Query Result Set
Skip Navigation Links
   ActiveUsers:598Hits:19898467Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
JOURNAL OF STRATEGIC STUDIES VOL: 43 NO 2 (5) answer(s).
 
SrlItem
1
ID:   173807


China’s weapons transfer in the Western hemisphere / Solar, Carlos   Journal Article
Solar, Carlos Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract What characterises China’s weapons diplomacy and how does it unfold in the current security scenario in the Western Hemisphere? This article argues that Chinese arms deliveries have arrived in the region together with the expansion of commerce and trade routes as evidenced in Africa, Asia, and the Middle East. In Latin America and the Caribbean, states seek to buy weapons in light of contentious border hot spots and intrastate rampant violence. China is a wilful seller and, to accomplish this, it has developed a weapons transfer policy taking advantage of the post-hegemony of the United States. The article argues that Beijing’s successes could reverse due to the lack of interstate armed conflict, and the less belligerent military missions adopted by the armed forces. Yet, Chinese arms transfers in the Western Hemisphere and other parts of the developing world reveal a complex security governance regime where the military, industry, and diplomatic policy communities interact.
        Export Export
2
ID:   173809


On the asymmetric advantages of cyberwarfare. Western literature and the Chinese journal Guofang Keji / Dossi, Simone   Journal Article
Dossi, Simone Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract An issue that has been widely debated in the West is whether cyberwarfare gives militarily weaker actors asymmetric advantages. Is cyberwarfare a weapon of the weak? Or does it rather multiply the advantages enjoyed by militarily superior actors? These questions have major implications for China, which – as a rising power – must face stronger and weaker opponents at the same time. Based on an analysis of the Chinese journal Guofang Keji, this article investigates how China’s strategic community theorises advantage and disadvantage in the cyber domain and how this differs from Western perspectives on cyberwarfare.
        Export Export
3
ID:   173806


Rise of China, balance of power theory and US national security: reasons for optimism? / Shifrinson, Joshua   Journal Article
Shifrinson, Joshua Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract When and why might a rising China challenge the power and security of a relatively declining United States? Conventional wisdom argues that China – like other rising states – is apt to adopt an increasingly ambitious strategy that imperils US interests as its relative power grows. Drawing on balance of power theory, I instead argue that the threat of Chinese predation is overstated. Rising in a crowded geopolitical neighbourhood, China faces incentives to avoid preying on the United States, and may even have reason to cooperate with the United States over the long term.
        Export Export
4
ID:   173810


Signals of strength: capability demonstrations and perceptions of military power / Montgomery, Evan Braden   Journal Article
Montgomery, Evan Braden Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract States often use demonstrations to improve perceptions of their military power. This topic has received limited attention in the literature, which typically assumes that states disguise or downplay their capabilities, advertise them only to enhance their prestige, or use demonstrations to communicate interests and resolve. Because military strength can be difficult to gauge, however, successful deterrence and assurance can require demonstrations to ensure that capabilities are viewed as credible. This article explains the logic of capability demonstrations, identifies the conditions under which they have the most utility, introduces a typology of demonstration mechanisms, and describes how emerging technology influences demonstrations.
        Export Export
5
ID:   173808


US cyber deterrence: practice guiding theory / Wilner, Alex S   Journal Article
Wilner, Alex S Journal Article
0 Rating(s) & 0 Review(s)
Summary/Abstract When compared to advancements in conceptualising deterrence in other domains, cyber deterrence is still in it messy infancy. In some ways cyber deterrence practice outpaces cyber deterrence theory. Tactics, strategy, doctrine, and policy are developed and put to use even before corresponding theories are properly understood. This article analyses how American cyber deterrence has been implemented over the past two decades in order to inform ongoing debates within the academic study of deterrence, and to provide insights from practice for how cyber deterrence theory can be better conceived and refined.
        Export Export