![]() |
![]() |
Your cart is empty |
||
Showing 1 - 7 of 7 matches in All Departments
As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant. These essays examine the ways in which the information technology revolution has affected the logic of deterrence and crisis management, definitions of peace and war, democratic constraints on conflict, the conduct of and military organization for war, and the growing role of the private sector in providing security. This book was previously published as a special issue of the journal Contemporary Security Policy. John Arquilla, Naval Postgraduate School Walter S. Baer, RAND Graduate School, California Matt Bishop, University of California, Davis Damon Coletta, United Sta
Like the industrial revolution before it, the information technology revolution appears to be creating a new ruling class, a new economy and a new society. Information technology is also transforming military operations and warfare. A vast literature on the revolution in military affairs (or "RMA") cites the important (indeed, dominant) role of information technology in enabling a new military revolution. This volume challenges conventional wisdom not by claiming that information's impact on military operations is not "positive" or "transformative" but by claiming its impact is not "new". Previous periods of military revolution can also be characterized as information revolutions. Through the close examination of six case studies of military transformation during the industrial age, the contributors to this volume demonstrate how the employment of emerging information systems was critical to realizing a major boost in military effectiveness. The most successful adaptations to the new environment were made by the most skillful users of information. This volume draws upon the expertise of leading military historians, political scientists and defense practitioners to craft a set of original essays that provide the first retrospective examination of how information affects the process of military revolution. This book was previously published as a special issue of the Journal of Strategic Studies.
Like the industrial revolution before it, the information technology revolution appears to be creating a new ruling class, a new economy and a new society. Information technology is also transforming military operations and warfare. A vast literature on the revolution in military affairs (or RMA) cites the important (indeed, dominant) role of information technology in enabling a new military revolution. This volume challenges conventional wisdom not by claiming that information's impact on military operations is not positive or transformative but by claiming its impact is not new. Previous periods of military revolution can also be characterized as information revolutions. Through the close examination of six case studies of military transformation during the industrial age, the contributors to this volume demonstrate how the employment of emerging information systems was critical to realizing a major boost in military effectiveness. The most successful adaptations to the new environment were made by the most skillful users of information.This volume draws upon the expertise of leading military historians, political scientists and defense practitioners to craft a set of original essays that provide the first retrospective examination of how information affects the process of military revolution. This book was previously published as a special issue of the Journal of Strategic Studies. Emily O. Goldman, University of California, Davis Dennis Showalter, Colorado College Geoffrey Herrera, Temple University Robert Citino, Eastern Michigan University
As the activities of individuals, organizations, and nations
increasingly occur in cyberspace, the security of those activities
is becoming a growing concern. Political, economic and military
leaders must manage and reduce the level of risk associated with
threats from hostile states, malevolent nonstate actors such as
organized terrorist groups or individual hackers, and high-tech
accidents. The impact of the information technology revolution on
warfare, global stability, governance, and even the meaning of
existing security constructs like deterrence is significant.
As military forces across the globe adopt new technologies, doctrines, and organizational forms suited to warfare in the information age, defense practitioners and academic specialists are debating the potential consequences of the "revolution in military affairs." The central question of this book is how such revolutions spread, to whom, how quickly, and with what consequences for the global balance of military power. The contributors to this volume-who include historians, political scientists, policy analysts, and sociologists-examine the diffusion of weapons technology, know-how, and methods of conducting military operations over the past two hundred years. The approach reflects the recent reawakening of interest in the relationship between culture and security. The transition from the industrial age to the information age has impacted warfare much as it has other social institutions. Advances in precision weapons, surveillance satellites, robotics, and computer-based information processing, together with organizational changes that network military units, promise to create fundamentally new ways of war; the final outcome of the current revolution is unpredictable-as the North Korean missile program shows-but its global impact will hinge on how the revolution diffuses.
A bold re-conceptualization of the fundamentals driving behavior and dynamics in cyberspace. Most cyber operations and campaigns fall short of activities that states would regard as armed conflict. In Cyber Persistence Theory, Michael P. Fischerkeller, Emily O. Goldman, and Richard J. Harknett argue that a failure to understand this strategic competitive space has led many states to misapply the logic and strategies of coercion and conflict to this environment and, thus, suffer strategic loss as a result. The authors show how the paradigm of deterrence theory can neither explain nor manage the preponderance of state cyber activity. They present a new theory that illuminates the exploitive, rather than coercive, dynamics of cyber competition and an analytical framework that can serve as the basis for new strategies of persistence. Drawing on their policy experience, they offer a new set of prescriptions to guide policymakers toward a more stable, secure cyberspace.
In this analysis of naval arms control between the two world wars, Emily Goldman dissects the underlying assumptions of arms control theory that have guided theorizing and practice for the past thirty years. She concludes that because there has been a near-exclusive focus on the behavior of the superpowers and on the consequences of nuclear technology, the arms control process has been artificially constrained in its scope and potential. Returning to the most important historical precedent of arms control prior to the Cold War, Goldman demonstrates that there are two distinct strategies of arms control, one that integrates force limitation with political conflict resolution and one that confines itself to technical limitations exclusively. Goldman's is the first analytical treatment of the interwar period that examines arms control in both its technical and conflict-resolution dimensions in tandem and traces them through the entire life of the arms control system. By debunking Cold War orthodoxy about arms control and by illuminating how arms control functioned between the wars, Goldman shows how the process of arms control can transcend the narrow goal of regulating the military balance and become a constructive tool for restructuring power relationships.
|
![]() ![]() You may like...
|