3,973
Views
34
CrossRef citations to date
0
Altmetric
Articles

The capability/vulnerability paradox and military revolutions: Implications for computing, cyber, and the onset of war

Keep up to date with the latest research on this topic with citation updates for this article.

Read on this site (20)

. (2024) From the editors. Journal of Strategic Studies 47:2, pages 159-161.
Read now
Jacquelyn Schneider & Julia Macdonald. (2024) Looking back to look forward: Autonomous systems, military revolutions, and the importance of cost. Journal of Strategic Studies 47:2, pages 162-184.
Read now
. (2024) From the editors. Journal of Strategic Studies 47:1, pages 1-4.
Read now
Yordan Gunawan, Muhamad Haris Aulawi, Rizaldy Anggriawan & Tri Anggoro Putro. (2022) Command responsibility of autonomous weapons under international humanitarian law. Cogent Social Sciences 8:1.
Read now
Jon R. Lindsay & Erik Gartzke. (2022) Politics by many other means: The comparative strategic advantages of operational domains. Journal of Strategic Studies 45:5, pages 743-776.
Read now
Eleni Ekmektsioglou & Ji-Young Lee. (2022) North Korea, missile defense, and U.S.-China security dilemma. The Pacific Review 35:4, pages 587-616.
Read now
Joshua Rovner. (2022) From the editors. Journal of Strategic Studies 45:3, pages 329-333.
Read now
. (2022) From the editors. Journal of Strategic Studies 45:1, pages 1-4.
Read now
. (2021) From the editors. Journal of Strategic Studies 44:7, pages 953-957.
Read now
Jacob Shively. (2021) Cybersecurity policy and the Trump administration. Policy Studies 42:5-6, pages 738-754.
Read now
Miguel Alberto Gomez. (2021) Overcoming uncertainty in cyberspace: strategic culture and cognitive schemas. Defence Studies 21:1, pages 25-46.
Read now
Carlos Solar. (2020) Cybersecurity and cyber defence in the emerging democracies. Journal of Cyber Policy 5:3, pages 392-412.
Read now
. (2020) From the editors. Journal of Strategic Studies 43:2, pages 171-174.
Read now
Caitlin Talmadge. (2019) Emerging technology and intra-war escalation risks: Evidence from the Cold War, implications for today. Journal of Strategic Studies 42:6, pages 864-887.
Read now
Ben Garfinkel & Allan Dafoe. (2019) How does the offense-defense balance scale?. Journal of Strategic Studies 42:6, pages 736-763.
Read now
Heather Williams. (2019) Asymmetric arms control and strategic stability: Scenarios for limiting hypersonic glide vehicles. Journal of Strategic Studies 42:6, pages 789-813.
Read now
Tristan A. Volpe. (2019) Dual-use distinguishability: How 3D-printing shapes the security dilemma for nuclear programs. Journal of Strategic Studies 42:6, pages 814-840.
Read now
Todd S. Sechser, Neil Narang & Caitlin Talmadge. (2019) Emerging technologies and strategic stability in peacetime, crisis, and war. Journal of Strategic Studies 42:6, pages 727-735.
Read now
Michael C. Horowitz. (2019) When speed kills: Lethal autonomous weapon systems, deterrence and stability. Journal of Strategic Studies 42:6, pages 764-788.
Read now

Articles from other publishers (14)

Sang Jin Oh, Sang Keun Cho & Yongseok Seo. (2024) Harnessing ICT-Enabled Warfare: A Comprehensive Review on South Korea’s Military Meta Power. IEEE Access 12, pages 46379-46400.
Crossref
Khalid Majeed, Zaheer Masood, Muhammad Rizwan Ghori & Muhammad Asif Zahoor Raja. (2023) Design and analysis of cyber warfare model with intelligent predictive stochastic networks for attack–defend strategies on critical infrastructures. Applied Soft Computing 148, pages 110847.
Crossref
Inwook Kim. (2023) Oiling the War Machine? The Fuel Dilemma and Warfighting Capability. International Studies Quarterly 67:4.
Crossref
Angela Yarnell, Patricia K Carreño, Lindsey Davis, Meaghan McGovern & Margaux Keller. (2023) Leaders, Talent Management, and Allies: The Keys to Successful Integration in the Combat Arms. Military Medicine 188:Supplement_4, pages 41-49.
Crossref
Mawuli Afenyo & Livingstone D. Caesar. (2023) Maritime cybersecurity threats: Gaps and directions for future research. Ocean & Coastal Management 236, pages 106493.
Crossref
Lennart Maschmeyer. (2022) Subversion, cyber operations, and reverse structural power in world politics. European Journal of International Relations 29:1, pages 79-103.
Crossref
Yahli Shereshevsky. (2022) International humanitarian law-making and new military technologies. International Review of the Red Cross, pages 1-22.
Crossref
Brandon Valeriano & Benjamin Jensen. 2022. Cyber Peace. Cyber Peace 64 93 .
Miguel Alberto Gomez & Christopher Whyte. (2022) Unpacking strategic behavior in cyberspace: a schema-driven approach. Journal of Cybersecurity 8:1.
Crossref
Bo Hu. (2021) Systemic obstacles and possible solutions to crisis management between China and the US. China International Strategy Review 3:2, pages 261-277.
Crossref
Dominic Rosch-Grace & Jeremy Straub. (2021) Analysis of the Necessity of Quantum Computing Capacity Development for National Defense and Homeland Security. Analysis of the Necessity of Quantum Computing Capacity Development for National Defense and Homeland Security.
Tim Stevens. (2020) Knowledge in the grey zone: AI and cybersecurity. Digital War 1:1-3, pages 164-170.
Crossref
Michael C. Horowitz. (2020) Do Emerging Military Technologies Matter for International Politics?. Annual Review of Political Science 23:1, pages 385-400.
Crossref
Jacquelyn Schneider & Julia Macdonald. (2022) Looking Back to Look Forward: Autonomy, Military Revolutions, and The Importance of Cost. SSRN Electronic Journal.
Crossref

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.