Query Result Set
Skip Navigation Links
   ActiveUsers:379Hits:19888881Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
JOURNAL OF STRATEGIC STUDIES VOL: 36 NO 1 (9) answer(s).
 
SrlItem
1
ID:   120284


1983 Nuclear crisis – lessons for deterrence theory and practice / Adamsky, Dmitry Dima   Journal Article
Adamsky, Dmitry Dima Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract This article distills insights for the scholarship of deterrence by examining the 1983 nuclear crisis - the moment of maximum danger of the late Cold War. Important contributions notwithstanding, our understanding of this episode still has caveats, and a significant pool of theoretical lessons for strategic studies remain to be learned. Utilizing newly available sources, this article suggests an alternative interpretation of Soviet and US conduct. It argues that the then US deterrence strategy almost produced Soviet nuclear overreaction by nearly turning a NATO exercise into a prelude to a preventive Soviet attack. Building on historical findings, this article offers insights about a mechanism for deterrence effectiveness evaluation, recommends establishing a structure responsible for this endeavor, and introduces a new theoretical term to the strategic studies lexicon - a 'culminating point of deterrence'.
        Export Export
2
ID:   120285


Allies at war: British and US army command culture in the Italian campaign, 1943-1944 / Rose, Patrick   Journal Article
Rose, Patrick Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract This article compares the philosophy and practice of command in the British and US Armies during the Italian Campaign of 1943-44. It assesses pre-war influences on the command approach adopted by each army, and shows how refinements derived from wartime experience enabled British and American commanders to successfully utilise mission command principles to outfight the German Army in the latter years of World War II. This examination directly challenges the historical consensus that Allied commanders were disadvantaged by an inability to exploit the advantages of mission command, and that the German Army retained superior command practices, despite its other failings, throughout the fighting between 1939 and 1945. These conclusions hold additional relevance to modern military organisations which have emphasised mission command as the optimal solution to effective command in battle since the 1980s, but from an inaccurate understanding of German, British and American command traditions and experience that persists to this day.
Key Words British Army  Italian Campaign  German Army  US Army  Mission Command 
        Export Export
3
ID:   120286


Competitive strategies against continental powers: the geopolitics of Sino-Indian-American relations / Montgomery, Evan Braden   Journal Article
Montgomery, Evan Braden Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract This article makes three arguments about the Sino-American competition, the Sino-Indian rivalry, and the US-India partnership. First, past maritime-continental rivalries suggest that China will pose a greater challenge to American interests as it confronts fewer threats on land, while the US may require continental allies to counter-balance China's rise. Second, whereas a Sino-Indian continental security dilemma could benefit the US by compelling China to invest in capabilities that do not threaten it, a Sino-Indian maritime security dilemma could have the opposite effect. Third, Washington should consider India as a prospective continental ally rather than a potential maritime partner.
Key Words Geopolitics  China  India  Rivalry  Competitive Strategy 
        Export Export
4
ID:   120288


Cyber war is inevitable (Unless We Build Security In) / McGraw, Gary   Journal Article
McGraw, Gary Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The information systems controlling our critical infrastructure are vulnerable to cyber attack. Cyber war is therefore inevitable unless we improve our cyber defenses. The only way to do this is by building security into systems at the design stage.
        Export Export
5
ID:   120287


Cyber war will take place! / Stone, John   Journal Article
Stone, John Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract The question of whether or not cyber war amounts to war per se is difficult to determine given strategic theory's uncertain grasp of the concepts of force, violence and lethality. These three concepts, along with their relationships with one another, are explored in order to demonstrate that cyber attacks can in fact be construed as acts of war.
Key Words Violence  Cyberwar  Force  Strategic Theory  Lethality 
        Export Export
6
ID:   120290


How probable is Cyber war? bringing IR theory back in to the cy / Junio, Timothy J   Journal Article
Junio, Timothy J Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract Many well-established explanations for war suggest that cyber weapons have a greater chance of being used offensively than other kinds of military technologies. This response article introduces a research agenda for the study of cyber war, and offers an example - principal-agent problems in cyber operations - to demonstrate how rigorous theoretical and empirical work may proceed.
        Export Export
7
ID:   120292


More attacks, less violence / Rid, Thomas   Journal Article
Rid, Thomas Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract A response to John Stone, Dale Peterson, and Gary McGraw on cyber war.
Key Words Violence  Power  Cyber Security  Cyber War  Sabotage 
        Export Export
8
ID:   120289


Offensive cyber weapons: construction, development, and employment / Peterson, Dale   Journal Article
Peterson, Dale Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract Deploying cyber weapons to damage Industrial Control Systems (ICS) is relatively easy because such systems are insecure by design. Maintaining communication with an activated cyber weapon, and ensuring its persistence, is harder but feasible.
        Export Export
9
ID:   120291


Proliferation of cyberwarfare capabilities and interstate war, : Liff responds to Junio / Liff, Adam P   Journal Article
Liff, Adam P Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
        Export Export