The Quest for Security: Alliances and Arms

Author(s):  
Brett Ashley Leeds ◽  
T. Clifton Morgan

Security issues have long been linked to the study of international relations. The crucial issue which scholars and decision makers have sought to understand is how states can avoid being victimized by war while also being prepared for any eventuality of war. Particular attention has been devoted to alliances and armaments as the policy instruments that should have the greatest effect on state war experiences. Scholars have attempted to use balance of power theories to explain the interrelationships between arms, alliances, and international conflict, but the overwhelming lack of empirical support for such theories led the field to look for alternatives. This gave rise to new theorizing that recognized variance in national goals and an enhanced role for domestic politics, which in turn encouraged empirical tests at the nation state or dyadic level of analysis. Drawing from existing theoretical perspectives, more specific formal models and empirical tests were invoked to tackle particular questions about alliances and arms acquisitions. Despite significant advances in individual “islands of theory,” however, integrated explanations of the pursuit and effects of security policies have remained elusive. An important consideration for the future is to develop of theories of security policy that take into account the substitutability and complementarity of varying components. There have been two promising attempts at such integrated theorizing: the first explains the steps to war and the second is based on the assumption that states pursue two composite goods through foreign policy.

2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2021 ◽  
Author(s):  
Sifana Sohail ◽  
Nadia Chernyak ◽  
Kristen Dunfield

By the preschool age, children exhibit a diversity of prosocial behaviors that include both sharing resources and helping others. Though recent work has theorized that these prosocial behaviors are differentiated by distinct ages of emergence, developmental trajectories and underlying mechanisms, the experimental evidence in support of the last claim remains scant. The current study focuses on one such cognitive mechanism - numerical cognition - seeking to replicate and extend prior work demonstrating the strong link between children’s numerical cognition and precise sharing behavior, and further examining its relationship to instrumental helping. In line with theoretical perspectives favoring the differentiation of varieties of prosocial behaviors, we hypothesize that numerical cognition underlies precise sharing, but not precise helping behavior. Eighty-five 3 to 6-year-old children completed two procedurally similar tasks designed to elicit sharing and instrumental helping behavior, in addition to a Give-N task measuring their symbolic counting skills. Despite the procedural similarity, and the implicit norm of providing half (5 out of 10) stickers in both tasks, children’s counting proficiency predicted precise sharing, but not precise helping. These results indicate a unique relationship between children’s developing numerical cognition and behavioral fairness, providing empirical support for claims that varieties of prosocial behavior are supported by distinct underlying mechanisms.


Author(s):  
Joshua Hurtado Hurtado

While there has been research focusing on security issues in Mexico in the context of the Mexican Drug War and the effects of violence on its population, little has been done to explore the relationship between public-official discourse, political practices and mourning at a societal level. Using the Logics of Critical Explanation (LCE) framework developed by Jason Glynos and David Howarth, and focusing on the notions of mourning and melancholia at a societal level, this paper argues that the conditions for mourning at a societal level have not been met in public-official discourse regarding the security policy and the Mexican Drug War, resulting in subjects experiencing blocked mourning. It views the Peace and Reconciliation Forums as a political logic that seeks to differentiate the approach taken by the incoming López Obrador administration in relation to security strategy formulation and attention to victims and Human Rights’ groups. It also argues that while the forums themselves have some attributes that could pave the way for successful mourning to occur, a comprehensive set of practices needs to materialize that addresses the concerns of violence-affected subjects.


Author(s):  
E. V. Batueva

The development of ICT and the formation of the global information space changed the agenda of national and international security. Such key characteristics of cyberspace as openness, accessibility, anonymity, and identification complexity determined the rise of actors in cyber space and increased the level of cyber threats. Based on the analyses of the U.S. agencies' approach, the author defines three major groups of threats: use of ICT by states, criminals and terrorists. This concept is shared by the majority of the countries involved in the international dialogue on information security issues and is fundamental for providing cyber security policy on both national and international levels. The United States is developing a complex strategy for cyber space that includes maximization of ICT's advantages in all strategically important fields as well as improvement of national information systems and networks security. On the international level the main task for the American diplomacy is to guarantee the U.S. information dominance. The United States is the only country that takes part practically in all international and regional fora dealing with cyber security issues. However process of the development of a global cyber security regime is not going to be fast due to countries' different approaches to key definitions and lack of joint understanding of cyber security issues as well as due to the position of the countries, among all the United States, that are not interested in any new obligatory international norms and principles. Such American policy aims at saving the possibility of using cyberspace capacity in reaching political and military goals, thus keeping the global leadership.


2019 ◽  
Vol 5 ◽  
pp. e173 ◽  
Author(s):  
Marvin Wyrich ◽  
Daniel Graziotin ◽  
Stefan Wagner

Background Assessing a software engineer’s ability to solve algorithmic programming tasks has been an essential part of technical interviews at some of the most successful technology companies for several years now. We do not know to what extent individual characteristics, such as personality or programming experience, predict the performance in such tasks. Decision makers’ unawareness of possible predictor variables has the potential to bias hiring decisions which can result in expensive false negatives as well as in the unintended exclusion of software engineers with actually desirable characteristics. Methods We conducted an exploratory quantitative study with 32 software engineering students to develop an empirical theory on which individual characteristics predict the performance in solving coding challenges. We developed our theory based on an established taxonomy framework by Gregor (2006). Results Our findings show that the better coding challenge solvers also have better exam grades and more programming experience. Furthermore, conscientious as well as sad software engineers performed worse in our study. We make the theory available in this paper for empirical testing. Discussion The theory raises awareness to the influence of individual characteristics on the outcome of technical interviews. Should the theory find empirical support in future studies, hiring costs could be reduced by selecting appropriate criteria for preselecting candidates for on-site interviews and potential bias in hiring decisions could be reduced by taking suitable measures.


2004 ◽  
Vol 5 (1) ◽  
pp. 67-87
Author(s):  
Jeong-Yong Kim

This article presents the model of 'business-track diplomacy' to test a state's utilization of economic engagement strategy as security policy. The model provides ways to think around security issues and alternative security options that go beyond the traditional military containment approach to security in international relations. As a case study, the article investigates Hyundai Group's Mountain Kumgang tourism with North Korea. In this case study, it demonstrates that not only the Kim Dae-Jung government's strong policy-making will of business-track diplomacy towards North Korea but also the Hyundai Group's business will and vulnerability of the North Korean economy played important roles in realizing the tour project and thus, enhanced inter-Korean economic cooperation.


2016 ◽  
Vol 25 (12) ◽  
pp. 1644013 ◽  
Author(s):  
Yuri Bonder

A hypothesis of general relativity (GR) is that spacetime torsion vanishes identically. This assumption has no empirical support; in fact, a nonvanishing torsion is compatible with all the experimental tests of GR. The first part of this essay specifies the framework that is suitable to test the vanishing-torsion hypothesis, and an interesting relation with the gravitational degrees of freedom is suggested. In the second part, some original empirical tests are proposed based on the observation that torsion induces new interactions between different spin-polarized particles.


Author(s):  
Kris Ven ◽  
Geert Van Kerckhoven ◽  
Jan Verelst

More organizations are currently migrating toward open source desktop software (OSDS). However, such migration is complex. More insight into the process will assist decision makers in making a well-informed decision on whether or not to migrate to OSDS and in building a strong business case to support this decision. In this paper, the authors present the results of a qualitative study in seven Belgian organizations and report on why these organizations have adopted OSDS and how the migration was undertaken. These cases represent challenging adoptions of OSDS. Results indicate that providing added value for users can positively influence user perceptions. In addition, the authors found strong empirical support for the guidelines with respect to the migration to OSDS that have been proposed in academic literature.


2011 ◽  
pp. 1531-1542
Author(s):  
Zita Zoltay Paprika

Many management scholars believe that the process used to make strategic decisions affects the quality of those decisions. However, several authors have observed a lack of research on the strategic decision-making process. Empirical tests of factors that have been hypothesized to affect the way strategic decisions are made are notably absent (Fredrickson, 1985). This article reports the results of a study that attempts to assess the effects of decision-making circumstances, focusing mainly on the approaches applied and the managerial skills and capabilities the decision makers built on during concrete strategic decisionmaking procedures. The study was conducted in California between September 2005 and June 2006 and it was sponsored by a Fulbright research scholarship grant.


Sign in / Sign up

Export Citation Format

Share Document