In this analysis of naval arms control between the two world wars, Emily Goldman dissects the underlying assumptions of arms control theory that have guided theorizing and practice for the past thirty years. She concludes that because there has been a near-exclusive focus on the behavior of the superpowers and on the consequences of nuclear technology, the arms control process has been artificially constrained in its scope and potential. Returning to the most important historical precedent of arms control prior to the Cold War, Goldman demonstrates that there are two distinct strategies of...
In this analysis of naval arms control between the two world wars, Emily Goldman dissects the underlying assumptions of arms control theory that ha...
Like the industrial revolution before it, the information technology revolution appears to be creating a new ruling class, a new economy and a new society. Information technology is also transforming military operations and warfare. A vast literature on the revolution in military affairs (or "RMA") cites the important (indeed, dominant) role of information technology in enabling a new military revolution. This volume challenges conventional wisdom not by claiming that information's impact on military operations is not "positive" or "transformative" but by claiming its impact is not "new."...
Like the industrial revolution before it, the information technology revolution appears to be creating a new ruling class, a new economy and a new soc...
As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant. These essays examine...
As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing ...
As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing concern. Political, economic and military leaders must manage and reduce the level of risk associated with threats from hostile states, malevolent nonstate actors such as organized terrorist groups or individual hackers, and high-tech accidents. The impact of the information technology revolution on warfare, global stability, governance, and even the meaning of existing security constructs like deterrence is significant. These essays examine the...
As the activities of individuals, organizations, and nations increasingly occur in cyberspace, the security of those activities is becoming a growing ...
As military forces across the globe adopt new technologies, doctrines, and organizational forms suited to warfare in the information age, defense practitioners and academic specialists are debating the potential consequences of the "revolution in military affairs." The central question of this book is how such revolutions spread, to whom, how quickly, and with what consequences for the global balance of military power. The contributors to this volume--who include historians, political scientists, policy analysts, and sociologists--examine the diffusion of weapons technology, know-how, and...
As military forces across the globe adopt new technologies, doctrines, and organizational forms suited to warfare in the information age, defense prac...
The United States faces a complex and rapidly shifting international security landscape. Forces of ethnic and religious extremism, diffusion of information technologies, proliferation of mass destruction weapons, and newly empowered non-state actors are just some of the trends whose complex interplay will produce unanticipated threats. Yet, while the future is more uncertain today than during the Cold War, we currently have a window of opportunity for shaping a more favorable future. The challenge for the United States, and for all states, is not just to manage uncertainty but also to prevail...
The United States faces a complex and rapidly shifting international security landscape. Forces of ethnic and religious extremism, diffusion of inform...
Like the industrial revolution before it, the information technology revolution appears to be creating a new ruling class, a new economy and a new society. Information technology is also transforming military operations and warfare. A vast literature on the revolution in military affairs (or "RMA") cites the important (indeed, dominant) role of information technology in enabling a new military revolution. This volume challenges conventional wisdom not by claiming that information's impact on military operations is not "positive" or "transformative" but by claiming its impact is not "new."...
Like the industrial revolution before it, the information technology revolution appears to be creating a new ruling class, a new economy and a new soc...