Conclusion

Secret Wars ◽  
2018 ◽  
pp. 283-316
Author(s):  
Austin Carson

This chapter summarizes the key empirical findings and address extension of the basic argument to cyberconflict and violence within states (i.e., civil wars, terrorism). A consistent theme of the book is that the backstage of war sometimes features direct combat encounters by outside powers that were publicly understood to have avoided such entanglements. The chapter then presents a brief case study of a post-Cold War conflict: the Iranian covert weapons supply program during the U.S. occupation of Iraq (2003–2011). The U.S. occupation of Iraq and the Iranian covert intervention that followed suggest the links between limited war, covertness, and collusion continue to be relevant. Though conclusions about the case are necessarily preliminary, the chapter reviews this conflict to illustrate how the claims of the theory travel to a more recent case. It also addresses questions about the initial choice to intervene, mistakes and exploitation, and the possible implications of social media and leaks in the contemporary era. It concludes by discussing the implications of secrecy's role in escalation control for policy and scholarship.

Asian Survey ◽  
1993 ◽  
Vol 33 (8) ◽  
pp. 832-847
Author(s):  
Allan E. Goodman
Keyword(s):  
Cold War ◽  

Daedalus ◽  
2017 ◽  
Vol 146 (4) ◽  
pp. 33-44 ◽  
Author(s):  
Bruce D. Jones ◽  
Stephen John Stedman

By the standards of prosperity and peace, the post–Cold War international order has been an unparalleled success. Over the last thirty years, there has been more creation of wealth and a greater reduction of poverty, disease, and food insecurity than in all of previous history. During the same period, the numbers and lethality of wars have decreased. These facts have not deterred an alternative assessment that civil violence, terrorism, failed states, and numbers of refugees are at unprecedentedly high levels. But there is no global crisis of failed states and endemic civil war, no global crisis of refugees and migration, and no global crisis of disorder. Instead, what we have seen is a particular historical crisis unfold in the greater Middle East, which has collapsed order within that region and has fed the biggest threat to international order: populism in the United States and Europe.


Author(s):  
Thomas J. Christensen

This chapter examines how, in the post-Cold War era, the United States' alignment with Taiwan and alliance with Japan again have figured prominently among issues affecting U.S.-China security relations. While they are far from being allies, the United States and the People's Republic of China (PRC) are not enemies either, but rather major economic partners who have also cooperated to some degree in addressing an increasing range of international problems. But there are still security tensions between the two sides over issues such as relations across the Taiwan Strait, and both nations practice coercive diplomacy toward the other, sometimes tacitly, sometimes less so. The chapter considers how the legacies of these Cold War alliances—particularly the U.S.–Taiwan relationship and the U.S.–Japan security treaty—have affected U.S.–China relations since the collapse of the Soviet Union.


Author(s):  
J. J. Sylvia IV ◽  
Kyle Moody

The issue of Russian interference in the 2016 U.S. Presidential election has been widely debated by scholars and journalists. However, these works have not fully analyzed the ads that have been released by Facebook and the U.S. Congress. This project uses a case study to analyze the ads posted by the Russian-affiliated Internet Research Agency, considering the quantities of ads targeted to particular geographic locations, the frequency of targeting for unique keywords, and the reach and impressions of each of the ads. Further, these results are compared to results from best practices in traditional social media campaigns as a way to better understand the goals and potential impacts of the IRA ads. In conclusion, the project, by analyzing the full set of IRA ads, sheds new light on the way false information narratives were leveraged by the Russian-linked IRA.


2012 ◽  
pp. 1824-1837 ◽  
Author(s):  
Leila Sadeghi ◽  
Steve Ressler ◽  
Andrew Krzmarzick

This chapter examines the growing literature on e-government and Web 2.0 with particular attention to online collaborative platforms, such as GovLoop, that complement government. The authors present a thorough background to the topic of Web 2.0 in e-government and present numerous examples of how these technologies are used across government both in the U.S. and globally. This chapter explores two main areas: first, how Web 2.0 and social media are being used as a vehicle to enhance e-government, and second, to present a case study of GovLoop, which is a collaborative social media platform designed to complement the work of government. GovLoop provides those working within and external to government—citizens, government employees, academics, non-profit professionals and contractors—with the ability to share information and collaborate on issues of public benefit. The chapter presents a starting point for future research on how Web 2.0 is changing the very nature of e-government and service delivery, and how governments are in a unique position to utilize these tools to expand collaboration and openness with their communities.


Author(s):  
Todd R. Burton

Potential leaders within marginalized communities find it difficult to connect, learn, strategize, and support one another and build a cohesive community capable of effecting social change. This research contributes to filling a gap in empirical research on effective approaches to employing social media tools to organize and engage in social movements. The research builds on earlier studies of marginalized communities and social media to organize and engages in social movements by applying a case study design to assess how the lesbian, gay, bisexual, and transgender (LGBT) military community employed social media to organize and advocate for inclusion and end discrimination within the U.S. armed forces. Seventeen findings were identified that describe key ways the LGBT military community employed these tools to organize, identify leaders and their roles, and how online behavior affected offline advocacy.


Author(s):  
Timothy Stapleton

Since independence from France in 1960, the Central African Republic (CAR) has experienced numerous military coups both successful and unsuccessful, mutinies by disgruntled soldiers and civil wars that have had terrible impacts on civilians. Three career military officers took power by force and led the country for a total of 36 years: Bokassa (1965–1979), Kolingba (1981–1993), and Bozize (2003–2013). From the 1960s to 1990s, both military and civilian rulers politicized, regionalized, and weakened the CAR military by packing it with supporters from their home areas and ethnic groups, and establishing alternative security structures and bringing in foreign troops to secure their regimes. In this period, the CAR military became a Praetorian force obsessed with the country’s internal political power struggles. In the 1990s, in the context of the post-Cold War political liberalization of Africa, the CAR’s transition to democracy was undermined by a succession of army mutinies over lack of pay and other grievances that fatally weakened an already fragile state. A series of civil wars in the 2000s and 2010s resulted in the near dissolution of the CAR military and the partition of the country into a network of fiefdoms dominated by antagonistic local armed factions separated from each other by beleaguered UN peacekeepers.


1995 ◽  
Vol 14 (2) ◽  
pp. 244-247 ◽  
Author(s):  
David R. Franz

Proliferation of biological—as well as chemical and nuclear—weapons is a threat to the security of the U.S. in the post-Cold War era. The number of states with biological weapons (BW) programs or with a strong interest in having a BW program has increased significantly since the Biological Weapons Convention (BWC) was signed in 1972 (Office of Technology Assessment, 1993). BW programs present difficult intelligence targets. Thus, the Soviet Union was a signatory to the BWC at the time of the Sverdlovsk incident in 1979, yet we knew little of the scope of its BW program until 1991 (Meselson et al., 1994). The spread of biotechnology throughout the world in recent years has made even more governments potentially BW capable.


Sign in / Sign up

Export Citation Format

Share Document