Query Result Set
Skip Navigation Links
   ActiveUsers:1524Hits:18314869Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
CONTROL (29) answer(s).
 
12Next
SrlItem
1
ID:   165906


Anti-mercenary norm and United Nations’ use of private military and security companies / Bures, Oldrich ; Meyer, Jeremy   Journal Article
Bures, Oldrich Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article offers an analysis of the influence of the anti-mercenary norm on the United Nations’ use of services provided by private military and security companies (PMSCs). It follows a constructivist approach which focuses on violations of the anti-mercenary norm within the UN system and on the justifications and condemnations of these violations in official UN documents. The findings suggest that while the anti-mercenary norm is no longer puritanical, two key aspects of the norm—the lack of a proper cause and the lack of control—remain influential within the UN system. Although all parts of the UN system nowadays routinely use a wide variety of services of PMSCs and the UN Secretary-General officially sanctioned security outsourcing in 2011, the UN continues to insist that it is only using PMSCs as a last resort, when no other options are available. The continuing need to justify the use of PMSCs’ services suggests that this practice challenges both the long-established identity of the UN as a key anti-mercenary norm entrepreneur and its ontological security.
        Export Export
2
ID:   109996


Automated control over preparation and conduct of operations: challenges and responses / Skokov, S I; Vygovsky, I I   Journal Article
Skokov, S I Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract The authors examine an automated control system for preparing and conducting military operations; and identify ways they consider essential for improving control efficiency.
        Export Export
3
ID:   170012


Civilians, Control, and Collaboration during Civil Conflict / Condra, Luke N ; Wright, Austin L   Journal Article
Luke N Condra, Austin L Wright Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract What affects civilian collaboration with armed actors during civil war? While theory and evidence confirm that harm by armed actors influences when and with whom civilians collaborate, we argue that collaboration is also a function of civilians’ perceptions of armed actors’ efforts to minimize collateral casualties. We test this argument using a series of nationwide surveys of Afghan civilians conducted quarterly between 2013 and 2015. Our data record civilian willingness to report roadside bombs to government authorities and perceptions of government and Taliban efforts to minimize civilian harm. Civilians are less (more) willing to collaborate with the government when they perceive the government (Taliban) carelessly using force, even after accounting for political sentiment, local security conditions, and a range of additional confounding factors. Moreover, our evidence suggests that perceived carelessness in the rival’s area of control influences collaboration. We discuss how these empirical results inform broader literatures on collaboration, conquest, occupation, and control.
Key Words Civil Conflict  Collaboration  Civilians  Control 
        Export Export
4
ID:   145487


Civil-military relations in democratic South Asia: a comparative framework / Karim, Mohd Aminul   Journal Article
Karim, Mohd Aminul Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The aim of this paper is to conceptualize a comparative framework on civil-military relations (CMR), at both political and strategic levels, in the context of major South Asian states such as India, Pakistan, and Bangladesh. There are complexities involved in framing and explaining power relations between political/ bureaucratic and military elites in these countries. Methodology used in this paper is basically content analysis, interviews, and observations made, and inferences drawn by the author himself, given his professional experience. The paper concludes there are both similarities and dissimilarities in such relations between democratic and quasidemocratic or between liberal and illiberal polities.
Key Words Democracy  Control  CM  South-Asia  Political-Elites  Military-Elites 
Nuclea 
        Export Export
5
ID:   114042


Communications and control over naval forces / Kovalenko, S D   Journal Article
Kovalenko, S D Journal Article
0 Rating(s) & 0 Review(s)
Publication 2012.
Summary/Abstract The author discusses the specifics of communication with naval forces in various environments. He shows ways of improving naval communications facilities in view of the interservice standardization of the Russian Armed Forces' control system.
        Export Export
6
ID:   100052


Control problems in a unified multifuntional electronic warfare / Bakumov, V V; Vystorobsky, G D   Journal Article
Bakumov, V V Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
7
ID:   082796


Controlling the Chinese media: an uncertain business / Hassid, Jonathan   Journal Article
Hassid, Jonathan Journal Article
0 Rating(s) & 0 Review(s)
Publication 2008.
Summary/Abstract Increasing economic liberalization of the Chinese media has not resulted in proportional political liberalization, and previous explanations for the state's puzzlingly firm grip are inadequate. This article argues that a "regime of uncertainty" is critical toward keeping the Chinese media in line
Key Words Media  China  Uncertainty  Control  Chinese Politics 
        Export Export
8
ID:   089896


Cooperation and control in the European Union: the case of the European Union as international environmental negotiator / Delreux, Tom   Journal Article
Delreux, Tom Journal Article
0 Rating(s) & 0 Review(s)
Publication 2009.
Summary/Abstract This article examines the internal decision-making process in the European Union when the EU participates in international environmental negotiations. More particularly, the practical functioning of the relation between the member states and the EU negotiator (i.e. the Commission, the Presidency or a lead country), representing the member states externally, is examined. Starting from principal-agent theory and based on empirical research on eight EU decision-making processes with regard to international environmental negotiations, the article argues, first, that control by the member states on the EU negotiator takes place most manifestly during the course of the international negotiations, and, second, that these ad locum control mechanisms perform not only a control function, but also a cooperation function.
        Export Export
9
ID:   157719


Decolonising drugs in Asia: the case of cocaine in colonial India / Mills, James   Journal Article
Mills, James Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article examines a drugs trade in Asia that has been largely forgotten by historians and policy-makers, that in cocaine. It will briefly trace some of the contours of this commerce and the efforts to control it. It will also assess how successful these efforts were. The article is designed to contribute fresh perspectives on recent controversies in the historiography of drugs in Asia to argue that the agendas and agency of consumers are central to understanding why markets have formed there for psychoactive substances in the modern period.
Key Words South Asia  Cocaine  Agency  Control  Consumption  Colonial 
        Export Export
10
ID:   173720


Development prospects for automated control systems in the rf af missile forces and artillery / Parshin, N.M.   Journal Article
PARSHIN, N.M. Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This paper analyzes aspects of introducing information technologies in automated troop and weapon control, and examines ways of achieving interaction between control objects when automated control systems of Missile Forces and Artillery (MF&A) are in operation.
        Export Export
11
ID:   133232


Did they 'read before burning': the coalition and quangos / Dommett, Katharine; Flinders, Matthew; Skelcher, Chris; Tonkiss, Katherine   Journal Article
Flinders, Matthew Journal Article
0 Rating(s) & 0 Review(s)
Publication 2014.
Summary/Abstract Attitudes to quangos are paradoxical. On the one hand they are perceived to be undemocratic, unaccountable organisations, while on the other they are seen to improve effectiveness, limit political interference and increase public confidence in government. This paradox is reflected in the behaviour of political parties, which generally adopt a harsh line towards quangos in opposition, but come to rely on these bodies in office. Ahead of the 2010 general election it was, however, noticeable that the Conservative party rejected this dynamic by promising to pursue 'a more sophisticated approach'. This article explores the Coalition government's subsequent 'public bodies reform programme', assessing its progress against recommendations contained within the Institute for Government's Read before Burning report of July 2010. It concludes that while the Coalition has addressed long-standing concerns about the day-to-day governance of public bodies, it has failed to resolve a set of broader and strategic (metagovernance) issues.
        Export Export
12
ID:   040243


Elements of production planning and control / Eilon, Samuel 1962  Book
Eilon, Samuel Book
0 Rating(s) & 0 Review(s)
Publication New York, Macmillan Company, 1962.
Description viii, 587p.Hbk
        Export Export
Copies: C:1/I:0,R:0,Q:0
Circulation
Accession#Call#Current LocationStatusPolicyLocation
008994658.503/EIL 008994MainOn ShelfGeneral 
13
ID:   151193


Flatness versus depth: a study of algorithmically generated camouflage / Mollicchi, Silvia   Journal Article
Mollicchi, Silvia Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract For the past two decades, the camouflage patterns used on military uniforms have been computed by families of algorithms. The article argues that these computation methods fit within a genealogy of discourses on camouflage practices, which the text reconstructs along the axes of flatness and depth. Camouflage can be explained as an attempt at flattening information related to a target onto the underlying background, by producing general invariances within the environment and in accordance with the observer’s perceptive faculties. Carrying out this task, static camouflage responds to the aporia of using one pattern to disguise presence within multiple contexts. After analysing two discourses on camouflage in relation to the notion of flatness, the article considers a case of algorithmically generated static camouflage. Its disguising method abstracts information from both the environment in which an army is expected to fight and the observer’s perceptive capacities and then computes these threads of abstraction together in a pattern. The meshing function of computation thus flattens the principles embedded in the fabric, making them individually illegible. This changes the value that camouflage usually gives to target/background relations and to the observer’s perceptive faculties.
Key Words Control  Algorithms  Camouflage  Abstraction  Depth  Flatness 
        Export Export
14
ID:   174063


Ground-based robotechnical system for the forward aviation gunlayer / Gudkov, M.A.   Journal Article
GUDKOV, M.A. Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This paper examines the ground-based robotechnical system (RTS) of the forward aviation gunlayer for guiding aircraft during air support of troops. It gives the distinctive features of its location on the ground and interaction with control points in the responsibility area of combined-arms formations. It also shows the tasks and functional peculiarities of various subsystems of the robotechnical system when homing the flying vehicle.
        Export Export
15
ID:   138199


Handling the training and buildup of mobilization resources in present-day conditions / Koritchuk, V V; Kuznetsov, S G   Article
Koritchuk, V V Article
0 Rating(s) & 0 Review(s)
Summary/Abstract The authors look at issues of improving control over mobilization resources training and buildup in the course of the ongoing army reform in the Russian Federation.
        Export Export
16
ID:   144924


How can weak insurgent groups grow? insights from Nepal / Holtermann, Helge   Article
Holtermann, Helge Article
0 Rating(s) & 0 Review(s)
Summary/Abstract How can insurgent groups that are militarily far weaker than the state survive and grow? Influential accounts drawing on Kalyvas' “control-collaboration” model argue that limited state reach can make this possible by allowing rebel groups to carve out pockets of control where they can elicit collaboration. I suggest that this account is inadequate. Even states with limited reach are likely to transfer sufficient forces to rebel-affected areas to establish at least partial control. Weak rebels therefore often face the challenge of building capacity without local control to begin with. I identify two broad factors that can make this feasible: first, strong pre-existing rebel networks, which facilitate collaboration through solidarity, norms of reciprocity, and social incentives; and second, counterinsurgency policies and practices that fail to exploit the opportunities that control offers for incentivizing collaboration and shaping political preferences. These arguments are grounded in a fieldwork-based case study of insurgency processes in a hamlet of Rolpa, Nepal.
Key Words Insurgency  Nepal  Mobilization  Collaboration  Control  Civil War 
        Export Export
17
ID:   186079


Institutional choice, risk, and control: the G5 Sahel and conflict management in the Sahel / Welz, Martin   Journal Article
Welz, Martin Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Using institutional choice theory, this article seeks to explain why the G5 Sahel, an international organization that comprises Burkina Faso, Chad, Mali, Mauritania, and Niger, was created in 2014 and tasked to deal with conflict management in the Sahel through its Joint Force that was established in 2017. While the use of the theory offers crucial insights into the creation of the G5 Sahel, I also find that the theory overestimates the costs and risks attached to the creation of a new institution while underestimating the desire of states to maintain control over actions on the ground – at least when it comes to security questions.
Key Words Conflict Management  Risk  Control  Institutional Choice  G5 Sahel 
        Export Export
18
ID:   094953


Occupying the nternet: responding to the shifting power balanc / Surin, Jacqueline Ann   Journal Article
Surin, Jacqueline Ann Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
Summary/Abstract This paper examines how the internet and information communication technology have resulted in a shift in power with regard to who defines and controls content for consumption. Individuals can now take on established institutions in defining and constructing reality; and with the much lower entry point for just about anybody to be a publisher, the traditional media are being contested as never before. At the same time, this shift in power has meant it is also easier to hold media accountable-not a bad thing at all for democracy.
Key Words Internet  Malaysia  Online  Control  General Election  Media - Power 
Nut Graph  Malaysiavotes.Com 
        Export Export
19
ID:   098955


Operations, combat actions, and network-centric warfare / Kazar'Yan, B I   Journal Article
Kazar'Yan, B I Journal Article
0 Rating(s) & 0 Review(s)
Publication 2010.
        Export Export
20
ID:   077133


Precision terror: suicide bombing as control technology / Lewis, Jeffrey W   Journal Article
Lewis, Jeffrey W Journal Article
0 Rating(s) & 0 Review(s)
Publication 2007.
Summary/Abstract Suicide bombing can be understood as a technology that successfully integrates people, cultures, and hardware into precise, intelligent, lethal weapons systems. Lacking access to the sophisticated electronic guidance systems of their enemies, terrorists have developed a cost-effective alternative technology by using social and cultural pressure to convert human beings into guidance systems for terrorist ordnance. This demonstrates that while terrorists tend to be imitative in their technologies, they can still be effective and difficult to predict. A significant implication that arises from this discussion is that the American tendency to assume that "high-tech" devices will automatically confer an advantage on the United States in the struggle against terrorism should be reconsidered.
Key Words Terrorism  Technology  Suicide Terrorism  Bombing  Control  Guidance 
        Export Export
12Next