1,292
Views
2
CrossRef citations to date
0
Altmetric
Editorial

From the Editors:

 

Notes

1 See also Sumit Ganguly, ‘A Tale of Two Trajectories: Civil–Military Relations in Pakistan and India’, Journal of Strategic Studies 39/1 (2016), 142–157; Shashank Joshi, ‘India’s Military Instrument: A Doctrine Stillborn’, Journal of Strategic Studies 36/4 (2013), 512–540; Walter C. Ladwig III, ‘Indian Military Modernization and Conventional Deterrence in South Asia’, Journal of Strategic Studies 38/5 (2015), 729–772; Srinath Raghavan, ‘Civil–Military Relations in India: The China Crisis and After’, Journal of Strategic Studies 32/1 (2009), 149–175.

2 See also C. Christine Fair, ‘The Changing Pakistan Army Officer Corps’, Journal of Strategic Studies 34/1 (2011), 63–94; Sebastien Miraglia, ‘Deadly or Impotent? Nuclear Command and Control in Pakistan’, Journal of Strategic Studies 36/6 (2013), 841–866; Evan Braden Montgomery and Eric Edelman, ‘Rethinking Stability in South Asia: India, Pakistan, and the Competition for Escalation Dominance’, Journal of Strategic Studies 38/1–2 (2015), 159–182; Muhammad Zubair, ‘Fighting to the End: The Pakistan Army’s Way of War’, Journal of Strategic Studies 37/6–7 (2014), 1071–1074.

3 See also Kersti Larsdotter, ‘Regional Support for Afghan Insurgents: Challenges for Counterinsurgency Theory and Doctrine’, Journal of Strategic Studies 37/1 (2014), 135–162.

4 See also Javier Jordan, ‘The Effectiveness of the Drone Campaign against Al Qaeda Central: A Case Study’, Journal of Strategic Studies 37/1 (2014): 4–29; C. Christine Fair, ‘Pakistani Political Communication and Public Opinion on US Drone Attacks’, Journal of Strategic Studies 38/6 (2015), 852–872.

5 See also David Betz, ‘Cyberpower in Strategic Affairs: Neither Unthinkable nor Blessed’, Journal of Strategic Studies 35/5 (2012), 689–711; Adam P. Liff, ‘Cyberwar: A New “Absolute Weapon”? The Proliferation of Cyberwarfare Capabilities and Interstate War’, Journal of Strategic Studies 35/3 (2012) 401–428; Thomas Rid and Ben Buchanan, ‘Attributing Cyber Attacks’, Journal of Strategic Studies 38/1–2 (2015), 4–37.

6 Fintan Hoey, ‘Japan and Extended Nuclear Deterrence: Security and Non-proliferation’, Journal of Strategic Studies 39/4 (2016), 484–501.

7 See also Thomas G. Mahnken, ‘China’s Anti-Access Strategy in Historical and Theoretical Perspective’, Journal of Strategic Studies 34/3 (2011), 299–323; Luis Simon, ‘The “Third” US Offset Strategy and Europe’s “Anti-access” Challenge’, Journal of Strategic Studies 39/3 (2016), 417–445.

8 Dennis J. Blasko, ‘Integrating the Services and Harnessing the Military Area Commands’, Journal of Strategic Studies 39/5–6 (2016).

9 See, for example, Lazar Berman, ‘Capturing Contemporary Innovation: Studying IDF Innovation Against Hamas and Hizballah’, Journal of Strategic Studies 35/1 (2012); Tai Ming Cheung, ‘The Chinese Defense Economy’s Long March from Imitation to Innovation’, Journal of Strategic Studies 34/3 (2011); Adam M. Jungdahl and Julia M. Macdonald, ‘Innovation Inhibitors in War: Overcoming Obstacles in the Pursuit of Military Effectiveness’, Journal of Strategic Studies 38/4 (2015); Nina A. Kollars, ‘War’s Horizon: Soldier-Led Adaptation in Iraq and Vietnam’, Journal of Strategic Studies 38/4 (2015), 529–553; Nina A. Kollars, Richard R. Muller and Andrew Santora, ‘Learning to Fight and Fighting to Learn: Practitioners and the Role of Unit Publications in VIII Fighter Command 1943–1944’, Journal of Strategic Studies 39/7 (2016); Raphael D. Marcus, ‘Military Innovation and Tactical Adaptation in the Israel–Hizballah Conflict: The Institutionalization of Lesson-Learning in the IDF’, Journal of Strategic Studies 38/4 (2015), 500–528.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.