首页 > 最新文献

Journal of Peace Research最新文献

英文 中文
Management of Frontal Sinus Fractures at a Level 1 Trauma Center: Retrospective Study and Review of the Literature. 一级创伤中心额窦骨折的处理:回顾性研究和文献综述。
IF 0.9 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-03-01 Epub Date: 2023-02-09 DOI: 10.1177/19433875231155727
Kimberly Oslin, Meryam Shikara, Joshua Yoon, Pharibe Pope, Kelly Bridgham, Suneet Waghmarae, Andrea Hebert, Fan Liang, Kalpesh Vakharia, Natalie Justicz

Study design: Case series.

Objective: This retrospective review of frontal sinus fractures aims to describe our current experience managing these fractures at an urban level I trauma center.

Methods: An institutional database of 2081 patients who presented with maxillofacial fractures on computed tomography face/sinus in 2019 was queried for all patients with traumatic frontal sinus fractures. Demographics, trauma-related history, management approach, and follow-up data were collected and analyzed.

Results: Sixty-three (7.3%) patients had at least one fracture involving the frontal sinus. The most common etiologies were assaults, falls, and motor vehicle accidents. Surgical repair was performed in 26.8% of patients with frontal sinus fractures, and the other 73.2% were observed. Fractures that were displaced, comminuted, obstructive of the frontal sinus outflow tract, or associated with a dural tear or cerebrospinal fluid leak were more likely to be operative.

Conclusions: The majority of frontal sinus fractures in this study were treated with observation. Despite advances in transnasal endoscopic approaches, many surgeons still rely on open approaches to repair frontal sinus fractures.

研究设计病例系列:这篇额窦骨折的回顾性综述旨在描述我们目前在城市一级创伤中心处理这些骨折的经验:方法:在机构数据库中查询了2019年在计算机断层扫描脸部/窦颌面骨折的2081名患者,以了解所有创伤性额窦骨折患者的情况。结果:63名(7.3%)患者至少有一处涉及额窦的骨折。最常见的病因是袭击、跌倒和机动车事故。26.8%的额窦骨折患者接受了手术修复,73.2%的患者接受了观察。骨折移位、粉碎、阻塞额窦流出道或伴有硬脑膜撕裂或脑脊液漏者更有可能进行手术:结论:本研究中的大多数额窦骨折患者都接受了观察治疗。尽管经鼻内窥镜方法取得了进步,但许多外科医生仍依赖开放式方法修复额窦骨折。
{"title":"Management of Frontal Sinus Fractures at a Level 1 Trauma Center: Retrospective Study and Review of the Literature.","authors":"Kimberly Oslin, Meryam Shikara, Joshua Yoon, Pharibe Pope, Kelly Bridgham, Suneet Waghmarae, Andrea Hebert, Fan Liang, Kalpesh Vakharia, Natalie Justicz","doi":"10.1177/19433875231155727","DOIUrl":"10.1177/19433875231155727","url":null,"abstract":"<p><strong>Study design: </strong>Case series.</p><p><strong>Objective: </strong>This retrospective review of frontal sinus fractures aims to describe our current experience managing these fractures at an urban level I trauma center.</p><p><strong>Methods: </strong>An institutional database of 2081 patients who presented with maxillofacial fractures on computed tomography face/sinus in 2019 was queried for all patients with traumatic frontal sinus fractures. Demographics, trauma-related history, management approach, and follow-up data were collected and analyzed.</p><p><strong>Results: </strong>Sixty-three (7.3%) patients had at least one fracture involving the frontal sinus. The most common etiologies were assaults, falls, and motor vehicle accidents. Surgical repair was performed in 26.8% of patients with frontal sinus fractures, and the other 73.2% were observed. Fractures that were displaced, comminuted, obstructive of the frontal sinus outflow tract, or associated with a dural tear or cerebrospinal fluid leak were more likely to be operative.</p><p><strong>Conclusions: </strong>The majority of frontal sinus fractures in this study were treated with observation. Despite advances in transnasal endoscopic approaches, many surgeons still rely on open approaches to repair frontal sinus fractures.</p>","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"59 1","pages":"24-33"},"PeriodicalIF":0.9,"publicationDate":"2024-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10874201/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73095361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election 网络影响行动是网络冲突的 "重心":以俄罗斯干预 2016 年美国联邦大选为例
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-02-27 DOI: 10.1177/00223433231225814
Jelena Vićić, Erik Gartzke
Russia’s cyber-enabled influence operations (CEIO) have garnered significant public, academic and policy interest. 126 million Americans were reportedly exposed to Russia’s efforts to influence the 2016 US election on Facebook. Indeed, to the extent that such efforts shape political outcomes, they may prove far more consequential than other, more flamboyant forms of cyber conflict. Importantly, CEIOs highlight the human dimension of cyber conflict. Focused on ‘hacking human minds’ and affecting individuals behind keyboards, as opposed to hacking networked systems, CEIOs represent an emergent form of state cyber activity. Importantly, data for studying CEIOs are often publicly available. We employ semantic network analysis (SNA) to assess data seldom analyzed in cybersecurity research – the text of actual advertisements from a prominent CEIO. We examine the content, as well as the scope and scale of the Russian-orchestrated social media campaign. While often described as ‘disinformation,’ our analysis shows that the information utilized in the Russian CEIO was generally factually correct. Further, it appears that African Americans, not white conservatives, were the target demographic that Russia sought to influence. We conclude with speculation, based on our findings, about the likely motives for the CEIO.
俄罗斯的网络影响力行动(CEIO)引起了公众、学术界和政策界的极大兴趣。据报道,1.26 亿美国人在 Facebook 上看到了俄罗斯为影响 2016 年美国大选所做的努力。事实上,就此类行动对政治结果的影响程度而言,其后果可能远远超过其他更引人注目的网络冲突形式。重要的是,CEIOs 突出了网络冲突中人的层面。与黑客攻击网络系统相比,CEIOs 侧重于 "黑客攻击人的思想",影响键盘后面的个人,代表了国家网络活动的一种新兴形式。重要的是,用于研究 CEIO 的数据通常是公开的。我们采用语义网络分析(SNA)来评估网络安全研究中很少分析的数据--一个著名 CEIO 的实际广告文本。我们研究了内容以及俄罗斯策划的社交媒体活动的范围和规模。我们的分析表明,俄罗斯 CEIO 所使用的信息虽然经常被描述为 "虚假信息",但总体而言与事实相符。此外,俄罗斯试图影响的目标人群似乎是非裔美国人,而非白人保守派。最后,根据我们的研究结果,我们推测了 CEIO 的可能动机。
{"title":"Cyber-enabled influence operations as a ‘center of gravity’ in cyberconflict: The example of Russian foreign interference in the 2016 US federal election","authors":"Jelena Vićić, Erik Gartzke","doi":"10.1177/00223433231225814","DOIUrl":"https://doi.org/10.1177/00223433231225814","url":null,"abstract":"Russia’s cyber-enabled influence operations (CEIO) have garnered significant public, academic and policy interest. 126 million Americans were reportedly exposed to Russia’s efforts to influence the 2016 US election on Facebook. Indeed, to the extent that such efforts shape political outcomes, they may prove far more consequential than other, more flamboyant forms of cyber conflict. Importantly, CEIOs highlight the human dimension of cyber conflict. Focused on ‘hacking human minds’ and affecting individuals behind keyboards, as opposed to hacking networked systems, CEIOs represent an emergent form of state cyber activity. Importantly, data for studying CEIOs are often publicly available. We employ semantic network analysis (SNA) to assess data seldom analyzed in cybersecurity research – the text of actual advertisements from a prominent CEIO. We examine the content, as well as the scope and scale of the Russian-orchestrated social media campaign. While often described as ‘disinformation,’ our analysis shows that the information utilized in the Russian CEIO was generally factually correct. Further, it appears that African Americans, not white conservatives, were the target demographic that Russia sought to influence. We conclude with speculation, based on our findings, about the likely motives for the CEIO.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"94 3 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139988582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Election violence prevention during democratic transitions: A field experiment with youth and police in Liberia 在民主过渡时期预防选举暴力:利比里亚青年和警察的实地实验
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-02-22 DOI: 10.1177/00223433231211770
Lindsey Pruett, Alex Dyzenhaus, Sabrina Karim, Dao Freeman
During highly uncertain, post-conflict elections, police officers and youth-wing party activists often engage in low-intensity electoral violence, which cannot be readily explained by national-level, institutional, elite-level strategic incentives for violence. Responding to calls to examine ‘non-strategic’ election violence, this article examines both the key actors most likely to perpetrate violence on-the-ground, and the micro-level perceptions underlying their decisions. In post-conflict contexts, police and youth-wing party activists operate within uncertain, information-poor and weakly institutionalized settings. Consequently, their pre-existing attitudes towards the use of violence, democracy, electoral institutions and towards other political actors influence how and when they engage in electoral violence. We proposed two different paths for reducing this uncertainty and improving attitudes: a) civic engagement programs and b) experience with ‘crucial’ elections, which we defined as the first post-conflict election following the withdrawal of external guarantors of electoral security. We employed a unique, locally led field experiment and panel data collected during the 2017 Liberian election to demonstrate how a ‘crucial election’ improved attitudes of both police and youth activists, while civic engagement programming did not. The findings suggested that elections following major structural reforms may reinforce democratization by improving the attitudes of the actors most likely to participate in violence.
在高度不确定的冲突后选举中,警察和青年党派积极分子经常参与低强度的选举暴力,而这并不能轻易用国家、机构和精英层面的暴力战略动机来解释。为了响应研究 "非战略性 "选举暴力的呼吁,本文既研究了最有可能在实地实施暴力的主要行为者,也研究了他们做出决定时的微观观念。在冲突后环境中,警察和青年党派活动分子的活动环境不确定、信息匮乏且制度化程度低。因此,他们之前对使用暴力、民主、选举机构和其他政治行为者的态度会影响他们参与选举暴力的方式和时间。我们提出了两种不同的途径来减少这种不确定性并改善人们的态度:a)公民参与计划;b)"关键 "选举的经验,我们将其定义为选举安全的外部担保人撤出后的第一次冲突后选举。我们采用了一个独特的、由当地主导的实地实验和在 2017 年利比里亚选举期间收集的面板数据,以证明 "关键选举 "如何改善了警察和青年活动家的态度,而公民参与计划却没有。研究结果表明,重大结构改革后的选举可能会通过改善最有可能参与暴力的行为者的态度来加强民主化。
{"title":"Election violence prevention during democratic transitions: A field experiment with youth and police in Liberia","authors":"Lindsey Pruett, Alex Dyzenhaus, Sabrina Karim, Dao Freeman","doi":"10.1177/00223433231211770","DOIUrl":"https://doi.org/10.1177/00223433231211770","url":null,"abstract":"During highly uncertain, post-conflict elections, police officers and youth-wing party activists often engage in low-intensity electoral violence, which cannot be readily explained by national-level, institutional, elite-level strategic incentives for violence. Responding to calls to examine ‘non-strategic’ election violence, this article examines both the key actors most likely to perpetrate violence on-the-ground, and the micro-level perceptions underlying their decisions. In post-conflict contexts, police and youth-wing party activists operate within uncertain, information-poor and weakly institutionalized settings. Consequently, their pre-existing attitudes towards the use of violence, democracy, electoral institutions and towards other political actors influence how and when they engage in electoral violence. We proposed two different paths for reducing this uncertainty and improving attitudes: a) civic engagement programs and b) experience with ‘crucial’ elections, which we defined as the first post-conflict election following the withdrawal of external guarantors of electoral security. We employed a unique, locally led field experiment and panel data collected during the 2017 Liberian election to demonstrate how a ‘crucial election’ improved attitudes of both police and youth activists, while civic engagement programming did not. The findings suggested that elections following major structural reforms may reinforce democratization by improving the attitudes of the actors most likely to participate in violence.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"73 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Allies and diffusion of state military cybercapacity 盟国和国家军事网络能力的扩散
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-02-22 DOI: 10.1177/00223433241226559
Nadiya Kostyuk
Understanding the diffusion of military capabilities is a central issue in international relations. Despite this, only a few works attempt to explain this phenomenon, focusing on threats. This article explains why threats alone cannot account for cybercapacity-development diffusion and introduces a more consistent explanation: the role of alliances. Allies with cybercapacity help partner-countries without cybercapacity start developing their own capacity to increase the alliance’s overall security by reducing mutual vulnerabilities in cyberspace. Partner-countries that lack cybercapacity are eager to accept this option because it is more favorable than developing cybercapacity on their own. Partner-countries may also start investing in cybersecurity to reduce the likelihood of being abandoned in other, conventional, domains. My new cross-sectional time-series dataset on indicators of a state’s cybercapacity-development initiation for 2000–18 provides robust empirical support for this argument and offers important implications for scholarship on arms, allies, and diffusion.
了解军事能力的扩散是国际关系中的一个核心问题。尽管如此,只有少数著作试图解释这一现象,并将重点放在威胁上。本文解释了为什么单靠威胁无法解释网络能力发展扩散的原因,并引入了一种更为一致的解释:联盟的作用。拥有网络能力的盟国帮助没有网络能力的伙伴国开始发展自己的能力,通过减少彼此在网络空间的脆弱性来提高联盟的整体安全。缺乏网络能力的伙伴国急于接受这一方案,因为它比自己发展网络能力更有利。伙伴国也可能开始投资网络安全,以减少在其他常规领域被抛弃的可能性。我关于 2000-18 年国家网络能力发展启动指标的新的横截面时间序列数据集为这一论点提供了有力的经验支持,并为有关武器、盟友和扩散的学术研究提供了重要启示。
{"title":"Allies and diffusion of state military cybercapacity","authors":"Nadiya Kostyuk","doi":"10.1177/00223433241226559","DOIUrl":"https://doi.org/10.1177/00223433241226559","url":null,"abstract":"Understanding the diffusion of military capabilities is a central issue in international relations. Despite this, only a few works attempt to explain this phenomenon, focusing on threats. This article explains why threats alone cannot account for cybercapacity-development diffusion and introduces a more consistent explanation: the role of alliances. Allies with cybercapacity help partner-countries without cybercapacity start developing their own capacity to increase the alliance’s overall security by reducing mutual vulnerabilities in cyberspace. Partner-countries that lack cybercapacity are eager to accept this option because it is more favorable than developing cybercapacity on their own. Partner-countries may also start investing in cybersecurity to reduce the likelihood of being abandoned in other, conventional, domains. My new cross-sectional time-series dataset on indicators of a state’s cybercapacity-development initiation for 2000–18 provides robust empirical support for this argument and offers important implications for scholarship on arms, allies, and diffusion.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"73 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The effects of state presence on the mental mapping of security: Evidence from an experiment in Kashmir 国家存在对安全心理映射的影响:克什米尔实验的证据
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-02-22 DOI: 10.1177/00223433231220272
Yelena Biberman, Christopher B Mann
What is the relationship between governance and security? What impact, if any, does state presence have on civilians’ perceptions of security in militarized conflict zones? The existing literature suggests that government control over a restive region means order and security for the local population. We propose a ‘mental mapping’ framework for the relationship between state presence and security perceptions in militarized ethnic peripheries, drawing on prior research in urban planning about how attitudes are shaped by living environments. We use a survey experiment to measure the effect of the physical presence of government institutions on civilians’ sense of how safe they imagine their city to be, demonstrating a mental mapping mechanism between the physical presence of the state and perceptions of safety. We show that residents who encounter images of state institutions on a map of Srinagar – the largest city and summer capital of Jammu and Kashmir, India – are more likely to perceive their city as less secure than those who encounter a map without images or a placebo map. This experimental evidence implies that government security presence is not always perceived as security by the civilian population.
治理与安全之间的关系是什么?在军事化的冲突地区,国家的存在对平民的安全感有什么影响(如果有的话)?现有文献表明,政府对动荡地区的控制意味着当地居民的秩序和安全。我们借鉴城市规划领域关于生活环境如何塑造人的态度的研究,提出了一个 "心理映射 "框架,以探讨在军事化的民族边缘地区,国家存在与安全感之间的关系。我们利用调查实验来测量政府机构的实际存在对平民想象中城市安全程度的影响,从而证明了国家的实际存在与安全感之间的心理映射机制。我们的研究表明,在斯利那加--印度查谟和克什米尔地区最大的城市和夏季首府--的地图上遇到国家机构图像的居民,比遇到没有图像的地图或安慰剂地图的居民更有可能认为自己的城市不那么安全。这一实验证据表明,政府的安全存在并不总是被平民视为安全。
{"title":"The effects of state presence on the mental mapping of security: Evidence from an experiment in Kashmir","authors":"Yelena Biberman, Christopher B Mann","doi":"10.1177/00223433231220272","DOIUrl":"https://doi.org/10.1177/00223433231220272","url":null,"abstract":"What is the relationship between governance and security? What impact, if any, does state presence have on civilians’ perceptions of security in militarized conflict zones? The existing literature suggests that government control over a restive region means order and security for the local population. We propose a ‘mental mapping’ framework for the relationship between state presence and security perceptions in militarized ethnic peripheries, drawing on prior research in urban planning about how attitudes are shaped by living environments. We use a survey experiment to measure the effect of the physical presence of government institutions on civilians’ sense of how safe they imagine their city to be, demonstrating a mental mapping mechanism between the physical presence of the state and perceptions of safety. We show that residents who encounter images of state institutions on a map of Srinagar – the largest city and summer capital of Jammu and Kashmir, India – are more likely to perceive their city as less secure than those who encounter a map without images or a placebo map. This experimental evidence implies that government security presence is not always perceived as security by the civilian population.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"36 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How cyber operations can reduce escalation pressures: Evidence from an experimental wargame study 网络行动如何减少升级压力:来自战争游戏实验研究的证据
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-02-20 DOI: 10.1177/00223433231219440
Benjamin Jensen, Brandon Valeriano, Sam Whitt
Cyber operations ranging from deception and espionage to disruption and high-end degradation have become a central feature of modern statecraft in the digital age, yet we lack a clear understanding of how decision-makers employ and respond to cyber operations in times of crisis. Our research provides theoretical mechanisms and empirical evidence for understanding how decision-makers react to cyber triggers and utilize cyber responses during crises. Specifically, we argue that the availability of cyber response creates off-ramps for non-escalatory engagement. Based on experimental wargames involving rival states with power parity in militarized disputes and randomized cyber triggers and response options, we find the availability of cyber response options reduces escalatory behavior via a substitution mechanism. In the absence of cyber response options, however, participants pursue more conventional, escalatory actions, regardless of the triggering mechanism. Our findings underscore how enhancing the availability of cyber response options might reduce strategic escalation risks and offer the space to bargain during periods of conflict.
从欺骗和间谍活动到破坏和高端降级,网络行动已成为数字时代现代国家政治的核心特征,但我们对决策者在危机时刻如何运用和应对网络行动缺乏清晰的认识。我们的研究提供了理论机制和经验证据,有助于理解决策者在危机期间如何对网络触发因素做出反应并利用网络应对。具体来说,我们认为网络应对措施的可用性为非升级性交战创造了匝道。基于涉及军事化争端中力量对比的敌对国家的实验性战争游戏,以及随机网络触发和响应选项,我们发现网络响应选项的可用性通过替代机制减少了升级行为。然而,在没有网络应对选项的情况下,无论触发机制如何,参与者都会采取更常规的升级行动。我们的研究结果强调了加强网络应对方案的可用性可以降低战略升级风险,并在冲突期间提供讨价还价的空间。
{"title":"How cyber operations can reduce escalation pressures: Evidence from an experimental wargame study","authors":"Benjamin Jensen, Brandon Valeriano, Sam Whitt","doi":"10.1177/00223433231219440","DOIUrl":"https://doi.org/10.1177/00223433231219440","url":null,"abstract":"Cyber operations ranging from deception and espionage to disruption and high-end degradation have become a central feature of modern statecraft in the digital age, yet we lack a clear understanding of how decision-makers employ and respond to cyber operations in times of crisis. Our research provides theoretical mechanisms and empirical evidence for understanding how decision-makers react to cyber triggers and utilize cyber responses during crises. Specifically, we argue that the availability of cyber response creates off-ramps for non-escalatory engagement. Based on experimental wargames involving rival states with power parity in militarized disputes and randomized cyber triggers and response options, we find the availability of cyber response options reduces escalatory behavior via a substitution mechanism. In the absence of cyber response options, however, participants pursue more conventional, escalatory actions, regardless of the triggering mechanism. Our findings underscore how enhancing the availability of cyber response options might reduce strategic escalation risks and offer the space to bargain during periods of conflict.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"51 12 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How the process of discovering cyberattacks biases our understanding of cybersecurity 发现网络攻击的过程如何使我们对网络安全的理解产生偏差
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-02-16 DOI: 10.1177/00223433231217687
Harry Oppenheimer
Social scientists do not directly study cyberattacks; they draw inferences from attack reports that are public and visible. Like human rights violations or war casualties, there are missing cyberattacks that researchers have not observed. The existing approach is to either ignore missing data and assume they do not exist or argue that reported attacks accurately represent the missing events. This article is the first to detail the steps between attack, discovery and public report to identify sources of bias in cyber data. Visibility bias presents significant inferential challenges for cybersecurity – some attacks are easy to observe or claimed by attackers, while others take a long time to surface or are carried out by actors seeking to hide their actions. The article argues that missing attacks in public reporting likely share features of reported attacks that take the longest to surface. It builds on datasets of cyberattacks by or against Five Eyes (an intelligence alliance composed of Australia, Canada, New Zealand, the United Kingdom and the United States) governments and adds new data on when attacks occurred, when the media first reported them, and the characteristics of attackers and techniques. Leveraging survival models, it demonstrates how the delay between attack and disclosure depends on both the attacker’s identity (state or non-state) and the technical characteristics of the attack (whether it targets information confidentiality, integrity, or availability). The article argues that missing cybersecurity events are least likely to be carried out by non-state actors or target information availability. Our understanding of ‘persistent engagement,’ relative capabilities, ‘intelligence contests’ and cyber coercion rely on accurately measuring restraint. This article’s findings cast significant doubt on whether researchers have accurately measured and observed restraint, and informs how others should consider external validity. This article has implications for our understanding of data bias, empirical cybersecurity research and secrecy in international relations.
社会科学家并不直接研究网络攻击,而是从公开可见的攻击报告中得出推论。就像侵犯人权行为或战争伤亡一样,研究人员没有观察到的网络攻击也会缺失。现有的方法是要么忽略缺失的数据并假定它们不存在,要么认为报告的攻击事件准确地代表了缺失的事件。本文首次详细介绍了攻击、发现和公开报告之间的步骤,以确定网络数据的偏差来源。可见性偏差给网络安全带来了巨大的推论挑战--有些攻击很容易被观察到或被攻击者声称,而另一些攻击则需要很长时间才能浮出水面或由试图隐藏其行动的行为者实施。文章认为,公开报告中遗漏的攻击很可能与报告中浮出水面时间最长的攻击具有相同的特征。文章以 "五眼"(由澳大利亚、加拿大、新西兰、英国和美国组成的情报联盟)政府发动或针对其发动的网络攻击数据集为基础,增加了有关攻击发生时间、媒体首次报道时间以及攻击者和攻击技术特征的新数据。文章利用生存模型,展示了攻击与披露之间的延迟如何取决于攻击者的身份(国家或非国家)和攻击的技术特征(是否针对信息的保密性、完整性或可用性)。文章认为,缺失的网络安全事件最不可能由非国家行为者实施,也最不可能以信息可用性为目标。我们对 "持续参与"、相对能力、"情报竞赛 "和网络胁迫的理解有赖于对克制的准确测量。本文的研究结果让人对研究人员是否准确测量和观察了克制产生了极大的怀疑,并告诉其他人应如何考虑外部有效性。这篇文章对我们理解数据偏差、网络安全实证研究和国际关系中的保密问题都有影响。
{"title":"How the process of discovering cyberattacks biases our understanding of cybersecurity","authors":"Harry Oppenheimer","doi":"10.1177/00223433231217687","DOIUrl":"https://doi.org/10.1177/00223433231217687","url":null,"abstract":"Social scientists do not directly study cyberattacks; they draw inferences from attack reports that are public and visible. Like human rights violations or war casualties, there are missing cyberattacks that researchers have not observed. The existing approach is to either ignore missing data and assume they do not exist or argue that reported attacks accurately represent the missing events. This article is the first to detail the steps between attack, discovery and public report to identify sources of bias in cyber data. Visibility bias presents significant inferential challenges for cybersecurity – some attacks are easy to observe or claimed by attackers, while others take a long time to surface or are carried out by actors seeking to hide their actions. The article argues that missing attacks in public reporting likely share features of reported attacks that take the longest to surface. It builds on datasets of cyberattacks by or against Five Eyes (an intelligence alliance composed of Australia, Canada, New Zealand, the United Kingdom and the United States) governments and adds new data on when attacks occurred, when the media first reported them, and the characteristics of attackers and techniques. Leveraging survival models, it demonstrates how the delay between attack and disclosure depends on both the attacker’s identity (state or non-state) and the technical characteristics of the attack (whether it targets information confidentiality, integrity, or availability). The article argues that missing cybersecurity events are least likely to be carried out by non-state actors or target information availability. Our understanding of ‘persistent engagement,’ relative capabilities, ‘intelligence contests’ and cyber coercion rely on accurately measuring restraint. This article’s findings cast significant doubt on whether researchers have accurately measured and observed restraint, and informs how others should consider external validity. This article has implications for our understanding of data bias, empirical cybersecurity research and secrecy in international relations.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"56 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Civil war mediation in the shadow of IGOs: The path to comprehensive peace agreements 政府间组织阴影下的内战调解:通往全面和平协定之路
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-02-01 DOI: 10.1177/00223433231211766
Johannes Karreth, Jaroslav Tir, Jason Quinn, Madhav Joshi
Recent research shows that comprehensive peace agreements (CPAs) are effective in ending civil wars and improving post-conflict conditions, but CPAs emerge in only a fraction of civil wars. This study provides systematic evidence about the origins of CPAs and the role of international actors in facilitating their signing. We argue that mediation is more likely to be successful and that CPAs are more likely to emerge in those civil war countries that are members in a higher number of IGOs with high economic leverage. Using their financial and institutional leverage, these IGOs can help the combatants overcome the credible commitment problems associated with entering into mediation, and with making sufficient concessions and compromises to reach and sign a CPA. Analyzing all intrastate armed conflicts from 1989 to 2011, we find that a conflict country’s memberships in IGOs with high economic leverage increase the odds of (1) mediation occurring and (2) mediation subsequently leading to the signing of CPAs. This finding is robust to common sources of spurious relationships between international institutions and the behavior of conflict parties. Participating in IGOs with high economic leverage carries important positive consequences for civil war management and enhances the impact of mediation on getting conflict parties to sign CPAs.
最近的研究表明,全面和平协议(CPAs)能有效结束内战并改善冲突后的条件,但全面和平协议仅在一小部分内战中出现。本研究提供了系统的证据,说明全面和平协议的起源以及国际行动者在促进协议签署中的作用。我们认为,在那些加入了较多具有较高经济影响力的政府间组织的内战国家,调解更有可能取得成功,而且更有可能出现全面和平协议。这些政府间组织利用其金融和制度杠杆,可以帮助交战方克服与参与调解相关的可信承诺问题,并做出足够的让步和妥协,以达成和签署《全面和平协议》。通过分析 1989 年至 2011 年的所有国内武装冲突,我们发现,冲突国家加入具有高经济影响力的政府间组织会增加(1)发生调解和(2)调解随后导致签署《全面和平协议》的几率。这一发现对国际机构与冲突各方行为之间虚假关系的常见来源具有稳健性。参与具有高经济影响力的政府间组织对内战管理具有重要的积极影响,并能增强调解对冲突各方签署《全面和平协议》的影响。
{"title":"Civil war mediation in the shadow of IGOs: The path to comprehensive peace agreements","authors":"Johannes Karreth, Jaroslav Tir, Jason Quinn, Madhav Joshi","doi":"10.1177/00223433231211766","DOIUrl":"https://doi.org/10.1177/00223433231211766","url":null,"abstract":"Recent research shows that comprehensive peace agreements (CPAs) are effective in ending civil wars and improving post-conflict conditions, but CPAs emerge in only a fraction of civil wars. This study provides systematic evidence about the origins of CPAs and the role of international actors in facilitating their signing. We argue that mediation is more likely to be successful and that CPAs are more likely to emerge in those civil war countries that are members in a higher number of IGOs with high economic leverage. Using their financial and institutional leverage, these IGOs can help the combatants overcome the credible commitment problems associated with entering into mediation, and with making sufficient concessions and compromises to reach and sign a CPA. Analyzing all intrastate armed conflicts from 1989 to 2011, we find that a conflict country’s memberships in IGOs with high economic leverage increase the odds of (1) mediation occurring and (2) mediation subsequently leading to the signing of CPAs. This finding is robust to common sources of spurious relationships between international institutions and the behavior of conflict parties. Participating in IGOs with high economic leverage carries important positive consequences for civil war management and enhances the impact of mediation on getting conflict parties to sign CPAs.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"31 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gendering hawkishness in the war room: Evidence from Pakistani politicians 战争室中的鹰派性别化:来自巴基斯坦政治家的证据
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-02-01 DOI: 10.1177/00223433231211762
Fahd Humayun
Can representation in foreign policy deliberations – in particular, increased female representation – impact deliberators’ support for interstate conflict resolution? While existing work on gender representation in IR suggests that increased female representation should moderate intragroup hawkishness, making conflict resolution more viable, I offer empirical evidence that qualifies this idea, based on a survey experiment on 149 male and 55 female elite Pakistani legislators. Politicians of both sexes were randomly assigned to ‘listen in’ on a hypothetical national security deliberation that was either all-male or gender-mixed. I find that politicians’ decisionmaking in these hypothetical committees was informed simultaneously by notions of committee competence and by inferences about the social desirability of hawkish outcomes in deliberative settings. Specifically, respondents assigned to gender-mixed committees became less supportive of external conflict resolution. I show how different mechanisms accounted for this increased hawkishness for men and women. Female politicians assigned to gender-mixed committees became more conscious and wary of how their participation, the result of increased representation, would be perceived, compelling them to opt for more hawkish policies. Male politicians, in contrast, attempted to overcompensate for the increased visibility of female representation by resorting to greater levels of aggression.
外交政策讨论中的代表性--尤其是女性代表性的增加--能否影响讨论者对解决国家间冲突的支持?虽然现有的关于国际关系中性别代表性的研究表明,增加女性代表性应能缓和集团内部的鹰派倾向,从而使冲突解决更具可行性,但我基于对 149 名男性和 55 名女性巴基斯坦精英立法者的调查实验,提供了实证证据来证实这一观点。男女政治家被随机分配 "旁听 "一场假定的国家安全讨论,该讨论要么全部由男性参加,要么由男女混合参加。我发现,政治家们在这些假定委员会中的决策同时受到委员会能力概念和审议环境中鹰派结果的社会可取性推论的影响。具体来说,被分配到性别混合委员会的受访者对解决外部冲突的支持度较低。我展示了不同的机制是如何导致男性和女性的鹰派倾向增加的。被分配到性别混合委员会的女性政治家会更加在意和警惕她们的参与(代表权增加的结果)会被如何看待,这迫使她们选择更加鹰派的政策。与此相反,男性政治家则试图通过采取更具侵略性的手段来弥补女性代表性增加所带来的影响。
{"title":"Gendering hawkishness in the war room: Evidence from Pakistani politicians","authors":"Fahd Humayun","doi":"10.1177/00223433231211762","DOIUrl":"https://doi.org/10.1177/00223433231211762","url":null,"abstract":"Can representation in foreign policy deliberations – in particular, increased female representation – impact deliberators’ support for interstate conflict resolution? While existing work on gender representation in IR suggests that increased female representation should moderate intragroup hawkishness, making conflict resolution more viable, I offer empirical evidence that qualifies this idea, based on a survey experiment on 149 male and 55 female elite Pakistani legislators. Politicians of both sexes were randomly assigned to ‘listen in’ on a hypothetical national security deliberation that was either all-male or gender-mixed. I find that politicians’ decisionmaking in these hypothetical committees was informed simultaneously by notions of committee competence and by inferences about the social desirability of hawkish outcomes in deliberative settings. Specifically, respondents assigned to gender-mixed committees became less supportive of external conflict resolution. I show how different mechanisms accounted for this increased hawkishness for men and women. Female politicians assigned to gender-mixed committees became more conscious and wary of how their participation, the result of increased representation, would be perceived, compelling them to opt for more hawkish policies. Male politicians, in contrast, attempted to overcompensate for the increased visibility of female representation by resorting to greater levels of aggression.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"1 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139939020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
If it bleeps it leads? Media coverage on cyber conflict and misperception 如果它哔哔作响,它就会引导?媒体对网络冲突和误解的报道
IF 3.6 1区 社会学 Q1 INTERNATIONAL RELATIONS Pub Date : 2024-01-31 DOI: 10.1177/00223433231220264
Christos Makridis, Lennart Maschmeyer, Max Smeets
What determines media coverage on cyber conflict (CC)? Media bias fostering misperception is a well-established problem in conflict reporting. Because of the secrecy and complexity surrounding cyber operations (COs), where most data moreover come from marketing publications by private sector firms, this problem is likely to be especially pronounced in reporting on cyber threats. Because media reporting shapes public perception, such bias can shape conflict dynamics and outcomes with potentially destabilizing consequences. Yet little research has examined media bias systematically. This study connects existing literature on media reporting bias with the CC literature to formulate four theoretical explanations for variation in reporting on COs based on four corresponding characteristics of a CO. We introduce a new dataset of COs reporting by the private sector, which we call the Cyber Conflict Media Coverage Dataset, and media reporting on each of these operations. Consequently, we conduct a statistical analysis to identify which of these characteristics correlate with reporting quantity. This analysis shows that the use of novel techniques, specifically zero-day exploits, is a highly significant predictor of coverage quantity. Operations targeting the military or financial sector generate less coverage. We also find that cyber effect operations tend to receive more coverage compared to espionage, but this result is not statistically significant. Nonetheless, the predictive models explain limited variation in news coverage. These findings indicate that COs are treated differently in the media than other forms of conflict, and help explain persistent threat perception among the public despite the absence of catastrophic cyberattacks.
是什么决定了媒体对网络冲突 (CC) 的报道?媒体偏见造成误解是冲突报道中一个公认的问题。由于网络行动(CO)的保密性和复杂性,而且大多数数据来自私营企业的营销出版物,因此这一问题在有关网络威胁的报道中可能尤为突出。由于媒体报道会影响公众的看法,因此这种偏见可能会影响冲突的态势和结果,从而造成潜在的不稳定后果。然而,很少有研究对媒体偏见进行系统研究。本研究将有关媒体报道偏见的现有文献与有关冲突的文献联系起来,根据冲突的四个相应特征,提出了有关冲突报道差异的四种理论解释。我们引入了一个新的数据集,即网络冲突媒体报道数据集(Cyber Conflict Media Coverage Dataset),该数据集包含了私营部门对 CO 的报道,以及媒体对这些行动的报道。因此,我们进行了统计分析,以确定这些特征中哪些与报道数量相关。分析表明,新技术的使用,特别是零日漏洞的使用,是预测报道数量的一个非常重要的因素。针对军事或金融部门的行动产生的报道较少。我们还发现,与间谍活动相比,网络效应行动往往得到更多的报道,但这一结果在统计上并不显著。尽管如此,预测模型仍能解释新闻报道中的有限差异。这些发现表明,与其他形式的冲突相比,媒体对 COs 的处理方式有所不同,这也有助于解释为什么尽管没有发生灾难性的网络攻击,但公众对 COs 的威胁感依然存在。
{"title":"If it bleeps it leads? Media coverage on cyber conflict and misperception","authors":"Christos Makridis, Lennart Maschmeyer, Max Smeets","doi":"10.1177/00223433231220264","DOIUrl":"https://doi.org/10.1177/00223433231220264","url":null,"abstract":"What determines media coverage on cyber conflict (CC)? Media bias fostering misperception is a well-established problem in conflict reporting. Because of the secrecy and complexity surrounding cyber operations (COs), where most data moreover come from marketing publications by private sector firms, this problem is likely to be especially pronounced in reporting on cyber threats. Because media reporting shapes public perception, such bias can shape conflict dynamics and outcomes with potentially destabilizing consequences. Yet little research has examined media bias systematically. This study connects existing literature on media reporting bias with the CC literature to formulate four theoretical explanations for variation in reporting on COs based on four corresponding characteristics of a CO. We introduce a new dataset of COs reporting by the private sector, which we call the Cyber Conflict Media Coverage Dataset, and media reporting on each of these operations. Consequently, we conduct a statistical analysis to identify which of these characteristics correlate with reporting quantity. This analysis shows that the use of novel techniques, specifically zero-day exploits, is a highly significant predictor of coverage quantity. Operations targeting the military or financial sector generate less coverage. We also find that cyber effect operations tend to receive more coverage compared to espionage, but this result is not statistically significant. Nonetheless, the predictive models explain limited variation in news coverage. These findings indicate that COs are treated differently in the media than other forms of conflict, and help explain persistent threat perception among the public despite the absence of catastrophic cyberattacks.","PeriodicalId":48324,"journal":{"name":"Journal of Peace Research","volume":"39 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2024-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139938939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":1,"RegionCategory":"社会学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Peace Research
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1