Search results
1 – 10 of over 29000Technology has always been one of the decisive factors, by which the outcome of conflict or war ought to be influenced without any doubt. But with…
Abstract
Technology has always been one of the decisive factors, by which the outcome of conflict or war ought to be influenced without any doubt. But with Information-Communication Technology (ICT) appearance it seems the revolutionary changes began concerning conflict perception, the organisation of actors waging a war and (spatial) spheres where conflicts are taking place. The case of last Iraqi war should confirm this thesis. The main purpose of my research paper is therefore to prove that ICT has really multidimensional impacts regarding recent conflicts and wars and these impacts should be analysed with interdisciplinary approach in any case.
So my research paper based especially on strategic (defence) studies as well as on communication and sociological theory guidelines, what actually ensures a real interdisciplinary approach. Within these three basic theoretical approaches the concepts such as propaganda, perception management and information operations/warfare as well as asymmetric warfare, have also been used.
Regarding research limitations and future work to do, my proposal is focusing towards information theory and informatics science, which should also be incorporated in modern conflict analysis. Without very good knowledge of how Internet is working and what are its technical possibilities there is no change, virtual part of recent conflicts is being treated properly.
Practical implications of the paper are visible especially in the proposal (model) how recent conflicts should be treated and understood and this is not important just for strategists and intelligence personal but also for journalists, academics etc. And practical implications as well as methodology approach based on the interdisciplinary has also added the main value and originality of the paper. It must be clear that the way how reality is constructed through the ICT (what is actually the point of constructivism theory) has tremendous importance also within conflict and strategic studies.
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks…
Abstract
Purpose
This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.
Methodology/approach
Review of relevant literature.
Findings
The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.
Research limitations/implications
Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.
Originality/value of the chapter
The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.
Details
Keywords
The purpose of this paper is to highlight the extent of the use of the internet by terrorist organisations to achieve their strategic and operational objectives.
Abstract
Purpose
The purpose of this paper is to highlight the extent of the use of the internet by terrorist organisations to achieve their strategic and operational objectives.
Design/methodology/approach
The methodology adopted consisted of an extensive literature review on topics to include Islamic terrorism, cyber crime, globalisation, and financial crime, supported by field work to verify findings.
Findings
Al‐Qaeda has become a radical Islamic phenomenon held together through its global network of communities, both virtual and physical. One significant enabler has been the internet, which enables anonymous communication, aids recruitment, encourages the sharing of knowledge, as well as playing a significant role in the spreading of propaganda. The understanding of the use of internet‐based technologies, not only as a potential target for terrorist attack, but as a tool to achieve its ideological and operational goals, remains a neglected area of study requiring further focus.
Originality/value
This paper serves as a useful guide to alert and educate counter‐terrorism professionals, law enforcement and policy makers of the significance of the extent of the use of the internet for purposes such as operational planning, recruitment, psychological operations and fund raising. It is essential that these subjects should not be viewed as a peripheral issue to cyber‐terrorism, but instead, should be considered to be central to the existing counter‐terrorism effort.
Details
Keywords
Purpose – An analysis of the security implications of asymmetric warfare and counterinsurgency.Methodology/approach – This chapter provides a review of the relevant…
Abstract
Purpose – An analysis of the security implications of asymmetric warfare and counterinsurgency.
Methodology/approach – This chapter provides a review of the relevant literature based on historical, defense-strategic and also a wider security-political qualitative approach.
Findings – The results show that the military is not always the best and the only instrument to counter asymmetric war. Intelligence and covert action play a certain role, but cause additional problems, also with regard to international law.
Research limitations/implications – Further research should be done with regard to a coordination and cooperation of the various actors and bodies engaged in countering insurgency and asymmetric warfare.
Originality/value of paper – This is a research paper with practical implications.
Details
Keywords
Megan Paull, Maryam Omari, Judith MacCallum, Susan Young, Gabrielle Walker, Kirsten Holmes, Debbie Haski-Leventhal and Rowena Scott
The purpose of this paper is to demonstrate the importance of expectation formation and matching for university student volunteers and their hosts.
Abstract
Purpose
The purpose of this paper is to demonstrate the importance of expectation formation and matching for university student volunteers and their hosts.
Design/methodology/approach
This research involved a multi-stage data collection process including interviews with student volunteers, and university and host representatives from six Australian universities. The project team undertook an iterative process of coding and interpretation to identify themes and develop understanding of the phenomenon.
Findings
University student volunteering has the potential to fail to meet the expectations of at least one of the parties to the relationship when the expectations of the parties are not clearly articulated. Universities operating volunteer programmes have an important role in facilitating expectation formation and matching, minimising the chances of mismatched expectations.
Research limitations/implications
The study confirms the operation of a psychological contract for university student volunteers and organisations who host them which is consistent with other research in volunteering demonstrating the importance of matching expectations.
Practical implications
The paper identifies the importance of expectation formation and matching for hosts and students, and highlights the role of universities in facilitating matchmaking.
Originality/value
This paper contributes to the growing body of research on the role of the psychological contract in volunteering, in particular in university student volunteering and host organisations.
Details
Keywords
Francis J. Yammarino, Michael D. Mumford, M. Shane Connelly, Eric Anthony Day, Carter Gibson, Tristan McIntosh and Tyler Mulhearn
In this chapter, we view team cohesion from a more generalized perspective of team dynamics, and focus on four leadership models for understanding these dynamics in teams…
Abstract
In this chapter, we view team cohesion from a more generalized perspective of team dynamics, and focus on four leadership models for understanding these dynamics in teams in the context of the Mars Mission. Given the long duration of the mission with periods of no or intermittent communication and support, isolation and confinement, and the risk of great physical and psychological harm, having tailored leadership models for this unique team dynamics context is critical. And yet, many of these same dangerous conditions occur in other contexts such as for first responders, crisis management teams, Special Forces operations, and scientific exploration teams in extreme environments. As such, building from a model of leadership and team dynamics for dangerous contexts, for a long-duration space mission involving both Mission Control and the Astronaut Crew, these models of leadership and team dynamics include a collective-level approach for scientists and engineers, a primarily crew-based socioemotional approach, a leader-level crisis/emergency approach, and a dyadic or sortie-level approach. Implications of these models for effective leadership in building and maintaining team dynamics and cohesion for the Mars Mission and across a variety of other dangerous and extreme contexts are discussed.
Details
Keywords
The Chinese military's Strategic Support Force.
Details
DOI: 10.1108/OXAN-DB247056
ISSN: 2633-304X
Keywords
Geographic
Topical
Andrew Rathmell, Richard Overill, Lorenzo Valeri and John Gearson
This article is concerned with answering the question: What is the extent and nature of the Information Warfare (IW) threat from sub‐state radical political groups…
Abstract
This article is concerned with answering the question: What is the extent and nature of the Information Warfare (IW) threat from sub‐state radical political groups? Although there has been a great deal of speculation and theorising about the potential threat from terrorist groups, there has been little open source research on this subject. Even at a classified level, it appears that intelligence agencies are struggling with the construction of methodologies for threat assessment.
This study attempts to introduce South Korea's unique experiences of civic operations made in Iraq and Lebanon. Koreans approached it with extreme caution since they are…
Abstract
This study attempts to introduce South Korea's unique experiences of civic operations made in Iraq and Lebanon. Koreans approached it with extreme caution since they are seeing through two different lenses: “paying back syndrome” from the Korean War experiences is colliding with the “Vietnam syndrome” from the experiences of Vietnam War. Expanding its regional role through revitalizing PKOs is not an easy job for the ROK government despite the fact that President Lee has committed himself to increase its efforts since his campaign days. South Korea recently decided to send its KDX-II type destroyer to Somalia for joining the maritime peacekeeping while people in Korea strongly suspect that the Obama administration would soon request to send its troops to Afghanistan as a part of International Security Assistance Force (ISAF). As the Korean society is getting democratized, progressive NGOs have been opposing the government decision to send forces to assist the U.S. war efforts in Iraq and Afghanistan. It remains to be seen how President Lee persuades people to bear the burden and endure sacrifices. At least, four problems need to be addressed for Korea to become a major troop-contributing country (TCC): first, Korea needs to enact laws to deal with South Korea's participation in the UN PKOs. Second, Korea needs to find a way to include civilian experts in future activities of UN PKOs. Third, it needs to increase the budget and size of standby forces. Lastly, it needs to educate people to understand why Korea has to contribute further to make a safer world. It remains to be seen whether South Korea will continue to focus on its stabilization and reconstruction efforts without sending its combat troops.