2,977
Views
10
CrossRef citations to date
0
Altmetric
Original Articles

Politics by many other means: The comparative strategic advantages of operational domains

&

Bibliography

  • Acton, James M., ‘Escalation through Entanglement: How the Vulnerability of Command-and-Control Systems Raises the Risks of an Inadvertent Nuclear War’, International Security 43/1 (1 August 2018), 56–99.
  • Art, Robert J., ‘Geopolitics Updated: The Strategy of Selective Engagement’, International Security 23/3 (1998), 79–113. doi:10.2307/2539339
  • Art, Robert J. and Kelly M Greenhill, ‘Coercion: An Analytical Overview’, in Kelly M. Greenhill and Peter J. P. Krause (eds.), Coercion: The Power to Hurt in International Politics (New York: Oxford University Press 2018), 3–32.
  • Bacon, Francis, Essays, Civil and Moral: And the New Atlantis (New York: P.F. Collier & Son 1909).
  • Bahney, Benjamin, Jonathan Pearl, and Michael Markey, ‘Anti-Satellite Weapons and the Instability of Deterrence’, in Jon R. Lindsay and Erik Gartzke (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019), 121–43.
  • Bahney, Benjamin and Jonathan Pearl, ‘Why Creating a Space Force Changes Nothing’, Foreign Affairs (26 March 2019). https://www.foreignaffairs.com/articles/space/2019-03-26/why-creating-space-force-changes-nothing
  • Bejtlich, Richard, The Practice of Network Security Monitoring: Understanding Incident Detection and Monitoring (San Francisco: No Starch Press 2013).
  • Benbow, Tim, The Magic Bullet? Understanding the Revolution in Military Affairs (London: Brassey’s 2004).
  • Betts, Richard K., ‘Is Strategy an Illusion?’, International Security 25/2 (2000), 5–50. doi:10.1162/016228800560444
  • Beyerchen, Alan, ‘Clausewitz, Nonlinearity, and the Unpredictability of War’, International Security 17/3 (1992), 59–90. doi:10.2307/2539130
  • Biddle, Stephen D, Military Power: Explaining Victory and Defeat in Modern Battle (Princeton, NJ: Princeton University Press 2004).
  • Biddle, Stephen, ‘Speed Kills? Reassessing the Role of Speed, Precision, and Situation Awareness in the Fall of Saddam’, Journal of Strategic Studies 30/1 (2007), 3–46. doi:10.1080/01402390701210749
  • Biddle, Tami Davis, Rhetoric and Reality in Air Warfare: The Evolution of British and American Ideas about Strategic Bombing, 1914–1945 (Princeton, NJ: Princeton University Press 2002).
  • Biddle, Tami Davis, ‘Coercion Theory: A Basic Introduction for Practitioners’, Texas National Security Review 3/2 (20 February 2020). https://tnsr.org/2020/02/coercion-theory-a-basic-introduction-for-practitioners/
  • Bijker, Wiebe E., Thomas P. Hughes, Trevor Pinch, and Deborah G Douglas, (eds.), The Social Construction of Technological Systems: New Directions in the Sociology and History of Technology (Cambridge, MA: MIT press 1987).
  • Blainey, Geoffrey, Causes of War 3rd. (New York: Simon and Schuster 1988).
  • Bodmer, Sean, Max Kilger, Gregory Carpenter, and Jade Jones, Reverse Deception: Organized Cyber Threat Counter-Exploitation (New York: McGraw-Hill 2012).
  • Borghard, Erica D. and Shawn W. Lonergan, ‘The Logic of Coercion in Cyberspace’, Security Studies 26/3 (3 July 2017), 452–81. doi:10.1080/09636412.2017.1306396
  • Bowen, Bleddyn E, War in Space: Strategy, Spacepower, Geopolitics (Edinburgh: Edinburgh University Press 2020).
  • Branch, Jordan, “What’s in a Name? Metaphors and Cybersecurity,” Typescript, 2019.
  • Brodie, Bernard, Frederick Sherwood Dunn, Arnold Wolfers, Percy Ellwood Corbett, and William T. R. Fox, The Absolute Weapon: Atomic Power and World Order (New York: Harcourt, Brace and Co. 1946).
  • Builder, Carl H., The Masks of War: American Military Styles in Strategy and Analysis (Baltimore: Johns Hopkins University Press 1989).
  • Carson, Austin and Keren Yarhi-Milo, ‘Covert Communication: The Intelligibility and Credibility of Signaling in Secret’, Security Studies 26/1 (2017), 124–56. doi:10.1080/09636412.2017.1243921
  • Carter, Ashton B., ‘Satellites and Anti-Satellites: The Limits of the Possible’, International Security 10/4 (1986), 46–98. doi:10.2307/2538950
  • Choucri, Nazli and David D. Clark, International Relations in the Cyber Age: The Co-Evolution Dilemma (Cambridge, MA: MIT Press 2018).
  • Clausewitz, Carl von, On War Translated by Michael Howard and Peter Paret. (Princeton, NJ: Princeton University Press 1976).
  • Corbett, Julian Stafford, Some Principles of Maritime Strategy (London: Longmans, Green and Co. 1911).
  • Dafoe, Allan, ‘On Technological Determinism: A Typology, Scope Conditions, and A Mechanism’, Science, Technology & Human Values 40/6 (1 November 2015), 1047–76. doi:10.1177/0162243915579283
  • DeNardis, Laura, The Global War for Internet Governance (New Haven: Yale University Press 2014).
  • Deudney, Daniel, Whole Earth Security: A Geopolitics of Peace Worldwatch Paper 55. (Washington, DC: Worldwatch Institute 1983).
  • Drezner, Daniel W., ‘Economic Sanctions in Theory and Practice: How Smart are They?’, in Kelly M. Greenhill and Peter Krause (eds.), Coercion: The Power to Hurt in International Politics (New York: Oxford University Press 2018), 251–70.
  • Early, Bryan R. and Erik Gartzke. ‘Spying from Space: Reconnaissance Satellites and Interstate Disputes.’ Typescript, 20 Aug., 2017.
  • Fearon, James D., ‘Rationalist Explanations for War’, International Organization 49/3 (1995), 379–414. doi:10.1017/S0020818300033324
  • Fearon, James D., ‘Signaling Foreign Policy Interests: Tying Hands versus Sinking Costs’, The Journal of Conflict Resolution 41/1 (1 February 1997), 68–90. doi:10.1177/0022002797041001004
  • Frederick, Bryan, Stephen Watts, Matthew Lane, Abby Doll, Ashley L. Rhoades, and Meagan L. Smith, Understanding the Deterrent Impact of U.S. Overseas Forces (Santa Monica, CA: RAND Corporation 2020).
  • Freedman, Lawrence, Deterrence (Cambridge: Polity Press 2004).
  • Freedman, Lawrence, Strategy: A History (New York: Oxford University Press 2013).
  • Friedman, Norman, Seapower and Space: From the Dawn of the Missile Age to Net-Centric Warfare (Annapolis, MD: Naval Institute Press 2000).
  • Gartzke, Erik, ‘War Is in the Error Term’, International Organization 53/3 (1999), 567–87. doi:10.1162/002081899550995
  • Gartzke, Erik, ‘Blood and Robots: How Remotely Piloted Vehicles and Related Technologies Affect the Politics of Violence’, Journal of Strategic Studies (3 October 2019), 1–31. doi:10.1080/01402390.2019.1643329
  • Gartzke, Erik and James Igoe Walsh, ‘The Drawbacks of Drones: The Effects of UAVs on Militant Violence in Pakistan’, Journal of Peace Research (Forthcoming).
  • Gartzke, Erik, Jeffrey M. Kaplow, and Rupal N. Mehta, ‘The Determinants of Nuclear Force Structure’, Journal of Conflict Resolution 58/3 (2014), 481–508. doi:10.1177/0022002713509054
  • Gartzke, Erik and Jon R. Lindsay, ‘Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace’, Security Studies 24/2 (2015), 316–48. doi:10.1080/09636412.2015.1038188
  • Gartzke, Erik and Jon R. Lindsay, ‘Thermonuclear Cyberwar’, Journal of Cybersecurity 3/1 (February 2017), 37–48.
  • Gartzke, Erik and Jon R. Lindsay, ‘The Influence of Seapower on Politics: Domain- and Platform-Specific Attributes of Material Capabilities,’ Security Studies (Forthcoming).
  • Gartzke, Erik and Koji Kagotani, ‘Being There: U.S. Troop Deployments, Force Posture and Alliance Reliability,’ Working Paper, 2017.
  • Gavin, Francis J, Nuclear Statecraft: History and Strategy in America’s Atomic Age (Ithaca: Cornell University Press 2012).
  • Glaser, Charles L., Analyzing Strategic Nuclear Policy (Princeton, NJ: Princeton University Press 1990).
  • Glaser, Charles L. and Steve Fetter, ‘Should the United States Reject MAD? Damage Limitation and U.S. Nuclear Strategy toward China’, International Security 41/1 (1 July 2016), 49–98. doi:10.1162/ISEC_a_00248
  • Goldstein, Avery, ‘First Things First: The Pressing Danger of Crisis Instability in U.S.-China Relations’, International Security 37/4 (2013), 49–89. doi:10.1162/ISEC_a_00114
  • Gompert, David C. and Phillip C. Saunders, The Paradox of Power: Sino-American Strategic Restraint in an Age of Vulnerability (Washington DC: National Defense University Press 2011).
  • Green, Brendan Rittenhouse and Austin Long, ‘Conceal or Reveal? Managing Clandestine Military Capabilities in Peacetime Competition’, International Security 44/3 (1 January 2020), 48–83. doi:10.1162/isec_a_00367
  • Greenhill, Kelly M., ‘Asymmetric Advantage: Weaponizing People as Nonmilitary Instruments of Cross-Domain Coercion’, in Jon R. Lindsay and Erik Gartzke (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019), 259–89.
  • Haun, Phil M., Coercion, Survival, and War: Why Weak States Resist the United States (Stanford, CA: Stanford University Press 2015).
  • Haun, Phil M., ‘Air Power versus Ground Forces—Deterrence at the Operational Level of War’, in Jon R. Lindsay and Erik Gartzke (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019), 144–62.
  • Haun, Phil and Colin Jackson, ‘Breaker of Armies: Air Power in the Easter Offensive and the Myth of Linebacker I and II in the Vietnam War’, International Security 40/3 (1 January 2016), 139–78. doi:10.1162/ISEC_a_00226
  • Herrera, Geoffrey L., Technology and International Transformation: The Railroad, the Atom Bomb, and the Politics of Technological Change (Albany, NY: State University of New York Press 2006).
  • Heuser, Beatrice, The Evolution of Strategy: Thinking War from Antiquity to the Present (New York: Cambridge University Press 2010).
  • Hunzeker, Michael Allen and Alexander Lanoszka, ‘Landpower and American Credibility’, Parameters 45/4 (2015), 17–26.
  • Jervis, Robert, The Logic of Images in International Relations (Princeton, NJ: Princeton University Press 1970).
  • Jervis, Robert, The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon (Ithaca: Cornell University Press 1989).
  • Jervis, Robert, Richard Ned Lebow, and Janice Gross Stein, Psychology and Deterrence (Baltimore, MD: Johns Hopkins University Press 1985).
  • Johnson, Nicholas L. ‘Orbital Debris: The Growing Threat to Space Operations.’ Breckenridge, CO, 2010. https://ntrs.nasa.gov/search.jsp?R=20100004498
  • Johnston, Patrick B. and Anoop K. Sarbahi, ‘The Impact of US Drone Strikes on Terrorism in Pakistan’, International Studies Quarterly 60/2 (2016), 203–19. doi:10.1093/isq/sqv004
  • Kahn, David, ‘An Historical Theory of Intelligence’, Intelligence and National Security 16/3 (1 September 2001), 79–92. doi:10.1080/02684520412331306220
  • Kahn, Herman, On Thermonuclear War (Princeton, NJ: Princeton University Press 1960).
  • Kennedy, Paul M., The Rise and Fall of British Naval Mastery Revised. (London: Penguin Random House 2017).
  • Kroenig, Matthew, The Logic of American Nuclear Strategy: Why Strategic Superiority Matters (New York: Oxford University Press 2018).
  • Lasswell, Harold D., Politics: Who Gets What, When, How (New York: Whittlesey House 1936).
  • Levy, Jack S. and William R. Thompson, ‘Balancing on Land and at Sea: Do States Ally against the Leading Global Power?’, International Security 35/1 (1 July 2010), 7–43. doi:10.1162/ISEC_a_00001
  • Libicki, Martin C., Cyberdeterrence and Cyberwar (Santa Monica, CA: RAND 2009).
  • Lieber, Keir A. and Daryl G. Press, ‘The End of MAD? The Nuclear Dimension of U.S. Primacy’, International Security 30/4 (1 April 2006), 7–44. doi:10.1162/isec.2006.30.4.7
  • Lieber, Keir A. and Daryl G. Press, ‘The New Era of Counterforce: Technological Change and the Future of Nuclear Deterrence’, International Security 41/4 (1 April 2017), 9–49. doi:10.1162/ISEC_a_00273
  • Lindsay, Jon R., ‘Restrained by Design: The Political Economy of Cybersecurity’, Digital Policy, Regulation and Governance 19/6 (2017), 493–514. doi:10.1108/DPRG-05-2017-0023
  • Lindsay, Jon R. and Erik Gartzke, ‘Coercion through Cyberspace: The Stability-Instability Paradox Revisited’, in Kelly M. Greenhill and Peter Krause (eds.), Coercion: The Power to Hurt in International Politics (New York: Oxford University Press 2018), 179–203.
  • Lindsay, Jon R., Information Technology and Military Power (Ithaca, NY: Cornell University Press 2020).
  • Lindsay, Jon R. and Erik Gartzke, (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019).
  • Long, Austin and Brendan Rittenhouse Green, ‘Stalking the Secure Second Strike: Intelligence, Counterforce, and Nuclear Strategy’, Journal of Strategic Studies 38/1–2 (2014), 38–73. doi:10.1080/01402390.2014.958150
  • Lyall, Jason, ‘Bombing to Lose? Airpower and the Dynamics of Violence in Counterinsurgency Wars,’ Working Paper, Social Science Research Network, 3 Sept., 2017. doi:10.2139/ssrn.2422170.
  • Lynn, William J., III, ‘Defending a New Domain: The Pentagon’s Cyberstrategy’, Foreign Affairs 89/5 (2010), 97–108.
  • Mackinder, H. J., ‘The Geographical Pivot of History’, The Geographical Journal 23/4 (1904), 421–37. doi:10.2307/1775498
  • Mahan, Alfred Thayer, The Influence of Sea Power upon History, 1660–1783 (Boston: Little, Brown, and Co. 1890).
  • McNeal, Gregory S., ‘Targeted Killing and Accountability’, Georgetown Law Journal 102 (March 2014), 681–794.
  • McNeill, William H., The Pursuit of Power: Technology, Armed Force, and Society since A.D. 1000 (Chicago: University of Chicago Press 1982).
  • McRaven, William H., Spec Ops: Case Studies in Special Operations Warfare: Theory and Practice (New York: Presidio Press 1995).
  • Mearsheimer, John J., Conventional Deterrence (Ithaca, NY: Cornell University Press 1985).
  • Mearsheimer, John J., The Tragedy of Great Power Politics (New York: Norton 2001).
  • Mehta, Rupal N., ‘Extended Deterrence and Assurance in Multiple Domains’, in Jon R. Lindsay and Erik Gartzke (eds.), Cross-Domain Deterrence: Strategy in an Era of Complexity (New York: Oxford University Press 2019), 234-56.
  • Meirowitz, Adam and Anne E. Sartori, ‘Strategic Uncertainty as a Cause of War’, Quarterly Journal of Political Science 3/4 (31 December 2008), 327–52. doi:10.1561/100.00008018
  • Moltz, James Clay, The Politics of Space Security: Strategic Restraint and the Pursuit of National Interests (Stanford, Calif: Stanford Security Studies 2008).
  • Moltz, James Clay, Crowded Orbits: Conflict and Cooperation in Space (New York: Columbia University Press 2014).
  • Mumford, Lewis, Technics and Civilization (Chicago: University of Chicago Press 2010).
  • Naylor, Sean, Not a Good Day to Die: The Untold Story of Operation Anaconda (New York: Penguin 2005).
  • Nolan, Cathal, The Allure of Battle: A History of How Wars Have Been Won and Lost (New York: Oxford University Press 2017).
  • North Atlantic Treaty Organization. ‘NATO Cyber Defence Factsheet.’ February 2018. https://www.nato.int/nato_static_fl2014/assets/pdf/pdf_2018_02/20180213_1802-factsheet-cyber-defence-en.pdf
  • Nye, Joseph S., ‘Deterrence and Dissuasion in Cyberspace’, International Security 41/3 (1 January 2017), 44–71. doi:10.1162/ISEC_a_00266
  • Pape, Robert Anthony, Bombing to Win: Air Power and Coercion in War (Ithaca, NY: Cornell University Press 1996).
  • Posen, Barry R., Inadvertent Escalation: Conventional War and Nuclear Risks (Ithaca, N.Y.: Cornell University Press 1991).
  • Posen, Barry R., ‘Command of the Commons: The Military Foundation of U.S. Hegemony’, International Security 28/1 (2003), 5–46. doi:10.1162/016228803322427965
  • Posen, Barry R., The Sources of Military Doctrine: France, Britain, and Germany between the World Wars (Ithaca, NY: Cornell University Press 1984).
  • Post, Abigail, ‘Flying to Fail: Costly Signals and Air Power in Crisis Bargaining’, Journal of Conflict Resolution 63/4 (2019), 869–95. doi:10.1177/0022002718777043
  • Powell, Robert, ‘Bargaining Theory and International Conflict’, Annual Review of Political Science 5/1 (2002), 1–30. doi:10.1146/annurev.polisci.5.092601.141138
  • Poznansky, Michael and Evan Perkoski, ‘Rethinking Secrecy in Cyberspace: The Politics of Voluntary Attribution’, Journal of Global Security Studies 3/4 (1 October 2018), 402–16. doi:10.1093/jogss/ogy022
  • Press, Daryl G., Scott D. Sagan, and Benjamin A. Valentino, ‘Atomic Aversion: Experimental Evidence on Taboos, Traditions, and the Non-Use of Nuclear Weapons’, American Political Science Review 107/1 (February 2013), 188–206. doi:10.1017/S0003055412000597
  • Ramsay, Kristopher W., ‘Information, Uncertainty, and War’, Annual Review of Political Science 20/1 (2017), 505–27. doi:10.1146/annurev-polisci-051215-022729
  • Reiter, Dan, ‘Exploring the Bargaining Model of War’, Perspectives on Politics 1/1 (2003), 27–43. doi:10.1017/S1537592703000033
  • Rid, Thomas, Cyber War Will Not Take Place (London: Hurst 2013).
  • Roland, Alex, ‘Technology, Ground Warfare, and Strategy: The Paradox of the American Experience’, The Journal of Military History 55/4 (1994), 447–67. doi:10.2307/1985764
  • Ross, Robert S., ‘The Geography of the Peace: East Asia in the Twenty-First Century’, International Security 23/4 (1999), 81–118. doi:10.1162/isec.23.4.81
  • Rovner, Joshua, “Cyber War as an Intelligence Contest,” War on the Rocks (blog), 16 Sept., 2019. https://warontherocks.com/2019/09/cyber-war-as-an-intelligence-contest/
  • Schelling, Thomas C., Arms and Influence: With a New Preface and Afterword (New Haven, CT: Yale University Press 2008).
  • Schneider, Jacquelyn, ‘The Capability/Vulnerability Paradox and Military Revolutions: Implications for Computing, Cyber, and the Onset of War’, Journal of Strategic Studies 42/6 (19 September 2019), 841–63. doi:10.1080/01402390.2019.1627209
  • Sechser, Todd S. and Matthew Fuhrmann, Nuclear Weapons and Coercive Diplomacy (New York: Cambridge University Press 2017).
  • Sechser, Todd S., Neil Narang, and Caitlin Talmadge, ‘Emerging Technologies and Strategic Stability in Peacetime, Crisis, and War’, Journal of Strategic Studies 42/6 (19 September 2019), 727–35. doi:10.1080/01402390.2019.1626725
  • Shah, Aqil, ‘Do U.S. Drone Strikes Cause Blowback? Evidence from Pakistan and Beyond’, International Security 42/4 (1 May 2018), 47–84. doi:10.1162/isec_a_00312
  • Slantchev, Branislav L., Military Threats: The Costs of Coercion and the Price of Peace (New York: Cambridge University Press 2011).
  • Slantchev, Branislav L. and Ahmer Tarar, ‘Mutual Optimism as a Rationalist Explanation of War’, American Journal of Political Science 55/1 (1 January 2011), 135–48. doi:10.1111/j.1540-5907.2010.00475.x
  • Smith, Merritt Roe and Leo Marx, (eds.), Does Technology Drive History? The Dilemma of Technological Determinism (Cambridge, MA: MIT Press 1994).
  • Snyder, Glenn H., ‘The Balance of Power and the Balance of Terror’, in Paul Seabury (ed.), The Balance of Power (San Francisco, CA: Chandler 1965), 184–201.
  • Spykman, Nicholas J., ‘Geography and Foreign Policy, I’, The American Political Science Review 32/1 (1938), 28–50. doi:10.2307/1949029
  • Stares, Paul B., The Militarization of Space: U.S. Policy, 1945–1984 (Ithaca, NY: Cornell University Press 1985).
  • State Council Information Office, China’s Military Strategy (Beijing: The State Council Information Office of the People’s Republic of China May 2015). http://www.chinadaily.com.cn/china/2015-05/26/content_20820628.htm
  • Stevens, Tim, ‘A Cyberwar of Ideas? Deterrence and Norms in Cyberspace’, Contemporary Security Policy 33/1 (1 April 2012), 148–70. doi:10.1080/13523260.2012.659597
  • Talmadge, Caitlin, ‘Would China Go Nuclear? Assessing the Risk of Chinese Nuclear Escalation in a Conventional War with the United States’, International Security 41/4 (1 April 2017), 50–92. doi:10.1162/ISEC_a_00274
  • U. S. Army, FM 3-24: Counterinsurgency (Washington, D.C.: Government Printing Office 2006).
  • U.S. Army, The U.S. Army in Multi-Domain Operations 2028 (TRADOC Pamphlet. Fort Eustis, VA: U.S. Army Training and Doctrine Command 6 December 2018).
  • Ucko, David H., The New Counterinsurgency Era: Transforming the U.S. Military for Modern Wars (Washington, DC: Georgetown University Press 2009).
  • United States, ‘National Security Strategy of the United States of America,’ White House Office, December 2017. https://www.whitehouse.gov/wp-content/uploads/2017/12/NSS-Final-12-18-2017-0905.pdf
  • Valeriano, Brandon, Benjamin M. Jensen, and Ryan C. Maness, Cyber Strategy: The Evolving Character of Power and Coercion (New York: Oxford University Press 2018).
  • Wagner, R. Harrison., ‘Bargaining and War’, American Journal of Political Science 44/3 (2000), 469–84. doi:10.2307/2669259
  • Waldman, Thomas, War, Clausewitz and the Trinity (New York: Routledge 2016).
  • Walsh, James Igoe., The Effectiveness of Drone Strikes in Counterinsurgency and Counterterrorism Campaigns (Carlisle Barracks, PA: Strategic Studies Institute 26 September 2013). http://www.strategicstudiesinstitute.army.mil/pubs/display.cfm?pubID=1167
  • Weigley, Russell F., The American Way of War: A History of United States Military Strategy and Policy (Bloomington, IN: Indiana University Press 1973).
  • White, Hugh. ‘Losing the War in an Afternoon: Jutland 1916.’ The Strategist. Autralian Strategic Policy Institute, 13 May, 2016.
  • Winner, Langdon, Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought (Cambridge, MA: MIT Press 1977).
  • Wylie, J.C., Military Strategy: A General Theory of Power Control Edited by John B. Hattendorf. (Annapolis, MD: Naval Institute Press 1989).
  • Zegart, Amy, ‘Cheap Fights, Credible Threats: The Future of Armed Drones and Coercion’, Journal of Strategic Studies 43/1 (28 February 2018), 6–46. doi:10.1080/01402390.2018.1439747

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.