首页 > 最新文献

Security Studies最新文献

英文 中文
Tripwires and Alliance Reassurance: An Exchange – The Authors Reply 绊网与联盟保证:一种交流——作者回复
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-08-08 DOI: 10.1080/09636412.2022.2140599
Brian Blankenship, Erik Lin-Greenberg
cent) of US military events in Asia fall into Blankenship and Lin-Greenberg’s worst category—transient demonstrations. These operations—like FONOPS, routine operations through the Taiwan Strait, and flyovers around the North Korean Peninsula—supposedly demonstrate low resolve and low capability. It is an intriguing, and researchable, policy question about why the United States would choose to focus so much of its efforts on precisely the types of activities that Blankenship and Lin-Greenberg argue do little to reassure allies, and thus do little to deter adversaries. After all, most of the activities that fall within the authors’ reassurance typology are not primarily meant to reassure at all, but to deter. This inconsistency raises the additional question of whether the purpose of the military activity determines whether it signals high resolve and/or capability.
布兰肯希普和林-格林伯格认为,美国在亚洲的军事行动中,有25%属于最糟糕的一类——短暂示威。这些行动——比如航行自由行动(FONOPS),通过台湾海峡的常规行动,以及围绕朝鲜半岛的飞越行动——被认为是低决心和低能力的表现。布兰肯希普和林-格林伯格认为,美国为什么会选择将如此多的精力集中在那些既无法安抚盟友,也无法威慑对手的活动上,这是一个有趣的、可研究的政策问题。毕竟,大多数属于作者的安抚类型的活动主要不是为了安抚,而是为了阻止。这种不一致提出了另一个问题,即军事活动的目的是否决定了它是否表明高度决心和(或)能力。
{"title":"Tripwires and Alliance Reassurance: An Exchange – The Authors Reply","authors":"Brian Blankenship, Erik Lin-Greenberg","doi":"10.1080/09636412.2022.2140599","DOIUrl":"https://doi.org/10.1080/09636412.2022.2140599","url":null,"abstract":"cent) of US military events in Asia fall into Blankenship and Lin-Greenberg’s worst category—transient demonstrations. These operations—like FONOPS, routine operations through the Taiwan Strait, and flyovers around the North Korean Peninsula—supposedly demonstrate low resolve and low capability. It is an intriguing, and researchable, policy question about why the United States would choose to focus so much of its efforts on precisely the types of activities that Blankenship and Lin-Greenberg argue do little to reassure allies, and thus do little to deter adversaries. After all, most of the activities that fall within the authors’ reassurance typology are not primarily meant to reassure at all, but to deter. This inconsistency raises the additional question of whether the purpose of the military activity determines whether it signals high resolve and/or capability.","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"750 - 756"},"PeriodicalIF":1.8,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46187572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accommodative Signaling in Cyberspace and the Role of Risk 网络空间中的适应信号与风险的作用
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-08-08 DOI: 10.1080/09636412.2022.2140601
Fiona S. Cunningham
Do cyber operations fuel escalation in international crises, or do they provide states with a pathway to step back from the brink of conflict toward normal peacetime relations? This question has been hotly debated, including in the pages of Security Studies. Many cyber conflict scholars have pushed back against popular warnings that cyber operations could cause a crisis to ignite, citing a lack of empirical evidence that cyberattacks make escalation more likely. Engaging with this debate, Erica D. Lonergan and Shawn W. Lonergan posit that certain features of cyber operations make them better suited to “accommodative” signaling—signals of a desire to negotiate an end to the crisis—rather than signals of resolve to stand firm or escalate. They argue that “accommodative signaling is linked to crisis de-escalation because the former can enable the latter.” According to Lonergan and Lonergan, cyber operations intended to send accommodative signals have a distinctive logic. Their theory of accommodative signaling in cyberspace does not rely on the same theoretical logic that they and scholars have used to explain why cyber operations are
网络行动是助长了国际危机的升级,还是为各国提供了一条从冲突边缘向和平时期正常关系后退的途径?这个问题一直在激烈争论,包括在《安全研究》的页面上。许多网络冲突学者反驳了网络行动可能引发危机的流行警告,称缺乏经验证据表明网络攻击更有可能升级。参与这场辩论的Erica D.Lonergan和Shawn W.Lonergan认为,网络行动的某些特征使他们更适合“宽松”的信号——希望通过谈判结束危机的信号——而不是坚定立场或升级的决心信号。他们认为,“宽松信号与危机缓和有关,因为前者可以实现后者。”根据Lonergan和Lonergan的说法,旨在发送宽松信号的网络行动有着独特的逻辑。他们关于网络空间中调节信号的理论并不依赖于他们和学者用来解释为什么网络行动
{"title":"Accommodative Signaling in Cyberspace and the Role of Risk","authors":"Fiona S. Cunningham","doi":"10.1080/09636412.2022.2140601","DOIUrl":"https://doi.org/10.1080/09636412.2022.2140601","url":null,"abstract":"Do cyber operations fuel escalation in international crises, or do they provide states with a pathway to step back from the brink of conflict toward normal peacetime relations? This question has been hotly debated, including in the pages of Security Studies. Many cyber conflict scholars have pushed back against popular warnings that cyber operations could cause a crisis to ignite, citing a lack of empirical evidence that cyberattacks make escalation more likely. Engaging with this debate, Erica D. Lonergan and Shawn W. Lonergan posit that certain features of cyber operations make them better suited to “accommodative” signaling—signals of a desire to negotiate an end to the crisis—rather than signals of resolve to stand firm or escalate. They argue that “accommodative signaling is linked to crisis de-escalation because the former can enable the latter.” According to Lonergan and Lonergan, cyber operations intended to send accommodative signals have a distinctive logic. Their theory of accommodative signaling in cyberspace does not rely on the same theoretical logic that they and scholars have used to explain why cyber operations are","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"764 - 771"},"PeriodicalIF":1.8,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45866768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Can Cyberattacks Reassure? Half Measures as a De-Escalation Strategy 网络攻击能让人放心吗?减半措施作为降级策略
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-08-08 DOI: 10.1080/09636412.2022.2140600
Brandon K. Yoder
How can states de-escalate a crisis and avoid spiraling toward war? Doing so requires the actors to reassure each other of their willingness to issue and commit to concessions. Yet reassurance is fundamentally difficult: states have incentives to misrepresent their aims as moderate in order to dupe the other into offering concessions and drawing down its military readiness, only to renege and issue further demands in the future. Thus, credible signaling mechanisms are essential for peaceful crisis resolution. Adding to a growing literature on credible reassurance, Erica D. Lonergan and Shawn W. Lonergan offer an intriguing new theory of crisis de-escalation built around the distinct properties of cyber technology. They argue that states caught in an escalatory spiral can use cyberattacks to signal their willingness to compromise and give the opponent an opportunity to reciprocate. Thus, a seemingly provocative action can instead convey restraint and alleviate tensions. Two features of cyberattacks underpin this counterintuitive claim: they are relatively harmless compared to other military operations, and their origins are ambiguous, which facilitates plausible deniability. The “low harm” aspect signals restraint because the attacker foregoes more destructive coercive tools at its disposal. Because an attacker with maximalist goals would
{"title":"Can Cyberattacks Reassure? Half Measures as a De-Escalation Strategy","authors":"Brandon K. Yoder","doi":"10.1080/09636412.2022.2140600","DOIUrl":"https://doi.org/10.1080/09636412.2022.2140600","url":null,"abstract":"How can states de-escalate a crisis and avoid spiraling toward war? Doing so requires the actors to reassure each other of their willingness to issue and commit to concessions. Yet reassurance is fundamentally difficult: states have incentives to misrepresent their aims as moderate in order to dupe the other into offering concessions and drawing down its military readiness, only to renege and issue further demands in the future. Thus, credible signaling mechanisms are essential for peaceful crisis resolution. Adding to a growing literature on credible reassurance, Erica D. Lonergan and Shawn W. Lonergan offer an intriguing new theory of crisis de-escalation built around the distinct properties of cyber technology. They argue that states caught in an escalatory spiral can use cyberattacks to signal their willingness to compromise and give the opponent an opportunity to reciprocate. Thus, a seemingly provocative action can instead convey restraint and alleviate tensions. Two features of cyberattacks underpin this counterintuitive claim: they are relatively harmless compared to other military operations, and their origins are ambiguous, which facilitates plausible deniability. The “low harm” aspect signals restraint because the attacker foregoes more destructive coercive tools at its disposal. Because an attacker with maximalist goals would","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"757 - 763"},"PeriodicalIF":1.8,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46614485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Cyber Operations and Signaling: An Exchange – The Authors Reply 网络操作和信号:交流——作者回复
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-08-08 DOI: 10.1080/09636412.2022.2140603
E. Lonergan, Shawn W. Lonergan
with no perceived time to discern otherwise before retaliating. This alternative deductive argument warrants scrutiny, although the empirical cupboard of crises involving cyber operations is bare, despite what Lonergan and Lonergan suggest in their article. Unless, or until, cyberspace matures as a domain of interaction between states in crisis, the deductive logic above suggests caution for policymakers considering the use of cyber operations as crisis management tools.
在报复之前,没有时间辨别其他情况。尽管Lonergan和Lonergan在他们的文章中提出了建议,但涉及网络运营的危机的经验橱柜是裸露的,这种替代演绎论点值得仔细研究。除非或直到网络空间作为危机中国家之间互动的领域成熟,否则上述演绎逻辑建议决策者谨慎考虑将网络行动用作危机管理工具。
{"title":"Cyber Operations and Signaling: An Exchange – The Authors Reply","authors":"E. Lonergan, Shawn W. Lonergan","doi":"10.1080/09636412.2022.2140603","DOIUrl":"https://doi.org/10.1080/09636412.2022.2140603","url":null,"abstract":"with no perceived time to discern otherwise before retaliating. This alternative deductive argument warrants scrutiny, although the empirical cupboard of crises involving cyber operations is bare, despite what Lonergan and Lonergan suggest in their article. Unless, or until, cyberspace matures as a domain of interaction between states in crisis, the deductive logic above suggests caution for policymakers considering the use of cyber operations as crisis management tools.","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"782 - 789"},"PeriodicalIF":1.8,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44256562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How Women Shape the Course of War: Women’s Suffrage and the Election of 1916 妇女如何影响战争进程:妇女选举权和1916年的选举
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-08-08 DOI: 10.1080/09636412.2022.2129439
Joslyn Barnhart, Robert F. Trager
Abstract Studies have shown that across time and place, women, on average, are less supportive of the use of force than men. This implies that extensions of the franchise to women provide an opportunity to evaluate theories of democratic constraint on foreign policy decision making. In this article, we theorize democratic constraint on war and peace, arguing that it is a common latent constraint on elite actions and an active constraint when one party is pre-committed to a foreign policy position. We use the extraordinary—yet unexplored—case of the 1916 US presidential election to identify the democratic constraint on foreign policy and of women’s votes in particular. This case represents an early step of women into the electoral realm at the national level and provides unique evidence of leader selection due to changes in public opinion because of the uneven extension of women’s suffrage to US states. Reelected on a platform of: “He kept the United States out of war,” Woodrow Wilson would fail to avoid war in Europe, but he did pursue cooperative policies with Mexico that very likely prevented a second Mexican-American war.
研究表明,在不同的时间和地点,平均而言,女性比男性更不支持使用武力。这意味着,将选举权扩大到妇女,为评估外交政策决策中的民主约束理论提供了一个机会。在本文中,我们将对战争与和平的民主约束理论化,认为这是对精英行为的一种常见的潜在约束,当一方预先致力于外交政策立场时,这是一种积极的约束。我们用1916年美国总统选举这个不寻常但尚未被探索的案例来确定民主对外交政策的限制,尤其是对妇女投票的限制。这一案例代表了妇女在国家层面上进入选举领域的早期步骤,并提供了独特的证据,表明由于妇女选举权在美国各州的不均匀扩展,公众舆论发生了变化,从而导致了领导人的选择。伍德罗·威尔逊(Woodrow Wilson)以“他让美国远离战争”的政纲再次当选,但他未能避免欧洲战争,但他确实奉行与墨西哥的合作政策,很可能阻止了第二次美墨战争。
{"title":"How Women Shape the Course of War: Women’s Suffrage and the Election of 1916","authors":"Joslyn Barnhart, Robert F. Trager","doi":"10.1080/09636412.2022.2129439","DOIUrl":"https://doi.org/10.1080/09636412.2022.2129439","url":null,"abstract":"Abstract Studies have shown that across time and place, women, on average, are less supportive of the use of force than men. This implies that extensions of the franchise to women provide an opportunity to evaluate theories of democratic constraint on foreign policy decision making. In this article, we theorize democratic constraint on war and peace, arguing that it is a common latent constraint on elite actions and an active constraint when one party is pre-committed to a foreign policy position. We use the extraordinary—yet unexplored—case of the 1916 US presidential election to identify the democratic constraint on foreign policy and of women’s votes in particular. This case represents an early step of women into the electoral realm at the national level and provides unique evidence of leader selection due to changes in public opinion because of the uneven extension of women’s suffrage to US states. Reelected on a platform of: “He kept the United States out of war,” Woodrow Wilson would fail to avoid war in Europe, but he did pursue cooperative policies with Mexico that very likely prevented a second Mexican-American war.","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"703 - 735"},"PeriodicalIF":1.8,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45292040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Co-Optation at the Creation: Leaders, Elite Consensus, and Postwar International Order 创立时的合作:领导人、精英共识与战后国际秩序
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-08-08 DOI: 10.1080/09636412.2022.2133628
Austin Carson, Matthew J. Conklin
Abstract This article analyzes how democratic leaders cultivate an elite consensus in favor of participating in international institutions. We theorize two tactics to prevent elite dissent. Delegating early policy development to technocratic and nonpartisan experts can set a depoliticized tone. Later integration of opposition elites into the process can create powerful advocates that expand support to a consensus. We assess contrasting fates of the United Nations (UN) and International Trade Organization (ITO). Haunted by Woodrow Wilson’s failure to win approval for the League of Nations, leaders outsourced early planning for a UN to the Council on Foreign Relations. Later, Franklin D. Roosevelt and top aides tapped moderate Republicans for the US delegation to San Francisco, creating powerful Republican advocates. In contrast, leaders developed the ITO in-house and excluded legislative elites in final negotiations, provoking elite dissent. These tactics shed new light on leaders, elites, and the domestic politics of international order and hegemony.
摘要本文分析了民主领导人如何培养有利于参与国际机构的精英共识。我们提出了两种防止精英异议的策略。将早期政策制定交给技术官僚和无党派专家可以设定一种非政治化的基调。反对派精英稍后融入这一进程可以产生强有力的倡导者,将支持扩大到共识。我们评估了联合国(UN)和国际贸易组织(ITO)截然不同的命运。由于伍德罗·威尔逊未能获得国际联盟的批准,各国领导人将联合国的早期规划外包给了外交关系委员会。后来,富兰克林·D·罗斯福和高级助手任命温和派共和党人为美国旧金山代表团成员,从而产生了强大的共和党支持者。相比之下,领导人在内部发展ITO,并在最终谈判中排斥立法精英,引发精英异议。这些策略为领导人、精英以及国际秩序和霸权的国内政治提供了新的视角。
{"title":"Co-Optation at the Creation: Leaders, Elite Consensus, and Postwar International Order","authors":"Austin Carson, Matthew J. Conklin","doi":"10.1080/09636412.2022.2133628","DOIUrl":"https://doi.org/10.1080/09636412.2022.2133628","url":null,"abstract":"Abstract This article analyzes how democratic leaders cultivate an elite consensus in favor of participating in international institutions. We theorize two tactics to prevent elite dissent. Delegating early policy development to technocratic and nonpartisan experts can set a depoliticized tone. Later integration of opposition elites into the process can create powerful advocates that expand support to a consensus. We assess contrasting fates of the United Nations (UN) and International Trade Organization (ITO). Haunted by Woodrow Wilson’s failure to win approval for the League of Nations, leaders outsourced early planning for a UN to the Council on Foreign Relations. Later, Franklin D. Roosevelt and top aides tapped moderate Republicans for the US delegation to San Francisco, creating powerful Republican advocates. In contrast, leaders developed the ITO in-house and excluded legislative elites in final negotiations, provoking elite dissent. These tactics shed new light on leaders, elites, and the domestic politics of international order and hegemony.","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"634 - 666"},"PeriodicalIF":1.8,"publicationDate":"2022-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46631336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Estimating Alliance Costs: An Exchange 估算联盟成本:一个交换
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-05-27 DOI: 10.1080/09636412.2022.2101324
Alex Cooley, Daniel H. Nexon
In their ambitious article, Joshua Alley and Matthew Fuhrmann ask how “alliance commitments affect US military spending.” Their answer: each alliance, on average, adds $11–$22 billion to the annual defense budget. Given the number of US defense pacts, that would mean formal alliances accounted for over $735 billion of the 2019 defense budget. This finding, if true, suggests that Donald Trump was right to claim that alliances are “much too costly for the US.” In this reply, we show that supporters of contemporary US grand strategy can rest easy. Given the actual size of US defense budgets, Alley and Fuhrmann’s estimates cannot be correct. Even if their statistical models produced plausible numbers, the article remains deeply flawed. First, the article conflates its spending estimates with fixed costs. How much the United States spends, either directly or indirectly, on its formal alliances is almost entirely a matter of policy decisions and political processes; the United States can reduce the “average cost” of its formal alliances any time it wants to—by cutting the defense budget. Nothing about defense pacts forces Congress to appropriate funds for, say, another aircraft carrier or new generation of strike aircraft. For the same reason, we see no particular reason to think that if the United States shed an alliance (or ten) tomorrow then Congress would reduce military spending. Second, the key grand-strategy debate between “restrainers” and “engagers” concerns whether the United States should dramatically reduce its security commitments or military presence in some combination of Europe, the Middle East, and East Asia. Knowing the average “price tag” per defense pact does not help us decide which, if any, of those regions the
在他们雄心勃勃的文章中,Joshua Alley和Matthew Fuhrmann询问“联盟承诺如何影响美国军费开支”。他们的答案是:每个联盟平均每年增加110 - 220亿美元的国防预算。考虑到美国防务协议的数量,这意味着正式联盟占2019年国防预算的7350亿美元以上。如果这一发现属实,则表明唐纳德•特朗普(Donald Trump)有关结盟“对美国来说代价太大”的说法是正确的。在这篇文章中,我们表明,当代美国大战略的支持者可以高枕无忧。考虑到美国国防预算的实际规模,Alley和Fuhrmann的估计不可能是正确的。即使他们的统计模型得出了可信的数字,这篇文章仍然存在严重缺陷。首先,这篇文章将支出估算与固定成本混为一谈。美国在其正式联盟上直接或间接地花了多少钱,几乎完全取决于政策决定和政治进程;美国可以随时通过削减国防预算来降低其正式联盟的“平均成本”。没有任何国防协议迫使国会为另一艘航空母舰或新一代攻击机拨出资金。出于同样的原因,我们认为没有特别的理由认为,如果美国明天放弃一个(或十个)联盟,国会就会削减军费开支。其次,“克制者”和“接触者”之间的关键大战略辩论涉及美国是否应该大幅减少其在欧洲、中东和东亚的安全承诺或军事存在。了解每个防务协议的平均“价格标签”并不能帮助我们决定哪些地区(如果有的话)是最重要的
{"title":"Estimating Alliance Costs: An Exchange","authors":"Alex Cooley, Daniel H. Nexon","doi":"10.1080/09636412.2022.2101324","DOIUrl":"https://doi.org/10.1080/09636412.2022.2101324","url":null,"abstract":"In their ambitious article, Joshua Alley and Matthew Fuhrmann ask how “alliance commitments affect US military spending.” Their answer: each alliance, on average, adds $11–$22 billion to the annual defense budget. Given the number of US defense pacts, that would mean formal alliances accounted for over $735 billion of the 2019 defense budget. This finding, if true, suggests that Donald Trump was right to claim that alliances are “much too costly for the US.” In this reply, we show that supporters of contemporary US grand strategy can rest easy. Given the actual size of US defense budgets, Alley and Fuhrmann’s estimates cannot be correct. Even if their statistical models produced plausible numbers, the article remains deeply flawed. First, the article conflates its spending estimates with fixed costs. How much the United States spends, either directly or indirectly, on its formal alliances is almost entirely a matter of policy decisions and political processes; the United States can reduce the “average cost” of its formal alliances any time it wants to—by cutting the defense budget. Nothing about defense pacts forces Congress to appropriate funds for, say, another aircraft carrier or new generation of strike aircraft. For the same reason, we see no particular reason to think that if the United States shed an alliance (or ten) tomorrow then Congress would reduce military spending. Second, the key grand-strategy debate between “restrainers” and “engagers” concerns whether the United States should dramatically reduce its security commitments or military presence in some combination of Europe, the Middle East, and East Asia. Knowing the average “price tag” per defense pact does not help us decide which, if any, of those regions the","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"510 - 532"},"PeriodicalIF":1.8,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44988888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Norm Diffusion through US Military Training: An Exchange 规范在美国军事训练中的传播:一种交流
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-05-27 DOI: 10.1080/09636412.2022.2103333
Rachel Tecott, Heidi A. Urben, Sharan Grewal
In “ Norm Diffusion through US Military Training in Tunisia, ” Sharan Grewal argues that foreign soldiers who study in the United States come to absorb the entire pattern of American civil-military relations, and not just the good parts. The article describes the “ politicization of the [US] military, ” focusing on its increasing support for military personnel voting and retired officers serving in key political roles. 1 Noting that the US military deliberately aims to transmit liberal civil-military relations norms to its foreign trainees, the article investigates whether it also inadvertently transmits the “ unhealthy ” elements of American civil-military relations. 2 To answer the question, Grewal conducts interviews and two surveys of Tunisian military personnel (some who trained in France, and some who trained in the United States), and finds a positive relationship between training in the United States and Tunisian officers ’ support for a more political military. This essay proceeds in four parts. The first situates Grewal ’ s article within the wider literature on security assistance and recipient civil-military relations. The second part discusses the article ’ s contributions. The third section argues that the study, though well-designed and well-executed, should not lead readers to significantly update their priors on the major questions moti-vating most scholars and practitioners of security assistance and civil-military relations. The fourth section briefly highlights areas for future research.
在《通过美国在突尼斯的军事训练进行规范传播》一书中,Sharan Grewal认为,在美国学习的外国士兵吸收了美国军民关系的整个模式,而不仅仅是好的部分。这篇文章描述了“[美国]军队的政治化”,重点是它越来越多地支持军事人员投票和担任关键政治角色的退休军官。注意到美军有意将自由的军民关系规范传递给其外国学员,本文调查了它是否也无意中传递了美国军民关系的“不健康”因素。为了回答这个问题,格里瓦尔对突尼斯军事人员(一些在法国受训,一些在美国受训)进行了采访和两次调查,发现在美国受训与突尼斯军官对更政治化的军队的支持之间存在正相关关系。本文分为四个部分。第一部分将格里瓦尔的文章置于更广泛的关于安全援助和受援国军民关系的文献中。第二部分论述了本文的贡献。第三部分认为,该研究虽然设计良好,执行良好,但不应导致读者对大多数安全援助和军民关系的学者和实践者所关注的主要问题进行重大更新。第四部分简要介绍了未来的研究领域。
{"title":"Norm Diffusion through US Military Training: An Exchange","authors":"Rachel Tecott, Heidi A. Urben, Sharan Grewal","doi":"10.1080/09636412.2022.2103333","DOIUrl":"https://doi.org/10.1080/09636412.2022.2103333","url":null,"abstract":"In “ Norm Diffusion through US Military Training in Tunisia, ” Sharan Grewal argues that foreign soldiers who study in the United States come to absorb the entire pattern of American civil-military relations, and not just the good parts. The article describes the “ politicization of the [US] military, ” focusing on its increasing support for military personnel voting and retired officers serving in key political roles. 1 Noting that the US military deliberately aims to transmit liberal civil-military relations norms to its foreign trainees, the article investigates whether it also inadvertently transmits the “ unhealthy ” elements of American civil-military relations. 2 To answer the question, Grewal conducts interviews and two surveys of Tunisian military personnel (some who trained in France, and some who trained in the United States), and finds a positive relationship between training in the United States and Tunisian officers ’ support for a more political military. This essay proceeds in four parts. The first situates Grewal ’ s article within the wider literature on security assistance and recipient civil-military relations. The second part discusses the article ’ s contributions. The third section argues that the study, though well-designed and well-executed, should not lead readers to significantly update their priors on the major questions moti-vating most scholars and practitioners of security assistance and civil-military relations. The fourth section briefly highlights areas for future research.","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"533 - 551"},"PeriodicalIF":1.8,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"59614067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Logic of Choice: China’s Binding Strategies toward North Korea, 1965–1970 选择的逻辑:中国对朝鲜的约束性战略,1965–1970
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-05-27 DOI: 10.1080/09636412.2022.2097891
Chengzhi Yin
Abstract In the late 1960s, the Soviet Union tried to induce North Korea to drift away from China. This challenged China’s security, given escalated tension between China and the Soviet Union in this period. To counter the Soviet policies, China used binding strategies, which are a state’s attempt to maintain or enhance its alignment with its security partners. I argue that China chose coercive binding as its primary strategy because it had strong leverage over North Korea. Meanwhile, China deployed accommodative binding to complement its primary strategy. In this article, I first develop a theoretical framework to explain how a state chooses its binding strategies. I then apply this theory to the Chinese-North Korean-Soviet triangle in the late 1960s. I conclude by discussing broader theoretical and policy implications, such as the importance of examining how states mix different types of binding strategies.
上世纪60年代末,苏联试图诱使朝鲜脱离中国。这对中国的安全构成了挑战,因为这一时期中苏之间的紧张局势不断升级。为了对抗苏联的政策,中国使用了约束性战略,这是一个国家试图维持或加强与安全伙伴的结盟。我认为,中国之所以选择强制约束作为其主要战略,是因为它对朝鲜拥有强大的影响力。与此同时,中国部署了宽松约束,以补充其主要战略。在本文中,我首先开发了一个理论框架来解释国家如何选择其绑定策略。然后,我将这一理论应用于20世纪60年代末的中国-朝鲜-苏联三角关系。最后,我将讨论更广泛的理论和政策含义,例如检查国家如何混合不同类型的绑定策略的重要性。
{"title":"Logic of Choice: China’s Binding Strategies toward North Korea, 1965–1970","authors":"Chengzhi Yin","doi":"10.1080/09636412.2022.2097891","DOIUrl":"https://doi.org/10.1080/09636412.2022.2097891","url":null,"abstract":"Abstract In the late 1960s, the Soviet Union tried to induce North Korea to drift away from China. This challenged China’s security, given escalated tension between China and the Soviet Union in this period. To counter the Soviet policies, China used binding strategies, which are a state’s attempt to maintain or enhance its alignment with its security partners. I argue that China chose coercive binding as its primary strategy because it had strong leverage over North Korea. Meanwhile, China deployed accommodative binding to complement its primary strategy. In this article, I first develop a theoretical framework to explain how a state chooses its binding strategies. I then apply this theory to the Chinese-North Korean-Soviet triangle in the late 1960s. I conclude by discussing broader theoretical and policy implications, such as the importance of examining how states mix different types of binding strategies.","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"483 - 509"},"PeriodicalIF":1.8,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42288489","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
To Buy a War but Sell the Peace? Mercenaries and Post-Civil War Stability 购买战争却出卖和平?雇佣军与内战后的稳定
IF 1.8 2区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2022-05-27 DOI: 10.1080/09636412.2022.2097890
Corinne Bara, Joakim Kreutz
Abstract Private military and security companies (PMSCs) and mercenaries are a common feature in civil wars, yet little systematic analysis of PMSC involvement and conflict dynamics exists. This article explores whether civil conflicts that feature PMSC forces in combat are more likely to recur. We contend that the presence of PMSCs in fighting exacerbates the postwar credible commitment problem, as belligerents will be concerned about the possibility to redeploy such forces in the future. Belligerents pay more attention to more recent and more visible information, meaning that the effects should be greatest if PMSCs feature extensively in combat and at the end of the conflict. A duration analysis of data from the Private Security Events Database and Uppsala Conflict Data Program, 1990–2014, offers robust support for these claims. Our results suggest that conflict management should consider aspects beyond the local context as risk factors for civil war recurrence.
摘要私营军事和安全公司(PMSC)和雇佣军是内战中的一个常见特征,但很少有系统地分析PMSC的参与和冲突动态。本文探讨了PMSC部队在战斗中发生的内乱是否更有可能再次发生。我们认为,PMSC在战斗中的存在加剧了战后可信的承诺问题,因为交战方将担心未来重新部署此类部队的可能性。交战方更加关注最近和更明显的信息,这意味着如果私营军保公司在战斗中和冲突结束时广泛存在,其影响应该最大。对1990–2014年私人安全事件数据库和乌普萨拉冲突数据计划数据的持续时间分析为这些说法提供了有力的支持。我们的研究结果表明,冲突管理应将当地环境之外的方面视为内战复发的风险因素。
{"title":"To Buy a War but Sell the Peace? Mercenaries and Post-Civil War Stability","authors":"Corinne Bara, Joakim Kreutz","doi":"10.1080/09636412.2022.2097890","DOIUrl":"https://doi.org/10.1080/09636412.2022.2097890","url":null,"abstract":"Abstract Private military and security companies (PMSCs) and mercenaries are a common feature in civil wars, yet little systematic analysis of PMSC involvement and conflict dynamics exists. This article explores whether civil conflicts that feature PMSC forces in combat are more likely to recur. We contend that the presence of PMSCs in fighting exacerbates the postwar credible commitment problem, as belligerents will be concerned about the possibility to redeploy such forces in the future. Belligerents pay more attention to more recent and more visible information, meaning that the effects should be greatest if PMSCs feature extensively in combat and at the end of the conflict. A duration analysis of data from the Private Security Events Database and Uppsala Conflict Data Program, 1990–2014, offers robust support for these claims. Our results suggest that conflict management should consider aspects beyond the local context as risk factors for civil war recurrence.","PeriodicalId":47478,"journal":{"name":"Security Studies","volume":"31 1","pages":"417 - 445"},"PeriodicalIF":1.8,"publicationDate":"2022-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49107390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Security Studies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1