Security Questions Analysis: Deterrence and International Relations

Verified

Added on  2022/09/21

|4
|580
|18
Homework Assignment
AI Summary
This assignment analyzes several security questions related to deterrence theory and international relations. It explores the concept of deterrence, examining how a weaker power can discourage a stronger adversary through surprise attacks. The analysis delves into the impacts of deterrence on strategic stability and discusses scenarios where disincentives may fail. The assignment then examines real-world examples, including nuclear attacks, diplomatic crises, and military operations, to illustrate the practical application of these theories. The cases discussed include conflicts between the United States and North Korea, the attempted legislation regarding military operations, and the China-Japan diplomatic crisis over the Senkaku/Diaoyu Islands. The assignment also addresses the Iran-related conflicts and the use of strikes as part of their strategies.
Document Page
SECURITY QUESTIONS 0
SECURITY QUESTIONS
System04121
4/11/2020
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
SECURITY QUESTIONS 1
Answer 1
Theory of deterrence is that a lower power may discourage a stronger adversary, regardless of
the disruptive intensity of the weapon, if this power was covered by surprise assault against
destruction (D'arcy and Herath, 2011)
Answer 2
Deterrence not only affects strategic stability but also desires. If the importance of the
adversary in achieving a specific target is greater than its own, disincentives can fail. There
was a misunderstanding. Not only lacks this asymmetric collection of preferences, but still
allows major forces to fight small wars (D'arcy and Herath, 2011).
Answer 3
While the conflicts mainly existed with the United States, Australia was hit twice with
nuclear attacks in 2017 with North Korea, accusing it of siding with America and 'blindly'
pursuing it. Nevertheless, conflict started drastically in early 2018 with North Korea
declaring that the Seoul- Hotline had been revived and promising to hold talks with South
Korea While negotiations failed there, a third summit in the DMZ on 30 June 2019 was
conducted with Trump as the first US leader to visit North Korea. The reopening of nuclear
work-level talks was then confirmed by both sides (Yang, Xia, Wan, and Sun, 2016).
Answer 4
On 6 September 2013 the bill was introduced in special pro forma sessions during a sessional
session conducted during the last week of the August break by Senate Majority Leader Harry
Reid. The legislation should have approved 60 days of military operation and would only
have been able to use 30 days for one time. This legislation may have expressly prohibited
Document Page
SECURITY QUESTIONS 2
the usage of ground troops. Nevertheless, either the House or the Senate never passed this bill
by the floor.
Answer 5
After a Chinese fishing trawler struck the Japan Costa Guard in waters around the contested
Senkaka Islands, controlled by Japans and named by China as the Diary Islands, China and
Japan entered a big diplomatic crisis in 2010. Amid outraged complaints from China, Japan
detained the Chinese master of the ships. The dispute has spiralled into a big war, and China
has repressed Japan by enforcing an illegal ban on the export of rare-earth metals from China
to Japanese companies (Yang, Xia, Wan, and Sun, 2016).
Answer 6
The IRC proclaimed the strikes to be part of their ransoms against the assassination of
Soleimani. While the figures were in disagreement with the Pentagon, it reported that Iranian
missiles had damaged both the Ayn al-Asad and Erbil airbases. This was seeking to dissuade
(Yang, Xia, Wan, and Sun, 2016).
Document Page
SECURITY QUESTIONS 3
REFERENCES
D'arcy, J. and Herath, T., 2011. A review and analysis of deterrence theory in the IS security
literature: making sense of the disparate findings. European Journal of Information
Systems, 20(6), pp.643-658.
Yang, X.L., Lo, D., Xia, X., Wan, Z.Y. and Sun, J.L., 2016. What security questions do
developers ask? a large-scale study of stack overflow posts. Journal of Computer Science and
Technology, 31(5), pp.910-924.
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]