You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This path-breaking study is about how ordinary people are gaining the means to be extraordinarily lethal. States are also concentrating their technological power, but their gains lag behind a shift in relative capacity that is already disrupting the role of conventional armed forces. The dispersal of emerging technologies such as roboics, cyber weapons, 3-D printing, autonomous systems, and various forms of artificial intelligence is widening popular access to unprecedented destructive power. Based on hard lessons from previous waves of lethal technology such as dynamite and the assault rifle, the book explains what the future may hold and how we should respond"-
This book examines America's evolving strategy on the international security environment, and comprehensively analyzes how different strategies position states to compete in the present and future, manage risk, and prevail despite uncertainty.
This book studies the impact of cultural factors on the course of military innovations. One would expect that countries accustomed to similar technologies would undergo analogous changes in their perception of and approach to warfare. However, the intellectual history of the Revolution in Military Affairs (RMA) in Russia, the US, and Israel indicates the opposite. The US developed technology and weaponry for about a decade without reconceptualizing the existing paradigm about the nature of warfare. Soviet 'new theory of victory' represented a conceptualization which chronologically preceded technological procurement. Israel was the first to utilize the weaponry on the battlefield, but was th...
From the "Facebook" revolutions in the Arab world to the use of social networking in the aftermath of disasters in Japan and Haiti, to the spread of mobile telephony throughout the developing world: all of these developments are part of how information and communication technologies are altering global affairs. With the rise of the social web and applications like Facebook, YouTube and Twitter, scholars and practitioners of international affairs are adapting to this new information space across a wide scale of issue areas. In conflict resolution, dialogues and communication are taking the form of open social networks, while in the legal realm, where cyberspace is largely lawless space, state...
None
This book examines the role of terrorist innovation and learning in theory and practice, and in the context of three specific EU case-studies. It is often said that terrorist groups are relatively conservative in character operating in a technological vacuum – relying almost exclusively on bombs and bullets. This observation masks increasing complexity and creativity and innovation within terrorist groups and one of the most distinguishing features of al-Qaeda’s terrorist operations is its propensity for remarkable innovation. This book examines how and why terrorist groups innovate more generally and al-Qaeda-related terrorist plots in Europe more specifically. The starting point for th...
This book offers a comparative analysis of British Army Unit War Diaries in the two World Wars, to reveal the role played by previously unnoticed technologies in shaping the archival records of war. Despite thriving scholarship on the history of war, the history of Operational Record Keeping in the British Army remains unexplored. Since World War I, the British Army has maintained daily records of its operations. These records, Unit War Diaries, are the first official draft of events on the battlefield. They are vital for the army’s operational effectiveness and fundamental to the histories of British conflict, yet the material history of their own production and development has been widel...
None
This book provides a comprehensive assessment of the global diffusion of the Revolution in Military Affairs (RMA) and its impact on military innovation trajectories in small states. Although the 'Revolution in Military Affairs' (RMA) concept has enjoyed significant academic attention, the varying paths and patterns of military innovation in divergent strategic settings have been overlooked. This book seeks to rectify this gap by addressing the broad puzzle of how the global diffusion of RMA-oriented military innovation – the process of international transmission, communication, and interaction of RMA-related military concepts, organizations, and technologies - has shaped the paths, pattern...
Cyberspace is essential for socializing, learning, shopping, and just about everything in modern life. Yet, there is also a dark side to cyberspace: sub-national, transnational, and international actors are challenging the ability of sovereign governments to provide a secure environment for their citizens. Criminal groups hold businesses and local governments hostage through ransomware, foreign intelligence services steal intellectual property and conduct influence operations, governments attempt to rewrite Internet protocols to facilitate censorship, and militaries prepare to use cyberspace operations in wars. Security in the Cyber Age breaks-down how cyberspace works, analyzes how state and non-state actors exploit vulnerabilities in cyberspace, and provides ways to improve cybersecurity. Written by a computer scientist and national security scholar-practitioner, the book offers technological, policy, and ethical ways to protect cyberspace. Its interdisciplinary approach and engaging style make the book accessible to the lay audience as well as computer science and political science students.