18,498 research outputs found

    Set-Monotonicity Implies Kelly-Strategyproofness

    Full text link
    This paper studies the strategic manipulation of set-valued social choice functions according to Kelly's preference extension, which prescribes that one set of alternatives is preferred to another if and only if all elements of the former are preferred to all elements of the latter. It is shown that set-monotonicity---a new variant of Maskin-monotonicity---implies Kelly-strategyproofness in comprehensive subdomains of the linear domain. Interestingly, there are a handful of appealing Condorcet extensions---such as the top cycle, the minimal covering set, and the bipartisan set---that satisfy set-monotonicity even in the unrestricted linear domain, thereby answering questions raised independently by Barber\`a (1977) and Kelly (1977).Comment: 14 page

    Information Warfare and the Future of Conflict

    Get PDF
    The goal of the Future of Information Warfare Threatcasting Project was to explore the coming decade’s emerging technological and cultural trends and envision plausible future threats from multiple perspectives. The project sought to illuminate emerging areas of strategic threat and potential investment, particularly relating to the proliferation of emerging intelligences, technologies, and systems that could considerably change the nature of the battlefield by 2028 and beyond. In three Threatcasting Workshops a select group of practitioners from across multiple domains (security, academia, media, and technology) worked to envision these futures and explore what actions should be taken now to counter future IW threats. The final goal was to operationalize the finding for the Army and to determine what actions could be taken to disrupt, mitigate, and recover from these future threats.https://digitalcommons.usmalibrary.org/aci_books/1039/thumbnail.jp

    A poststructuralist approach to strategic culture: Estonia's strategic response to Russia's hybrid threat

    Get PDF
    This research has investigated how the hegemonic articulation of Estonian strategic culture mediates its strategic response to Russian hybrid threat in the information sphere. The study employs poststructuralist discourse theory as an intellectual framework and examines Estonia’s strategic culture as a discursive context. Poststructuralist discourse analysis is utilised in the empirical analysis of Estonian strategic texts. The central argument of this study is that drawing on the privileged identity of Western democracy, the hegemonic articulation of Estonian strategic culture has rendered a cluster of security practices in response to Russian hybrid threat appropriate and “normal”, namely the establishment of ETV+, the authorisation of Sputnik operation in Estonia, the partnership between Tallinn Television and Pervõi Baltiski Channel, and the public debunking practices. At the same time, such a hegemonic articulation excludes the illiberal security practices from the strategic frontier, namely censorship, nationalisation of information sphere and crackdown on Russia’s media outlets in Estonia. Therefore, Estonia’s strategic culture has created conditions of possibility for the minimalist approach to strategic response to Russian hybrid threat in the information sphere. The existing minimal strategic response is sustained by the concept of media liberalism. At the same time, the challenging political force is trying to disrupt the hegemonic articulation by bringing into play the concept of media sovereignty. However, Estonia’s strong Western democratic identity has prevented the latter from gaining momentum.https://www.ester.ee/record=b5173983*es

    Fear appeal construction in the Daily Mail Online:a critical discourse analysis of ‘Prime Minister Corbyn and the 1000 days that destroyed Britain’

    Get PDF
    The rhetorical fear appeal is a technique of political communication that seeks to elicit an emotional response in receivers with the intention of provoking them to political action desired by the rhetor. This paper examines a single example of fear appeal construction in the British press, the Mail Online’s ‘Prime Minister Corbyn and the 1000 days that Destroyed Britain’ (2015), through analysis of its use of two defining political myths, a conservative myth of declinism, and the utopia/anti-utopia binary myth. I firstly examine the origins and contemporary uses of fear appeals as techniques of political persuasion, before going on to examine how these are constructed. I then go on to analyse the Mail Online article’s use of these two powerful political myths, one, declinism, which I argue is utilised descriptively for the purposes of discourse construction, and the other, utopia/anti-utopia, which is utilised instructively. Finally, I propose a method of analysis combining recent approaches to the critical discourse analysis of myth with the cognitive-motivational-relational theory of emotion drawn from social psychology, in order to show how the Mail Online article is constructed as a discursive fear appeal

    Hybrid Warfare

    Get PDF
    This book is available as open access through the Bloomsbury Open Access programme and is available on www.bloomsburycollections.com. Hybrid Warfare refers to a military strategy that blends conventional warfare, so-called ‘irregular warfare’ and cyber-attacks with other influencing methods, such as fake news, diplomacy and foreign political intervention. As Hybrid Warfare becomes increasingly commonplace, there is an imminent need for research bringing attention to how these challenges can be addressed in order to develop a comprehensive approach towards Hybrid Threats and Hybrid Warfare. This volume supports the development of such an approach by bringing together practitioners and scholarly perspectives on the topic and by covering the threats themselves, as well as the tools and means to counter them, together with a number of real-world case studies. The book covers numerous aspects of current Hybrid Warfare discourses including a discussion of the perspectives of key western actors such as NATO, the US and the EU; an analysis of Russia and China’s Hybrid Warfare capabilities; and the growing threat of cyberwarfare. A range of global case studies – featuring specific examples from the Baltics, Taiwan, Ukraine, Iran and Catalonia – are drawn upon to demonstrate the employment of Hybrid Warfare tactics and how they have been countered in practice. Finally, the editors propose a new method through which to understand the dynamics of Hybrid Threats, Warfare and their countermeasures, termed the ‘Hybridity Blizzard Model’. With a focus on practitioner insight and practicable International Relations theory, this volume is an essential guide to identifying, analysing and countering Hybrid Threats and Warfare

    Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study

    Get PDF
    This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives

    Breaking the Mold: Consolidated Report on the Workshop

    Get PDF
    https://digital-commons.usnwc.edu/btm/1000/thumbnail.jp

    Mapping war, peace and terrorism in the global information environment

    Get PDF
    This article outlines in general terms how the environment of 21st century transnational organised crime, terrorism and unconventional conflict is being shaped by information-related capabilities (IRCs) that foster global networked connectivity and asymmetric responses to conventional military supremacy. This article explores how the conceptual apparatus regarding the distinction between wartime and peacetime, as well as war zones and peace zones, which has been developed within the framework of international criminal law and humanitarian law, can contribute to military-strategic operational and capability concepts. Integration of these conceptual frameworks within strategic analysis can serve to promote the effective use of force within a full spectrum operational environment in which information, surveillance, target acquisition and reconnaissance thresholds are being raised and where deeper understandings of the social dynamic that sustains ongoing fighting within a global information environment become increasingly feasible. In this context, this article suggests that law enforcement frameworks and approaches have a high threshold of applicability if the strategic failures associated with conventional military operations are to be avoided
    corecore