![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
Due to the continuing expansion of the notion of security, various national, regional and international institutions now find themselves addressing contemporary security issues. While institutions may evolve by adjusting themselves to new challenges, they can also fundamentally alter the intricate balance between security and current legal frameworks. This volume explores the tensions that occur when institutions address contemporary security threats, in both public and international law contexts. As part of the Connecting International with Public Law series, it provides important and valuable insights into the legal issues and perspectives which surround the institutional responses to contemporary security challenges. It is essential reading for scholars, practitioners and policy makers seeking to understand the legal significance of security institutions and the implications of their evolution on the rule of law and legitimacy.
Alliances have shaped grand strategy and warfare since the dawn of civilization. Indeed, it is doubtful that the United States of America would have gained its independence without its Revolutionary War alliance with France. Such alliances may prove even more important to international security in the twenty-first century. Economic and financial difficulties alone will ensure that policy makers attempt to spread the burden of securing vital interests onto other nations through alliances, both formal organizations such as NATO and informal alliances of convenience as developed to wage the Gulf War in 1991. A team of leading historians examine the problems inherent in alliance politics and relationships in the framework of grand strategy through the lens of history. Aimed at not just the military aspects of alliances, the book uncovers the myriad factors that have made such coalitions succeed or fail in the past.
Military strategy is concerned with the translation of armed force into intended political effects. As such, it constitutes one of the most important activities of the past two centuries; and yet during this period it has not always been practised very effectively. In this book, John Stone seeks to explain why this has been the case by examining various instances of strategic practice drawn from the period between the eighteenth century and the present day. He contends that, to be truly effective, strategy must faithfully reflect the political context in which it is formulated. Where strategy has failed, it is frequently because its practitioners have paid undue attention to military-technical matters at the expense of politics.
Welcome to cyberspace - where all your computing and connection needs are on demand, and where security threats have never been more massive.A world without the advantages and convenience provided by cyberspace and the internet of things is now unimaginable. But do we truly grasp the threats to this massive, interconnected system? And do we really understand how to secure it? After all, cyber security is no longer just a technology problem; the effort to secure systems and society are now one and the same.This book discusses cyber security and cyber policy in an effort to improve the use and acceptance of security services. It argues that a substantive dialogue around cyberspace, cyber security and cyber policy is critical to a better understanding of the serious security issues we face.
The sudden transformation of the Cold War security order in 1989 altered the structure of the European state system, and necessitates the striking of a new balance between the economic, political and military requirements of security. This volume focuses on the most important institutions of European security, the European Union and NATO. Both institutions are expanding, especially eastwards, in terms of their respective roles and membership. This double expansion raises many questions; most crucially, whether Europe will be a two-speed security order, which suggests openess, inclusiveness and the emergence of an anarchical society, or a two-tiered security order, which suggests a continued hierachical security system with all of its associated historical liabilities. -- .
This book provides a comprehensive understanding of the evolution of India's strategic culture in the era of globalization. It examines dominant themes that have governed India's foreign and security policy and events which have shaped India's role in global politics. The author Examines the traditional and new approaches to diplomacy and the state's response to internal and external conflicts; Delineates policy pillars which are required to protect the state's strategic interests and forge new relationships in the current geopolitical climate; Compares the domestic and international security policies followed during the tenures of Narsimha Rao, Atal Bihari Vajpayee and Manmohan Singh; and Analyzes how the Narendra Modi era has brought on changes in India's security strategy and the use of soft power and diplomacy. With extensive additions, drawing on recent developments, this edition of the book will be a key text for scholars, teachers and students of defence and strategic studies, international relations, history, political science and South Asian studies.
This book focuses on the disagreements which existed in British political and military circles over nuclear strategy during the period from 1945 to 1964. Based on recently released documents, the book argues that British policy in this important area was much more ambiguous and much less coherent than is usually supposed.
Britain is at a crossroads. As we leave the EU, we face a great challenge and also the opportunity to forge a new identity in an increasingly uncertain world. Our Armed Forces will be critical to our power and prosperity. For centuries, they have been the envy of the world. Now barely a day passes without reports of diminishing prowess. The number of Navy workhorse ships has been halved and the Army reduced to its smallest size since the Napoleonic war. Our spectacular new aircraft carriers and the F-35 fighter jet programme are mired in controversy. Meanwhile, the Armed Forces face questions about their purpose. The bitter experiences of Iraq and Afghanistan have undermined the concept of the military as a `force for good.' Voters are now sceptical of discretionary wars in faraway places. Aside from sporadic jihadi attacks, few believe there is any real threat to our way of life. Thus defence spending is no longer a public priority. Politicians know that there are more votes in schools and hospitals, even while they are deploy our troops onto the streets after suicide bombings or, more recently, a nerve agent attack. In what feels like peacetime, no wonder top brass have to justify big budgets. Yet this country faces an array of new and escalating threats, while Brexit and Donald Trump raise difficult questions over the future of our most important alliances. Have we become dangerously complacent? Are we still masters of our own destiny, or have we run up the white flag?
'Cyber security' is a recent addition to the global security agenda, concerned with protecting states and citizens from the misuse of computer networks for war, terrorism, economic espionage and criminal gain. Many argue that the ubiquity of computer networks calls for robust and pervasive countermeasures, not least governments concerned about their potential effects on national and economic security. Drawing on critical literature in international relations, security studies, political theory and social theory, this is the first book that describes how these visions of future cyber security are sustained in the communities that articulate them. Specifically, it shows that conceptions of time and temporality are foundational to the politics of cyber security. It explores how cyber security communities understand the past, present and future, thereby shaping cyber security as a political practice. Integrating a wide range of conceptual and empirical resources, this innovative book provides insight for scholars, practitioners and policymakers.
There is little doubt that Asia- stretching from the Eurasian landmass to the maritime reaches of Australia and the South Pacific-is experiencing a major shift in the global balance of power. Expressions like the 'Indo-Pacific' and 'Asia-Pacific', contested they maybe, capture Asia's expanse and dynamism. A power shift from the West to the East is well under way. But what is not understood is how this global re-distribution of political, economic and military power will impact global and regional geopolitical order. IR experts warn that power transitions of this magnitude can prove to be destabilizing. The argument that the world is interdependent to an unprecedented degree offers some hope that the transitions to new world order may turn out to be peaceful. Interestingly, these changes are also changing the mindset of the people who are pushing for political reforms and accountability. The chapters in this edited volume take a measure of these changes and try to understand their impact on peace and stability.
- When do individuals radicalise? - Can terrorism be rational? - How can we define terrorism? - What is the role of women in terrorism? - Can states be terrorist? World leading experts answer these questions in Contemporary Terrorism Studies, the first textbook to provide a multi-disciplinary, methodologically plural, and richly diverse introduction to terrorism studies. Contemporary Terrorism Studies covers the main approaches in terrorism studies, and is structured into three comprehensive sections. The first on 'The State of Terrorism Studies' maps the development and historical context of the discipline, and looks to the future of terrorism studies. Part two on 'Issues and Debates in Terrorism Studies' examines key contentious questions and debates such as the role of women, technology, and the media in terrorism. The final part, part three on 'Countering Terrorism' focuses specifically on counterterrorism: it's instruments, foreign policy, legal frameworks, and organisations. Overall, text will engage students, and establish a confident understanding of the subject. The textbook has been developed with pedagogical features to help enhance student learning. Each chapter contains case studies to highlight real world examples of political violence, questions for reflection to encourage critical thinking, and suggestions for further reading which provide useful sources for further reading, essays, and exam preparation. Furthermore, a consistent, accessible tone, and jargon-free writing style makes Contemporary Terrorism Studies the clearest guide to understanding terrorism. Digital formats and resources Contemporary Terrorism Studies is available for students and institutions to purchase in a variety of formats, and is supported by online resources. - The e-book offers a mobile experience and convenient access along with hyperlinks to question pointers, and a library of web links, helping you to broaden your knowledge and understanding terrorism studies: www.oxfordtextbooks.co.uk/ebooks - Student resources: additional case studies, guidance on accessing databases, pointers for tackling the questions for reflection, and suggested web links organised by chapter are available online. - Lecturer resources: customisable PowerPoint slides to adapt and use in teaching
Strategy is not a modern invention. It is an essential and enduring feature of human history that is here to stay. In this original essay, Colin S. Gray, world-renowned scholar of strategic thought, discusses the meaning of strategy and its importance for politicians and the military as a means of achieving desired outcomes in complex, uncertain conditions. Drawing on a wide range of examples from the Great Peloponnesian War to the Second World War, Vietnam, and the ongoing conflicts in Iraq and Afghanistan, Gray ably shows how great military thinkers of the past and present have acted strategically in their various ideological, political, geographical and cultural contexts. Looking to the future, he argues that strategy will continue to provide a vital tool-kit for survival and security, but that the global threat posed by nuclear weapons remains an on-going challenge without obvious practical solutions. As Gray boldy asserts, there is no promised land ahead, only hard and dangerous times that will require us to master the theory and practice of strategy to secure our own future.
After a decade and a half of war in Iraq and Afghanistan, US policymakers are seeking to provide aid and advice to local governments' counterinsurgency campaigns rather than directly intervening with US forces. This strategy, and US counterinsurgency doctrine in general, fail to recognize that despite a shared aim of defeating an insurgency, the US and its local partner frequently have differing priorities with respect to the conduct of counterinsurgency operations. Without some degree of reform or policy change on the part of the insurgency-plagued government, American support will have a limited impact. Using three detailed case studies - the Hukbalahap Rebellion in the Philippines, Vietnam during the rule of Ngo Dinh Diem, and the Salvadorian Civil War - Ladwig demonstrates that providing significant amounts of aid will not generate sufficient leverage to affect a client's behaviour and policies. Instead, he argues that influence flows from pressure and tight conditions on aid rather than from boundless generosity.
This book offers an overview of space strategy in the 21st century. The purpose of space strategy is to coordinate, integrate, and prioritize space activities across security, commercial, and civil sectors. Without strategy, space activities continue to provide value, but it becomes difficult to identify and execute long-term programs and projects and to optimize the use of space for security, economic, civil, and environmental ends. Strategy is essential for all these ends since dependence on, and use of, space is accelerating globally and space is integrated in the fabric of activities across all sectors and uses. This volume identifies a number of areas of concern pertinent to the development of national space strategy, including: intellectual foundations; political challenges; international cooperation and space governance; space assurance and political, organizational, and management aspects specific to security space strategy. The contributing authors expand their focus beyond that of the United States, and explore and analyse the international developments and implications of national space strategies of Russia, China, Europe, Japan, India, Israel, and Brazil. This book will be of much interest to students of space power and politics, strategic studies, foreign policy and International Relations in general.
Intelligence and security communities have access to an overwhelming amount of information. More data is better in an information-hungry world, but too much data paralyzes individual and institutional abilities to process and use information effectively. Robert Mandel calls this phenomenon "global data shock." He investigates how information overload affects strategic ambiguity, deception, and surprise, as well as the larger consequences for international security. This book provides not only an accessible framework for understanding global data shock and its consequences, but also a strategy to prepare for and respond to information overload. Global Data Shock explores how information overload facilitates deception, eroding international trust and cooperation in the post-Cold War era. A sweeping array of case studies illustrates the role of data shock in shaping global events from the 1990 Iraqi attack on Kuwait to Brexit. When strategists try to use an overabundance of data to their advantage, Mandel reveals, it often results in unanticipated and undesirable consequences. Too much information can lead to foreign intelligence failures, security policy incoherence, mass public frustrations, curtailment of democratic freedoms, and even international political anarchy. Global Data Shock addresses the pressing need for improved management of information and its strategic deployment.
This Field Manual establishes doctrine (fundamental principles) for tactical counterinsurgency (COIN) operations at the company, battalion, and brigade level. It is based on lessons learned from historic counterinsurgencies and current operations. This manual continues the efforts of FM 3-24, Counterinsurgency, in combining the historic approaches to COIN with the realities of today's operational environment (OE)- an environment modified by a population explosion, urbanization, globalization, technology, the spread of religious fundamentalism, resource demand, climate change and natural disasters, and proliferation of weapons of mass destruction. This manual is generic in its geographic focus and should be used with other doctrinal sources.
Historical research on the German army of the interwar period has concentrated on the development of the so-called 'Blitzkrieg'. However, Matthias Strohn shows that for most of the time the German army, restricted by the terms of the Versailles Treaty, was too weak to launch an offensive war or even effectively repel an invader. Accordingly, the army focused instead primarily on planning a defensive war against superior enemies, especially France and Poland. Making extensive use of German archival sources, Strohn explores the development of military thought and doctrine for the defence of Germany and shows how these ideas were tested in war games and staff rides. His findings comprehensively revise our understanding of the German army in this period, shedding new light on the ideas of leading figures in the German military and how events, such as the occupation of the Ruhr in 1923, influenced military planning.
This book analyzes both NATO's and the EU's military crisis management operations and provides an explanation for the fact that it is sometimes NATO, sometimes the EU, and sometimes both international organizations that intervene militarily in a conflict. In detailed case studies on Libya, Chad/Central African Republic, and the Horn of Africa, Claudia Fahron-Hussey shows that the capabilities and preferences of the organizations matter most and the organizations' bureaucratic actors influence the decision-making process of the member states.
This book is a major new study of the extent to which national mentalities, or 'ways of war', are responsible for 'national styles' of insurgency and counterinsurgency. Leading scholars examine the ways of war of particular insurgent movements, and the standard operational procedures of states and occupation forces to suppress them. Through case studies ranging from British, American and French counterinsurgency to the IRA and the Taliban, they show how 'national styles' evolve, influenced by transnational trends, ideas and practices. They examine whether we can identify a tendency to resort to a particular pattern of fighting and, if so, whether this is dictated by constants such as geography and climate, or by the available options, or else whether there exists a particular 'strategic culture' or 'national style'. Their findings show that 'national style' is not eternal but can undergo fundamental transformations.
This book is a major new study of the extent to which national mentalities, or 'ways of war', are responsible for 'national styles' of insurgency and counterinsurgency. Leading scholars examine the ways of war of particular insurgent movements, and the standard operational procedures of states and occupation forces to suppress them. Through case studies ranging from British, American and French counterinsurgency to the IRA and the Taliban, they show how 'national styles' evolve, influenced by transnational trends, ideas and practices. They examine whether we can identify a tendency to resort to a particular pattern of fighting and, if so, whether this is dictated by constants such as geography and climate, or by the available options, or else whether there exists a particular 'strategic culture' or 'national style'. Their findings show that 'national style' is not eternal but can undergo fundamental transformations.
This is a major study of French foreign and security policy before, during and after the First World War. Peter Jackson examines the interplay between two contending conceptions of security: the first based on traditional practices of power politics and the second on internationalist doctrines that emerged in the late nineteenth century. He pays particular attention to the social and political context in which security policy was made and to the cultural dynamics of the policy-making process. The result is a comprehensive reassessment of France's security policy in the era of the Great War. The book reconsiders the evolution of French war aims and reinterprets the peace policy of the Clemenceau government in 1919. It provides a perspective on the foreign policy of successive French governments in the early 1920s, and also shows that internationalist ideas were far more influential over this entire period than is commonly understood.
In light of the intertwining logics of military competition and economic interdependence at play in US-China relations, Trading with the Enemy examines how the United States has balanced its potentially conflicting national security and economic interests in its relationship with the People's Republic of China (PRC). To do so, Hugo Meijer investigates a strategically sensitive yet under-explored facet of US-China relations: the making of American export control policy on military-related technology transfers to China since 1979. Trading with the Enemy is the first monograph on this dimension of the US-China relationship in the post-Cold War. Based on 199 interviews, declassified documents, and diplomatic cables leaked by Wikileaks, two major findings emerge from this book. First, the US is no longer able to apply a strategy of military/technology containment of China in the same way it did with the Soviet Union during the Cold War. This is because of the erosion of its capacity to restrict the transfer of military-related technology to the PRC. Secondly, a growing number of actors in Washington have reassessed the nexus between national security and economic interests at stake in the US-China relationship - by moving beyond the Cold War trade-off between the two - in order to maintain American military preeminence vis-a-vis its strategic rivals. By focusing on how states manage the heterogeneous and potentially competing security and economic interests at stake in a bilateral relationship, this book seeks to shed light on the evolving character of interstate rivalry in a globalized economy, where rivals in the military realm are also economically interdependent.
The Security Governance of Regional Organizations assesses the effectiveness of regional organizations as regional or global security providers, and examines how policy preferences, resources, capabilities, institutional mechanisms and economic and political cohesion link with collective action behaviour in four security policy functions. It investigates how regional organizations meet the new security threats or respond to strategic geopolitical changes and what adaptations they make in the process. Divided into three parts and using a common analytical framework, the book explains the changing security agenda in ten key regional organizations, each organizational chapter:
This collection contributes to the ongoing reconceptualization of security and definition of security governance, and explores whether regional security governance processes are unique or similar and whether some organizational experiences can be seen as models for others to follow. It combines a coherent theoretical framework with strong comparative case studies, making it ideal reading for all students of security studies.
Military coalitions are ubiquitous. The United States builds them regularly, yet they are associated with the largest, most destructive, and consequential wars in history. When do states build them, and what partners do they choose? Are coalitions a recipe for war, or can they facilitate peace? Finally, when do coalitions affect the expansion of conflict beyond its original participants? The Politics of Military Coalitions introduces newly collected data designed to answer these very questions, showing that coalitions - expensive to build but attractive from a military standpoint - are very often more (if sometimes less) than the sum of their parts, at times encouraging war while discouraging it at others, at times touching off wider wars while at others keeping their targets isolated. The combination of new data, new formal theories, and new quantitative analysis will be of interest to scholars, students, and policymakers alike. |
You may like...
Rethinking American Grand Strategy
Elizabeth Borgwardt, Christopher McKnight Nichols, …
Hardcover
R2,460
Discovery Miles 24 600
Cuito Cuanavale - 12 Months Of War That…
Fred Bridgland
Paperback
(4)
Sustainable Security - Rethinking…
Jeremi Suri, Benjamin Valentino
Hardcover
R3,762
Discovery Miles 37 620
|