1-20 of 25 Results

  • Keyword: technology x
Clear all

Chapter

This chapter examines two types of irregular warfare: terrorism and insurgency. It first considers the problematic definitions given to irregular warfare, terrorism and insurgency before discussing the theory and practice of irregular warfare. In particular, it highlights the role of time, space, legitimacy, and/or support in insurgent and terrorist campaigns. It then analyses counterinsurgency and counterterrorism in theory and practice, focusing on three important elements of successful campaigns against insurgents and terrorists, namely, location, isolation, and eradication. It also explores contemporary and future irregular threats and how they are driven by a combination of culture, religious fanaticism, and technology. Finally, it comments on the role to be played by information technology in irregular wars of the future, which some observers expect to be fought in cyberspace.

Chapter

This chapter examines two types of irregular warfare: terrorism and insurgency. It first considers the problematic definitions given to irregular warfare, terrorism, and insurgency before discussing the theory and practice of irregular warfare. In particular, it highlights the role of time, space, legitimacy, and/or support in insurgent and terrorist campaigns. It then analyses counterinsurgency and counterterrorism in theory and practice, focusing on three important elements of successful campaigns against insurgents and terrorists, namely, location, isolation, and eradication. It also explores contemporary and future irregular threats and how they are driven by a combination of culture, religious fanaticism, and technology. Finally, it comments on the role to be played by information technology in irregular wars of the future, which some observers expect to be fought in cyberspace.

Chapter

Larry Diamond and Zak Whittington

This chapter examines the role of social media in processes of democratization. Facilitating rapid and decentralized communication among a wide range of actors, social media have played a particularly potent role in the past decade in facilitating the mobilization of protest against authoritarian regimes, the exposure of corruption and human rights abuses, and the monitoring of elections to expose electoral fraud. The chapter explores how social media have provided new tools for challenging dominant parties. It also looks at the ways in which authoritarian regimes censor and suppress access to these tools, while appropriating them for their own purposes of propaganda and control.

Chapter

This chapter examines how globalization has contributed to the growth of terrorism as a global phenomenon. It considers whether global terrorism is the price states pay for entry into and continued access to a globalized system, why violent Islamic extremism continues to be the primary motivator for global terrorist violence, and whether freedoms should be restricted to ensure greater security against the threat of global terrorism. The chapter first looks at the definitions of terrorism before tracing the transformation of terrorism from a transnational to a global phenomenon. It then explores the role of technology in terrorism and ways of combating terrorism. The two case studies in this chapter deal with activities of the so-called Islamic State in the Philippines and Mozambique since 2017 and the US ‘insurrection’ on 6 January 2021.

Chapter

Peter R. Neumann

This chapter looks into the evolution of terrorism. Changes in technology and other aspects of terrorism had produced a new form of terrorism. Globalization and the rise of information technology had allowed terrorist organizations to ‘flatten’ their hierarchies and operate across greater distances. Academic studies into new terrorism considers the following: the motives and actions of policymakers, validity of cause, and comparisons between ‘new’ and ‘old’ terrorisms. The chapter specifically considers Islam. The chapter also looks at considerations over the use of the term ‘new’ in relation to terrorism now. New terrorism has brought out a more nuanced and sophisticated understanding of the various trends and developments within the broader field of terrorism studies.

Chapter

Eliot A. Cohen

This chapter discusses the role of technology in achieving victory in battle and the emerging technological trends that are likely to transform the way wars are conducted in the future. It first considers the debate over the importance of military technology in warfare before introducing the reader to some concepts about military technology, showing that military technologies often reflect different national styles. In turn, different national styles are determined by a variety of factors such as the search for technological edge. The chapter goes on to examine the debate regarding the revolution in military affairs and how asymmetric challenges such as irregular warfare and the threat of weapons of mass destruction can counterbalance superior conventional technology. It also explores the range of challenges presented by new technologies to military and political leaders before concluding with an analysis of the future of military technology.

Chapter

Ryan Grauer

This chapter explores the relationship between military technology and warfare, with a particular focus on the tools and the ways they are used in conventional wars between states. There are significant technological changes afoot in military affairs, and conventional wisdom suggests that countries failing to keep pace with developments risk being relegated to the dustbin of history. However, there is reason to doubt this general claim. Militaries have always been incentivized to develop weapons and to integrate them into existing and emerging forces. As a consequence, there have been several ‘revolutions in military affairs’ throughout history and it is possible that a new one is currently under way. Technological development in the warfighting realm is not easy, however. As militaries seek to develop new tools and processes, they are constrained by a variety of factors, including national capacities, strategic culture, and strategic requirements. When they do acquire new technologies, the utility of the tools is limited by the frailty of the humans using them, their own organizational processes, and the nature of war itself. Countries that solve these problems can bolster their efficiency, effectiveness, and power in combat and so gain a decisive edge in combat over those that do not. Perfect solutions are evasive, however, and, except in cases of extreme technological disparities, tools and processes only rarely determine outcomes. The challenges of technological development persist into the present day and will continue to confound attempts to weaponize tools like artificial intelligence and quantum computing. Nevertheless, because there is significant potential in such technologies, strategists ignore them at their own peril.

Chapter

12. Digital Policy-Making in the European Union  

Building the New Economy of an Information Society

Abraham L. Newman

Digital technologies are transforming European societies, politics, and markets. Since the 1970s, the European Union has attempted to navigate these pressures through a package of digital policy-making. These efforts have targeted the dual missions of pan-European market-making, as well as market correction. Relying on a host of governance modes including the regulatory method, policy coordination, incorporated transgovernmental networks, and private governance, the European Union has tried to steer the new information society so as to both spur market growth and protect citizens against abuse. The ultimate success of these efforts has been encumbered by the overall complexity of the sector, where policy efforts quickly bleed over into other issue areas, such as competition policy and justice and home affairs, and have international consequences. Digital policy-making in Europe faces considerable challenges ahead, as EU institutions grapple with the rise of platform companies, disinformation campaigns, and transatlantic disputes over data privacy and the market power of US-based technology companies.

Chapter

Tony Roberts, Kevin Hernandez, and Becky Faith

This chapter assesses the use of digital technologies in international development. Digital technologies are transforming economic and social life and are used in almost every sector of development. However, positive benefits in the form of digital dividends are limited by continued digital divides in Information and Communication Technology (ICT) access. Use of digital technologies tends to reflect, reproduce, and amplify existing patterns of inequality. Thus, digital development initiatives need to design for equity, include non-digital communication, and pay attention to potential risks. The chapter then provides examples of contemporary digital development projects applying Information and Communication Technologies for Development (ICT4D), and looks at 'frontier technologies' that may shape the future of international development.

Chapter

This chapter addresses the globalization of production. Although companies have been investing abroad for centuries, the most recent era of globalization has created an unprecedented range of possibilities for global firms to reorganize and relocate their activities. The chapter analyses how advances in transportation and technology allow a firm to divide up a global value chain — the sequence of activities that lead to the production of a particular good or service — and how these decisions create new opportunities and challenges for both companies and the societies within which they operate. It first reviews the rise of global production and the forces that have led to dramatic increases in foreign direct investment (FDI) and outsourcing. The central questions for any firm involved in global production involves how to govern the value chain and where to locate different activities. The chapter then provides a framework for understanding these issues and the implications of the various choices. It also applies these concepts to the case of East Asia, particularly China.

Chapter

Claire Colebrook

This chapter explores the various disciplinary and political dimensions of Donna Haraway’s work revolving around the negotiation of the interdisciplinary problem of the Anthropocene. It considers Haraway’s works which range between feminist interventions in science studies, animal studies, and environmental criticism. Haraway’s A Cyborg Manifesto (1985) offers a feminist response to broadly Marxist accounts of the relationship between technology and history while also reconfiguring and responding to feminist forms of socialism. After briefly introducing Haraway’s contributions to standpoint theory and posthumanism, this chapter turns to an examination of her critique of science and her alternative way of considering the world in which the boundaries between the human and non-human disappear. Haraway outlines various ways to think about planetary change and develops a conception of the Chthulucene that captures the complexity of the present, including the transformation of nature through human histories.

Chapter

Ikenna Acholonu, Charlotte Brown, and Ingrina Shieh

This concluding chapter brings together reflections from practitioners, thinkers, and academics. They comment on achievements and challenges for social progress in the world over the past 30 years, and outline possible futures for poverty and development. Economist and historian María del Pilar López-Uribe speaks about the experiences of South American countries. She is an authority on the long-term effects of climate change and geography on institutional drivers of economic development, and on the history of land conflicts and property rights in Colombia. Meanwhile, Leonard Wantchekon highlights the role of technology in shaping the future of development. Affan Cheema also offers a practitioner's perspective on the need to approach humanitarianism from a more holistic perspective in relation to development. The chapter then looks at how warnings of the effects of climate change have galvanized international movements calling for governments to declare a climate emergency and prioritize policies that promote sustainability and mitigate the environmental impact of the global economy. Since forming in spring of 2018, the environmental pressure group Extinction Rebellion has organized protests that have reached international scale.

Chapter

This chapter looks at the role of technology in the battle against terrorism. Technology was quickly identified as such a potential ‘silver bullet’ following the 9/11 event. This showed that border controls alone are insufficient to prevent terrorist incidents. Technology was able to help with biometrics, data mining, and acquisition to identify terrorists posing as regular citizens. While technology is undeniably useful, it is not fool proof. The chapter uses facial recognition software to illustrate issues with technology. This type of software often comes up with false positives and biases against minority groups. The chapter also raises issues of privacy and civil liberties while referencing the Pegasus spyware scandal as an example.

Chapter

3. Growth Unlimited  

The Promethean Response

This chapter covers a response to the discourse of limits which stresses the unlimited capacity of ingenious humans to overcome ecological limits, especially when they are organized in capitalist markets. For Prometheans, long term trends show environmental improvement and declining resource scarcity, such that economic growth can therefore go on forever. This Promethean discourse has often been advanced by market economists, and has often been highly influential in government, especially in the United States. More recently a Promethean environmentalism looks forward to a ‘good Anthropocene’ in which government too plays a role in bringing natural systems under benign human control, so that technologies such as geoengineering can be used effectively against problems such as climate change. In the background of Promethean argument is an older cornucopian discourse that stresses natural abundance of resources and the capacity of ecosystems to absorb pollutants. Ecologists and Earth systems scientists are not convinced and remain critical of Promethean discourse.

Chapter

This chapter examines how globalization has contributed to the growth of terrorism as a global phenomenon. It considers whether global terrorism is the price states pay for entry into and continued access to a globalized system, why violent Islamic extremism continues to be the primary motivator for global terrorist violence, and whether freedoms should be restricted to ensure greater security against the threat of global terrorism. The chapter first looks at the definitions of terrorism before tracing the transformation of terrorism from a transnational to a global phenomenon. It then explores the role of technology in terrorism and ways of combating terrorism. Two case studies are presented, one dealing with three generations of violent Islamic extremists and the other with the 2016 Lahore terrorist attack. There is also an Opposing Opinions box that asks whether states targeted by terrorism should aggressively address the threat beyond their national borders.

Chapter

Benjamin J. Muller

This chapter reviews the security politics of borders and mobility. Borders and bordering practices—such as surveillance, ID technology, and the virtual border—are presented as essential to security. Conversely, forms of mobility are framed as threats, and in the process mobile actors are regularly rendered precarious and dehumanized. How should we understand borders as spaces of contestation? To what extent are borders and mobility about the production and negotiation of belonging and precarity, sometimes violently, along hierarchies of class, gender, race, sexuality, indigeneity, and territoriality? The chapter focuses on territorial sovereign borders and demonstrates the extent to which borders, bordering practices, and boundary making are framed as ‘belonging’ and mobility well beyond territoriality.

Chapter

This chapter studies the connections between security and surveillance in order to discover how (in)security and violence are fostered by the digital. To do so, it is important to understand the digital in terms of datafication, computation, and materiality. These enable us to critically explore security through society and technology and tensions between the local and the global, while asking questions about the growing role of IT companies in our worlds. Datafication is at the core of modern statecraft—techniques for counting things and people allow authorities to maintain control over a population at a distance, imposing and collecting taxes that can be used to reinforce their military power. At the same time, showcasing the development of computing permits us to emphasize the key role of security imaginaries in shaping what is now called the digital age.

Chapter

Katrin Voltmer and Gary Rawnsley

This chapter examines the role of the media in processes of democratization. It considers the media’s political, economic, and social environment both in their domestic and international contexts. It also explains how new communications technologies have made it increasingly difficult for authoritarian regimes to hermetically seal their borders to prevent the flow of information in and out of the country. The most noticeable influence of international communications in the process of democratization is the ‘demonstration effect’. The chapter also discusses media-state relations, how market conditions and commercialization affect the media’s ability to fulfil their democratic role, and issues of journalistic professionalism and the quality of reporting. It argues that democracy and the media need each other.

Chapter

Amitav Acharya and Jiajie He

This chapter examines the limitations and problems of strategic studies with respect to security challenges in the global South. It first considers the ethnocentrism that bedevils strategic studies and international relations before discussing mainstream strategic studies during the cold war. It then looks at whether strategic studies kept up with the changing pattern of conflict, where the main theatre is the non-Western world, with particular emphasis on the decline in armed conflicts after the end of the cold war, along with the problem of human security and how it has been impacted by technology. It also explores the issue of whether to take into account non-military threats in strategic studies and the debates over strategic culture and grand strategy in China and India. It concludes by proposing Global International Relations as a new approach to strategic studies that seeks to adapt to the strategic challenges and responses of non-Western countries.

Chapter

This chapter examines how the theory and practice of war has evolved over the past two centuries. It first provides an overview of modern warfare and the transformation in the way that wars are fought. In particular, it charts the decline of limited warfare and considers the ideas of Prussian career soldier Carl von Clausewitz, along with the emergence of the Napoleonic way of war and the legacy of Napoleon Bonaparte with regard to strategy. It then discusses the impact of the Industrial Revolution on the planning for and conduct of war, focusing on the ways that weapons technology transformed both strategy and tactics. It also explores the evolution of naval warfare, how nuclear weapons ended the era of total war, and the rise of revolutionary warfare. Finally, it reflects on how the transition to postmodernity can influence war as a politico-cultural institution.