You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Survival, the IISS’s bimonthly journal, challenges conventional wisdom and brings fresh, often controversial, perspectives on strategic issues of the moment. In this issue: · Anatol Lieven argues that realist support for prudence and restraint in foreign policy does not equate to chauvinism, isolationism and opposition to international cooperation · Toby Dodge assesses that the United States’ attempt to comprehensively transform Afghanistan was based on its erroneous presumption that the liberal-peacebuilding model was universally applicable · Audrey Kurth Cronin contends that the logic of fighting terrorists far from the US homeland no longer holds, as the US faces resource constraints and rising domestic terrorism · Jens Ringsmose and Sten Rynning analyse the potential priorities and scope of NATO’s next Strategic Concept, and how it can bridge the Alliance’s political–military divide And eight more thought-provoking pieces, as well as our regular Book Reviews and Noteworthy column. Editor: Dr Dana Allin Managing Editor: Jonathan Stevenson Associate Editor: Carolyn West Assistant Editor: Jessica Watson
Informed discussion of the current challenges facing NATO
Vicarious identity : an overview -- Vicarious identity in international relations -- US vicarious identity with Israel, 1967-2020 -- Vicarious identification as foreign policy strategy : the UK-US "special relationship" -- Aspiring for vicarious identity through engagement in war : the case of Denmark -- Conclusion.
This handbook provides a comprehensive survey of the development and importance of the North Atlantic Treaty Organisation (NATO), its role in international relations and its influence on history. The volume examines the Alliance’s evolution in breadth, depth and context by analysing and explaining why and how NATO has endured and remained relevant since its creation. To present an inclusive study of the Alliance’s activities and milestone events and to offer a glimpse of future challenges, the book’s 29 chapters fall into six thematic sections that act as frameworks and allow the exploration of specific topics that pertain to the evolution of NATO: Part I: History of NATO, 1949–2024 ...
This book identifies contemporary military coalition defections, builds a theoretical framework for understanding why coalition defection occurs and assesses its utility for both the scholarly and policy practitioner communities. Drawing upon the author’s own experiences managing the Afghanistan coalition for the Pentagon, the volume builds a relevant policy and practical understanding of some of the key aspects of contemporary coalition warfare. Ultimately, it concludes that coalition defection is prompted by heightened perceptions of political and military risk. Yet the choice of how to defect— whether to completely withdraw forces or instead find another, less risky way to participate—is largely a function of international and alliance pressures to remain engaged.
This innovative new book aims to put society's fight against terrorism into a comprehensive crime prevention perspective with a clear, understandable theoretical foundation, developing a general model for the prevention of crime which is, in this book, applied to terrorism.
Examines the governance challenges of cybersecurity through twelve, real-world case studies Through twelve detailed case studies, this superb collection provides an overview of the ways in which government officials and corporate leaders across the globe are responding to the challenges of cybersecurity. Drawing perspectives from industry, government, and academia, the book incisively analyzes the actual issues, and provides a guide to the continually evolving cybersecurity ecosystem. It charts the role that corporations, policymakers, and technologists are playing in defining the contours of our digital world. Rewired: Cybersecurity Governance places great emphasis on the interconnection of...
A wide-ranging new history of NATO, from its origins to the present day—published for the alliance’s seventy-fifth anniversary For seven decades, NATO’s stated aim has been the achievement of world peace—but playing great power politics always involves conflict. Russia’s war on Ukraine and on Europe’s security order puts the alliance under threat, but also demonstrates why transatlantic cooperation is so necessary. But how did NATO get to where it is today, and what does its future hold? In this incisive new account, Sten Rynning traces the full history of the North Atlantic Treaty Organisation from its origins to the present. Across its seventy-five years, NATO has navigated the twists and turns of Cold War diplomacy and nuclear deterrence, and has grown its membership. The alliance has become a guarantor of peace, but Rynning explores how its complex inner workings alongside Russian and Chinese opposition are now shaping its direction. At a time of strategic competition and geopolitical upheaval, Rynning offers us a clear-sighted account of the alliance’s intriguing history—and asks what its ambitions might be for the future.
When people think of hackers, they usually think of a lone wolf acting with the intent to garner personal data for identity theft and fraud. But what about the corporations and government entities that use hacking as a strategy for managing risk? Why Hackers Win asks the pivotal question of how and why the instrumental uses of invasive software by corporations and government agencies contribute to social change. Through a critical communication and media studies lens, the book focuses on the struggles of breaking and defending the “trusted systems” underlying our everyday use of technology. It compares the United States and the European Union, exploring how cybersecurity and hacking accelerate each other in digital capitalism, and how the competitive advantage that hackers can provide corporations and governments may actually afford new venues for commodity development and exchange. Presenting prominent case studies of communication law and policy, corporate hacks, and key players in the global cybersecurity market, the book proposes a political economic model of new markets for software vulnerabilities and exploits, and clearly illustrates the social functions of hacking.