Informacja

Drogi użytkowniku, aplikacja do prawidłowego działania wymaga obsługi JavaScript. Proszę włącz obsługę JavaScript w Twojej przeglądarce.

Wyszukujesz frazę "proxy" wg kryterium: Temat


Tytuł:
Changes in habitat conditions in a Late Glacial fluviogenic lake in response to climatic fluctuations (Warta River valley, central Poland)
Autorzy:
Forysiak, Jacek
Okupny, Daniel
Obremska, Milena
Antczak-Orlewska, Olga
Płóciennik, Mateusz
Pawłowski, Dominik
Baradyn, Daria
Kotrys, Bartosz
Luoto, Tomi P.
Nevalainen, Liisa
Borówka, Ryszard K.
Powiązania:
https://bibliotekanauki.pl/articles/13955341.pdf
Data publikacji:
2023
Wydawca:
Państwowy Instytut Geologiczny – Państwowy Instytut Badawczy
Tematy:
multi-proxy analysis
Late Weichselian
denudation processes
palaeoclimate
central European river
Opis:
The Warta River valley was greatly influenced by the ice sheet of the Last Glacial Maximum (LGM). A small peatland located in the Warta drainage system is here used as a palaeoarchive of climatic and habitat changes during the Late Glacial (Weichselian). The Ługi sediment profile was investigated using multi-proxy (pollen, Chironomidae, Cladocera and geochemistry) analyses that recorded changes in a fluviogenic sedimentary depression. After the Poznań Phase (LGM), Ługi functioned as an oxbow lake that was cut off from the active river channel as a result of fluvial erosion. Since that time, the Warta River has flowed only along the section now occupied by the Jeziorsko Reservoir. Sedimentation of lacustrine deposits started at the beginning of the Late Glacial. Summer temperature reconstructions indicate cool Oldest and Younger Dryas, but no clear cooling in the Older Dryas. During the Younger Dryas the palaeolake was completely occupied by a peatland (fen), which periodically dried out during the Holocene. Investigation of this site has tracked the reaction of the habitat to climatic, hydrological and geomorphological changes throughout the Late Weichselian.
Źródło:
Geological Quarterly; 2023, 67, 1; art. no. 1
1641-7291
Pojawia się w:
Geological Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Współczesne rozumienie wojen zastępczych
Modern understanding of proxy wars
Autorzy:
Karczmarzyk, Dominik
Powiązania:
https://bibliotekanauki.pl/articles/21230445.pdf
Data publikacji:
2023
Wydawca:
Polskie Towarzystwo Geopolityczne
Tematy:
war
proxy war
hybrid warfare
indirect action
art of war
strategy of warfare
wojna
wojna zastępcza
wojna hybrydowa
działania pośrednie
sztuka wojenna
strategia działań wojennych
Opis:
Advances in the field of military action strategy create the need to reexamine the definition of proxy war. Contemporary researchers are attempting to systematize knowledge on the subject, including those related to the development of a definition of proxy war that corresponds to the contemporary realities of military action. However, there is no consensus among researchers on what characterizes it. It is often equated with indirect action, political intervention, or hybrid warfare. This article aims to organize this knowledge. The subject of the research is the definition of proxy war in the context of its understanding in contemporary scientific discourse. The main problem, determining the research conducted, is to answer the question: what is the contemporary understanding of proxy wars? In order to solve the above research problem, the author undertook an analysis of the existing definitions, focusing on the elements that characterize them, such as: the objectives of using proxy war strategies, the elements determining its occurrence, or the number of parties determining the occurrence of this type of conflict. Due to the existence of many definitions of proxy war, related to each other in content, it was necessary to make a selection, the main criterion of which was the impact of these definitions on the scientific discourse.
Postępy w dziedzinie strategii działań zbrojnych stwarzają potrzebę ponownego przeanalizowania definicji wojny zastępczej. Współcześni badacze podejmują próby usystematyzowania wiedzy na ten temat, m.in. związanej z opracowaniem definicji wojny zastępczej, która odpowiadałaby współczesnym realiom działań zbrojnych. Brak jednak zgodności wśród badaczy wobec tego co ją charakteryzuje. Często jest utożsamiana z działaniami pośrednimi, interwencjami politycznymi, czy wojną hybrydową. Niniejszy artykuł ma na celu uporządkować tą wiedzę. Przedmiotem badań jest definicja wojny zastępczej w kontekście jej rozumienia we współczesnym dyskursie naukowym. Problemem głównym, determinującym prowadzone badania jest odpowiedź na pytanie: jakie jest współczesne rozumienie wojen zastępczych? W celu rozwiązania powyższego problemu badawczego autor podjął się analizy istniejących definicji, skupiając się na elementach je charakteryzujących, takich jak: cele stosowania strategii wojny zastępczej, elementy determinujące jej wystąpienie, czy ilość stron decydująca o zaistnieniu tego rodzaju konfliktu. Z powodu istnienia wielu definicji wojny zastępczej, w stosunku do siebie pokrewnych w treści, konieczne okazało się dokonanie selekcji, której głównym kryterium był wpływ tych definicji na dyskurs naukowy.
Źródło:
Przegląd Geopolityczny; 2023, 45; 138-149
2080-8836
2392-067X
Pojawia się w:
Przegląd Geopolityczny
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
NoPASARAN: a Novel Platform for Analysing Semi-Active elements in Routes Across a Network
Autorzy:
Benhabbour, Ilies
Dacier, Marc
Powiązania:
https://bibliotekanauki.pl/articles/27294199.pdf
Data publikacji:
2022
Wydawca:
NASK - National Research Institute
Tematy:
conformance
firewall
IPsec
Man-in-the-Middle
network
proxy
security
TLS
zgodność
sieć
bezpieczeństwo
Opis:
In this paper, we propose a novel, collaborative distributed platform to discover the presence, or analyse the configuration, of what we call semi-active elements. By doing so, we revisit the ideas initially proposed in [1, 2] with the Netalyzr tool and in [3] with Inmap-t. Our contributions lie in a simplified and more powerful design that enables the platform to be used for a variety of tasks, such as conformance verification, security testing, network configuration understanding, etc. The specifications, design and implementation choices of the platform are presented and discussed. Two use cases are revealed to illustrate how the platform can be used. We welcome any interest shown by others in deploying our tool in different environments, and encourage any subsequent collaboration in improving its expressiveness.
Źródło:
Applied Cybersecurity & Internet Governance; 2022, 1, 1; 1-25
2956-3119
2956-4395
Pojawia się w:
Applied Cybersecurity & Internet Governance
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Design of a rule based monetary policy in a Central Bank Digital Currency System
Autorzy:
Wijngaard, Jacob
Van Hee, Kees
Powiązania:
https://bibliotekanauki.pl/articles/14110259.pdf
Data publikacji:
2021-12-28
Wydawca:
Wyższa Szkoła Bankowa we Wrocławiu
Tematy:
Design
CBDC
Rule-based
Monetary policy
Inflation correction
Domestic product proxy
Opis:
Aim: This paper presupposes a purely Central Bank Digital Currency (CBDC) based system. Its aim is to describe how such a system facilitates complete new possibilities to design a suitable monetary policy. More specifically, the purpose is to show that the available monetary tools can be used to design a rule-based monetary policy that guarantees stability of purchasing power and interest rates. Research methods: The paper is design oriented. It describes how the monetary system could function The important monetary variables are defined and their relationship is described. To illustrate these variables and their relationship, simulation results of their behavior are added. Conclusions: It is shown that it is indeed possible to design a monetary policy that is rule based and guarantees stability of purchasing power and interest rates. Crucial elements in the design are linking the balances of the CBDC-accounts to a proxy of the domestic product and replacing the use of government bonds by allowing the government to borrow from the Central Bank and giving households and businesses the opportunity to open a savings account at the Central Bank. Originality: The approach is completely new. It is the result of rethinking the possibilities of a complete transition of bank money to CBDC. Implications: The paper shows that a more absolute transition to the use of CBDC makes it possible to establish a clearer and more stable monetary practice, and that it is necessary therefore to revise monetary theory.
Źródło:
Central European Review of Economics and Management; 2021, 5, 4; 61-95
2543-9472
Pojawia się w:
Central European Review of Economics and Management
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
ID-based, Proxy, Threshold Signature Scheme
Autorzy:
Pomykała, Jacek
Kułakowski, Henryk
Sapiecha, Piotr
Grela, Błażej
Powiązania:
https://bibliotekanauki.pl/articles/1844644.pdf
Data publikacji:
2021
Wydawca:
Polska Akademia Nauk. Czytelnia Czasopism PAN
Tematy:
ID-based
proxy
threshold
signature
scheme
Opis:
We propose the proxy threshold signature scheme with the application of elegant construction of verifiable delegating key in the ID-based infrastructure, and also with the bilinear pairings. The protocol satisfies the classical security requirements used in the proxy delegation of signing rights. The description of the system architecture and the possible application of the protocol in edge computing designs is enclosed.
Źródło:
International Journal of Electronics and Telecommunications; 2021, 67, 2; 201-205
2300-1933
Pojawia się w:
International Journal of Electronics and Telecommunications
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Klimatyczne uwarunkowania rozwoju osadnictwa na prawie wołoskim w Karpatach Zachodnich na przełomie XV i XVI wieku na przykładzie Podtatrza
Climatic conditions of the development of the Vlach law settlements in the western Carpathians at the turn of the 15th and 16th century on the example of the Podtatrze (Sub-Tatra) region
Autorzy:
Kłapyta, Piotr
Powiązania:
https://bibliotekanauki.pl/articles/1490853.pdf
Data publikacji:
2021-07-19
Wydawca:
Uniwersytet im. Adama Mickiewicza w Poznaniu
Tematy:
settlement crisis
Valachian law
sediment proxy data
Little Ice Age
Sub-Tatra region
kryzys osadniczy
prawo wołoskie
dane sedymentologiczne
Mała Epoka Lodowa
Podtatrze
Opis:
Źródła historyczne wielu miejscowości istniejących od XIV wieku na obszarze polskiego i słowackiego Podtatrza zaświadczają o zastanawiającym i do tej pory mało wytłumaczonym procesie kryzysu osadniczego pod koniec XV w. Polegał on na opuszczaniu znacznej liczby osad rolniczych prawa niemieckiego i ich ponownym odnawianiu na początku XVI wieku na prawie wołoskim przez nowych osadników Rusnaków-Wołochów. Analiza zapisu zmian środowiskowych w tym okresie zarejestrowana w szeregu stanowisk osadów jezior i torfowisk z obszaru Tatr wskazuje, że kryzys osadnictwa rolniczego pod koniec XV mógł być spowodowany długofalowymi zmianami klimatycznymi podczas Małej Epoki Lodowej. Kryzys klimatyczny przełomu XV/XVI wieku uwarunkowany był ochłodzeniem (minimum słoneczne Spörera; AD 1460–1550), na które nałożyła się wyraźna regionalna faza zwilgotnienia klimatu i ekstremalnych zdarzeń hydrometeorologicznych, dobrze odzwierciedlonych w zapisie sedymentologicznym w Tatrach. Kryzys demograficzny spowodował depopulację znacznej części wschodniego Podtatrza oraz pociągnął za sobą potrzebę zmiany strategii gospodarowania w obszarach górskich Karpat z rolniczej na pastersko-rolniczą opartą o innowacyjne regulacje prawa wołoskiego. Nowe społeczności zdołały zaadaptować się do niekorzystnych warunków środowiskowych, a wsie prawa wołoskiego funkcjonowały na tym terenie w kolejnych wiekach bez przeszkód w oparciu gospodarkę pastersko-rolniczą mimo ciągle niesprzyjających warunków klimatyczny Małej Epoki Lodowej.
Historical documents concerning  many localities existing from the 14th century in the Polish and Slovak Podtatrze (Sub-Tatra) region testify the settlement crisis at the end of the 15th century, consisting in disappearance of a large number of agricultural settlements under German law and renewing them at the beginning of the 16th century under the Vlach law by the new settlers of Russniak-Vlach origin. The analysis of the record of environmental changes during this period, recorded in a number of sediment sites of lakes and peat bogs in the Tatra Mountains area, indicates that the crisis of agricultural settlement at the end of the 15th century may have been caused by long-term climate changes during the Little Ice Age. The climate crisis of the turn of the 15th / 16th century was conditioned by cooling (Spörer's solar minimum), which was overlapped with a clear regional phase of climate dampness and extreme hydrometeorological events, well reflected in the sedimentological record in the Tatra Mountains. The demographic crisis resulted in the depopulation of a large part of the eastern Podtatrze and resulted in the need to change the economic strategy in the mountainous Carpathian areas from agriculture to pastoral/agricultural activity based on innovative regulations of the Vlach law. The new communities managed to adapt to the unfavorable environmental conditions, and the villages under the Vlach law functioned in this area in the following centuries without any problems based on the pastoral and agricultural economy, despite the still unfavorable climatic conditions of the Little Ice Age.
Źródło:
Balcanica Posnaniensia Acta et studia; 2021, 28, 1; 133-148
0239-4278
2450-3177
Pojawia się w:
Balcanica Posnaniensia Acta et studia
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
The Fragmented Middle East: Persistent Insecurity, Rising Instability
Podzielony Bliski Wschód: trwała niepewność, rosnąca niestabilność
Autorzy:
Issa, Alex
Powiązania:
https://bibliotekanauki.pl/articles/1803831.pdf
Data publikacji:
2021
Wydawca:
Krakowska Akademia im. Andrzeja Frycza Modrzewskiego
Tematy:
terroryzm
Bliski Wschod
migracja
uchodźcy
aktorzy niepaństwowi
wojna domowa
bezpieczeństwo narodowe
Middle East
Terrorism
Non-State Actors
Proxy Wars
Rivalries
Instability
Refugees
Human Security
Opis:
Po ataku na Centrum Handlu Światowego (World Trade Center – WTC) we wrześniu 2001 r. Bliski Wschód stał się centralnym punktem amerykańskiej interwencji wojskowej. Chaos powiększyła kolejna interwencja amerykańska w Iraku w ramach operacji „Iracka Wolność” w 2003 r. W swoim artykule autor podkreśla, że obecnie, dwadzieścia lat po ataku na WTC, region Bliskiego Wschodu pozostaje regionem niebezpiecznym, ze zdestabilizowaną architekturą bezpieczeństwa narodowego i bezpieczeństwa regionalnego. Analizując sytuację w czterech wybranych krajach: Iraku, Syrii, Libanie oraz Egipcie, udowadnia tezę postawioną na początku artykułu. Wskazuje wyraźnie, że wielotysięczne demonstracje z okresu tzw. Arabskiej Wiosny nie przyniosły zamierzonego efektu, przyczyniając się do kryzysów humanitarnych, masowej migracji czy wręcz umocnienia władzy autorytarnych liderów.
After the 9/11 attacks, the Middle East became the centre of the American military interventions. After Afghanistan in 2001, the US decided to invade Iraq and depose Saddam Hussein in order to bring democracy to the country. In 2021, Iraq is still suffering from a number of problems – social, economic, but also political and security-related – as foreign interference and terrorist attacks have become inherent to the Iraqi daily life. In the Arab spring context, Syria and Egypt saw massive demonstrations, leading firstly to civil and proxy wars and to the proliferation of terrorist groups; and secondly, to the re-establishment of a dictatorship facing many security challenges. The Lebanese case is more complex. The fragility of the state and the predominance of sectarianism and the states within a state phenomenon, to which we can add two major refugee issues with the Palestinians and the Syrians, as well as an aggressive neighbour in the South and constant foreign interference, make the national security concept debatable among the population and political leaders, preventing a concrete national security strategy from being established. With the current economic crisis, a new dimension of national security is added to the state which is already struggling to ensure its duties towards its population. Through these case studies, this article aims to present how each of these countries perceives its national security and the problems it is facing in order to suggest some recommendations for long-term sustainable responses to some of these challenges.
Źródło:
Bezpieczeństwo. Teoria i Praktyka; 2021, XLIV, 3; 169-178
1899-6264
2451-0718
Pojawia się w:
Bezpieczeństwo. Teoria i Praktyka
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Changing the character of proxy warfare and its consequences for geopolitical relationships
Autorzy:
Ivanov, Zoran
Powiązania:
https://bibliotekanauki.pl/articles/1194383.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
state
Proxy force
technologic empowerment
political relationships
geopolitical environment
Opis:
The main purpose of the article is to examine the causal relationship between key elements of the geostrategic environment (i.e. political, military, and technological) and the changes in the characteristics of proxy force. Qualitative data analysis is used to identify the geopolitical environment conditions, actors, and their relationship. The causal analysis between key elements of the geopolitical environment, such as politics, military, and technological, therefore influences how proxy forces change character. The findings imply that the contemporary geopolitical environment is changing the character of the proxies. They can be used as multipurpose forces depending on the desired strategic outcome. The results advocate that proxies have a global reach beyond the traditional battlefield. These capabilities allow proxies to be used in a wide range of political, economic, and military activities, especially in peacetime, and, therefore, influencing, changing, and damaging the state’s mutual relationships. Despite differences between several theoretical perspectives of security theories, many concur on the low desirability of proxy force. The changing characteristics of proxy war allow state and non-state actors to wage war with a minimal use of force, or none at all, beyond the traditional battlefield. Political violence demonstrated through proxy force to fulfil foreign policy goals has become even more violent. In such action, disregarding the sustainable strategic goal can easily damage the state’s international relations and threaten international and regional stability. The overall findings show the urgency for a more holistic approach in the analysis of proxy warfare as part of security studies and military operations.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 37-51
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Countering terrorism in the shadows: The role of private security and military companies
Autorzy:
Hlouchova, Iveta
Powiązania:
https://bibliotekanauki.pl/articles/1194366.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
security
regulations
privatization
counterterrorism
proxy
Opis:
The article identifies the main features of the PSMCs’ involvement in counterterrorism operations and outlines what their future involvement might look like with its implications for international peace and security. The main methods used to gather data and to draw inferences are a content analysis of relevant primary and secondary sources, and a discourse analysis, used as a method of examining the prevailing discourse surrounding the activities of PSMCs, seeking to understand the level of transparency, accountability and attributability of these actors. So far, the PSMCs’ potential for counterterrorism has not been fully exploited. There are many challenges surrounding the existence and operations of PSMCs, mainly lack of transparency and accountability, the continuous significance of the plausible deniability and political expediency PSMCs provide to nation governments, and an insufficient and inadequate international regulatory and control framework with no sanction or enforcement mechanisms. Most recently, the tendency to re-legitimise PSMCs’ activities can be identified. There will most probably be an expansion of PSMCs’ activities in the near future, as climate change consolidates security as a commodity, not a right. Therefore, there is a renewed urgency for adequate and effective international regulatory and control mechanisms on their activities on the international level.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 155-169
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Differentiated Service Model-Supported Cluster-Based Routing in Wireless Sensor Networks
Autorzy:
Agarkhed, Jayashree
Dattatraya, Patil Yogita
Patil, Siddarama
Powiązania:
https://bibliotekanauki.pl/articles/307674.pdf
Data publikacji:
2020
Wydawca:
Instytut Łączności - Państwowy Instytut Badawczy
Tematy:
clustering
energy efficiency
proxy server
TDMA
wireless sensor networks
Opis:
Wireless Sensor Network finds its extensive use in healthcare applications for the transfer of time-critical data through wireless connectivity. The primary cause of network failure is the transfer of time-critical multimedia data. The article presents a new dfferentiated service modelsupported (DSM) cluster-based routing in wireless sensor networks (WSNs) that overcomes the above issue. DSM prioritizes the transfer of dfferent flow types based on packet type and packet size. The employment of computational offlading minimizes delay for critical and small-sized data packets and by carrying out data reduction of large-sized packets at proxy server. It outperforms the existing protocols in terms of energy efficiency, throughput, and reliability by prioritizing the transfer of time-critical health application data.
Źródło:
Journal of Telecommunications and Information Technology; 2020, 3; 1-9
1509-4553
1899-8852
Pojawia się w:
Journal of Telecommunications and Information Technology
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Game of Proxies – Towards a new model of warfare: Experiences from the CAR, Libya, Mali, Syria, and Ukraine
Autorzy:
Kozera, Cyprian A.
Bernat, Paweł
Gürer, Cüneyt
Popławski, Błażej
Sözer, Mehmet A.
Powiązania:
https://bibliotekanauki.pl/articles/1194387.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Proxy Forces
Libya
Mali
Syria
Ukraine
Central African Republic
Opis:
The objective of the study is to carry out a meaningful comparison that demonstrates the similarities and differences of various conflict theatres where proxy forces were employed. The analyses of the discussed cases focused on different aspects of the conflict and nature of the proxy use. The analyses presented on the following pages were conducted on the basis of the literature on the subject, governmental research and reports, and supporting sources reporting recent developments that complemented academic sources. Various non-state actors such as ethnic militias, paramilitary units, and private military companies have become more and more visible on contemporary battlegrounds. Modern states employ those actors to further their objectives, as this limits their own political and financial costs. This increasingly visible phenomenon points to an emerging new model of warfare where state actors are relying ever more on proxies of various character and nature. It is highly likely that any future conflict will be characterised by a proxy-based model of warfare, which will consist of a limited footprint made by regular forces (or none at all) and, consequently, the extended use of proxies supported by special forces. Because such an approach is less costly, proxies will be more often employed by low-budget states, previously reluctant to carry out such costly military endeavours. Denying the actions and affiliations of these proxies will inevitably follow and, in turn, a lack of political accountability and responsibility for the conflict’s outcome.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 77-97
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
On the Multiple Varieties, Consequences and Paradoxes of the Commodification of Nature
Autorzy:
Ziółkowski, Marek
Baranowski, Mariusz
Drozdowski, Rafał
Powiązania:
https://bibliotekanauki.pl/articles/1790370.pdf
Data publikacji:
2020-09-29
Wydawca:
Polskie Towarzystwo Socjologiczne
Tematy:
commodification
nature
proxy commodification
Karl Polanyi
fictitious commodity
climate services markets
Opis:
The article aims to characterise the variety of processes and mechanisms of nature commodification from a sociological perspective. Its general theoretical framework is based on Karl Polanyi’s The Great Transformation and the economic-sociological theory of ownership, on the basis of which the social, economic and political determinants, actual modalities, and especially the intended and unintended social and ecological consequences and paradoxes of the processes of nature commodification and decommodification are analysed. This analysis (running across unilateral typologies and approaches), tries to go beyond the narrow and one-sided characteristics of complex practices of human impact on nature, taking into account both their positive and negative consequences where the robbery policy of conquering nature is mixed with attempts of protecting it. The general theoretical argument is illustrated by concrete examples and in particular by Poland’s experiences, both from the period of real socialism and the post-socialist transformation.
Źródło:
Polish Sociological Review; 2020, 211, 3; 281-300
1231-1413
2657-4276
Pojawia się w:
Polish Sociological Review
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Operational control over non-state proxies
Autorzy:
Bryjka, Filip
Powiązania:
https://bibliotekanauki.pl/articles/1194384.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
proxy war
hybrid threats
surrogate forces
modern warfare
special operations
Opis:
The intention of this paper is to clarify how state patrons control non-state proxy forces fighting on their behalf. In order to address the subject matter thoroughly, specific attention was paid to a number of questions including a) the criteria determining patronproxy relations, b) factors influencing the selection process of proxy forces, and c) principles governing the maximisation of potential benefits of using proxies, whilst simultaneously reducing risks and associated costs. The author applied a neo-realistic research paradigm to his work. Patron-proxy relations were presented in the context of the principal-agent theory, as well as through detailed analysis of ongoing scenarios involving Iran and Hezbollah, Russia and the Donbass separatists, Pakistan and Kashmiri militias, the US and Syrian rebels. The essence of war by proxy is to influence the strategic result of an armed conflict without direct, full-scale, military intervention. The use of non-state proxy, external actors is aimed at maximising their political goals and strategic interests whilst maintaining “plausible deniability”. By supporting non-state proxies, indirectly or by providing limited direct assistance, sponsors operate below the threshold of war. Empirical analysis of proxy war cases proves that such models may both guarantee “strategic victory” or become a “double-edged sword”. One of the key challenges for external powers engaged in war by proxy is to avoid unintended consequences (blowback). The author argues that elements such as ideology, ethnicity or religion do not necessarily ensure control over proxies, whilst the range of common goals and interests, and the level of the proxy’s dependency, are crucial.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 191-210
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Outsourcing warfare: Proxy forces in contemporary armed conflicts
Autorzy:
Wither, James K.
Powiązania:
https://bibliotekanauki.pl/articles/1194386.pdf
Data publikacji:
2020
Wydawca:
Akademia Sztuki Wojennej
Tematy:
Iran
United States
Russia
proxy forces
great power competition
Opis:
The aim of this article is to provide a comprehensive examination of the different types of armed non-state proxy groups. It discusses their characteristics and sponsorship and how they are employed by states in pursuit of their security and foreign policy objectives. The article also analyses the reasons for the recent increase in the use of proxy forces, including the benefits and risks for states that employ them, as well as the broader impact of proxy forces on the international security environment, including great power competition. Data was collected and analysed from a wide range of secondary source documents. A descriptive, qualitative research methodology was applied to print and on-line publications available from governmental, institutional and academic sources. This involved literature reviews and case studies to provide an in-depth understanding of current thinking on the topic, while also identifying potential areas for further research. The article provides a comprehensive, qualitative analysis of the existing literature and case studies on the topic of proxy forces, which due to the research methodology applied, also relies on the researcher’s judgement, choices and assumptions. Proxy wars will remain the norm for the foreseeable future. Two strategic developments drive this conclusion. Firstly, there is the renewal of great power competition for influence, resources and security, and secondly, the imperative for states to achieve these objectives without employing their military forces in a manner that could cause a major war.
Źródło:
Security and Defence Quarterly; 2020, 31, 4; 17-34
2300-8741
2544-994X
Pojawia się w:
Security and Defence Quarterly
Dostawca treści:
Biblioteka Nauki
Artykuł
Tytuł:
Polityczny i wojskowy wymiar konfliktu Izraela z Iranem
Political and Military Dimensions of the Israel-Iran Conflict
Autorzy:
Czulda, Robert
Powiązania:
https://bibliotekanauki.pl/articles/2091725.pdf
Data publikacji:
2020-06-25
Wydawca:
Uniwersytet Warszawski. Wydział Nauk Politycznych i Studiów Międzynarodowych
Tematy:
Iran
Izrael
wojna zastępcza
proxy war
Bliski Wschód
anty-syjonizm
Israel
Middle East
anti-Zionism
Opis:
Konflikt pomiędzy Izraelem a Iranem stanowi jeden z najważniejszych kryzysów polityczno-wojskowych nie tylko dla współczesnego Bliskiego Wschodu, ale też dla całego świata, ponieważ wybuch otwartej wojny miałby bez wątpienia konsekwencje nie tylko regionalne, lecz również globalne. Napięcia w relacjach dwustronnych przybierają wiele form. Celem artykułu jest przede wszystkim zanalizowanie źródeł wzajemnej nienawiści, a także płaszczyzn konfliktu – tak w wymiarze politycznym, w tym w zakresie gry psychologicznej i propagandowej, jak i militarnym, który realizowany jest na kilka sposobów – od ograniczonych interwencji zbrojnych (pośrednich i bezpośrednich) po działania służb specjalnych. Oprócz pytania badawczego o czynniki determinujące istniejący konflikt, istotne jest również pytanie o możliwości zakończenia sporu oraz o to, czy – w przypadku fiaska takiego scenariusza – rywalizacja może przerodzić się w otwartą wojnę.
The bilateral tension between Israel and Iran is one of the most important political and military hotspots not only for the contemporary Middle East but also for the whole world as a breakout of open war would undoubtedly have tremendous regional and global consequences. This bilateral tension comes in several guises. The goal of this paper is first and foremost to analyse the sources of the mutual distrust as well as the layers of the conflict including the political dimension, the psychological and propaganda warfare, as well as the military dimension, which is carried out in several ways: from limited military interventions (direct and indirect) to operations carried out by special forces. Apart from the research question on factors determining the existing tension, it is also essential to ask questions about the possibilities of ending this dispute and whether – in case of a failure of such a scenario – this rivalry could transform into open war
Źródło:
Stosunki Międzynarodowe - International Relations; 2015, 51, 3; 169-179
0209-0961
Pojawia się w:
Stosunki Międzynarodowe - International Relations
Dostawca treści:
Biblioteka Nauki
Artykuł

Ta witryna wykorzystuje pliki cookies do przechowywania informacji na Twoim komputerze. Pliki cookies stosujemy w celu świadczenia usług na najwyższym poziomie, w tym w sposób dostosowany do indywidualnych potrzeb. Korzystanie z witryny bez zmiany ustawień dotyczących cookies oznacza, że będą one zamieszczane w Twoim komputerze. W każdym momencie możesz dokonać zmiany ustawień dotyczących cookies