|
Showing 1 - 6 of
6 matches in All Departments
As entrenched bureaucracies, military organizations might
reasonably be expected to be especially resistant to reform and
favor only limited, incremental adjustments. Yet, since 1945, the
U.S. Army has rewritten its capstone doctrine manual, Operations,
fourteen times. While some modifications have been incremental,
collectively they reflect a significant evolution in how the Army
approaches warfare-making the U.S. Army a crucial and unique case
of a modern land power that is capable of change. So what accounts
for this anomaly? What institutional processes have professional
officers developed over time to escape bureaucracies' iron cage?
Forging the Sword conducts a comparative historical process-tracing
of doctrinal reform in the U.S. Army. The findings suggest that
there are unaccounted-for institutional facilitators of change
within military organizations. Thus, it argues that change in
military organizations requires "incubators," designated subunits
established outside the normal bureaucratic hierarchy, and
"advocacy networks" championing new concepts. Incubators, ranging
from special study groups to non-Title 10 war games and field
exercises, provide a safe space for experimentation and the
construction of new operational concepts. Advocacy networks then
connect different constituents and inject them with concepts
developed in incubators. This injection makes changes elites would
have otherwise rejected a contagious narrative.
As entrenched bureaucracies, military organizations might
reasonably be expected to be especially resistant to reform and
favor only limited, incremental adjustments. Yet, since 1945, the
U.S. Army has rewritten its capstone doctrine manual, Operations,
fourteen times. While some modifications have been incremental,
collectively they reflect a significant evolution in how the Army
approaches warfare-making the U.S. Army a crucial and unique case
of a modern land power that is capable of change. So what accounts
for this anomaly? What institutional processes have professional
officers developed over time to escape bureaucracies' iron cage?
Forging the Sword conducts a comparative historical process-tracing
of doctrinal reform in the U.S. Army. The findings suggest that
there are unaccounted-for institutional facilitators of change
within military organizations. Thus, it argues that change in
military organizations requires "incubators," designated subunits
established outside the normal bureaucratic hierarchy, and
"advocacy networks" championing new concepts. Incubators, ranging
from special study groups to non-Title 10 war games and field
exercises, provide a safe space for experimentation and the
construction of new operational concepts. Advocacy networks then
connect different constituents and inject them with concepts
developed in incubators. This injection makes changes elites would
have otherwise rejected a contagious narrative.
Some pundits claim cyber weaponry is the most important military
innovation in decades, a transformative new technology that
promises a paralyzing first-strike advantage difficult for
opponents to deter. Yet, what is cyber strategy? How do actors use
cyber capabilities to achieve a position of advantage against rival
states? This book examines the emerging art of cyber strategy and
its integration as part of a larger approach to coercion by states
in the international system between 2000 and 2014. To this end, the
book establishes a theoretical framework in the coercion literature
for evaluating the efficacy of cyber operations. Cyber coercion
represents the use of manipulation, denial, and punishment
strategies in the digital frontier to achieve some strategic end.
As a contemporary form of covert action and political warfare,
cyber operations rarely produce concessions and tend to achieve
only limited, signaling objectives. When cyber operations do
produce concessions between rival states, they tend to be part of a
larger integrated coercive strategy that combines network
intrusions with other traditional forms of statecraft such as
military threats, economic sanctions, and diplomacy. The books
finds that cyber operations rarely produce concessions in
isolation. They are additive instruments that complement
traditional statecraft and coercive diplomacy. The book combines an
analysis of cyber exchanges between rival states and broader event
data on political, military, and economic interactions with case
studies on the leading cyber powers: Russia, China, and the United
States. The authors investigate cyber strategies in their
integrated and isolated contexts, demonstrating that they are
useful for maximizing informational asymmetries and disruptions,
and thus are important, but limited coercive tools. This empirical
foundation allows the authors to explore how leading actors employ
cyber strategy and the implications for international relations in
the 21st century. While most military plans involving cyber
attributes remain highly classified, the authors piece together
strategies based on observations of attacks over time and through
the policy discussion in unclassified space. The result will be the
first broad evaluation of the efficacy of various strategic options
in a digital world.
Some pundits claim cyber weaponry is the most important military
innovation in decades, a transformative new technology that
promises a paralyzing first-strike advantage difficult for
opponents to deter. Yet, what is cyber strategy? How do actors use
cyber capabilities to achieve a position of advantage against rival
states? This book examines the emerging art of cyber strategy and
its integration as part of a larger approach to coercion by states
in the international system between 2000 and 2014. To this end, the
book establishes a theoretical framework in the coercion literature
for evaluating the efficacy of cyber operations. Cyber coercion
represents the use of manipulation, denial, and punishment
strategies in the digital frontier to achieve some strategic end.
As a contemporary form of covert action and political warfare,
cyber operations rarely produce concessions and tend to achieve
only limited, signaling objectives. When cyber operations do
produce concessions between rival states, they tend to be part of a
larger integrated coercive strategy that combines network
intrusions with other traditional forms of statecraft such as
military threats, economic sanctions, and diplomacy. The books
finds that cyber operations rarely produce concessions in
isolation. They are additive instruments that complement
traditional statecraft and coercive diplomacy. The book combines an
analysis of cyber exchanges between rival states and broader event
data on political, military, and economic interactions with case
studies on the leading cyber powers: Russia, China, and the United
States. The authors investigate cyber strategies in their
integrated and isolated contexts, demonstrating that they are
useful for maximizing informational asymmetries and disruptions,
and thus are important, but limited coercive tools. This empirical
foundation allows the authors to explore how leading actors employ
cyber strategy and the implications for international relations in
the 21st century. While most military plans involving cyber
attributes remain highly classified, the authors piece together
strategies based on observations of attacks over time and through
the policy discussion in unclassified space. The result will be the
first broad evaluation of the efficacy of various strategic options
in a digital world.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Not available
Loot
Nadine Gordimer
Paperback
(2)
R205
R168
Discovery Miles 1 680
Hypnotic
Ben Affleck, Alice Braga, …
DVD
R133
Discovery Miles 1 330
|