scholarly journals (Russian) Deterrence, we hardly know ye…

2021 ◽  
Author(s):  
Stephan De Spiegeleire ◽  
Yar Batoh ◽  
Daria Goriacheva ◽  
Glib Voloskyi ◽  
Khrystyna Holynska ◽  
...  

This paper provides the epistemic equivalent of an 'MRI' scan of the English and Russian literature on deterrence in an international security context. Using a variety of different recent datasets and -tools, the paper exposes a surprisingly high number of glaring weaknesses and holes. The paper’s first, more ‘technical’, section presents compelling evidence that the volume, velocity, collegiality and uptake of publicly available scientific insights into ‘security deterrence’ remain decidedly suboptimal – also compared to the other scientific disciplines that have examined human deterrence. The data on the scientific thoroughness of this field also paint a discomfortingly bleak picture, albeit less conclusively so. The paper’s second, more substantive section equally painfully highlights what it calls the field’s unbearable empirical lightness; conceptual confusion and cacophony (even within language domains); as well as multiple major (highly relevant) epistemic holes and other weaknesses. The paper concludes with some recommendations on how the epistemic community working on these issues as well as the academic and policy communities that fund much of this research can build on uniquely promising new developments in the access to (especially also textual) data to build and validate more granular and trustworthy datasets; in humans’ newfound ability to interact with machine algorithms to semantically parse texts to discover and validate ‘knowledge’ in unprecedented ways; but also – in a more mundane mode – to start incentivizing more organically collaborative ways of knowledge building.

2017 ◽  
Vol 43 (3) ◽  
pp. 494-515 ◽  
Author(s):  
Björn Jerdén

AbstractMany states partially relinquish sovereignty in return for physical protection from a more powerful state. Mainstream theory on international hierarchies holds that such decisions are based on rational assessments of the relative qualities of the political order being offered. Such assessments, however, are bound to be contingent, and as such a reflection of the power to shape understandings of reality. Through a study of the remarkably persistent US-led security hierarchy in East Asia, this article puts forward the concept of the ‘epistemic community’ as a general explanation of how such understandings are shaped and, hence, why states accept subordinate positions in international hierarchies. The article conceptualises a transnational and multidisciplinary network of experts on international security – ‘The Asia-Pacific Epistemic Community’ – and demonstrates how it operates to convince East Asian policymakers that the current US-led social order is the best choice for maintaining regional ‘stability’.


2018 ◽  
Vol 188 (2) ◽  
pp. 47-60
Author(s):  
Tomasz Jakubczyk

The specificity of the 21st century filled with economic and social problems, acts of terror as well as armed conflicts downrightly necessitates undertaking the research in the field of security sciences. However, each time defining a subject of scientific research is of the utmost importance in order to systemize research works and mainly concretize interests. Such the aim was chosen by the author of the current article who, while presenting the orientations of individual scientific theoreticians and researchers dealing with security issues, answers the subject matter question: What does constitute the subject of the research in security sciences? The author’s inquiries were preceded by the explanation of the types of security and its scope within individual cases, which includes the essence of national and international security. In the further part of the article the author’s attention was focused on the sphere of methodology in security sciences. The author notices that the subject of research in the security science is of multidimensional character hence explanation, description, analyzing, assessing and forecasting the consequences of ongoing processes and events in the security sphere, together with initiation of activities which serve for ensuring security, require applying the knowledge from various scientific disciplines, domains and fields. In the following part of the article the attempt to define the subject of research in security sciences and drawing the conclusions within that field was undertaken. The author cites the orientations by A. Dawidczyk and T. Jemiolo according to whom the subject of research in security sciences is defined as the threat coming from human surroundings and all the activities aiming at ensuring and maintaining security for a man. The article is summarized by the conclusions where it was determined that in security sciences, the security, its components, ratio, level and relations with respect to the subject of research are studied.


Author(s):  
P.A. Crozier ◽  
M. Pan

Heterogeneous catalysts can be of varying complexity ranging from single or double phase systems to complicated mixtures of metals and oxides with additives to help promote chemical reactions, extend the life of the catalysts, prevent poisoning etc. Although catalysis occurs on the surface of most systems, detailed descriptions of the microstructure and chemistry of catalysts can be helpful for developing an understanding of the mechanism by which a catalyst facilitates a reaction. Recent years have seen continued development and improvement of various TEM, STEM and AEM techniques for yielding information on the structure and chemistry of catalysts on the nanometer scale. Here we review some quantitative approaches to catalyst characterization that have resulted from new developments in instrumentation.HREM has been used to examine structural features of catalysts often by employing profile imaging techniques to study atomic details on the surface. Digital recording techniques employing slow-scan CCD cameras have facilitated the use of low-dose imaging in zeolite structure analysis and electron crystallography. Fig. la shows a low-dose image from SSZ-33 zeolite revealing the presence of a stacking fault.


2013 ◽  
Vol 23 (2) ◽  
pp. 49-61 ◽  
Author(s):  
Jamie Perry ◽  
Graham Schenck

Despite advances in surgical management, it is estimated that 20–30% of children with repaired cleft palate will continue to have hypernasal speech and require a second surgery to create normal velopharyngeal function (Bricknell, McFadden, & Curran, 2002; Härtel, Karsten, & Gundlach, 1994; McWilliams, 1990). A qualitative perceptual assessment by a speech-language pathologist is considered the most important step of the evaluation for children with resonance disorders (Peterson-Falzone, Hardin-Jones, & Karnell, 2010). Direct and indirect instrumental analyses should be used to confirm or validate the perceptual evaluation of an experienced speech-language pathologist (Paal, Reulbach, Strobel-Schwarthoff, Nkenke, & Schuster, 2005). The purpose of this article is to provide an overview of current instrumental assessment methods used in cleft palate care. Both direct and indirect instrumental procedures will be reviewed with descriptions of the advantages and disadvantages of each. Lastly, new developments for evaluating velopharyngeal structures and function will be provided.


Sign in / Sign up

Export Citation Format

Share Document