Search Results

1 - 10 of 10 items :

  • "asymmetric warfare" x
Clear All
Understanding Contemporary Asymmetric Threats

Hartley, D., 2017. Descriptions of Unconventional Conflict. In: Unconventional Conflict. Understanding Complex Systems. Springer: Cham. Hartman, W., 2002. Globalization and Asymmetrical Warfare . US Army. Maxwell Air Force Base, Alabama. Available on: www.dtic.mil [accessed 17 December 2017]. Hayoun, M. and Goldstein, S., 2017. EMS, Weapons of Mass Destruction and Related Injury . Einstein Healthcare Network, October 06 2017. Huba, W., 2006. Traditional and Irregular War . US Army War College. Katzman, K. and Thomas, C., 2017. Afghanistan

Open access
Hybrid warfare and hybrid threats today and tomorrow: towards an analytical framework

Abstract

This article first traces the origin of hybrid warfare and the label game surrounding the concept, asking whether it is merely old wine in a new bottle, and if so, whether it is still a useful concept. It is found that while being old wine in new bottles, it is still a good wine well worth drinking. While there is not much new in the concept itself, it is a useful tool to think about past wars, today’s wars and the wars of the future. Thereafter, this paper analyses how hybrid warfare and hybrid threats are to be understood in the context of peace, conflict and war. It is shown how hybrid warfare and threats fit into our traditional understanding of conflict dynamics.

Open access
Intraspecific Aggression: Humans and Hominids

Abstract

An unwanted and long lasting consequence of the demise of the bipolar world order is the increasing number of non-state actors who constantly challenge the existing status quo. Unlike in the traditional international environment where states primarily interact with other states, the last two and a half decades witnessed states increasingly interacting with various non-state actors. These state / non-state interactions very often result in asymmetric confrontations, including asymmetric warfare. In order to better understand certain features of asymmetric warfare the author proposes a biological approach that takes advantage of recent discoveries in primate research

Open access
Selected Aspects of Vehicle Born Improvized Explosive Devices

Abstract

The paper focuses on the analysis of the current highly dangerous tools of destruction, used mostly by insurgents and terrorists, especially in asymmetric warfare. Vehicles usually loaded with explosives (mostly homemade explosive), driven by suicide bombers are a significant threat to troops and the civilian population, not only in high risk areas. Analysis of the available incidents of this type, and available response to an incident mentioned in this article, it becomes the basic portfolio data for the design of effective elimination or at least reduction of the destructive effect, especially on soft targets.

Open access
Comment on the paper Ageing in the Middle East and North Africa: A Contemporary Perspective by Jamie P. Halsall and Ian G. Cook

Bibliography Al-Sinawi, Hamed et al. (2012). “Emerging burden of frail young and elderly persons in Oman: For whom the bell tolls?” In: Sultan Qaboos University Medical Journal 12.2, p. 169. Benna, Umar and Indo Benna (2017). Urbanization and Its Impact on Socio-Economic Growth in Developing Regions . IGI Global. Bruneau, Emile and Nour Kteily (2017). “The enemy as animal: Symmetric dehumanization during asymmetric warfare”. In: PloS One 12.7, e0181422. Fareed, Mohd and Mohammad Afzal (2017). “Genetics of consanguinity and inbreeding

Open access
Inside War
Understanding the Evolution of Organised Violence in the Global Era
Open access
A Relationship in Limbo: Challenges, Dynamics and Perspectives of Kosovo’s Integration into NATO

: Deterring Asymmetric Warfare with an Asymmetric Definition. Air Force Law Review, 64(65): 66-101. UN Charter, 1 UNTS XVI, 24 October 1945. UNSC Resolution 1244 S/RES/1244, 10 June 1999. Walker, E. W., 2015. Between East & West: NATO Enlargement & the Geopolitics of the Ukraine Crisis. E-International Relations, 13 April [online]. Available at: http://www.e-ir.info/2015/04/13/betweeneast-west-nato-enlargement-the-geopolitics-of-the-ukraine-crisis/ (Accessed 15 March 2017). Wiseman, J. W., 2001

Open access
Hybrid Warfare – A Form of Asymmetric Conflict

, Russia and Hybrid Warfare - Going beyond the Label, Report 1/2016, Aleksanteri Institute, University of Helsinki, Finland, 2016, pp. 40-46. [45] Rod Thornton, “Turning strengths into vulnerabilities: the art of asymmetric warfare as applied by the Russian military in its hybrid warfare concept”, in Bettina Renz; Hanna Smith, Russia and Hybrid Warfare - Going beyond the Label, Report 1/2016, Aleksanteri Institute, University of Helsinki, Finland, pp. 52-60. [46] Antulio J. Echevarria II, “How Should We Think about ‘Gray-Zone’ Wars?”, in

Open access
Leadership in the Contemporary Military: Mavericks in the Bureaucracy?

and the Fox: An essay on Tolstoy’s view of history. 2nd edition. Hardy H and Ignatieff M (eds), Princeton, NJ: Princeton University Press. Bligh MC, Kohles JC and Pillai R (2011) Romancing leadership: Past, present, and future. Leadership Quarterly 22(6): 1058-1077. Caforio G (ed.) (2013) Soldiers without frontiers: The view from the ground. Experiences of asymmetric warfare. Militari e società, Rome: Bonanno Editore. Carlyle T (1841) On heroes, hero-worship, and the heroic in history. London: James Fraser

Open access
The Implications of Transnational Cyber Threats in International Humanitarian Law: Analysing the Distinction Between Cybercrime, Cyber Attack, and Cyber Warfare in the 21st Century

Attacks.” Int'l Committee of the Red Cross (November 19, 2004) // http://www.icrc.org/eng/assets/files/other/applicabilityofihltocna.pdf . 25. Estreicher, Samuel. “Privileging Asymmetric Warfare (Part II)?: The ‘Proportionality’ Principle under International Humanitarian Law.” Chi. J. Int’l L. 12 (2011): 1–143. 26. Franzese, Patrick W. “Sovereignty in Cyberspace: Can It Exist?” A.F. L. REV. 64 (2009): 1–54. 27. Gercke, Marco. Understanding Cybercrime: Phenomena, Challenges and Legal Response . ITU: Telecommunication Development Bureau, 2012

Open access