Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Alternativ können Sie versuchen, selbst über Ihren lokalen Bibliothekskatalog auf das gewünschte Dokument zuzugreifen.
Bei Zugriffsproblemen kontaktieren Sie uns gern.
41 Ergebnisse
Sortierung:
SSRN
Working paper
Most people believe that transparency improves governance, by improving trust in relations between governments and their people as well as with other governments. The devil, as always, is in the details. The paradox of transparency is that the metaphor conveys unproblematic revelation of true information, yet in practice the provision of believable, relevant information takes a lot of institutional and political work to achieve. Transparency in international security is more problematic because relationships between the information, its referent, and context of interpretation can be especially complex considering the multiple channels of information competing for attention and authority. This brief proposes a definition of "defense transparency" that takes these complexities into account, drawing on a pragmatic notion of communication between particular information sources, messages, and receivers, the normative goal of which is to enhance collective security.
BASE
In: Cornell studies in security affairs
In: Journal of peace research, Band 61, Heft 1, S. 87-102
ISSN: 1460-3578
Most cyber intrusions are a form of intelligence rather than warfare, but intelligence remains undertheorized in international relations (IR). This article develops a theory of intelligence performance at the operational level, which is where technology is most likely to affect broader political and military outcomes. It uses the pragmatic method of abduction to bootstrap general theory from the historical case of Bletchley Park in World War II. This critical case of computationally enabled signals intelligence anticipates important later developments in cybersecurity. Bletchley Park was uncommonly successful due to four conditions drawn from contemporary practice of cryptography: radio networks provided connectivity; German targets created vulnerability; Britain invested in bureaucratic organization; and British personnel exercised discretion. The method of abduction is used to ground these particular conditions in IR theory, revisit the evaluation of the case, and consider historical disanalogies. The result is a more generalizable theory that can be applied to modern cybersecurity as well as traditional espionage. The overarching theme is that intelligence performance in any era depends on institutional context more than technological sophistication. The political distinctiveness of intelligence practice, in contrast to war or coercive diplomacy, is deceptive competition between rival institutions in a cooperatively constituted institutional environment. Because cyberspace is highly institutionalized, furthermore, intelligence contests become pervasive in cyberspace.
In: Intelligence and national security, Band 36, Heft 2, S. 260-278
ISSN: 1743-9019
In: Perspectives on politics, Band 18, Heft 1, S. 336-337
ISSN: 1541-0986
In: Security studies, Band 29, Heft 2, S. 335-361
ISSN: 1556-1852
In: Perspectives on politics, Band 16, Heft 4, S. 1139-1141
ISSN: 1541-0986
In: Science, technology, & human values: ST&HV, Band 42, Heft 6, S. 1061-1099
ISSN: 1552-8251
In: Perspectives on politics, Band 14, Heft 4, S. 1275-1277
ISSN: 1541-0986
In: New perspectives quarterly: NPQ, Band 32, Heft 3, S. 17-21
ISSN: 1540-5842
In: International security, Band 39, Heft 3, S. 7-47
ISSN: 1531-4804
Exaggerated fears about the paralysis of digital infrastructure and the loss of competitive advantage contribute to a spiral of mistrust in U.S.-China relations. In every category of putative Chinese cyber threat, there are also considerable Chinese vulnerabilities and Western advantages. China has inadvertently degraded the economic efficiency of its networks and exposed them to foreign infiltration by prioritizing political information control over technical cyber defense. Although China also actively infiltrates foreign targets, its ability to absorb stolen data is questionable, especially at the most competitive end of the value chain, where the United States dominates. Similarly, China's military cyber capacity cannot live up to its aggressive doctrinal aspirations, even as its efforts to guide national information technology development create vulnerabilities that more experienced U.S. cyber operators can attack. Outmatched by the West, China is resorting to a strategy of international institutional reform, but it benefits too much from multistakeholder governance to pose a credible alternative. A cyber version of the stability-instability paradox constrains the intensity of cyber interaction in the U.S.-China relationship—and in international relations more broadly—even as lesser irritants continue to proliferate.
In: New perspectives quarterly: NPQ, Band 32, Heft 3, S. 17-21
ISSN: 0893-7850
In: International security, Band 39, Heft 3, S. 7-47
ISSN: 0162-2889
World Affairs Online
In: Security studies, Band 22, Heft 3, S. 365-404
ISSN: 1556-1852