Journal: Contemporary Security Policy

Loading...

Abbreviation

Contemp. secur. policy

Publisher

Routledge

Journal Volumes

ISSN

1352-3260
1743-8764

Description

Search Results

Publications1 - 10 of 12
  • Hellmüller, Sara; Salaymeh, Bilal (2025)
    Contemporary Security Policy
    World politics are changing with important implications for international peace processes. We argue that recent changes in world order have led to transactionalism becoming more pronounced in peace processes. This is because increased geopolitical competition often leads to a conflation of warmakers and peacemakers: States that provide military support to belligerents also engage in peacemaking. This renders peace processes political marketplaces with transactionalism as main modus operandi. Transactional peacemaking has three features: It prioritizes bilateral over multilateral approaches; is interest-based and exclusive rather than value-based and inclusive; and focuses on short-term deals instead of long-term outcomes. Drawing on over 70 interviews, we empirically demonstrate our argument with the peace processes in Libya, Syria, and Yemen. We conclude by discussing the consequences of transactionalism for the global peacemaking landscape. By providing a new conceptualization of an emerging phenomenon in contemporary peace processes, we contribute to the literature on changing peacemaking approaches.
  • Dijkstra, Hylke; Dunn Cavelty, Myriam; Jenne, Nicole; et al. (2023)
    Contemporary Security Policy
  • Mirow, Wilhelm (2012)
    Contemporary Security Policy
  • Beyond Exceptionalism?
    Item type: Journal Article
    Hagmann, Jonas (2010)
    Contemporary Security Policy
  • Kunertova, Dominika (2023)
    Contemporary Security Policy
    Before Russia's 2022 invasion of Ukraine, security studies scholars were myopic about small drones' enabling functions and tactical benefits. They were preoccupied with drone impacts on international security and the ethical dimensions of counterterrorism drone strikes. Similarly, literature on the revolution in military affairs has examined emerging drone technologies based on their strategic advantages. "Low-tech" drone innovations have received less attention. The war has highlighted the collective magnitude of these omissions. At first, scholars followed extant predictions by concluding that large drones did not revolutionize warfare, proliferated slowly, and were too costly and complex to operate. Yet, one year into the war, thousands of drones-scouts, loitering grenades, drone bomblets, and suicide drones-are defying the field's assumptions of their uselessness sans air superiority. Contrary to most theoretical expectations, small drones in Ukraine are changing battlefield dynamics from lower airspace. Scholars must begin to study drone diversity in modern wars.
  • Editorial message 2025
    Item type: Other Journal Item
    Dunn Cavelty, Myriam; Jenne, Nicole; Reykers, Yf (2025)
    Contemporary Security Policy
  • Egloff, Florian (2020)
    Contemporary Security Policy
    Public attributions of cyber incidents by governments and private industry have become prevalent in recent years. This article argues that they display a skewed version of cyber conflict for several operational and structural reasons, including political, commercial, and legal constraints. In addition, public attribution of cyber incidents takes place in a heavily contested information environment, creating fractured narratives of a shared past. The article uses three cyber incidents (Sony Pictures, DNC, and NotPetya) to show how actors cope with this contested information environment and proposes a changed role of academia to address some of the problems that emerge. To become competent in contesting public attribution discourses, universities would have to work more across physical, disciplinary, and academic boundaries. The main implications for democracies are to be more transparent about how attribution is performed, enable other civilian actors to study cyber conflict, and thereby broaden the discourse on cybersecurity politics.
  • Haas, Michael; Fischer, Sophie-Charlotte (2017)
    Contemporary Security Policy
  • War in Ukraine
    Item type: Other Journal Item
    Dijkstra, Hylke; Dunn Cavelty, Myriam; Jenne, Nicole; et al. (2022)
    Contemporary Security Policy
  • Foulon, Michiel; Meibauer, Gustav (2024)
    Contemporary Security Policy
    This article proposes a new way to understand cyberspace's impact on international relations by treating it as a "structural modifier." This shared language with IR allows for a clearer picture of cyberspace's causal role and effects. Unlike previous views of cyberspace as a mere domain or a revolutionary tool, this approach sees it as influencing all states' behavior within the existing international structure. Cyberspace alters the nature and number of interactions between states, but only within the confines and constraints of the existing structure. The article demonstrates the analytical value of this approach across four key areas: deterrence, foreign policy tool choice, uncertainty, and state/non-state actor interactions. Thinking of cyberspace as a structural modifier heeds policy-makers to remain skeptical of pressures to focus on cyberspace in isolation or at the expense of other statecraft domains and tools, or to make decisions based on the idea that cyberspace revolutionizes international relations.
Publications1 - 10 of 12