Query Result Set
Skip Navigation Links
   ActiveUsers:1833Hits:18227181Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
ATTRIBUTION (13) answer(s).
 
SrlItem
1
ID:   104044


Anger, hatred, and the quest for peace: anger can be constructive in the absence of Hatred / Halperin, Eran; Russell, Alexandra G; Dweck, Carol S; Gross, James J   Journal Article
Halperin, Eran Journal Article
0 Rating(s) & 0 Review(s)
Publication 2011.
Summary/Abstract Anger is often viewed as a destructive force in intergroup conflicts because of its links to aggressive behavior. The authors hypothesized, however, that anger should have constructive effects in those with low levels of hatred toward the out-group. Using experimental designs with subsamples of nationwide representative surveys, the authors conducted two studies within the context of the Israeli-Palestinian conflict. Study 1 showed that inducing anger toward Palestinians several weeks before the Annapolis summit increased support for making compromises in upcoming negotiations among those with low levels of hatred but decreased support for compromise among those with high levels of hatred. Study 2 showed that, even when a strong anger induction was used just days before the summit, the anger induction led to increased support for compromise among those low in hatred, but not among those high in hatred. The authors discuss the implications of these findings for informing a psychological understanding of conflicts.
Key Words Peace  Emotion  Anger  Intergroup Conflict  Hatred  Attribution 
        Export Export
2
ID:   137241


Attributing cyber attacks / Rid, Thomas; Buchanan, Ben   Article
Rid, Thomas Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as dependent mainly on the available forensic evidence. But is it? Is this a productive understanding of attribution? — This article argues that attribution is what states make of it. To show how, we introduce the Q Model: designed to explain, guide, and improve the making of attribution. Matching an offender to an offence is an exercise in minimising uncertainty on three levels: tactically, attribution is an art as well as a science; operationally, attribution is a nuanced process not a black-and-white problem; and strategically, attribution is a function of what is at stake politically. Successful attribution requires a range of skills on all levels, careful management, time, leadership, stress-testing, prudent communication, and recognising limitations and challenges.
        Export Export
3
ID:   141816


Attribution and accountability: voting for roads in Ghana / Harding, Robin   Article
Harding, Robin Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Do voters in Africa use elections to hold governments accountable for their performance in office? In contexts of limited information and weak state capacity, it can be difficult for citizens to attribute the provision of public goods and services to political action. As a result, voters often have little information about government performance on which to condition their electoral support. Such contexts are frequently characterized by clientelism or ethnic politics, and there is a widespread impression that African elections are little more than contests in corruption or ethnic mobilization. Using an original panel data set containing electoral returns and detailed information on road conditions throughout Ghana, the author provides robust evidence that when a public good can be attributed to political action, as is the case with roads in Ghana, electoral support is affected by the provision of that good. The author also uses data on a variety of educational inputs to test the claim that votes are conditioned only on attributable outcomes.
Key Words Ghana  Accountability  Attribution  Voting for Roads  African Elections 
        Export Export
4
ID:   171962


Contested public attributions of cyber incidents and the role of academia / Egloff, Florian J   Journal Article
Egloff, Florian J Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Public attributions of cyber incidents by governments and private industry have become prevalent in recent years. This article argues that they display a skewed version of cyber conflict for several operational and structural reasons, including political, commercial, and legal constraints. In addition, public attribution of cyber incidents takes place in a heavily contested information environment, creating fractured narratives of a shared past. The article uses three cyber incidents (Sony Pictures, DNC, and NotPetya) to show how actors cope with this contested information environment and proposes a changed role of academia to address some of the problems that emerge. To become competent in contesting public attribution discourses, universities would have to work more across physical, disciplinary, and academic boundaries. The main implications for democracies are to be more transparent about how attribution is performed, enable other civilian actors to study cyber conflict, and thereby broaden the discourse on cybersecurity politics.
        Export Export
5
ID:   191978


CWC at 25: from verification of chemical-weapons destruction to attribution of their use / Kelle, Alexander   Journal Article
Kelle, Alexander Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article analyzes the shifting focus of the Chemical Weapons Convention (CWC) during the first 25 years of its implementation, from the verification of destruction of declared chemical-weapon (CW) stockpiles to the attribution of CW use. The article identifies the repeated use of chemical weapons by Syria and the resultant creation of a new attribution norm under the CWC as a critical juncture in the regime’s evolution. Repeated calls for accountability for the use of so-called Novichok nerve agents for assassination purposes serve as the first manifestation of the new attribution norm. The article further outlines steps CWC states parties should take in the context of the Fifth CWC Review Conference in May 2023 to prepare the CW-prohibition regime for its next 25 years of operation by (1) adapting the implementation of key regime norms following the anticipated completion of CW destruction later in 2023 and (2) incorporating the investigation and attribution work of the Investigation and Identification Team into the programmatic work of the OPCW.
        Export Export
6
ID:   120288


Cyber war is inevitable (Unless We Build Security In) / McGraw, Gary   Journal Article
McGraw, Gary Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.
        Export Export
7
ID:   191909


Do Politically Irrelevant Events Cause Conflict? the Cross-continental Effects of European Professional Football on Protests in / Uesugi, Mamoru; Kikuta, Kyosuke   Journal Article
Kikuta, Kyosuke Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract We examine whether politically irrelevant events can cause conflicts, by analyzing the effects of professional football games in Europe on protests in Africa—an unintended spillover across the continents. By expanding psychological theories, we argue that the outcomes of the football games in Europe can affect African people's subjective evaluation of domestic politicians, which in turn can trigger protests. By exploiting as-if random variation in the results of 15,102 close football games conditional on betting odds, we find that compared to draw games, close losses of African players’ teams increase peaceful protests in their original countries while not changing the likelihood of riots or armed conflicts. The effect is particularly large for non-ethnic protests targeted at a central government. Close losses also temporarily decrease people's trust in their country's leader. By contrast, close victories do not have equivalent or compensating effects on protests or public opinion. These results suggest asymmetric misattribution: people in Africa unreasonably blame domestic politicians for bad luck in European football games, prompting protests; but they do not credit politicians with football victories.
Key Words Conflict  Africa  Psychology  Sports  Protest  Football 
Attribution 
        Export Export
8
ID:   171054


Mmodel for judging complex events in an intercultural situation / Rauchberger, Nirit; Kaniel, Shlomo ; Gross, Zehavit   Journal Article
Rauchberger, Nirit Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article presents a multi–variable model for the judgement of complex events in an intercultural situation. The participants in the study were 244 female students, who expressed negative emotions towards the events. Results of comparative analysis of the three events showed that the difference was not significant, χ2(34) = 36.47, p > 0.05, the events were similar with respect to the patterns of the structures of the connections between the variables, as predicted by the theoretical model. Forming judgements according to the model’s criteria will lead to greater moderation and mutual tolerance and to advancing and developing intercultural competence.
        Export Export
9
ID:   171149


Preventable or unpreventable Chinese smog problem in media: how attribution tells the story / Fan, Minghui; Zhou, Shuhua ; Panfeng, Yu   Journal Article
Zhou, Shuhua Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract China’s polluted air has seriously affected the health of the Chinese population. This paper uses attribution theory to investigate how Chinese newspapers and non-Chinese newspapers presented smog in China and attributed causes and responsibilities. Built on previous studies, this study adopted covariation model within attribution theory and painted an interesting picture of smog coverage by Chinese and non-Chinese newspapers because of the apparent differences in perspectives. The criteria further provided folder for elaboration on explaining why the different coverages attributed causes as they did. Implications are discussed.
Key Words China  Media Coverage  Attribution  Smog  Covariation Model 
        Export Export
10
ID:   190772


Publicly attributing cyber attacks: a framework / Egloff, Florian J; Smeets, Max   Journal Article
Smeets, Max Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract When should states publicly attribute cyber intrusions? Whilst this is a question governments increasingly grapple with, academia has hardly helped in providing answers. This article describes the stages of public attribution and provides a Public Attribution Framework designed to explain, guide, and improve decision making of public attribution by states. Our general argument is that public attribution is a highly complex process which requires trade-offs of multiple considerations. Effective public attribution not only necessitates a clear understanding of the attributed cyber operation and the cyber threat actor, but also the broader geopolitical environment, allied positions and activities, and the legal context. This also implies that more public attribution is not always better. Public attribution carries significant risks, which are often badly understood. We propose the decision maker’s attitude towards public attribution should be one of ‘strategic, coordinated pragmatism’. Public attribution – as part of a strategy – can only be successful if there is a consistent goal, whilst the avenues for potential negative counter effects are assessed on a case-by-case basis.
        Export Export
11
ID:   161325


Responsibility to Protect and the question of attribution / Aistrope, Tim   Journal Article
Aistrope, Tim Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract This article explores the problem of attribution in the context of Responsibility to Protect (R2P) intervention through an analysis of the Syrian chemical weapons attack of 2013. We argue that R2P advocates can be confronted by a crisis dynamic where the political momentum for military intervention runs ahead of independent verification and attribution of mass atrocity crimes. We contrast the political momentum for intervention with the technical process of independent attribution and show that the sort of independent evidence that would ideally legitimize an R2P intervention was unavailable when there was political momentum for action. Conversely, the information that was available (which inevitably informed the political momentum for action) was largely produced by state intelligence organizations – or a potentially briefed media – and shaped by the interests and priorities of its end users. While understandable in the face of the ‘extreme’, we suggest that the mobilization of political momentum by R2P advocates entails significant dangers: first, it risks undermining the integrity of R2P if evidence is later discredited and second, it risks amplifying the perception that states sometimes exploit humanitarian pretexts in pursuit of other strategic ends.
        Export Export
12
ID:   187493


Saddam Hussein’s role in the gassing of Halabja / Palkki, David D; Rubin, Lawrence   Journal Article
Rubin, Lawrence Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract Iraq’s use of chemical weapons against Iraqi Kurdish civilians in 1987 and 1988 is among the most morally troubling events in the latter half of the twentieth century. Most of the questions surrounding the attack, including why, when, and how, have been addressed in path-breaking research by Joost Hiltermann and other researchers from Human Rights Watch. However, even as more records and internal documents from the period have come to light, one question remains unresolved: Did Saddam Hussein, Iraq’s leader, directly order the gassing of Iraqi Kurds? This study reassesses the Halabja attack of 1988—in particular, Saddam’s thinking and behavior relating to the attack—in light of the post-2003 evidence. It synthesizes insights from the Iraqi records at the Conflict Records Research Center and Stanford University; debriefings of Iraqi principals, which the authors obtained in response to Mandatory Declassification Review requests; recent memoirs of Iraqi and US officials; and other previously unexplored sources. Although these records provide no direct proof that Saddam Hussein issued an explicit order to gas Halabja, it is clear he created a command environment in which the indiscriminate gassing of Iraqi Kurds was considered permissible and even desirable.
Key Words Chemical Weapons  Iraq  War Crimes  Accountability  Saddam Hussein  Attribution 
        Export Export
13
ID:   165331


Sound the alarm! Updating beliefs and degradative cyber operations / Gomez, Miguel Alberto N.   Journal Article
Gomez, Miguel Alberto N. Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract To date, cyber security research is built on observational studies involving macro-level attributes as causal factors that account for state behaviour in cyberspace. While this tradition resulted in significant findings, it abstracts the importance of individual decision-makers. Specifically, these studies have yet to provide an account as to why states fail to integrate available information resulting in suboptimal judgements such as the misattribution of cyber operations. Using a series of vignette experiments, the study demonstrates that cognitive heuristics and motivated reasoning play a crucial role in the formation of judgements vis-à-vis cyberspace. While this phenomenon is frequently studied relative to the physical domain, it remains relatively unexplored in the context of cyberspace. Consequently, this study extends the existing literature by highlighting the importance of micro-level attributes in interstate cyber interactions.
Key Words Conflict  Cyber Security  Experiments  Bias  Attribution 
        Export Export