1 - 8 of 8 articles
The purpose of this paper is to describe how China’s rapid growth and increasing resource dependence have changed its relationship with India and their respective defense strategies. In particular, we consider China's Belt and Road Initiative, India's “Act East” policy and the strategic and...
The purpose of this paper is to provide a quantitative assessment of caste-based conflict in India. The data for this paper are from the Rural Economic and Demographic Survey (REDS) of 2006 encompassing 8,659 households in 242 villages in 18 Indian states.Design/methodology/approachUsing these...
This paper aims to examine the interrelationships between subnational conflicts in Myanmar and other variables of interests from the following four major domains: economic, human security and vulnerability of people, aggressiveness or militancy of the armed forces and global and regional...
In explaining ethno-territorial conflicts, leadership preferences have an odd status. In case studies, leadership preferences are often viewed as highly significant causes but are not usually defined and measured explicitly. In large-sample statistical studies, leadership preferences are only...
This paper aims to examine the role of outside peacekeepers in a bilateral conflict.Design/methodology/approachThe authors build upon a trade theoretic framework by incorporating disruptions due to war, which could affect directly the return to investment, both domestic and foreign, and by...
In a global environment where terrorist organisations based in a poor country target a rich nation, this paper aims to study the properties of a dynamically incentive compatible contract designed by the target nation that involves joint counter-terror tasks with costly participation by each...
The proliferation of terrorism worldwide raises the risk that terrorist strategies could evolve from conventional methods (e.g. suicide attacks) to biological, chemical and even radioactive and nuclear attacks (commonly abbreviated as CBRN) which are potentially much more dangerous. The authors...
Read and print from thousands of top scholarly journals.
Continue with Facebook
Sign up with Google
Log in with Microsoft
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.