![]() |
![]() |
Your cart is empty |
||
Books > Social sciences > Warfare & defence > Defence strategy, planning & research > General
A cavalry regiment during the Victorian Age
This book presents a human factors and ergonomics evaluation of a digital Mission Planning and Battle-space Management (MP/BM) system. An emphasis was placed on the activities at the Brigade (Bde) and the Battle Group (BG) headquarters (HQ) levels. The analysts distributed their time evenly between these two locations. The human factors team from Brunel University, as part of the HFI DTC, undertook a multi-faceted approach to the investigation, including: - observation of people using the traditional analogue MP/BM processes in the course of their work - cognitive work analysis of the digital MP/BM system - analysis of the tasks and goal structure required by the digital MP/BM - assessment against a usability questionnaire - analysis of the distributed situation awareness - an environmental survey. The book concludes with a summary of the research project's findings and offers many valuable insights. For example, the recommendations for short-term improvements in the current generation of digital MP/BM system address general design improvements, user-interface design improvements, hardware improvements, infrastructure improvements and support improvements. In looking forward to the next generation digital MP/BM systems, general human factors design principles are presented and human factors issues in digitising mission planning are considered.
There are various Ways. There is the Way of salvation by the law of Buddha, the Way of Confucius governing the Way of learning, the Way of healing as a doctor, as a poet teaching the Way of Waka, tea, archery, and many arts and skills. Each man practises as he feels inclined. It is said the warrior's is the twofold Way of pen and sword, and he should have a taste for both Ways. Even if a man has no natural ability he can be a warrior by sticking assiduously to both divisions of the Way. Generally speaking, the Way of the warrior is resolute acceptance of death.
This contribution to the debate on security in the Caribbean highlights the security problems of small states. The contributors analyze internal and external security issues, military, political, and economic influences, and security initiatives and policies from indigenous, regional, and extra-regional perspectives. They also present empirical case studies of four English-speaking nations. The volume begins by introducing the dynamics influencing Caribbean security: leadership, history, geopolitics, and internal political violence. Part Two then presents four case studies: Barbados, Guyana, the Virgin Islands, and the Belize-Guatemala territorial dispute. Realist theory, conflict theory, political economy, and political psychology are among the theoretical frameworks represented in these essays. Focusing particularly on the English-speaking Caribbean, the authors examine the resources, institutions, economies, geopolitics, internal instability, militarization, and intervention shaping the security environment. This work is an important resource for scholars and policy analysts of military/security issues, the Caribbean/Latin America, and Third World development.
This edited volume focuses on India's experiences waging counterinsurgency campaigns since its independence in 1947. Filling a clear gap in the literature, the book traces and assess the origins, evolution and current state of India's counterinsurgency strategies and capabilities, focusing on key counterinsurgency campaigns waged by India within and outside its territory. It also analyzes the development of Indian doctrine on counterinsurgency, and locates this within the overall ebb and flow of India's defense and security policies. The central argument is that counterinsurgency has been an integral part of India's overall security policy and can thereby impart much to political and military leaders in other states. Since its emergence from British colonialism, India's defence policies have not merely sought to protect and preserve India's inherited colonial borders from threats by rival states, but have also sought to prevent and suppress secessionist movements. In countering insurgencies, the Indian state has fashioned strategies that seek to repress militarily any secessionist movement, while simultaneously forging a range of civilian administrative and institutional arrangements that attempt to address the grievances of disaffected populations. The book highlights key strategic and tactical innovations that the Indian Army and security forces made to deal with a range of insurgent movements. Simultaneously, it also examines how the civilian-military nexus enabled India's policy makers to utilize existing, and formulate novel, institutional means to address extant political grievances. India has been most successful where it has managed to use calibrated force, obtained the trust of much of the aggrieved population and made persuasive commitments to political and institutional reform. Examination of these elements of India's counterinsurgency performance can be compared to counterinsurgency doctrine developed by other countries, including the United States, and thus yield comparative policy prescriptions and recommendations that can be applied to other counterinsurgency contexts. This book will be of great interest to students of counterinsurgency and irregular warfare, Indian politics, Asian Security Studies and Strategic Studies in general.
To capture the defense reform debate surrounding the proper application of high technology in military systems, this study focuses on tactical aircraft, an area epitomizing cutting-edge technology. Air combat history is revisited (including the 1991 Persian Gulf War) to confirm, reject, or qualify positions advocating certain technologies in tactical aviation. Emphasis is placed on enduring combat ideas and aircraft design principles. The interaction between mission requirements, inventory composition, and aircraft design is discussed to illustrate the dynamics of constrained choice that enters acquisition decisions. The relevance of reform arguments in the post-Cold War era is assessed, including the impact of political and economic constraints on future force-mix options, the shift from NATO-centered contingencies to Third World Low Intensity Conflict (LIC), and the threat of conventional arms proliferation.
This edited volume introduces the reader to the role of space in military and defense strategy, and outlines some of the major foreign and domestic actors in the space arena, as well as constraints of law and treaties on activities in space. It also addresses science and technology as they relate to space policy. The book addresses three main questions:
This book fills a niche in the space policy field, providing insights into space and strategy from international experts from the military, academic and scientific communities. A unique feature of the book is the chapter on science and technology, which utilizes the latest information available concerning space utilization and exploration.
This book explores the idea of a revolution in military affairs (RMA), which underpins the transformational agenda of the US military, and examines its implications for smaller states. The strategic studies literature on the RMA tends to be American-centric and directed towards the strategic problems of the US military. This volume seeks to fill the gap in the literature and establish an intellectual framework that can assist other, smaller powers in their respective approaches to this issue. The book does so in three main sections; Part I focuses on questions of transformations in strategy and war; Part II explores transformations in operations; while Part III examines possible impediments to an RMA. This book will be of much interest to students of Military Studies, Asian Studies, Strategic Studies and International Relations in general.
French security policy has posed a puzzle to many people outside France, including politicians and even defense specialists such as the author, who took time off from his administrative position in Whitehall in order to study French thinking about security in detail. As with many other studies, he takes as his point of departure the traumatic defeat of 1940 but argues that the origins of current French policy are grounded in events and ideas that go back hundreds of years. They are ideas that are scarcely known or often misinterpreted in the Anglo-Saxon world.
This book uses history in two ways: as the source of ideas about strategy and as examples to illustrate the elements by showing their application to specific campaigns and their utility in understanding the role of strategy in military operations. The focus is on American military campaigns from the American Indian Wars to the War in the Gulf. Those case studies are used to illustrate the strategy behind land, sea, and air campaigns. Over a fifth of the book examines the U.S. war against Japan because it furnishes such fine examples of independent and interdependent operations on land, on the sea, and in the air. The cases studied are not only intended to illustrate strategic ideas but also to show the utility of the author's distinctive approach to organizing military strategy. The book will appeal to military professionals, students of military science, and enthusiasts.
The focus of this cutting-edge book is on new, information-age technologies that promise to offer seamless integration of real-time data sharing, creating a single logical network architecture to facilitate the movement of data throughout the battlespace. Because the structure of this network is constrained by the fundamental trade-off between range, mobility and capacity that applies to all communications systems, this network is unlikely to be based on a single network technology. This book presents an architecture for this network, and shows how its subsystems can be integrated to form a single logical network.
The Common Security and Defence Policy (CSDP) has come a long way since its inception as the European Security and Defence Identity under NATO. Yet more than a decade after emerging as an autonomous entity, with its own capacity for civilian crisis management and military action, the European Union's CSDP is still very much a work in progress. This fully revised and updated new edition provides the most comprehensive account available of the CSDP and the debates surrounding it. Written by a leading authority in the field, the second edition draws on the author's own extensive research in the area, including hundreds of interviews with key actors, and takes account of developments since the reforms of the Lisbon Treaty. A brand new chapter assesses international relations theory and European integration theory as tools to understand the CSDP, and critically engages with theoretical approaches that view security and defence policy as the exclusive domain of sovereign nation-states. The book concludes with an analysis of future hurdles for the European Union as it responds to new and often unpredictable crises across the globe.
This book is about Europe's apparent inability to cope with the complex international environment. Why does the Union fail to create a workable (sound) Common Foreign and Security Policy? Five distinct explanations for Euro-paralysis are considered, focusing on power politics, the assertion of national interests, misguided institutional designs, a crisis of modern democracy, and the post-Cold War conceptual confusion.
The successful application of the Fifth Generation of Warfare (5GW) is "indistinguishable from magic" (Rees 2009, following in the spirit of Clarke's Law, propounded by the author of 2001: A Space Odyssey) "any sufficiently advanced technology is indistinguishable from magic"). The Fifth-Generation warrior hides in the shadows, or in the static. So, then, how can analysts and researchers study and discuss 5GW? Other questions also demand answers. What is the xGW framework, which many theorists use to describe 5GW? What alternatives to the xGW framework exist? What 5GWs have been observed? What are the source documents for the xGW framework? What is the universe of discourse that the xGW framework emerged from? Why bother trying to understand 5GW? This handbook attempts to provide systematic answers to these questions in several major sections, each of which is written by many contributors. While this handbook records many different voices of 5GW research, it speaks with one voice on the need to understand 5GW, the fifth gradient of warfare.
The attempted Greek takeover of Cyprus, Turkey's military invasion and occupation of that country, and the Turkish arms embargo that followed during the summer of 1974 sparked a struggle over the direction of American foreign policy. Paul Y. Watanabe explores the American foreign policymaking process in general and the impact ethnic group activism can have on foreign policy formulation in particular in his two-part study Ethnic Groups, Congress, and American Foreign Policy. In Part 1, he focuses on the rise of ethnic consciousness and activism, organizational behavior and interest group politics, lobbying, congressional-executive relations, the foreign policymaking process, and national security policy. Part 2 deals with a specific example of ethnic group activity in the foreign policymaking arena--Greek American and congressional attempts to ban further military shipments to Turkey. Watanabe concludes that ethnic groups can and do make significant contributions to the formulation of foreign policy by affecting the perceptions and actions of officials in Congress and the executive branch.
While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.
A comparison of Singapore and Taiwan presents an interesting case study for those wishing to understand how small states struggle to overcome their strategic disadvantage. Since their independence, Singapore and Taiwan have faced numerous challenges resulting from their relative strategic disadvantage. They have struggled to overcome vulnerable bases, an unformed conception of state, and weak governmental institutes for defence. While territorial borders are difficult to change, both states have focused on nation building, economic growth, and military build-up in order to overcome their predicaments. During the Cold War, both states employed similarly authoritarian policies to preserve their survival. However, in the post-Cold War era, Taiwan has experienced political and economic weakness in the face of the rising China, while Singapore, with its polity of one-party domination, has continued to strengthen its hard and soft power. This book examines the unique context for each case, drawing comparisons and offering analysis of their distinct approaches.
This original and detailed collection explores how regional actors deal with uncertainties that are inherent to the current geopolitical situation in East Asia. The contributors collectively demonstrate that strategic uncertainty has become a major factor in the shaping of the security order in East Asia.
The second of a series, this study analyzes the historical relationships between the provision of military assistance and success in achieving Soviet aims during the Cold War. Mott looks at Soviet donor-recipient relationships across seventeen case studies to identify the generalities or regularities that relate the classical wartime relationship to achievement of donor Cold War aims. He refines the four critical features of the wartime donor-recipient relationship--convergence of donor and recipient aims, donor control, commitment of donor military forces, and coherence of donor policies and strategies--to reflect the unique political economic constraints of the Cold War. Findings challenge orthodox separation of politics, history, military science, and economics, and refute the common wisdom that economic aid is a more effective policy instrument than military assistance. Mott contends that both successes and failures of Cold War Soviet military assistance were predictable, explicit consequences of donor policies and strategies and of convergence of donor and recipient aims. This book presents a pattern for both policy development and theoretical analysis in which military assistance is a viable, robust policy option and bilateral relationship with a clear set of requirements, features, processes, and predictable results. Its primary methodology is the search for uniformities across historical observations through low-level, ordinary, multivariate regressions. Each chapter focuses on Soviet military assistance in a region and refines the relevant features of the observed relationships into a tentative pattern for comparison with other regions.
The pioneering essays in this volume explore national security challenges posed by new technologies and examine some ongoing efforts to understand and mitigate their potential negative effects. The authors, drawn from among a roster of international scholars, approach these issues from different yet ultimately complementary angles. Turkish scholar Emin Daskin chronicles the efforts of the Turkish government to develop and implement a Cyber Security Strategy aimed at protecting the country from attacks by both governmental and non-governmental cyber actors. French researcher Christine Dugoin-Clement has studied what she views as a successful case of cyberwarfare, in which Ukrainian soldiers fighting in the eastern separatist region of Donbass have been targeted by cyber attackers attempting to deteriorate their cognition, rendering them less effective in the field. Another French author and military academy instructor, Thomas Flichy de La Neuville, provides a counterpoint study of militarized motorbike attacks in the Sahel, demonstrating that cyberspace is not the only technological sphere in which innovation increasingly threatens security. Finally, American academic Christopher Whyte offers a trenchant critique of current academic studies of cyberterrorism, noting that while "cyberterrorism" appears frequently as a subject of research, the actual work being carried out in this critical area lacks thematic nuance and is only tenuously linked to related major thematic topic areas. The collection highlights the unique challenges faced by countries as they attempt to deal with previously unknown adversaries, as both the nature of the enemy and the field of operations continues to shift with unprecedented speed. It will undoubtedly be of interest to anyone concerned with international relations, cybersecurity, cyberterrorism, and national security in the twenty-first century.
This book brings together leading academic specialists and policy
practitioners to explore and develop cooperative approaches for
managing critical contemporary and emerging security challenges for
South East Europe and the wider international community.
The wars between 1792 and 1815 saw the making of the modern world, with Britain and Russia the key powers to emerge triumphant from a long period of bitter conflict. In this innovative book, Jeremy Black focuses on the strategic contexts and strategies involved, explaining their significance both at the time and subsequently. Reinterpreting French Revolutionary and Napoleonic warfare, strategy, and their consequences, he argues that Napoleon's failure owed much to his limitations as a strategist. Black uses this framework as a foundation to assess the nature of warfare, the character of strategy, and the eventual ascendance of Britain and Russia in this period. Rethinking the character of strategy, this is the first history to look holistically at the strategies of all the leading belligerents from a global perspective. It will be an essential read for military professionals, students, and history buffs alike. |
![]() ![]() You may like...
Spacepower - Doctrine for Space Forces
United States Space Force
Hardcover
R635
Discovery Miles 6 350
|