Introduction: explaining NATO's durability -- The post-Cold War environment and NATO enlargement -- Learning from Bosnia and Kosovo -- 9/11 and the transatlantic rift -- NATO's war on terror in Afghanistan -- Libya, Ukraine, and the rise of ISIS -- Conclusion: NATO's durability in a post-Cold War world
Verfügbarkeit an Ihrem Standort wird überprüft
Dieses Buch ist auch in Ihrer Bibliothek verfügbar:
This article explores how cyber-attacks affect freedom of expression. It begins by outlining the literature on cyber coercion and exploring other conceptions of how offensive cyber operations have been used to shape adversary behaviour, including efforts to intimidate through cyberspace, and the concept of 'cyber swaggering'. The article moves on to explore how cyber-attacks have been used to undermine electoral process, to Erode free and fair media reporting, and how manipulation of social media can constitute a 'virtual infiltration' and 'virtual occupation' of the information domain. The article then explores how cyber-attacks conducted during the conflict in Ukraine have limited or otherwise affected freedom of expression. I argue that the wider effects of cyber operations on political, civil and human rights have been underexplored in the cyber security literature; that cyber-attacks have adversely affected freedom of expression in the conflict in Ukraine and in other political disputes; and that the coercion concept is ill-suited to accounting for the socio-psychological impact of modern cyber operations. ; SCOPUS: ar.j ; info:eu-repo/semantics/published
The conceptual debate around the term cyber warfare has dominated the cybersecurity discipline over the last two decades. Much less attention has been given during this period to an equally important question: what constitutes cyber peace? This article draws on the literatures in peace and conflict studies and on desecuritization in critical security studies, to suggest how we might begin to rearticulate the cybersecurity narrative and shift the debate away from securitization and cyberwar to a more academically grounded focus on desecuritization and cyber peace. It is argued that such a move away from a vicious circle where states frame cybersecurity predominantly within a national security narrative and where they seek to perpetually prepare for cyberwar, to a virtual cycle of positive cyber peace, is not only a desirable, but a necessary outcome going forward. We assert that this is particularly important if we are to avoid (continuing) to construct the very vulnerabilities and insecurities that lead to the prioritization of offence and destruction in cyberspace, rather than transformative, human-centred development in information and communications technology innovation.
"This book offers a multi-disciplinary analysis of emerging technologies and their impact on the new international security environment across three levels of analysis. While recent technological developments, such as Artificial Intelligence (AI), robotics and automation, have the potential to transform international relations in positive ways, they also pose challenges to peace and security and raise new ethical, legal and political questions about the use of power and the role of humans in war and conflict. This book makes a contribution to these debates by considering emerging technologies across three levels of analysis: (1) the international system (systemic level) including the balance of power; (2) the state and its role in international affairs and how these technologies are redefining and challenging the state's traditional roles; and (3) the relationship between the state and society, including how these technologies affect individuals and non-state actors. This provides specific insights at each of these levels and generates a better understanding of the connections between the international and the local when it comes to technological advance across time and space The chapters examine the implications of these technologies for the balance of power, examining the strategies of the US, Russia and China to harness AI, robotics and automation (and how their militaries and private corporations are responding); how smaller and less powerful states and non-state actors are adjusting; the political, ethical and legal implications of AI and automation; what these technologies mean for how war and power is understood and utilized in the 21st century; and how these technologies diffuse power away from the state to society, individuals and non-state actors. This volume will be of much interest to students of international security, science and technology studies, law, philosophy and International Relations"--
Experts from academia, governments, think tanks, NGOs, trade unions, and business investigate whether the public should play a greater role in foreign policy making by analysing their current role in the Iraq war (USA), Post-Apartheid (South Africa), trade relations with China (New Zealand) and other cases
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
This article examines the ways in which the US intelligence community is leveraging the power of artificial intelligence (AI) for national security purposes. Drawing on declassified intelligence records, it contends that this community has been fascinated by AI for decades. This is important to acknowledge because this historical context has shaped contemporary projects and thinking within the community. It has given the United States a first-mover advantage, establishing precedents that other global actors need to comply with, negotiate or resist. The article advances three arguments. One, the community has long recognized that it needs to collaborate with the tech sector on AI. However, these relationships bring certain challenges since the sector is a curious compound of ideologies and interests. Two, while the community was initially attracted to the data processing advantages of AI to help human analysts to overcome "data smog," today it has broadened its focus to consider how AI can improve all stages of the intelligence cycle. Three, while many voices feverishly herald the transformative potential of AI in the global security environment, we argue instead that US agencies will not be able to exploit the full potential of AI, and thus talk of an intelligence revolution is premature. This is because of national and international rules on data collection and retention but also because of cultural tensions within the global AI ecosystem. The discussion will appeal to scholars and practitioners interested in the impact of emerging technologies on national security processes and decision-making and, more broadly, global security.