and guarding services. To date, scholars and security experts predominantly conceive this development within security reform processes or as an inevitable outcome of a chaotic post-uprisings period. Instead, this article situates some Arab states’ increasing reliance on private security actors within the evolving power dynamics and diverse challenges facing ruling elites and populations alike. Addressing how privatizing security contributes to perpetuating authoritarian practices post-2010, the article argues that contemporary security privatization and outsourcing provide alternative agents and strategies for control, while offering new venues to enrich and strengthen ruling elites. Guided by critical security studies and drawing on interviews, fieldwork and official documents, the article advances three ways through which outsourcing security supports practices of authoritarian adaptation: cultivating networks of patronage, diversifying ruling elites’ bases of security, and curbing constant sources of unrest.
自2011年以来,一些阿拉伯国家经历了激烈的安全市场多元化,国内安全和警卫服务外包相当大。迄今为止,学者和安全专家主要认为这种发展是在安全改革过程中发生的,或者是混乱的后起义时期的必然结果。相反,这篇文章将一些阿拉伯国家在不断变化的权力动态和统治精英和民众所面临的各种挑战中越来越依赖私人安全行为者。在探讨安全私有化如何助长2010年后的专制做法时,文章认为,当代安全私有化和外包为控制提供了替代代理和策略,同时提供了丰富和加强统治精英的新场所。在重要安全研究的指导下,通过访谈、实地调查和官方文件,本文提出了外包安全支持威权适应实践的三种方式:培养庇护网络,使统治精英的安全基础多样化,以及遏制持续的动荡来源。
{"title":"Privatizing security and authoritarian adaptation in the Arab region since the 2010–2011 uprisings","authors":"E. Moussa","doi":"10.1080/13523260.2023.2214757","DOIUrl":"https://doi.org/10.1080/13523260.2023.2214757","url":null,"abstract":"ABSTRACT Some Arab countries have since 2011 experienced intense security market diversification with considerable outsourcing of domestic security and guarding services. To date, scholars and security experts predominantly conceive this development within security reform processes or as an inevitable outcome of a chaotic post-uprisings period. Instead, this article situates some Arab states’ increasing reliance on private security actors within the evolving power dynamics and diverse challenges facing ruling elites and populations alike. Addressing how privatizing security contributes to perpetuating authoritarian practices post-2010, the article argues that contemporary security privatization and outsourcing provide alternative agents and strategies for control, while offering new venues to enrich and strengthen ruling elites. Guided by critical security studies and drawing on interviews, fieldwork and official documents, the article advances three ways through which outsourcing security supports practices of authoritarian adaptation: cultivating networks of patronage, diversifying ruling elites’ bases of security, and curbing constant sources of unrest.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-06-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41621114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Does plausible deniability work? Assessing the effectiveness of unclaimed coercive acts in the Ukraine war 合理的否认有效吗?评估乌克兰战争中无人认领的胁迫行为的有效性
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-05-31 DOI: 10.1080/13523260.2023.2212464
Costantino Pischedda, Andrew Cheon
ABSTRACT States conduct unclaimed coercive acts, imposing costs on adversaries to signal resolve but denying (or not claiming) responsibility. Some scholars posit that unclaimed acts have considerable potential to coerce targets, while containing escalation risks. Others suggest that unclaimed coercive efforts tend to fail and trigger escalation. We assess these competing perspectives about the effects of unclaimed attacks with a vignette experiment exposing US-based respondents to a scenario where, after Russia warns of unpredictable consequences if NATO continues providing weapons to Ukraine, an explosion occurs at a NATO base in Poland used to funnel weapons to Ukraine. Intelligence agencies and independent analysts identify Russia as the likely culprit, while not ruling out the possibility of an accident. We randomize whether Russia claimed or denied responsibility for the explosion and find that unclaimed acts have lower coercive leverage than claimed ones, but the two do not significantly differ in escalation risk.
摘要国家实施无人认领的胁迫行为,向对手施加代价以表明决心,但否认(或不声称)责任。一些学者认为,无人认领的行为有很大的潜力胁迫目标,同时遏制升级风险。其他人则认为,无人认领的胁迫努力往往会失败并引发事态升级。我们通过一项小插曲实验评估了这些关于无人认领袭击影响的相互竞争的观点,该实验将美国受访者暴露在一种情况下,即在俄罗斯警告如果北约继续向乌克兰提供武器将产生不可预测的后果后,北约在波兰的一个基地发生爆炸,该基地用于向乌克兰输送武器。情报机构和独立分析人士认定俄罗斯可能是罪魁祸首,但不排除发生事故的可能性。我们随机分析了俄罗斯是否声称或否认对爆炸负责,发现无人认领的行为比声称的行为具有更低的强制杠杆,但两者在升级风险方面没有显著差异。
{"title":"Does plausible deniability work? Assessing the effectiveness of unclaimed coercive acts in the Ukraine war","authors":"Costantino Pischedda, Andrew Cheon","doi":"10.1080/13523260.2023.2212464","DOIUrl":"https://doi.org/10.1080/13523260.2023.2212464","url":null,"abstract":"ABSTRACT States conduct unclaimed coercive acts, imposing costs on adversaries to signal resolve but denying (or not claiming) responsibility. Some scholars posit that unclaimed acts have considerable potential to coerce targets, while containing escalation risks. Others suggest that unclaimed coercive efforts tend to fail and trigger escalation. We assess these competing perspectives about the effects of unclaimed attacks with a vignette experiment exposing US-based respondents to a scenario where, after Russia warns of unpredictable consequences if NATO continues providing weapons to Ukraine, an explosion occurs at a NATO base in Poland used to funnel weapons to Ukraine. Intelligence agencies and independent analysts identify Russia as the likely culprit, while not ruling out the possibility of an accident. We randomize whether Russia claimed or denied responsibility for the explosion and find that unclaimed acts have lower coercive leverage than claimed ones, but the two do not significantly differ in escalation risk.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47515747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity 从零开始:美国公众如何评估网络安全中零日漏洞的使用
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-05-25 DOI: 10.1080/13523260.2023.2216112
Marcelo M. Leal, P. Musgrave
ABSTRACT Zero-day vulnerabilities are software and hardware flaws that are unknown to computer vendors. As powerful means of carrying out cyber intrusions, such vulnerabilities present a dilemma for governments. Actors that develop or procure such vulnerabilities may retain them for future use; alternatively, agencies possessing such vulnerabilities may disclose the flaws to affected vendors so they can be patched, thereby denying vulnerabilities not only to adversaries but also themselves. Previous research has explored the ethics and implications of this dilemma, but no study has investigated public opinion regarding zero-day exploits. We present results from a survey experiment testing whether conditions identified as important in the literature influence respondents’ support for disclosing or stockpiling zero-day vulnerabilities. Our results show that respondents overwhelmingly support disclosure, a conclusion only weakly affected by the likelihood that an adversary will independently discover the vulnerability. Our findings suggest a gap between public preferences and current U.S. policy.
零日漏洞是计算机供应商不知道的软件和硬件缺陷。作为实施网络入侵的有力手段,此类漏洞让各国政府进退两难。开发或获取此类漏洞的行为者可能会保留这些漏洞以备将来使用;或者,拥有此类漏洞的机构可能会向受影响的供应商披露漏洞,以便修补漏洞,从而不仅拒绝对手,而且拒绝自己的漏洞。之前的研究已经探讨了这种困境的伦理和影响,但没有研究调查过公众对零日漏洞的看法。我们提出了一项调查实验的结果,该实验测试了文献中确定的重要条件是否会影响受访者对披露或储存零日漏洞的支持。我们的结果显示,受访者压倒性地支持披露,这一结论只受到对手独立发现漏洞的可能性的微弱影响。我们的研究结果表明,公众的偏好与美国当前的政策之间存在差距。
{"title":"Backwards from zero: How the U.S. public evaluates the use of zero-day vulnerabilities in cybersecurity","authors":"Marcelo M. Leal, P. Musgrave","doi":"10.1080/13523260.2023.2216112","DOIUrl":"https://doi.org/10.1080/13523260.2023.2216112","url":null,"abstract":"ABSTRACT Zero-day vulnerabilities are software and hardware flaws that are unknown to computer vendors. As powerful means of carrying out cyber intrusions, such vulnerabilities present a dilemma for governments. Actors that develop or procure such vulnerabilities may retain them for future use; alternatively, agencies possessing such vulnerabilities may disclose the flaws to affected vendors so they can be patched, thereby denying vulnerabilities not only to adversaries but also themselves. Previous research has explored the ethics and implications of this dilemma, but no study has investigated public opinion regarding zero-day exploits. We present results from a survey experiment testing whether conditions identified as important in the literature influence respondents’ support for disclosing or stockpiling zero-day vulnerabilities. Our results show that respondents overwhelmingly support disclosure, a conclusion only weakly affected by the likelihood that an adversary will independently discover the vulnerability. Our findings suggest a gap between public preferences and current U.S. policy.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47896119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Explaining state participation in ten universal WMD treaties: A survival analysis of ratification decisions 解释国家参与十项世界性大规模杀伤性武器条约:对批准决定的生存分析
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-05-16 DOI: 10.1080/13523260.2023.2211899
Jan Karlas
ABSTRACT Much of what we know about state participation in universal weapons of mass destruction (WMD) treaties is based on research about the Nuclear Non-Proliferation Treaty (NPT). This article instead analyzes the ratification of all ten current WMD treaties. Using a survival analysis of ratification events (1960–2022), it challenges conventional wisdom. It shows that security threats—a factor stressed by neorealists and research on the NPT—provide only a weak and incomplete explanation. Instead, three types of costs and benefits influence ratification decisions: policy change costs, benefits from the secondary functions of treaties, and benefits from the conformity with the ratification behavior of regional peers. More specifically, the article finds that the possession and pursuit of WMD delays ratification. The country’s support for the liberal hegemonic order, the level of its economic development, and a high regional ratification rate of the respective treaty increase the probability of ratification.
摘要我们对国家参与普遍性大规模杀伤性武器条约的了解大多基于对《核不扩散条约》的研究。相反,本文分析了目前所有十项大规模杀伤性武器条约的批准情况。通过对批准事件(1960-2022年)的生存分析,它挑战了传统智慧。它表明,安全威胁——新现实主义者和《不扩散条约》研究者强调的一个因素——只能提供一个软弱和不完整的解释。相反,有三种类型的成本和收益会影响批准决定:政策变化成本、条约次要功能带来的收益以及与区域同行批准行为一致带来的收益。更具体地说,该条款认为,拥有和追求大规模毁灭性武器会推迟批准。该国对自由霸权秩序的支持、其经济发展水平以及各自条约的高地区批准率都增加了批准的可能性。
{"title":"Explaining state participation in ten universal WMD treaties: A survival analysis of ratification decisions","authors":"Jan Karlas","doi":"10.1080/13523260.2023.2211899","DOIUrl":"https://doi.org/10.1080/13523260.2023.2211899","url":null,"abstract":"ABSTRACT Much of what we know about state participation in universal weapons of mass destruction (WMD) treaties is based on research about the Nuclear Non-Proliferation Treaty (NPT). This article instead analyzes the ratification of all ten current WMD treaties. Using a survival analysis of ratification events (1960–2022), it challenges conventional wisdom. It shows that security threats—a factor stressed by neorealists and research on the NPT—provide only a weak and incomplete explanation. Instead, three types of costs and benefits influence ratification decisions: policy change costs, benefits from the secondary functions of treaties, and benefits from the conformity with the ratification behavior of regional peers. More specifically, the article finds that the possession and pursuit of WMD delays ratification. The country’s support for the liberal hegemonic order, the level of its economic development, and a high regional ratification rate of the respective treaty increase the probability of ratification.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43128963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The rules-based order as rhetorical entrapment: Comparing maritime dispute resolution in the Indo-Pacific 以规则为基础的秩序作为修辞陷阱:比较印太地区的海事争端解决
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-04-27 DOI: 10.1080/13523260.2023.2204266
Rebecca Strating
ABSTRACT In response to challenges to Asia’s security order, regional powers such Australia, India, and Japan have adopted new “Indo-Pacific” strategic narratives to promote and defend the “rules-based order.” These narratives use China’s maritime disputes with smaller neighbors in the South China Sea as a key example of Beijing’s revisionist intentions. Yet such narratives expose “rules-based order” advocates to risks of “rhetorical entrapment” as other actors compel them to abide by the standards they have set. To what extent have Indo-Pacific powers been forced to follow the rules in their own asymmetrical maritime disputes? This article examines three Indo-Pacific cases: Timor Sea Compulsory Conciliation between Australia and Timor-Leste, the Chagos Island Marine Protected Area Arbitration between the United Kingdom and Mauritius, and the Bay of Bengal Maritime Boundary Arbitration between India and Bangladesh. To varying degrees, this article finds that strategic narratives constrained the policy options of all three Indo-Pacific powers.
摘要为了应对对亚洲安全秩序的挑战,澳大利亚、印度和日本等地区大国采用了新的“印太”战略叙事,以促进和捍卫“基于规则的秩序”。这些叙事将中国与南中国海较小邻国的海洋争端作为北京修正主义意图的一个关键例子。然而,这种叙事使“基于规则的秩序”倡导者面临“修辞陷阱”的风险,因为其他行为者迫使他们遵守他们制定的标准。印太大国在多大程度上被迫在自己不对称的海洋争端中遵守规则?本文审查了三个印度-太平洋案件:澳大利亚和东帝汶之间的帝汶海强制调解、英国和毛里求斯之间的查戈斯岛海洋保护区仲裁以及印度和孟加拉国之间的孟加拉湾海洋边界仲裁。本文发现,战略叙事在不同程度上制约了三个印太大国的政策选择。
{"title":"The rules-based order as rhetorical entrapment: Comparing maritime dispute resolution in the Indo-Pacific","authors":"Rebecca Strating","doi":"10.1080/13523260.2023.2204266","DOIUrl":"https://doi.org/10.1080/13523260.2023.2204266","url":null,"abstract":"ABSTRACT In response to challenges to Asia’s security order, regional powers such Australia, India, and Japan have adopted new “Indo-Pacific” strategic narratives to promote and defend the “rules-based order.” These narratives use China’s maritime disputes with smaller neighbors in the South China Sea as a key example of Beijing’s revisionist intentions. Yet such narratives expose “rules-based order” advocates to risks of “rhetorical entrapment” as other actors compel them to abide by the standards they have set. To what extent have Indo-Pacific powers been forced to follow the rules in their own asymmetrical maritime disputes? This article examines three Indo-Pacific cases: Timor Sea Compulsory Conciliation between Australia and Timor-Leste, the Chagos Island Marine Protected Area Arbitration between the United Kingdom and Mauritius, and the Bay of Bengal Maritime Boundary Arbitration between India and Bangladesh. To varying degrees, this article finds that strategic narratives constrained the policy options of all three Indo-Pacific powers.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45017288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Beyond deterrence: Reconceptualizing denial strategies and rethinking their emotional effects 超越威慑:重新定义拒绝策略并重新思考其情感影响
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-03-16 DOI: 10.1080/13523260.2023.2185970
Samuel Žilinčík, T. Sweijs
ABSTRACT Contrary to detailed work on deterrence by punishment, Western strategic thought about denial and its effects is conceptually muddled at the expense of effective strategy-making. This article seeks to reconceptualize denial and rethink its emotional effects. It defines denial as a strategy aimed at frustrating the adversary’s military power and proposes four different denial logics: capability elimination, operational paralysis, tactical degradation, and strategic effect reduction. It then turns to the effects through which these denial logics generate favorable consequences, and singles out the emotions of despondency, resignation, fear, and disappointment as the key factors that mediate their impact. The article offers a framework that can help guide further theoretical reflection and empirical research, as well as inform the development of policies and strategies in today’s world.
摘要与惩罚威慑的详细研究相反,西方关于否认及其影响的战略思想在概念上是混乱的,而牺牲了有效的战略制定。本文试图重新定义否认的概念,并重新思考其情感影响。它将拒止定义为一种旨在挫败对手军事力量的策略,并提出了四种不同的拒止逻辑:能力消除、作战瘫痪、战术降级和战略效果降低。然后,它转向这些否认逻辑产生有利后果的效果,并指出沮丧、顺从、恐惧和失望情绪是调节其影响的关键因素。这篇文章提供了一个框架,可以帮助指导进一步的理论反思和实证研究,并为当今世界的政策和战略发展提供信息。
{"title":"Beyond deterrence: Reconceptualizing denial strategies and rethinking their emotional effects","authors":"Samuel Žilinčík, T. Sweijs","doi":"10.1080/13523260.2023.2185970","DOIUrl":"https://doi.org/10.1080/13523260.2023.2185970","url":null,"abstract":"ABSTRACT Contrary to detailed work on deterrence by punishment, Western strategic thought about denial and its effects is conceptually muddled at the expense of effective strategy-making. This article seeks to reconceptualize denial and rethink its emotional effects. It defines denial as a strategy aimed at frustrating the adversary’s military power and proposes four different denial logics: capability elimination, operational paralysis, tactical degradation, and strategic effect reduction. It then turns to the effects through which these denial logics generate favorable consequences, and singles out the emotions of despondency, resignation, fear, and disappointment as the key factors that mediate their impact. The article offers a framework that can help guide further theoretical reflection and empirical research, as well as inform the development of policies and strategies in today’s world.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45379434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Learning to trust Skynet: Interfacing with artificial intelligence in cyberspace 学会信任天网:在网络空间与人工智能对接
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-03-10 DOI: 10.1080/13523260.2023.2180882
Christopher Whyte
ABSTRACT The use of AI to automate defense and intelligence tasks is increasing. And yet, little is known about how algorithmic analyses, data capture, and decisions will be perceived by elite decision-makers. This article presents the results of two experiments that explore manifestations of AI systems in the cyber conflict decision-making loop. Though findings suggest that technical expertise positively impacts respondents’ ability to gauge the potential utility and credibility of an input (indicating that training can, in fact, overcome bias), the perception of human agency in the loop even in the presence of AI inputs mitigates this effect and makes decision-makers more willing to operate on less information. This finding is worrying given the extensive challenges involved in effectively building human oversight and opportunity for intervention into any effective employment of AI for national security purposes. The article considers these obstacles and potential solutions in the context of data gathered.
人工智能在自动化国防和情报任务中的应用越来越多。然而,对于精英决策者将如何看待算法分析、数据捕获和决策,我们知之甚少。本文介绍了两个探索人工智能系统在网络冲突决策循环中的表现的实验结果。尽管研究结果表明,技术专长对受访者衡量输入的潜在效用和可信度的能力产生了积极影响(表明培训实际上可以克服偏见),但即使在人工智能输入存在的情况下,对循环中人类代理的感知也会减轻这种影响,并使决策者更愿意在更少的信息上操作。这一发现令人担忧,因为有效地建立人类监督和干预机会涉及广泛的挑战,以有效地利用人工智能来实现国家安全目的。本文在收集数据的背景下考虑这些障碍和潜在的解决方案。
{"title":"Learning to trust Skynet: Interfacing with artificial intelligence in cyberspace","authors":"Christopher Whyte","doi":"10.1080/13523260.2023.2180882","DOIUrl":"https://doi.org/10.1080/13523260.2023.2180882","url":null,"abstract":"ABSTRACT The use of AI to automate defense and intelligence tasks is increasing. And yet, little is known about how algorithmic analyses, data capture, and decisions will be perceived by elite decision-makers. This article presents the results of two experiments that explore manifestations of AI systems in the cyber conflict decision-making loop. Though findings suggest that technical expertise positively impacts respondents’ ability to gauge the potential utility and credibility of an input (indicating that training can, in fact, overcome bias), the perception of human agency in the loop even in the presence of AI inputs mitigates this effect and makes decision-makers more willing to operate on less information. This finding is worrying given the extensive challenges involved in effectively building human oversight and opportunity for intervention into any effective employment of AI for national security purposes. The article considers these obstacles and potential solutions in the context of data gathered.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43101262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The limits of strategic partnerships: Implications for China’s role in the Russia-Ukraine war 战略伙伴关系的局限性:对中国在俄乌战争中的作用的启示
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-02-10 DOI: 10.1080/13523260.2023.2174702
Nien-chung Chang-Liao
ABSTRACT Will Russia’s invasion of Ukraine bring China and Russia closer together or drive them farther apart, or will it be business as usual? This article addresses this question by conceptualizing the main characteristics of the China–Russia strategic partnership. It argues that a strategic partnership, characterized as it is by informality, equality, and inclusivity, is essentially different from an alliance or alignment. These characteristics allow Beijing to distance itself from Moscow’s invasion of Ukraine. This makes it unlikely that China will attempt any simultaneous aggression in East Asia or that it will be able to mediate in the conflict. This effectively rules out the rise of a China–Russia axis. As China strives to balance its close ties with Russia and its economic engagement with the West, Beijing is more likely to maintain, rather than strengthen or weaken, its strategic partnership with Moscow.
俄罗斯入侵乌克兰会让中俄两国走得更近还是更远,还是一切如常?本文通过阐述中俄战略伙伴关系的主要特征来解决这一问题。报告认为,战略伙伴关系具有非正式性、平等性和包容性的特点,本质上不同于联盟或结盟。这些特点使北京与莫斯科入侵乌克兰保持距离。这使得中国不太可能同时在东亚进行侵略,也不太可能在冲突中进行调解。这有效地排除了中俄轴心崛起的可能性。随着中国努力平衡与俄罗斯的密切关系以及与西方的经济接触,北京更有可能维持,而不是加强或削弱与莫斯科的战略伙伴关系。
{"title":"The limits of strategic partnerships: Implications for China’s role in the Russia-Ukraine war","authors":"Nien-chung Chang-Liao","doi":"10.1080/13523260.2023.2174702","DOIUrl":"https://doi.org/10.1080/13523260.2023.2174702","url":null,"abstract":"ABSTRACT\u0000 Will Russia’s invasion of Ukraine bring China and Russia closer together or drive them farther apart, or will it be business as usual? This article addresses this question by conceptualizing the main characteristics of the China–Russia strategic partnership. It argues that a strategic partnership, characterized as it is by informality, equality, and inclusivity, is essentially different from an alliance or alignment. These characteristics allow Beijing to distance itself from Moscow’s invasion of Ukraine. This makes it unlikely that China will attempt any simultaneous aggression in East Asia or that it will be able to mediate in the conflict. This effectively rules out the rise of a China–Russia axis. As China strives to balance its close ties with Russia and its economic engagement with the West, Beijing is more likely to maintain, rather than strengthen or weaken, its strategic partnership with Moscow.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-02-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48058130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Risk acceptance and offensive war: The case of Russia under the Putin regime 风险接受与进攻性战争:普京政权下的俄罗斯
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-01-11 DOI: 10.1080/13523260.2023.2164974
Jonas J. Driedger
ABSTRACT Russia’s decision to invade Ukraine in early 2022 was seemingly driven by an unprecedented willingness to accept risks for the Russian regime, state, and society. Developing a generalizable framework, this article analyzes the development of Russian risk acceptance in offensive war initiation. Drawing on policy documents, speeches, expert literature, and various interviews with Russian, Ukrainian, and Western policymakers, the article finds that risk acceptance has continuously risen since the mid-2000s, although the 2022 invasion still evinces some risk aversion. These results are robust when accounting for miscalculation and caution against attributing the 2022 invasion solely to short-term and leader-centric factors. They also provide cues for understanding the crisis behavior of Russia and other major powers, corroborate prospect theory models on cognitive biases in elite decision-making, and indicate the need to revise the theoretical assumption that risk acceptance is an empirically rare and drastic aberration from a risk-neutral or risk-averse normality.
俄罗斯在2022年初决定入侵乌克兰,似乎是出于对俄罗斯政权、国家和社会承担风险的前所未有的意愿。本文建立了一个可推广的框架,分析了俄罗斯在进攻战争启动过程中风险接受的发展。根据政策文件、演讲、专家文献以及对俄罗斯、乌克兰和西方政策制定者的各种采访,文章发现,自2000年代中期以来,风险接受度不断上升,尽管2022年的入侵仍然显示出一些风险厌恶情绪。考虑到误判和谨慎,不要把2022年的入侵仅仅归因于短期和以领导人为中心的因素,这些结果是强有力的。它们还为理解俄罗斯和其他大国的危机行为提供了线索,证实了精英决策中认知偏差的前景理论模型,并表明有必要修改理论假设,即风险接受是风险中性或风险厌恶常态的经验罕见和严重偏差。
{"title":"Risk acceptance and offensive war: The case of Russia under the Putin regime","authors":"Jonas J. Driedger","doi":"10.1080/13523260.2023.2164974","DOIUrl":"https://doi.org/10.1080/13523260.2023.2164974","url":null,"abstract":"ABSTRACT Russia’s decision to invade Ukraine in early 2022 was seemingly driven by an unprecedented willingness to accept risks for the Russian regime, state, and society. Developing a generalizable framework, this article analyzes the development of Russian risk acceptance in offensive war initiation. Drawing on policy documents, speeches, expert literature, and various interviews with Russian, Ukrainian, and Western policymakers, the article finds that risk acceptance has continuously risen since the mid-2000s, although the 2022 invasion still evinces some risk aversion. These results are robust when accounting for miscalculation and caution against attributing the 2022 invasion solely to short-term and leader-centric factors. They also provide cues for understanding the crisis behavior of Russia and other major powers, corroborate prospect theory models on cognitive biases in elite decision-making, and indicate the need to revise the theoretical assumption that risk acceptance is an empirically rare and drastic aberration from a risk-neutral or risk-averse normality.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46643557","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Coercive disclosure: The weaponization of public intelligence revelation in international relations 强制披露:国际关系中公共情报披露的武器化
IF 5.9 1区 社会学 Q1 Social Sciences Pub Date : 2023-01-09 DOI: 10.1080/13523260.2022.2164122
Ofek Riemer, Daniel Sobelman
ABSTRACT Can intelligence serve as a coercive instrument in international relations? While coercion literature mostly addresses military and economic means, this article argues that coercion can also include the deliberate public disclosure of intelligence. Intelligence can be employed to threaten adversaries, reduce their latitude, and force them to adjust their plans and operations. Additionally, intelligence disclosure can be used to mobilize domestic and international audiences and make others align with a certain narrative and alter their policies accordingly. Still, coercive disclosure can fail or succeed only partially against a determined opponent or a target that is resilient to public and international pressure. To demonstrate the workings of coercive disclosure, we analyze Israel's campaign, beginning in 2017, against the Lebanese Hezbollah’s missile manufacturing program and Turkey's coercive campaign vis-à-vis Saudi Arabia and the United States following Jamal Khashoggi's assassination in 2018.
摘要:情报在国际关系中能起到胁迫性工具的作用吗?虽然胁迫文献主要涉及军事和经济手段,但本文认为胁迫也可以包括故意公开披露情报。情报可以用来威胁对手,减少他们的自由度,迫使他们调整计划和行动。此外,情报披露可以用来动员国内和国际受众,使其他人与某种叙述保持一致,并相应地改变其政策。尽管如此,强制性披露只能部分针对坚定的对手或能够抵御公众和国际压力的目标而失败或成功。为了证明强制披露的运作方式,我们分析了以色列从2017年开始针对黎巴嫩真主党导弹制造计划的行动,以及2018年贾迈勒·卡舒吉遇刺后土耳其对沙特阿拉伯和美国的强制行动。
{"title":"Coercive disclosure: The weaponization of public intelligence revelation in international relations","authors":"Ofek Riemer, Daniel Sobelman","doi":"10.1080/13523260.2022.2164122","DOIUrl":"https://doi.org/10.1080/13523260.2022.2164122","url":null,"abstract":"ABSTRACT Can intelligence serve as a coercive instrument in international relations? While coercion literature mostly addresses military and economic means, this article argues that coercion can also include the deliberate public disclosure of intelligence. Intelligence can be employed to threaten adversaries, reduce their latitude, and force them to adjust their plans and operations. Additionally, intelligence disclosure can be used to mobilize domestic and international audiences and make others align with a certain narrative and alter their policies accordingly. Still, coercive disclosure can fail or succeed only partially against a determined opponent or a target that is resilient to public and international pressure. To demonstrate the workings of coercive disclosure, we analyze Israel's campaign, beginning in 2017, against the Lebanese Hezbollah’s missile manufacturing program and Turkey's coercive campaign vis-à-vis Saudi Arabia and the United States following Jamal Khashoggi's assassination in 2018.","PeriodicalId":46729,"journal":{"name":"Contemporary Security Policy","volume":null,"pages":null},"PeriodicalIF":5.9,"publicationDate":"2023-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45356527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Contemporary Security Policy
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1