To see the other types of publications on this topic, follow the link: Asymmetrical Warfare.

Journal articles on the topic 'Asymmetrical Warfare'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Asymmetrical Warfare.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Algernon, S. R. "Asymmetrical warfare." Nature 519, no. 7544 (March 2015): 498. http://dx.doi.org/10.1038/519498a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Primayanti, Luh Putu Ika, and Saudi Firmansyah Putra. "SEAPOWER AND ASYMMETRIC WARFARE IN INDONESIA." Jurnal Pertahanan: Media Informasi ttg Kajian & Strategi Pertahanan yang Mengedepankan Identity, Nasionalism & Integrity 6, no. 1 (April 4, 2020): 94. http://dx.doi.org/10.33172/jp.v6i1.620.

Full text
Abstract:
<p>This study analyzes the Asymmetric Warfare that occurs at sea and the seapower that should be possessed by a state to overcome maritime asymmetrical threats. This study uses descriptive qualitative which explains in detail the asymmetrical warfare at sea and seapower using case examples. This research uses case examples of asymmetrical threats that occur in the domestic territory of Indonesia, namely the Malacca Strait case. The theories used in this study are defense theory, the concept of seapower, the concept of asymmetric warfare and the concept of international cooperation to analyze the case that occurs. The results of this study are Indonesia’s seapower to combat asymmetric warfare was built in three ways namely, strengthen the military defense equipment, carry out defense cooperation with the state that borders with Indonesia and strengthen the collaboration between related ministries and institutions. These ways are implemented through Malacca Strait Patrol which is defense cooperative include Malacca Sea Strait Patrol, Eyes in the Sky and Information Sharing.</p>
APA, Harvard, Vancouver, ISO, and other styles
3

Feinauer, Evan, and Nir Eisikovits. "Noncombatant Immunity in Asymmetrical Warfare." International Journal of Applied Philosophy 26, no. 2 (2012): 165–80. http://dx.doi.org/10.5840/ijap201226213.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Klincewicz, Michał. "Autonomous Weapon Systems, Asymmetrical Warfare, and Myth." Civitas. Studia z filozofii polityki 23 (December 15, 2018): 179–95. http://dx.doi.org/10.35757/civ.2018.23.10.

Full text
Abstract:
Predictions about autonomous weapon systems (AWS) are typically thought to channel fears that drove all the myths about intelligence embodied in matter. One of these is the idea that the technology can get out of control and ultimately lead to horrifi c consequences, as is the case in Mary Shelley’s classic Frankenstein. Given this, predictions about AWS are sometimes dismissed as science-fiction fear-mongering. This paper considers several analogies between AWS and other weapon systems and ultimately offers an argument that nuclear weapons and their effect on the development of modern asymmetrical warfare are the best analogy to the introduction of AWS. The fi nal section focuses on this analogy and offers speculations about the likely consequences of AWS being hacked. These speculations tacitly draw on myths and tropes about technology and AI from popular fi ction, such as Frankenstein, to project a convincing model of the risks and benefi ts of AWS deployment.
APA, Harvard, Vancouver, ISO, and other styles
5

Freedman, Lawrence D., and Roger Barnett. "Asymmetrical Warfare: Today's Challenge to U.S. Military Power." Foreign Affairs 82, no. 3 (2003): 151. http://dx.doi.org/10.2307/20033597.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Moltchanova, Anna. "Stateless National Groups, International Justice and Asymmetrical Warfare*." Journal of Political Philosophy 13, no. 2 (June 2005): 194–215. http://dx.doi.org/10.1111/j.1467-9760.2005.00220.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Gray, Phillip W. "Weaponized NonCombatants: A Moral Conundrum of Future Asymmetrical Warfare." Journal of Military Ethics 13, no. 3 (July 3, 2014): 240–56. http://dx.doi.org/10.1080/15027570.2014.975009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Pfanner, Toni. "Asymmetrical warfare from the perspective of humanitarian law and humanitarian action." International Review of the Red Cross 87, no. 857 (March 2005): 149–74. http://dx.doi.org/10.1017/s1816383100181238.

Full text
Abstract:
AbstractWarring parties are increasingly unequal and the principle of equality of arms does not apply to them. This asymmetry in warfare has many ramifications. The militarily weaker party is tempted to have recourse to unlawful methods of warfare in order to overcome the adversaries' strength. The expectation of reciprocity as a fundamental motivation for respecting the law is often illusory and replaced instead with perfidious behaviour; covert operations substitute for open battles, “special rules” are made for “special situations”. The fight against international terrorism seems to constitute the epitome of this kind of warfare. “Elementary considerations of humanity” as enshrined in article 3 common to the 1949 Geneva Conventions however constitute universally binding rules for all — even unequal and asymmetrical — parties to any situation of armed violence. Furthermore, attacks on humanitarian organizations have showed that humanitarian relief may be contrary to belligerents' interests, or, even worse, that attacks on humanitarian workers may be part of their agenda. Humanitarian actors must be aware of these facts and adapt their working methods so as to be able to continue to provide impartial assistance, based solely on the needs of the victims of armed violence.
APA, Harvard, Vancouver, ISO, and other styles
9

Huhtinen, Aki-Mauri, Noora Kotilainen, Saara Särmä, and Mikko Streng. "Information Influence in Hybrid Environment." International Journal of Cyber Warfare and Terrorism 9, no. 3 (July 2019): 1–20. http://dx.doi.org/10.4018/ijcwt.2019070101.

Full text
Abstract:
The traditional government-military-public relationship to the public driver's relationship is moving to the government and military. Conflicts are increasingly asymmetrical, networked, urbanized and open to the global publicities because of internet global connections and especially global access to the social media. The public-driven network-based global possibility to online communication means threats and the nature of conflict to become “hybrid.” “Hybrid warfare” challenges the standard way of waging military operations. Military and security organizations have to combat new technologies of their adversaries. This article sets out to discuss the phenomena of hybrid warfare in contemporary rhizomatic society and a hybrid media environment. Furthermore, this research considers how reflexive control functions can provide a historical perspective to ahistorical accounts of hybrid warfare and thus help us to better understand the contemporary challenges and threats of hybrid warfare, particularly coming from Russia.
APA, Harvard, Vancouver, ISO, and other styles
10

DiPaolo, Amanda. "Book Review: Asymmetrical Warfare: Today’s Challenge to U.S. Military Power." Armed Forces & Society 31, no. 3 (April 2005): 477–78. http://dx.doi.org/10.1177/0095327x0503100312.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Moquin, Ross R., and Mary E. Moquin. "Weapons of mass destruction: biological." Neurosurgical Focus 12, no. 3 (March 2002): 1–4. http://dx.doi.org/10.3171/foc.2002.12.3.3.

Full text
Abstract:
Humans are susceptible to microbial infections from many sources. Biological warfare is the use of microbial forms of life to diminish the capabilities, disrupt the organization, and terrorize the noncombatant population of an adversary. This form of warfare has been used throughout history and has gained renewed interest with the current use of asymmetrical warfare. The civilized world has condemned its use by the implementation of treaties specifically against it. This is a brief review of some of the more easily used biological agents such as anthrax, plague, tularemia, Q fever, and smallpox. Each agent's biology, infectious route, and disease course will be discussed. Possible delivery systems and signs of outbreak will also be reviewed. There are few real neurosurgery-related implications in biological warfare. Neurosurgeons, as members and leaders of the healthcare community, must have the ability to recognize and initiate treatment when biological agents have been deployed. If there is widespread use of these inhumane agents, the neurosurgical community will not be able to practice the surgical art for which we have trained. New knowledge must be acquired so that we can best serve our patients and communities during times of extreme need.
APA, Harvard, Vancouver, ISO, and other styles
12

Pang, Chee Khiang, Gregory R. Hudas, Dariusz G. Mikulski, Cao Vinh Le, and Frank L. Lewis. "Command and Control for Large-Scale Hybrid Warfare Systems." Unmanned Systems 03, no. 01 (January 2015): 1–15. http://dx.doi.org/10.1142/s2301385015500016.

Full text
Abstract:
Emerging hybrid threats in large-scale warfare systems require networked teams to perform in a reliable manner under changing mission tactics and reconfiguration of mission tasks and force resources. In this paper, a formal Command and Control (C2) structure is presented that allows for computer-aided execution of the networked team decision-making process, real-time tactic selection, and reliable mission reconfiguration. A mathematically justified networked computing environment is provided called the Augmented Discrete Event Control (ADEC) framework. ADEC is portable and has the ability to provide logical connectivity among all team participants including mission commander, field commanders, war-fighters, and robotic platforms. The proposed C2 structure is developed and demonstrated on a simulation study involving Singapore Armed Forces team with three realistic symmetrical, asymmetrical, and hybrid attack missions. Extensive simulation results show that the tasks and resources of multiple missions are fairly sequenced, mission tactics are correctly selected, and missions and resources are reliably reconfigured in real time.
APA, Harvard, Vancouver, ISO, and other styles
13

Miakinkov, Eugene. "The Agency of Force in Asymmetrical Warfare and Counterinsurgency: The Case of Chechnya." Journal of Strategic Studies 34, no. 5 (October 2011): 647–80. http://dx.doi.org/10.1080/01402390.2011.608946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Neuneck, Götz. "Die Rolle der Naturwissenschaft." PROKLA. Zeitschrift für kritische Sozialwissenschaft 32, no. 127 (June 1, 2002): 227–42. http://dx.doi.org/10.32387/prokla.v32i127.703.

Full text
Abstract:
In the last century, science was not only a dominant factor in society, but helped also to create incredible weapon arsenals: Nuclear weapons, radar, computers, operations research, missiles, lasers have been established for warfare purposes Ieading to a narrow relationship between national security and science, especially in the United States. Scientists not only made scientific discoveries, but were also instrumental in advising their governments to develop new weapons leading to an qualitative arms race that never stopped. On the other hand, scientists using their reputation, their international contacts and their knowledge helped to establish arms control regimes and disarmament to restrict or to ban the use of weapons of mass destruction. The speed of scientific progress and the proliferation of materials, knowledge and individuals seems not to slow down. New military applications based on scientific knowledge are likely: Computers, molecular biology, electronic communication, space technologies could also be put to evil purposes. Bio-weapons, information warfare, precision munitions, encryption etc. can support asymmetrical warfare but also be used as new powerful force multipliers. New ways to contro! cruel weapons uses have to be established in the new century. lt would be the responsibility of scientists to help mankind to ban new devasting weapon applications.
APA, Harvard, Vancouver, ISO, and other styles
15

Potter, Evan, and Daryl Copeland. "Public Diplomacy in Confl ict Zones:Military Information Operations Meet Political Counter-Insurgency." Hague Journal of Diplomacy 3, no. 3 (2008): 277–97. http://dx.doi.org/10.1163/187119108x367161.

Full text
Abstract:
AbstractThe case made in this article is threefold: that the resolution of conflicts in the twenty-first century will depend much more on the judicious use of soft rather than hard power; that the type of soft power exercised through public diplomacy will move increasingly from monologue to dialogue and collaboration; and that there is an increasing convergence of thinking both in defence departments and foreign ministries on the role of public diplomacy in resolving conflict in asymmetrical warfare. That convergence is expressed in this article's characterization of the 'guerrilla diplomat'.
APA, Harvard, Vancouver, ISO, and other styles
16

Stern, Nehemia, and Uzi Ben Shalom. "Beyond faith and foxholes: vernacular religion and asymmetrical warfare within contemporary IDF combat units." Small Wars & Insurgencies 31, no. 2 (February 3, 2020): 241–66. http://dx.doi.org/10.1080/09592318.2020.1713530.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

McQueen, K. A. Kelly, Frederick M. Burkle, Eaman T. Al-Gobory, and Christopher C. Anderson. "Maintaining Baseline, Corrective Surgical Care during Asymmetrical Warfare: A Case Study of a Humanitarian Mission in the Safe Zone of a Neighboring Country." Prehospital and Disaster Medicine 22, no. 1 (February 2007): 3–7. http://dx.doi.org/10.1017/s1049023x00004258.

Full text
Abstract:
AbstractThe current insurgency warfare in Iraq is of an unconventional or asymmetrical nature. The deteriorating security has resulted in problems recovering and maintaining essential health services. Before the 2003 war, Iraq was considered a developed country with the capacity to routinely perform baseline medical and surgical care. These procedures now are performed irregularly, if at all. Due to the unconventional warfare, traditional Military Medical Civilian Assistance Programs (MEDCAPs) and civilian humanitarian missions, which routinely are mobilized post-conflict, are unable to function. In December 2005, an international medical mission conducted by the Operation Smile International Chapter in neighboring Jordan employed civilian physicians and nurses to provide surgery and post-operative care for Iraqi children with newly diagnosed cleft lip and palates and the complications that had occurred from previous surgical repair. Seventy-one children, their families, and a team of Iraqi physicians were safely transported to Jordan and returned to Iraq across the Iraqi western province war zone. Although complications may occur during transport, treatment within a safe zone is a solution for providing services in an insecure environment.
APA, Harvard, Vancouver, ISO, and other styles
18

Paulus, Andreas, and Mindia Vashakmadze. "Asymmetrical war and the notion of armed conflict – a tentative conceptualization." International Review of the Red Cross 91, no. 873 (March 2009): 95–125. http://dx.doi.org/10.1017/s181638310999018x.

Full text
Abstract:
AbstractStates across the globe are increasingly involved in violent conflicts with non-state groups both within and across borders. This new situation challenges the classic distinction in international humanitarian law between international and non-international armed conflicts. However, the changing face of warfare does not diminish the importance of IHL. The essence of this body of law – to protect civilians and persons hors de combat and to lessen unnecessary harm during armed conflict – remains the same. The applicability of IHL must therefore be determined according to objective criteria and must not be left to the discretion of the warring parties. This article seeks to conceptualize the notion of armed conflict and examines the extent to which the existing body of humanitarian law applies to the new asymmetrical conflicts. It finds that the definition given by the ICTY Appeals Chamber in its Tadić Decision on Jurisdiction, which was taken up by Article 8(2)(f) of the Rome Statute, is a useful starting point for an analysis of the ‘triggering mechanism’ of international humanitarian law in asymmetrical conflicts.
APA, Harvard, Vancouver, ISO, and other styles
19

Hajjar, Lisa. "International Humanitarian Law and ““Wars on Terror””: A Comparative Analysis of Israeli and American Doctrines and Policies." Journal of Palestine Studies 36, no. 1 (2006): 21–42. http://dx.doi.org/10.1525/jps.2006.36.1.21.

Full text
Abstract:
The second intifada and the U.S. ““global war on terror,”” though quite different, both involve asymmetrical warfare that pits powerful states against non-state organizations. This article focuses on international humanitarian law (IHL) to assess and compare how Israeli and American doctrines and policies for waging ““wars on terror”” have departed from international consensus on norms and rules for military engagement in occupied territories and the treatment of enemy prisoners. Neither Israel nor the United States ignores IHL; rather, they seek to reinterpret it in a manner that permits the pursuit (militarized or otherwise) of political agendas, even while claiming the reinterpretation to be legally valid.
APA, Harvard, Vancouver, ISO, and other styles
20

Disi Pavlic, Rodolfo. "Explaining outcomes of asymmetric conflicts revisited: The Arauco War." Estudios Internacionales 50, no. 189 (April 23, 2018): 97. http://dx.doi.org/10.5354/0719-3769.2018.49062.

Full text
Abstract:
This article evaluates two theories that seek to explain the outcomes of asymmetric conflicts. It uses evidence from a case study of the Arauco War (1536-1883). The war resulted, unlike most other instances of European colonization, in the victory of the weaker side. The first theory argues that in asymmetrical warfare, opponents choose between direct (conventional) and indirect (guerrilla) approaches; the stronger side is more likely to win same-approach interactions, while the weaker side is more likely to prevail in different-approach interactions. The second theory advances the claim that when armies become mechanized, they gather less intelligence from the ground, and are therefore less likely to solve the information problem - telling combatants apart from noncombatants. The analysis of the Arauco War shows the limitations of the first theory: the stronger side can easily win some different-approach (indirectdirect) interactions, while the weaker can win same-approach (indirect-indirect) ones. The study lends support to the second theory, especially once it is generalized to include cultural differences as factors that exacerbate the identification problem.
APA, Harvard, Vancouver, ISO, and other styles
21

Ip, Hung-yok. "Weak-Party Negotiators of Ancient China: The Mohists, Offensive Warfare, and Power." International Negotiation 25, no. 2 (May 28, 2020): 298–328. http://dx.doi.org/10.1163/15718069-25131245.

Full text
Abstract:
Abstract This article situates the topic of weak-party negotiators in the context of early China. It examines the Mohists, activists known for their efforts to confront aggressive warfare in the Warring States period (476–221 BC), when various regional states competed fiercely with one another in China’s inter-state system. By examining the foundational text of Mohism, the Mozi, I show how the Mohists pioneered techniques and tactics regarded as beneficial for weak-party negotiators by modern day experts on negotiation and conflict resolution. More importantly, I emphasize that with their long and deep historical engagement with an ancient Chinese elite driven by self-interests, the Mohists pursued power and were consequential by developing their own approach to asymmetrical negotiation in war-related contexts. This approach was heavily dependent on the Mohists’ use of positive and negative leverage. And it is, according to the Mozi, made possible by the activists’ relentless pursuit of knowledge.
APA, Harvard, Vancouver, ISO, and other styles
22

Kalpokas, Ignas. "Book Review: Pauline M Kaurin, The Warrior, Military Ethics and Contemporary Warfare: Achilles Goes Asymmetrical." Political Studies Review 14, no. 4 (September 23, 2016): 582. http://dx.doi.org/10.1177/1478929916660500.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Ruhina Jesmin, U. H. "An Asymmetrical Dialectic of Oppression and Act of Political Warfare in Tsitsi Dangarembga’s Nervous Conditions." Explorations: A Journal of Language and Literature 8 (December 8, 2020): 59–70. http://dx.doi.org/10.25167/exp13.20.8.6.

Full text
Abstract:
The study locates an asymmetrical dialectic of oppression in Tsitsi Dangarembga’s Nervous Conditions. It reveals Nyasha, Tambu, Lucia, Maiguru, and Ma’Shingayi’s experiences with racist-sexist dimensions in the context of a typical Shona society in colonial Rhodesia and England. The study locates cultural and political inscriptions on women’s body and sexuality and the mutually-constitutive intersections which socio-culturally and politically regulate women characters’ beliefs and body. Nyasha goes against existing political dynamics and exhibits subversive body performativeness to claim/redefine her identity and sexuality. It bespeaks of an act of political warfare. She deliberately dismantles the barriers that prohibit entrance to domains reserved for specific gender and race. As such, Nyasha’s relation with her society and the hierarchical structure of race and gender in which her identity is embedded unequivocally signify political implications. This is because Nyasha’s race, gender, and sexuality constitute her social and political identities.
APA, Harvard, Vancouver, ISO, and other styles
24

Cîrdei, Ionut Alin. "The Hybrid Warfare in the 21St Century: An Old Concept with a New Face." International conference KNOWLEDGE-BASED ORGANIZATION 23, no. 1 (June 20, 2017): 74–78. http://dx.doi.org/10.1515/kbo-2017-0011.

Full text
Abstract:
Abstract In the last years the focus of the military specialists changed from the asymmetrical threats to the hybrid threats, seen as one of the main challenge for the security in the 21st century. The increased attention paid to hybrid threats is due to the events that took place in Ukraine, Syria and other confrontation areas and which highlighted the vulnerability of the modern societies and modern armies toward this type of actions. The use of hybrid type tactics can ensure the achievement of the main objectives of an international actor, with a low effort, usually without using the force, and can deny to the target/victim the possibility to take any defensive actions. The hybrid warfare can represent the war of the 21st century, a new type of direct or indirect confrontation, with effects on short and medium term, impossible to be anticipated.
APA, Harvard, Vancouver, ISO, and other styles
25

Chernobrov, D. V. "Identity in contemporary international conflict: typology of the history of conflicts through the prism of an Other." MGIMO Review of International Relations, no. 3(30) (June 28, 2013): 86–91. http://dx.doi.org/10.24833/2071-8160-2013-3-30-86-91.

Full text
Abstract:
The problem of an Other and association with an identity in conflict are among the least explored areas of contemporary conflict studies which tends to regard conflict behaviour as rational. This article suggests several periods in the development and evolution of conflict depending on the role and function of the Other, thus adopting a historical-constructivist approach. From the spread of social application of self-other categories to conflict, to the technological and informational transition from traditional to ‘new’ and asymmetrical wars and counter-insurgency warfare, the Other changed form, function, and role in conflict. Supporting the argument with historical evidence, this article reconstructs the evolution of the Other and situates it in the context of social, political, and conflict-evolving realities.
APA, Harvard, Vancouver, ISO, and other styles
26

Grassiani, Erella, Alexander Horstmann, Lotte Buch Segal, Ronald Stade, and Henrik Vigh. "Editorial." Conflict and Society 1, no. 1 (June 1, 2015): 1–3. http://dx.doi.org/10.3167/arcs.2015.010101.

Full text
Abstract:
Violence, defined as the intentional inflicting of injury and damage, seems to always have been a fact of human life. Whether in the shape of raids, ambushes, wars, massacres, genocides, insurgences, terrorism, or gang assaults, socially organized violence, that is, human groups orchestrating and committing violent acts, has been a steady companion of human life through the ages. The human quest to make sense of violence is probably as old as violence itself. Academic conflict research both continues and advances this quest. As long as wars were waged between nations, the research on armed conflicts focused on international relations and great power politics. This paradigm was kept alive even when the asymmetrical warfare of decolonization spread across the world, because by then the frame of analysis was the binary system of the Cold War and regional conflicts were classifi ed as proxy wars. After the end of the Cold War, the academic interest in forms of organized violence other than international conflict became more general in the social sciences, not least in anthropology, a discipline whose long-standing research interest in violent conflict previously had been directed almost exclusively towards “tribal warfare.” But, following their research tradition, anthropologists also began to conduct field studies in contemporary war zones and other violent settings.
APA, Harvard, Vancouver, ISO, and other styles
27

Smith, J. E. "The epidemiology of blast lung injury during recent military conflicts: a retrospective database review of cases presenting to deployed military hospitals, 2003–2009." Philosophical Transactions of the Royal Society B: Biological Sciences 366, no. 1562 (January 27, 2011): 291–94. http://dx.doi.org/10.1098/rstb.2010.0251.

Full text
Abstract:
Blast injuries are becoming increasingly common in military conflicts as the nature of combat changes from conventional to asymmetrical warfare and counter-insurgency. This article describes a retrospective database review of cases from the UK joint theatre trauma registry from 2003 to 2009, containing details of over 3000 patients, mainly injured in Iraq and Afghanistan. During this period, 1678 patients were injured by explosion of whom 113 had evidence of blast lung injury. Of the 50 patients who survived to reach a medical facility, 80 per cent required ventilatory support. Injuries caused by explosion are increasing when compared with those caused by other mechanisms, and blast lung represents a significant clinical problem in a deployed military setting. Management of these patients should be optimized from point of wounding to definitive care.
APA, Harvard, Vancouver, ISO, and other styles
28

Cornish, P. "Asymmetrical Warfare: Today's Challenge to U.S. Military Power. Roger W. Barnett. Dulles, VA: Brassey's Inc., 2003. 183pp. $24.95." Survival 45, no. 4 (December 1, 2003): 223—a—224. http://dx.doi.org/10.1093/survival/45.4.223-a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Lebow, Richard Ned, and Mervyn Frost. "Ethical traps in international relations." International Relations 33, no. 1 (November 4, 2018): 3–22. http://dx.doi.org/10.1177/0047117818808568.

Full text
Abstract:
We elaborate a little noticed strategy generally used by weaker actors both in domestic and international politics: the ethical trap. Actors who fall into such traps lose ethical standing and influence at home as well as abroad. We explore the concept of the trap and distinguish it from policy interventions and escalation in which there is no deliberate enticement. We document historical instances of successful ethical trapping both within states and between them. We also discuss traps that were not sprung. We contend that ethical traps have become an increasingly salient feature of contemporary asymmetrical warfare both within states and internationally. We conclude with some propositions about the global practice in which ethical traps are set and the conditions in which they are likely to succeed and some observations about the relative vulnerability of liberal and non-liberal regimes to these traps. This in turn says something important about the practical consequences of ethical violations in international affairs.
APA, Harvard, Vancouver, ISO, and other styles
30

Kuprinenko, Alexander, Mykola Chornyi, Volodymyr Mocherad, and Halyna Lotfi Ghahrodi. "Concept Designing of Armoured Fighting Vehicles for Future Combat." Defence Science Journal 70, no. 4 (July 13, 2020): 397–403. http://dx.doi.org/10.14429/dsj.70.14706.

Full text
Abstract:
The experience of military conflicts in recent decades shows changes in the nature of warfare performance, which differ significantly from those conditions for which existing types of armoured fighting vehicles were created. The conducted analysis of the works on the designing of advanced armoured fighting vehicles shows that these changes have not yet been sufficiently taken into account. It still focuses on the creation of high-value combat vehicles with high combat performance for direct (contact) actions. Given the limited economic opportunities of the most countries this inevitably leads to unreasonable expenses. This article presents a conceptual approach to design up to date of armoured fighting vehicles which is based on the asymmetrical principle of their development. Given that the practical implementation of the proposed approach is complex and high-cost, the results of simulation modelling of typical situations of combat use of the offered types of armoured fighting vehicles are given as evidence.
APA, Harvard, Vancouver, ISO, and other styles
31

Maisaia, Vakhtang, and Magdana Beselia. "Asymmetrical warfare Strategy and its Implications to the Black Sea Regional Security in 21st Century: Non-State Aggressive Actors and Terrorism." Ante Portas - Studia nad bezpieczeństwem 2(15)/2020, no. 2(15)/2020 (December 2020): 63–89. http://dx.doi.org/10.33674/120204.

Full text
Abstract:
Today, military politics have became a dominant factor in the aegis of the contemporary international and regional security, and this provision is also relevant in the Black Sea Region. The nature of military politics presupposes the existence of asymmetric threats, which is revealed in the implementation of functional politics by the states and implies the following components: power, chance, astonishment, armed forces, their doctrines, and armaments. The asymmetric military identification is vital to recognize at the regional level, with the example of the Black Sea Region and it’s involvement of so-called ‘Non-State Aggressive Actors’ (DAESH, Al-Qaeda, etc.). After the Russian annexation of Crimea, the Black Sea Region would be designated as a conflict zone and therefore NATO has reinforced it’s eastern security policy accordingly. The International Community witnessed that there are two regional hegemons: Russia and Turkey, pursuing their own geopolitical and economic interests in the Black Sea region and the region around the Caspian Sea (including one that sees regional power interests). Recently, China, as a global power in its own right, with its ‘One Belt and One Road’ Initiative (OBOR), expresses it’s own interests toward the region,
APA, Harvard, Vancouver, ISO, and other styles
32

Meisels, Tamar. "Targeted killing with drones? Old arguments, new technologies." Filozofija i drustvo 29, no. 1 (2018): 3–16. http://dx.doi.org/10.2298/fid1801003m.

Full text
Abstract:
The question of how to contend with terrorism in keeping with our preexisting moral and legal commitments now challenges Europe as well as Israel and the United States: how do we apply Just War Theory and International Law to asymmetrical warfare, specifically to our counter terrorism measures? What can the classic moral argument in Just and Unjust Wars teach us about contemporary targeted killings with drones? I begin with a defense of targeted killing, arguing for the advantages of pin pointed attacks over any alternative measure available for combatting terrorism. Assuming the legitimacy of killing combatants in wartime, I argue, there is nothing wrong, and in fact much that is right, with targeting particular terrorists selected by name, as long as their assassinations can be reasonably expected to reduce terrorist hostilities rather than increase it. Subsequently, I offer some further thoughts and comments on the use of remotely piloted aircrafts to carry out targeted killings, and address the various sources for discomfort with this practice identified by Michael Walzer and others.
APA, Harvard, Vancouver, ISO, and other styles
33

Park, Jiyoung, David K. Wright, and Jangsuk Kim. "Change in Settlement Distribution and the Emergence of an Early State: A Spatial Analysis of Radiocarbon Dates from Southwestern Korea." Radiocarbon 59, no. 6 (November 20, 2017): 1779–91. http://dx.doi.org/10.1017/rdc.2017.93.

Full text
Abstract:
AbstractArchaeologists have long examined how the emergence of core polities prompts changes in the settlement patterns of peripheral regions through various processes like warfare, patronage claims, control of ritual rites, and unequal balances of trade. According to historical records, there were 54 small Mahan polities in southwestern Korea, and one of these polities,Baekje,grew to become an ancient state by unifying other polities in the 4th century AD. It is assumed that subsequent changes in the settlement patterns of southwestern Korea were caused directly or indirectly by the expansion of Baekje, but the nature of this presumed influence is not fully explained due to difficulties in establishing chronologies and the limited application of spatial analyses. In this paper, radiocarbon (14C) dates, kernel density estimates, and spatial autocorrelation analyses are used to compare Mahan settlement distributions before and after the rise of the Baekje kingdom. The results demonstrate that the spatial distribution of Mahan settlements changed over time, correlating with the emergence of Baekje statehood, but detailed aspects of the settlement patterns observed in each region were not uniform. Baekje applied various expansion strategies and exerted asymmetrical hegemony based on the conditions and responses of peripheral communities.
APA, Harvard, Vancouver, ISO, and other styles
34

NOMIKOS, JOHN M. "ASYMMETRIC WARFARE THREATS IN GREECE: A DESCRIPTIVE ANALYSIS." NOVA VLOGA OBOROŽENIH SIL KOT ODZIV NA ASIMETRIČNE GROŽNJE/THE NEW ROLE OF ARMED FORCES AS A RESPONSE TO ASYMMETRIC THREATS, VOLUME 2020, ISSUE 22/3 (September 30, 2020): 107–13. http://dx.doi.org/10.33179/bsv.99.svi.11.cmc.22.3.6.

Full text
Abstract:
Povzetek Eden največjih izzivov današnjega časa je naraščanje asimetričnih groženj. Nato in EU sta tarča politično motiviranih nedržavnih in razvitejših državnih akterjev ter združenj, ki se ukvarjajo s kibernetskim kriminalom. Sovražna kibernetska kazniva dejanja spodkopavajo vse družbene ravni v državah Nata in EU ter ogrožajo politično, gospodarsko, civilno in vojaško varnost. S podobnimi grožnjami se spoprijema tudi Grčija. V članku so preučeni grška strategija kibernetske varnosti ter vzroki in posledice organiziranih terorističnih združb za nezakonite migracije v Grčiji. Prav tako je izpostavljen pomen izmenjave obveščevalnih podatkov med grško varnostno in obveščevalno skupnostjo. Ključne besede Grčija, asimetrično bojevanje, kibernetska varnost, trgovina z ljudmi, migracije. Abstract One of the biggest challenges of our time is the rise of asymmetric warfare threats. NATO and the EU are targeted by cybercrime syndicates, politically motivated non-state actors, and sophisticated state actors. Hostile cybercrime undermines all levels of society in NATO and the EU states, threatening political, economic, civil, and military security. Greece faces similar threats. This article focuses on the Greek cybersecurity strategy and analyses the causes and consequences of the terrorism-organized, illegal immigration nexus in Greece, and how essential it is to highlight the importance of collective intelligence sharing among the Greek security and intelligence community. Key words Greece, asymmetric warfare, cyber-security, human trafficking, migration
APA, Harvard, Vancouver, ISO, and other styles
35

Ammar, Ahmed. "Editorial Comments: Maintaining Baseline, Corrective Surgical Care during Asymmetrical Warfare: A Case Study of a Humanitarian Mission in the Safe Zone of a Neighboring Country." Prehospital and Disaster Medicine 22, no. 1 (February 2007): 8. http://dx.doi.org/10.1017/s1049023x0000426x.

Full text
Abstract:
I congratulate the authors of this article for their beneficial and much-needed work. I consider this work to be a bright shining light in a dark tunnel and a brave move in the right direction. The true value of this work is far beyond the treatment of 71 patients; it implants hope where there is confusion, promotes love where there is hate, and initiates trust and confidence where mistrust is common. Today, humanitarian aid groups and relief organizations face unique, difficult conditions, and sometimes must answer obscure questions and respond to new problems. History tells us that the war ends when the cease fire starts, that humanitarian organizations are well-received and protected, and that victims and patients respect and trust those providing medical treatment, regardless of their nationality. However, current reality reveals that a cease fire sometimes marks the start of a different war with a different strategy. The number of victims after the cease fire may exceed the number of conventional war victims. Some politicians generalize, classify, and reclassify people, creating mistrust, a lack of confidence, and confusion. It is sad to see victims who need treatment, while nearby there are well-meaning people willing to treat them but who are unable to do so without great risk.
APA, Harvard, Vancouver, ISO, and other styles
36

Caforio, Giuseppe. "The Asymmetric Warfare Environment as Described by the Participants." Connections: The Quarterly Journal 12, no. 2 (2012): 53–67. http://dx.doi.org/10.11610/connections.12.2.03.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Elm, William C., James W. Gualtieri, and Scott S. Potter. "Infochess: A Powerful Test Bed for Studying Information Operations (IO) Decision-Making." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 46, no. 20 (September 2002): 1758. http://dx.doi.org/10.1177/154193120204602001.

Full text
Abstract:
Participants will receive an introduction into the domain of Information Operations (IO) and asymmetric warfare. This interactive session will use InfoChess ™ to provide experiential learning in IO and explore decision-making. By integrating IO in the rich, yet well understood game of chess, the trainee's understanding of the synergistic effects of IO and maneuver warfare is internalized to a degree not shown with traditional instruction. The audience will then be asked to collectively work together, against an asymmetrically adversary. During the course of this session, observations will be collected on the decision-making activities of the participants.
APA, Harvard, Vancouver, ISO, and other styles
38

Salamé, Ghassan. "Middle Easts, old and new1." Contemporary Arab Affairs 3, no. 1 (January 1, 2010): 1–6. http://dx.doi.org/10.1080/17550910903471181.

Full text
Abstract:
This article is the text of an address given by Ghassan Salamé at the ‘Oil and Money’ Conference convened in London, UK, on 21 October 2009. In it, the author deals with what the ambiguous, amorphous, elastic and politically expedient term ‘Middle East’ has connoted historically and what it may or may not denote in political formulations of a given moment. In particular, American, European, Turkish, Iranian, Israeli and Arab views – and the serious implications of these – are examined with superb economy of style. Whether as part of the US-delimited region of the Middle East and North Africa (MENA) or whether as affiliated to the European Union via a Mediterranean Union based on trade relations, the exclusion or inclusion in the Middle East is not a simple matter where regional players such as Iran and Turkey have historical extraterritorial ambitions which would, yet again, appear to be coming to the fore – even when such may threaten internal balances. The author argues that Israel's position is increasingly problematic due not only to Palestinian demographics, but also to its recent experience against Hezbollah which has mastered asymmetrical warfare at a time when the ability of the United States to defend its primary ally in the region has been cast into doubt. The states of the Arab World have proved ineffectual and certain of them are looking to ‘escape’ from the Middle East into Africa (Libya) or looking to formulate a new regional constellation in which Turkey and Iran will play leading roles (Syria).
APA, Harvard, Vancouver, ISO, and other styles
39

Stahel, Albert A. "Dissymmetric warfare versus asymmetric warfare." International Transactions in Operational Research 11, no. 4 (July 2004): 435–46. http://dx.doi.org/10.1111/j.1475-3995.2004.00468.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Snytko, Olena. "Strategic narratives in the system of mechanisms for countering informational influence." Actual issues of Ukrainian linguistics: theory and practice, no. 40 (2020): 99–118. http://dx.doi.org/10.17721/apultp.2020.40.99-118.

Full text
Abstract:
The study addresses the issue of strategic communications in Ukraine’s information space. It defines strategic communications as a system of informational multi-dimensional interaction with the public on socially relevant topics through diverse mass media outlets directed at promoting national goals. Strategic communications aim at exerting influence on the individual by appealing to the freedom of speech principle and providing strong encouragement towards independent decision-making, as well as by drawing the public’s attention to socially relevant issues and the ways to approach them. Strategic communications entail the emergence of distinct strategic narratives. Therefore, gaining a better insight into strategic narratives allows determining the causes of the socially significant situation and the prospects for its resolution. The paper explores the narrative about the origin of the Ukrainians, which is steadily unfolding in the information space. This narrative represents a distinct multimodal semantic plural aimed at promoting the idea of national identity and statehood. The study has found that different versions of the strategic narrative about the origin of the Ukrainians in the Internet space have similar semantic and conceptual patterns and involve multiple narrators. At the same time, they provide varying amounts of information and commenting features, target different audiences, and, for this reason, require relevant tools of influence, namely argumentation and suggestion. Тhe methods of randomizing ideas, breaking patterns, and creating cognitive dissonance are widely used in the creolized political texts. In the context of information warfare, a powerful strategic narrative, as a rule, instigates the emergence of a counter-narrative, which has an asymmetrical structure. The struggle of narratives has become the dominant feature of modern media space.
APA, Harvard, Vancouver, ISO, and other styles
41

Finkelstein, Claire. "KILLING IN WAR AND THE MORAL EQUALITY THESIS." Social Philosophy and Policy 32, no. 2 (2016): 184–203. http://dx.doi.org/10.1017/s0265052516000169.

Full text
Abstract:
Abstract:In his famous book Just and Unjust Wars, Michael Walzer articulates a thesis he calls the “Moral Equality of Soldiers,” namely, the principle that combatants have an equal right to kill other combatants in war, regardless of the justice of the cause for which they are fighting. The Moral Equality Thesis, as I shall call it, is an essential component of traditional Just War Theory, in that it provides the basis for distinguishing the jus in bello from the jus ad bellum. It also plays a crucial role in identifying the nature of the difference between combatants and civilians. The Moral Equality Thesis has recently come under attack by scholars of Just War Theory, notably philosopher Jeff McMahan, on the grounds that killing for immoral purposes cannot be justified, and so it cannot be true that combatants all have an equal right to kill, regardless of the justice of their cause. In this essay, I defend the Moral Equality Thesis in its traditional formulation. Without it, I argue, the rule of law would not apply in war. The failure to recognize the equal right of combatants to kill in war, I suggest, creates an inconsistency between the rules of war and basic concepts in the law and morality of self-defense, an inconsistency that McMahan himself would think undesirable. I argue that McMahan’s argument applies more compellingly to armed conflict in asymmetrical warfare. Arguably, the Moral Equality Thesis does not apply in an armed conflict between combatants and unlawful combatants. In that context, the divergence from the law and morality of self-defense is less of a concern.
APA, Harvard, Vancouver, ISO, and other styles
42

Geiß, Robin. "Asymmetric conflict structures." International Review of the Red Cross 88, no. 864 (December 2006): 757–77. http://dx.doi.org/10.1017/s1816383107000781.

Full text
Abstract:
AbstractInequality in arms, indeed, significant disparity between belligerents, has become a prominent feature of various contemporary armed conflicts. Such asymmetries, albeit not at all a new phenomenon in the field of warfare, no longer constitute a random occurrence of singular battles. As a structural characteristic of modern-day warfare asymmetric conflict structures have repercussions on the application of fundamental principles of international humanitarian law. How, for example, can the concept of military necessity, commonly understood to justify the degree of force necessary to secure military defeat of the enemy, be reconciled with a constellation in which one side in the conflict is from the outset bereft of any chance of winning the conflict militarily? Moreover, military imbalances of this scope evidently carry incentives for the inferior party to level out its inferiority by circumventing accepted rules of warfare. This article attempts tentatively to assess the repercussions this could have on the principle of reciprocity, especially the risk of the instigation of a destabilizing dynamic of negative reciprocity which ultimately could lead to a gradual intensification of a mutual disregard of international humanitarian law.
APA, Harvard, Vancouver, ISO, and other styles
43

PETENER, Zrinko. "ASSYMETRIC WARFARE - NOT EVERY WAR HAS TO END?" Security and Defence Quarterly 2, no. 11 (June 30, 2016): 30–44. http://dx.doi.org/10.5604/01.3001.0010.5634.

Full text
Abstract:
The study of warfare, throughout its history, as well as efforts to legally regulate the resort to war and the conduct of war, were concentrated exclusively on one form of warfare - interstate conflict. Only since the terrorist attacks on Washington and New York in 2001 and the following ‘Global War on Terrorism’ has a discussion on a potentially new kind of warfare - asymmetric warfare - moved into the spotlight. Despite all the scientific attention, the concept of asymmetric warfare remains undefined or ill-defined until today, resulting in a proliferation of its use and limiting its value. Hence, restraint in the use of the term is necessary, in order to reinforce its analytical value and applicability. Defining asymmetric warfare as a conflict among opponents who are so different in their basic features that comparison of their military power is rendered impossible, is such an attempt to limit the term to a substantially new form of warfare, witnessed in a conflict that is often commonly called the Global War on Terrorism. The past two years, since the upsurge of the so-called Islamic State to the forefront of the salafi jihadi movement, have witnessed a significant change in this war. Superficial analysis could lead to the conclusion that the proclamation of the Islamic Caliphate on the territories of Iraq and Syria (for now) seems to have recalibrated this conflict into traditional interstate war again, making the concept of asymmetric warfare obsolete and diminishing it into just a short-term aberration in the history of warfare. Nothing could be further from the truth. The enemy in the Global War on Terrorism was and remains a global and territorially unrestricted ideological movement whose numbers cannot even be estimated, which fights its battles wherever it chooses to, and whose ultimate goal is the annihilation of the international system of sovereign states, not the creation of a new state within this system. The Islamic Caliphate in its current boundaries is nothing more than the “model Islamic state”, as envisioned by Osama bin Laden in his 1996 fatwa as part of Al Qaeda’s 200 year plan for the establishment of God’s Islamic World Order. This grand strategy is the guiding blueprint of the salafi jihad that is waged against the Westphalian state system in a war that is truly asymmetric. We have to adjust to this strategic asymmetry if we are to prevail in this struggle, fighting a long war against an indefinable enemy on battlefields that are still unknown.
APA, Harvard, Vancouver, ISO, and other styles
44

Herța, Laura-Maria. "Hybrid Warfare – A Form of Asymmetric Conflict." International conference KNOWLEDGE-BASED ORGANIZATION 23, no. 1 (June 20, 2017): 135–43. http://dx.doi.org/10.1515/kbo-2017-0021.

Full text
Abstract:
AbstractFor a few decades now, a vivid scholarly discussion centred on new forms of conflict has been developing. Military historians and political scientists entered into debates building consistent pro and counter-arguments about whether armed conflict at the end of the 20thcentury and beginning of the 21st century features novel aspects. Several concepts have been coined in order to describe the nature and dynamic of warfare in a post-clausewitzian/post-conventional era, such as new wars, Fourth Generation Warfare, compound wars and last, but not least, hybrid warfare. This article will briefly present the core of each category and will stress hybrid warfare as most recent development of such intellectual categories. The main argument defended here is that hybrid wars are a contemporary feature of global politics, mostly associated with non-state actors (such as terrorist groups) and with Russia’s strategies in eastern Ukraine, but also that they are a form of asymmetric conflict.
APA, Harvard, Vancouver, ISO, and other styles
45

Jobbagy, Zoltan. "Intraspecific Aggression: Humans and Hominids." International conference KNOWLEDGE-BASED ORGANIZATION 24, no. 2 (June 1, 2018): 300–305. http://dx.doi.org/10.1515/kbo-2018-0106.

Full text
Abstract:
Abstract An unwanted and long lasting consequence of the demise of the bipolar world order is the increasing number of non-state actors who constantly challenge the existing status quo. Unlike in the traditional international environment where states primarily interact with other states, the last two and a half decades witnessed states increasingly interacting with various non-state actors. These state / non-state interactions very often result in asymmetric confrontations, including asymmetric warfare. In order to better understand certain features of asymmetric warfare the author proposes a biological approach that takes advantage of recent discoveries in primate research
APA, Harvard, Vancouver, ISO, and other styles
46

Xenakis, Stephen N. "Military Medical Ethics for the 21st Century." Torture Journal 24, no. 1 (October 8, 2018): 3. http://dx.doi.org/10.7146/torture.v24i1.109723.

Full text
Abstract:
Military Medical Ethics for the 21st Century covers the broad array of vexing issues arising with warfare in the modern era. The editors anchor this volume in their observation that the past two decades have seen a dramatic increase in asymmetric warfare.
APA, Harvard, Vancouver, ISO, and other styles
47

Ehrhart, Hans-Georg. "Postmoderne Kriegführung in der Weltrisikogesellschaft als Herausforderung für eine liberale Friedensordnung." Sicherheit & Frieden 37, no. 2 (2019): 68–73. http://dx.doi.org/10.5771/0175-274x-2019-2-68.

Full text
Abstract:
Postmodern warfare in the 21st century can in simple terms be described as a combination of traditional and modern, indirect and direct, regular and irregular, symmetric and asymmetric, military and civilian components, following the postmodern motto of anything goes. On the one hand, its use is supposed to limit warfare. On the other hand, it tends to de-bound warfare due to its inevitable boomerang effects. New ways of warfare are due to minimize own casualties and to alleviate the waging of wars or interventions. The phenomenon of postmodern warfare raises a host of questions that comprise political, theoretical, conceptual, legal, ethical, and practical aspects.
APA, Harvard, Vancouver, ISO, and other styles
48

Prakash, Arun. "Asymmetric Warfare in South Asia." Maritime Affairs:Journal of the National Maritime Foundation of India 6, no. 1 (September 22, 2010): 155–62. http://dx.doi.org/10.1080/09733159.2010.508251.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kunstler, Barton. "Extreme Asymmetric Warfare of the Future." World Futures Review 3, no. 3 (August 2011): 5–16. http://dx.doi.org/10.1177/194675671100300303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

DOBIAS, PETER. "SELF-ORGANIZED CRITICALITY IN ASYMMETRIC WARFARE." Fractals 17, no. 01 (March 2009): 91–97. http://dx.doi.org/10.1142/s0218348x0900417x.

Full text
Abstract:
Two current conflicts, in Afghanistan and in Iraq were studied to identify a possibility of a critical behavior in an asymmetric conflict. The analysis was performed using temporal dependence of fatalities. The data included daily fatality information from the beginning of each of the conflicts until 31 December 2007. The results suggest that these examples of asymmetric, counter-insurgency warfare can possibly be characterized in terms of self-organized criticality (SOC). While SOC could be an attractor for such conflicts in general, not all asymmetric conflicts are actually at the point of criticality. The conflict in Afghanistan is an example of such a subcritical conflict. The conflict in Iraq, on the other hand is an example of an already critical system. The two types of conflict have in common the power-law dependence between the numbers of fatalities and the frequency of occurrences. However, while for a critical system the numbers of fatalities are correlated over time, for a subcritical system they are anti-correlated. From the point of view of counter-insurgency, the subcritical state is a preferred option. However, from the system point of view the two cases are just two different phases of the same type of a dynamical system.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography