Knowledge (XXG)

Deterrence theory

Source đź“ť

847:
about the defending state's expected behaviour in future conflicts. The credibilities of a defending state's policies are arguably linked over time, and reputations for resolve have a powerful causal impact on an attacking state's decision whether to challenge either general or immediate deterrence. The second approach argues that reputations have a limited impact on deterrence outcomes because the credibility of deterrence is heavily determined by the specific configuration of military capabilities, interests at stake, and political constraints faced by a defending state in a given situation of attempted deterrence. The argument of that school of thought is that potential attacking states are not likely to draw strong inferences about a defending states resolve from prior conflicts because potential attacking states do not believe that a defending state's past behaviour is a reliable predictor of future behavior. The third approach is a middle ground between the first two approaches and argues that potential attacking states are likely to draw reputational inferences about resolve from the past behaviour of defending states only under certain conditions. The insight is the expectation that decisionmakers use only certain types of information when drawing inferences about reputations, and an attacking state updates and revises its beliefs when a defending state's unanticipated behavior cannot be explained by case-specific variables.
741:
regime security are better served by defiance, or there are domestic political gains to be made from improving relations with the defending state. The second factor is an economic calculation of the costs that military force, sanctions, and other coercive instruments can impose and the benefits that trade and other economic incentives may carry. That is partly a function of the strength and flexibility of the attacking state's domestic economy and its capacity to absorb or counter the costs being imposed. The third factor is the role of elites and other key domestic political figures within the attacking state. To the extent that such actors' interests are threatened with the defending state's demands, they act to prevent or block the defending state's demands.
832:
seemingly resolved adversary. If all defending states have such incentives, potential attacking states may discount statements made by defending states along with any movement of military forces as merely bluffs. In that regard, rational deterrence theorists have argued that costly signals are required to communicate the credibility of a defending state's resolve. Those are actions and statements that clearly increase the risk of a military conflict and also increase the costs of backing down from a deterrent threat. States that bluff are unwilling to cross a certain threshold of threat and military action for fear of committing themselves to an armed conflict.
1458:, said: Deterrence is working in the Ukraine crisis, just not for the right side. The United States and its allies failed to deter Russia from invading. The purpose of deterrence strategy is to prevent the conflict entirely, and there Washington failed badly. On the other hand, Russian deterrence is enjoying spectacular success. Russia has convinced the West that even a whisper of NATO military action in Ukraine would bring disastrous consequences. Putin threatens, blusters, uses the word “nuclear,” and the West wilts. 624:
and military co-operation into a crisis or militarized confrontation that threatens armed conflict and possibly war. The prevention of crises of wars, however, is not the only aim of deterrence. In addition, defending states must be able to resist the political and the military demands of a potential attacking nation. If armed conflict is avoided at the price of diplomatic concessions to the maximum demands of the potential attacking nation under the threat of war, it cannot be claimed that deterrence has succeeded.
797:
equally, if not more, the art of coercion, intimidation and deterrence. Schelling says the capacity to harm another state is now used as a motivating factor for other states to avoid it and influence another state's behavior. To be coercive or deter another state, violence must be anticipated and avoidable by accommodation. It can therefore be summarized that the use of the power to hurt as bargaining power is the foundation of deterrence theory and is most successful when it is held in reserve.
814:
persuade the other guy to give in, when the only method at your disposal—threatening to push him off the cliff—would doom you both? Answer: You start dancing, closer and closer to the edge. That way, you don't have to convince him that you would do something totally irrational: plunge him and yourself off the cliff. You just have to convince him that you are prepared to take a higher risk than he is of accidentally falling off the cliff. If you can do that, you win."
1527:
and interpret intentions, the advantage of offense over defense, and weak actors and non-state actors can develop considerable cyber capabilities. Scholars have also debated the feasibility of launching highly damaging cyber attacks and engaging in destructive cyber warfare, with most scholars expressing skepticism that cyber capabilities have enhanced the ability of states to launch highly destructive attacks. The most prominent cyber attack to date is the
915: 691:
state's costs of compliance and the greater need for the defending state's strategy to increase the costs of noncompliance and the benefits of compliance. That is a challenge, as deterrence is by definition a strategy of limited means. George (1991) goes on to explain that deterrence sometimes goes beyond threats to the actual use of military force, but if force is actually used, it must be limited and fall short of full-scale use to succeed.
823:
orientation of potential attacking states generally is for the short term and is driven by concerns about military cost and effectiveness. For successful deterrence, defending states need the military capacity to respond quickly and strongly to a range of contingencies. Deterrence often fails if either a defending state or an attacking state underestimates or overestimates the other's ability to undertake a particular course of action.
860:
at stake for the defending state that would justify the risks of a military conflict. The argument is that defending states that have greater interests at stake in a dispute are more resolved to use force and more willing to endure military losses to secure those interests. Even less well-established arguments are the specific interests that are more salient to state leaders such as military interests and economic interests.
38: 1341:(MAD). Therefore, the period of détente was characterized by a general reduction in the tension between the Soviet Union and the United States and a thawing of the Cold War, which lasted from the late 1960s until the start of the 1980s. The doctrine of mutual nuclear deterrence then characterized relations between the United States and the Soviet Union and relations with Russia until the onset of the 1264:
Logan have challenged this assertion. A 2023 study found that a state with nuclear weapons is less likely to be targeted by non-nuclear states, but that a state with nuclear weapons is not less likely to target other nuclear states in low-level conflict. A 2022 study by Kyungwon Suh suggests that nuclear superiority may not reduce the likelihood that nuclear opponents will initiate nuclear crises.
632:
the extent of an attacking state's vulnerability as shaped by its domestic political and economic conditions. In broad terms, a state wishing to implement a strategy of deterrence is most likely to succeed if the costs of noncompliance that it can impose on and the benefits of compliance it can offer to another state are greater than the benefits of noncompliance and the costs of compliance.
1497:, said that Western fears about nuclear weapons and World War III have left it "fully deterred" and Putin "completely undeterred." The West have "ceded the initiative to the enemy." No attempt was made by NATO to deter Moscow with the threat of military force, wondered another expert. To the contrary, it was Russia’s deterrence that proved to be successful. 789:
costs on an attacking state in an armed conflict, and the attacking state believes that the defending state is resolved to use its available military forces. Huth goes on to explain the four key factors for consideration under rational deterrence theory: the military balance, signaling and bargaining power, reputations for resolve, interests at stake.
1563:, states frequently neither confirm nor deny responsibility for cyber operations so that they can avoid the escalatory risks (that come with public credit) while also signaling that they have cyber capabilities and resolve (which can be achieved if intelligence agencies and governments believe they were responsible). 1701:
reductions without the state becoming vulnerable, but it has been noted that there comes a point that further reductions may be undesirable, once minimal deterrence is reached, as further reductions beyond that point increase a state's vulnerability and provide an incentive for an adversary to expand
1616:
Scholars have also argued that leaders do not behave in ways that are consistent with the predictions of nuclear deterrence theory. Scholars have also argued that rational deterrence theory does not grapple sufficiently with emotions and psychological biases that make accidents, loss of self-control,
1526:
Scholars have debated how cyber capabilities alter traditional understandings of deterrence, given that it may be harder to attribute responsibility for cyber attacks, the barriers to entry may be lower, the risks and costs may be lower for actors who conduct cyber attacks, it may be harder to signal
1177:
give nations the potential to destroy their enemies but also the rest of humanity without drawing immediate reprisal because of the lack of a conceivable defense system and the speed with which nuclear weapons can be deployed. A nation's credible threat of such severe damage empowers their deterrence
831:
The central problem for a state that seeks to communicate a credible deterrent threat by diplomatic or military actions is that all defending states have an incentive to act as if they are determined to resist an attack in the hope that the attacking state will back away from military conflict with a
822:
Deterrence is often directed against state leaders who have specific territorial goals that they seek to attain either by seizing disputed territory in a limited military attack or by occupying disputed territory after the decisive defeat of the adversary's armed forces. In either case, the strategic
724:
must be sufficiently credible to raise the attacking state's perceived costs of noncompliance. A defending state having a superior military capability or economic strength in itself is not enough to ensure credibility. Indeed, all three elements of a balanced deterrence strategy are more likely to be
1862:
Definition of deterrence from the Dictionary of Modern Strategy and Tactics by Michael Keane: "The prevention or inhibition of action brought about by fear of the consequences. Deterrence is a state of mind brought about by the existence of a credible threat of unacceptable counteraction. It assumes
1660:
where proposed steps to achieve nuclear disarmament. Kissinger has argued, "The classical notion of deterrence was that there was some consequences before which aggressors and evildoers would recoil. In a world of suicide bombers, that calculation doesn't operate in any comparable way." Shultz said,
1418:
in 1985. They "agreed that a nuclear war cannot be won and must never be fought. Recognizing that any conflict between the USSR and the U.S. could have catastrophic consequences, they emphasized the importance of preventing any war between them, whether nuclear or conventional. They will not seek to
876:
A 2022 study by Brian Blankenship and Erik Lin-Greenberg found that high-resolve, low-capability signals (such as tripwires) were not viewed as more reassuring to allies than low-resolve, high-capability alternatives (such as forces stationed offshore). Their study cast doubt on the reassuring value
690:
provides further detail in relation to those factors. Proportionality refers to the relationship between the defending state's scope and nature of the objectives being pursued and the instruments available for use to pursue them. The more the defending state demands of another state, the higher that
606:
A threat serves as a deterrent to the extent that it convinces its target not to carry out the intended action because of the costs and losses that target would incur. In international security, a policy of deterrence generally refers to threats of military retaliation directed by the leaders of one
546:
Most of the innovative work on deterrence theory occurred from the late 1940s to mid-1960s. Historically, scholarship on deterrence has tended to focus on nuclear deterrence. Since the end of the Cold War, there has been an extension of deterrence scholarship to areas that are not specifically about
1737:
immoral in nature. In addition, he observes that deterrence theories serve to perpetuate a state of mutual assured destruction between nations over time. Holmes further argues that it is therefore both irrational and immoral to utilize a methodology for perpetuating international peace which relies
1566:
According to Lennart Maschmeyer, cyber weapons have limited coercive effectiveness due to a trilemma "whereby speed, intensity, and control are negatively correlated. These constraints pose a trilemma for actors because a gain in one variable tends to produce losses across the other two variables."
863:
Furthermore, Huth argues that both supporters and critics of rational deterrence theory agree that an unfavorable assessment of the domestic and international status quo by state leaders can undermine or severely test the success of deterrence. In a rational choice approach, if the expected utility
859:
Although costly signaling and bargaining power are more well established arguments in rational deterrence theory, the interests of defending states are not as well known. Attacking states may look beyond the short-term bargaining tactics of a defending state and seek to determine what interests are
631:
argue, two key sets of factors for successful deterrence are important: a defending state strategy that balances credible coercion and deft diplomacy consistent with the three criteria of proportionality, reciprocity, and coercive credibility and minimizes international and domestic constraints and
1422:
While the army was dealing with the breakup of the Soviet Union and the spread of nuclear technology to other nations beyond the United States and Russia, the concept of deterrence took on a broader multinational dimension. The US policy on deterrence after the Cold War was outlined in 1995 in the
813:
columnist and one of Schelling's former students, anecdotally summarizes Schelling's reorientation of game theory thus: "ou're standing at the edge of a cliff, chained by the ankle to someone else. You'll be released, and one of you will get a large prize, as soon as the other gives in. How do you
623:
A successful deterrence policy must be considered in military terms but also political terms: International relations, foreign policy and diplomacy. In military terms, deterrence success refers to preventing state leaders from issuing military threats and actions that escalate peacetime diplomatic
1263:
Scholars have debated whether having a superior nuclear arsenal provides a deterrent against other nuclear-armed states with smaller arsenals. Matthew Kroenig has argued that states with nuclear superiority are more likely to win nuclear crises, whereas Todd Sechser, Matthew Fuhrmann and David C.
1209:
is a key concept in rational deterrence theory. It states that when two countries each have nuclear weapons, the probability of a direct war between them greatly decreases, but the probability of minor or indirect conflicts between them increases. This occurs because rational actors want to avoid
846:
There are three different arguments that have been developed in relation to the role of reputations in influencing deterrence outcomes. The first argument focuses on a defending state's past behavior in international disputes and crises, which creates strong beliefs in a potential attacking state
788:
Deterrence theorists have consistently argued that deterrence success is more likely if a defending state's deterrent threat is credible to an attacking state. Huth outlines that a threat is considered credible if the defending state possesses both the military capabilities to inflict substantial
740:
that must be taken into consideration is the domestic political and economic conditions in the attacking state affecting its vulnerability to deterrence policies and the attacking state's ability to compensate unfavourable power balances. The first factor is whether internal political support and
610:
As outlined by Huth, a policy of deterrence can fit into two broad categories: preventing an armed attack against a state's own territory (known as direct deterrence) or preventing an armed attack against another state (known as extended deterrence). Situations of direct deterrence often occur if
1575:
Intrawar deterrence is deterrence within a war context. It means that war has broken out but actors still seek to deter certain forms of behavior. In the words of Caitlin Talmadge, "intra-war deterrence failures... can be thought of as causing wars to get worse in some way." Examples of intrawar
619:
becomes involved. The latter case has generated most interest in academic literature. Building on the two broad categories, Huth goes on to outline that deterrence policies may be implemented in response to a pressing short-term threat (known as immediate deterrence) or as strategy to prevent a
796:
brought his background in game theory to the subject of studying international deterrence. Schelling's (1966) classic work on deterrence presents the concept that military strategy can no longer be defined as the science of military victory. Instead, it is argued that military strategy was now
1595:
Deterrence theory has been criticized by numerous scholars for various reasons, the most basic being skepticism that decision makers are rational. A prominent strain of criticism argues that rational deterrence theory is contradicted by frequent deterrence failures, which may be attributed to
1267:
Proponents of nuclear deterrence theory argue that newly nuclear-armed states may pose a short- or medium-term risk, but that "nuclear learning" occurs over time as states learn to live with new nuclear-armed states. Mark S. Bell and Nicholas L. Miller have however argued that there is a weak
872:
International relations scholars Dan Reiter and Paul Poast have argued that so-called "tripwires" do not deter aggression. Tripwires entail that small forces are deployed abroad with the assumption that an attack on them will trigger a greater deployment of forces. Dan Altman has argued that
710:
outlines that reciprocity involves an explicit understanding of linkage between the defending state's carrots and the attacking state's concessions. The balance lies in not offering too little, too late or for too much in return and not offering too much, too soon, or for too little return.
5022: 719:
Finally, coercive credibility requires that in addition to calculations about costs and benefits of co-operation, the defending state convincingly conveys to the attacking state that failure to co-operate has consequences. Threats, uses of force, and other coercive instruments such as
1336:
was established, with peaceful co-existence was sought between the United States and the Soviet Union. Although all of those factors contributed to this shift, the most important factor was probably the rough parity achieved in stockpiling nuclear weapons with the clear capability of
1431:) not to threaten the United States, its interests, or allies. The document explains that such threats must also be used to ensure that nations without nuclear technology refrain from developing nuclear weapons and that a universal ban precludes any nation from maintaining 1168:
In 1966, Schelling is prescriptive in outlining the impact of the development of nuclear weapons in the analysis of military power and deterrence. In his analysis, before the widespread use of assured second strike capability, or immediate reprisal, in the form of
501:
military force or action refrains from doing so. Scholars distinguish between "extended deterrence" (the protection of allies) and "direct deterrence" (protection of oneself). Rational deterrence theory holds that an attacker will be deterred if they believe
850:
An example shows that the problem extends to the perception of the third parties as well as main adversaries and underlies the way in which attempts at deterrence can fail and even backfire if the assumptions about the others' perceptions are incorrect.
1488:
Timo S. Koster who served at NATO as Director of Defence Policy & Capabilities similarly argued: A massacre is taking place in Europe and the strongest military alliance in the world is staying out of it. We are deterred and Russia is not.
5904: 4986: 4961: 1427:". It explains that while relations with Russia continue to follow the traditional characteristics of MAD, but the US policy of deterrence towards nations with minor nuclear capabilities should ensure by threats of immense retaliation (or even 1672:
argued in 1994 that nuclear weapons were obsolete in the "new world disorder" after the dissolution of the Soviet Union, and he advocated reliance on precision guided munitions to secure a permanent military advantage over future adversaries.
438:
refers to the scholarship and practice of how threats of using force by one party can convince another party to refrain from initiating some other course of action. The topic gained increased prominence as a military strategy during the
1653:
have all called upon governments to embrace the vision of a world free of nuclear weapons, and created the Nuclear Security Project to advance that agenda. In 2010, the four were featured in a documentary film entitled
1617:
and loss of control over others likely. Frank C. Zagare has argued that deterrence theory is logically inconsistent and empirically inaccurate. In place of classical deterrence, rational choice scholars have argued for
1558:
There is a risk of unintended escalation in cyberspace due to difficulties in discerning the intent of attackers, and complexities in state-hacker relationships. According to political scientists Joseph Brown and
1576:
deterrence include deterring adversaries from resorting to nuclear, chemical and biological weapons attacks or attacking civilian populations indiscriminately. Broadly, it involves any prevention of escalation.
2381: 496:
otherwise take an action refrains from doing so due to the consequences that the deterrer is perceived likely to take. "Immediate deterrence" is considered successful when an actor seriously contemplating
5896: 698:, which has been seen in Libya, Iraq, and North Korea. There, defending states have sought to change the leadership of a state and to policy changes relating primarily to their nuclear weapons programs. 543:", his country needed an air force that could immediately retaliate: "If we are prepared it may never come. It is not immediately conceivable that any nation will dare to attack us if we are prepared". 4925: 4021:
the findings reinforce a key theoretical tenet of the nuclear revolution: Once states have achieved a secure second-strike capability, nuclear superiority does not confer additional political benefits.
3324:
Since the consequence of a breakdown of the nuclear deterrence strategy is so catastrophic for human civilisation, it is reasonable to employ the strategy only if the chance of breakdown is zero.
485:
Deterrence is most likely to be successful when a prospective attacker believes that the probability of success is low and the costs of attack are high. Central problems of deterrence include the
455:
would devastate both parties. The central problem of deterrence revolves around how to credibly threaten military action or nuclear punishment on the adversary despite its costs to the deterrer.
1210:
nuclear wars, and thus they neither start major conflicts nor allow minor conflicts to escalate into major conflicts—thus making it safe to engage in minor conflicts. For instance, during the
4466: 1933: 5552: 3960: 3710: 3410: 2029: 864:
of not using force is reduced by a declining status quo position, deterrence failure is more likely since the alternative option of using force becomes relatively more attractive.
422: 1485:
would be met with a nuclear response. Later Ukrainian attacks on the same fleet using a different communications system also caused deterrence, this time to the Russian Navy.
3153: 577:, synonymous with naivete and weakness, and signifying a craven willingness to barter away the nation's vital interests for empty promises." They claimed that the success of 596:
The concept of deterrence can be defined as the use of threats in limited force by one party to convince another party to refrain from initiating some course of action. In
1047: 635:
Deterrence theory holds that nuclear weapons are intended to deter other states from attacking with their nuclear weapons, through the promise of retaliation and possibly
615:
between neighboring states in which major powers like the United States do not directly intervene. On the other hand, situations of extended deterrence often occur when a
506:(Probability of deterrer carrying out deterrent threat Ă— Costs if threat carried out) > (Probability of the attacker accomplishing the action Ă— Benefits of the action) 6278: 4310: 6646: 4394: 1689:
in which a state possesses no more nuclear weapons than is necessary to deter an adversary from attacking is presently the most common form of deterrence practiced by
5675: 4343: 5165: 47:, one of two submarines designed to provide a nuclear deterrence using cruise missiles with a 500-mile (800 km) range—placed on patrol by starting to carry the 2812: 7832: 3343: 5838: 1053: 1596:
misperceptions. Here it's argued that misestimations of perceived costs and benefits by analysts contribute to deterrence failures, as exemplified in case of
1316:, asserted that he never advocated military intervention, merely economic support, and that his ideas were misinterpreted as espoused by the general public. 1114: 607:
state to the leaders of another in an attempt to prevent the other state from resorting to the use of military force in pursuit of its foreign policy goals.
559:
The two most prominent deterrent strategies are "denial" (denying the attacker the benefits of attack) and "punishment" (inflicting costs on the attacker).
1103: 1424: 873:
tripwires do work to deter aggression, citing the Western deployment of forces to Berlin in 1948–1949 to deter Soviet aggression as a successful example.
5808: 2644: 1124: 2310: 646:
A successful nuclear deterrent requires a country to preserve its ability to retaliate by responding before its own weapons are destroyed or ensuring a
603:
Glenn Snyder also offers a broad definition of deterrence, as he argues that deterrence involves both the threat of sanction and the promise of reward.
4254: 6298: 1155: 415: 1661:"If you think of the people who are doing suicide attacks, and people like that get a nuclear weapon, they are almost by definition not deterrable." 1357:'s arms build-up during the 1980s. Reagan attempted to justify the policy by concerns of growing Soviet influence in Latin America and the post-1979 6641: 6056:"Reviewed work: On War and Morality, Robert L. Holmes; Paths to Peace: Exploring the Feasibility of Sustainable Peace, Richard Smoke, Willis Harman" 4440: 1909: 1098: 6406: 6401: 6396: 7877: 7842: 6328: 1454:, many western hawks expressed the view that deterrence worked in that war but only in one way – in favor of Russia. Former US security advisor, 581:
often depends upon a president withstanding "the inevitable charges of appeasement that accompany any decision to negotiate with hostile powers.
4639: 4303:"An explosive Elon Musk biography is just hitting shelves. But the book's acclaimed author is already walking back a major claim | CNN Business" 3526: 3468: 1439:. The current tensions with Iran and North Korea over their nuclear programs are caused partly by the continuation of the policy of deterrence. 6661: 3928: 2736: 2272: 1068: 1058: 334: 5518: 1385:, who were fighting for independence from the Soviet Union, and several anticommunist movements in Latin America such as the overthrow of the 6760: 6271: 6235: 6177: 6149: 5538: 5490: 5388: 5342: 5296: 5159: 4460: 4220: 4180: 3946: 3768: 3682: 3558: 3090: 2855: 2774: 2722: 2676: 2600: 2258: 2204: 2158: 2112: 2061: 2023: 1970: 1927: 1084: 1073: 1063: 841: 486: 3717: 7659: 6666: 6656: 4528: 1257: 988: 408: 4903: 4280: 3402: 3032:
See, for example, Carl von Clausewitz, On War, trans. and ed. Michael Howard and Peter Paret (Princeton, Princeton University Press, 1989)
2005: 1621:, which assumes that states may vary in their internal characteristics and especially in the credibility of their threats of retaliation. 478:. Compellence has been characterized as harder to successfully implement than deterrence. Deterrence also tends to be distinguished from 7872: 6651: 6504: 6494: 2519: 1474: 1119: 1037: 578: 4837: 7476: 7011: 6809: 6421: 6411: 5696:
Zagare, Frank C. (2004), "Reconciling Rationality with Deterrence: A Re-examination of the Logical Foundations of Deterrence Theory",
4407:
Tavberidze, Vazha, (2022). "Former NATO Commander Says Western Fears Of Nuclear War Are Preventing A Proper Response To Putin,"
749:
One approach to theorizing about deterrence has entailed the use of rational choice and game-theoretic models of decision making (see
540: 475: 5356: 4373: 1482: 1206: 7837: 7295: 7114: 6717: 6671: 6348: 5868: 1892: 3125: 4234: 600:(1966), Schelling offers a broader definition of deterrence, as he defines it as "to prevent from action by fear of consequences." 6916: 6264: 1451: 5646: 1531:
attack on Iran's nuclear program. By 2019, the only publicly acknowledged case of a cyber attack causing a power outage was the
7847: 7385: 6712: 6571: 2218: 2172: 6926: 6633: 6388: 5963: 4302: 1402: 1189:
Part of a state's nuclear arsenal must appear to be able to survive an attack by the adversary and be used for a retaliatory
299: 7255: 5496: 5394: 5302: 4186: 3774: 3688: 3592: 3564: 3096: 2838:
NL ARMS Netherlands Annual Review of Military Studies 2020: Deterrence in the 21st Century—Insights from Theory and Practice
2682: 2606: 2067: 1976: 5667: 4335: 7827: 7436: 6854: 6829: 5141: 1414:
The final expression of the full impact of deterrence during the cold war can be seen in the agreement between Reagan and
1304:
throughout most of the globe, particularly Africa, Asia, Central America, and South America. One notable conflict was the
1148: 966: 574: 474:, which is the attempt to get an actor (such as a state) to take an action (i.e. alter the status quo). Both are forms of 1709:
under the belief that the United States will refuse to risk its own cities by assisting Western Europe in a nuclear war.
7786: 7212: 6966: 6956: 6891: 6333: 3340: 2801: 1758: 1682: 1532: 636: 5929: 5830: 7006: 6986: 6514: 5863: 2126: 1597: 1129: 7471: 5778: 5748: 1738:
exclusively upon the continuous development of new iterations of the very weapons which it is designed to prohibit.
30:
This article is about Deterrent in peace and conflict studies and nuclear weapons. For legal theory of justice, see
7852: 7822: 7720: 7441: 7099: 6941: 6936: 6722: 6531: 6308: 5072: 4148: 3906: 3840: 1407: 1338: 1089: 934: 894: 448: 366: 273: 5617: 3650: 3299: 3233: 2981: 2915: 2458: 1721:
era, philosophical objections to the reliance upon deterrence theories in general have also been raised on purely
1239: 7862: 7756: 7679: 7415: 6971: 6896: 6753: 1515:
Since the early 2000s, there has been an increased focus on cyber deterrence. Cyber deterrence has two meanings:
2836:
Mueller, Karl (2021), Osinga, Frans; Sweijs, Tim (eds.), "The Continuing Relevance of Conventional Deterrence",
535:
during World War II, was thinking about how the next war would be fought. He said in a speech that month to the
7867: 7857: 7771: 7504: 7390: 7187: 6981: 6799: 6524: 1141: 954: 536: 452: 361: 319: 123: 116: 7574: 5800: 2628: 2294: 7776: 7375: 7345: 7001: 6789: 6697: 6509: 6287: 5927:
From Counterforce to Minimal Deterrence: A New Nuclear Policy on the Path Toward Eliminating Nuclear Weapons
4258: 1768: 983: 949: 460: 208: 138: 7710: 639:. Nuclear deterrence can also be applied to an attack by conventional forces. For example, the doctrine of 7801: 7781: 7761: 7380: 7285: 7144: 7094: 7089: 7021: 6991: 6911: 6839: 5705: 5417:"Utility-based predictions of military escalation: Why experts forecasted Russia would not invade Ukraine" 1818: 1634: 1590: 590: 1247: 589:
The use of military threats as a means to deter international crises and war has been a central topic of
6819: 5574:"The Perils of Proliferation: Organization Theory, Deterrence Theory, and the Spread of Nuclear Weapons" 5237:"Emerging technology and intra-war escalation risks: Evidence from the Cold War, implications for today" 3051:
Huth, P. K. (1999), "Deterrence and International Conflict: Empirical Findings and Theoretical Debate",
2757:
Rynning, Sten (2021). "Deterrence Rediscovered: NATO and Russia". In Osinga, Frans; Sweijs, Tim (eds.).
1690: 1656: 1243: 1023: 1008: 944: 283: 41: 31: 7260: 7245: 6219: 6139: 1823: 466:
Deterrence is widely defined as any use of threats (implicit or explicit) or limited force intended to
344: 489:
communication of threats and assurance. Deterrence does not necessarily require military superiority.
7594: 7579: 7466: 7461: 7365: 7350: 7315: 7280: 6879: 6824: 6746: 6687: 6601: 6338: 4603: 971: 959: 349: 6223: 5710: 2704: 2240: 1365:. Similar to the old policy of containment, the US funded several proxy wars, including support for 7751: 7370: 7320: 7157: 7084: 7064: 6921: 6804: 6611: 6606: 6469: 1763: 1630: 1297: 1199: 1013: 890: 640: 612: 278: 177: 154: 58: 1548:
Norms: the establishment and maintenance of norms that establish appropriate standards of behavior
7730: 7589: 7420: 7400: 7250: 7129: 7034: 6961: 6906: 6442: 6120: 6078: 6036: 5994: 5723: 5609: 5601: 5544: 5348: 5264: 5217: 5122: 5064: 5014: 4953: 4895: 4887: 4829: 4742: 4692: 4631: 4581: 4520: 4226: 4140: 4132: 4085: 4012: 3952: 3898: 3890: 3832: 3824: 3642: 3518: 3460: 3381: 3291: 3283: 3225: 3217: 3145: 3015: 2973: 2965: 2907: 2899: 2728: 2571: 2511: 2450: 2442: 2373: 2264: 2210: 2164: 2118: 1753: 1694: 1686: 1436: 1398: 1358: 1293: 721: 532: 471: 467: 396: 314: 309: 94: 3711:"The Stability-Instability Paradox, Misperception, and Escalation Control in South Asia (essay)" 1374: 4891: 4859: 4492: 4272: 7715: 7684: 7639: 7534: 7405: 7360: 7335: 7265: 7139: 7069: 6951: 6901: 6849: 6707: 6576: 6541: 6452: 6369: 6231: 6173: 6145: 5942: 5593: 5534: 5486: 5384: 5338: 5292: 5256: 5209: 5155: 5114: 5056: 5006: 4945: 4879: 4821: 4782: 4734: 4684: 4623: 4573: 4512: 4456: 4388: 4216: 4176: 4124: 4004: 3942: 3882: 3816: 3764: 3678: 3634: 3554: 3510: 3452: 3275: 3209: 3086: 2957: 2891: 2851: 2770: 2718: 2672: 2636: 2596: 2563: 2503: 2434: 2365: 2302: 2254: 2200: 2154: 2108: 2057: 2019: 1966: 1923: 1888: 1808: 1788: 1773: 1748: 1698: 1415: 1329: 1235: 1178:
policies and fuels political coercion and military deadlock, which can produce proxy warfare.
1018: 1003: 998: 993: 929: 898: 304: 268: 172: 104: 17: 7796: 7791: 7725: 7689: 7669: 7629: 7599: 7554: 7509: 7494: 7451: 7305: 6946: 6883: 6869: 6834: 6727: 6596: 6519: 6241: 6112: 6070: 6028: 5986: 5715: 5585: 5526: 5461: 5428: 5330: 5282: 5248: 5199: 5147: 5106: 4998: 4937: 4871: 4813: 4772: 4726: 4676: 4615: 4565: 4504: 4448: 4116: 4077: 4046: 3994: 3934: 3874: 3808: 3626: 3502: 3444: 3373: 3267: 3201: 3137: 3060: 2949: 2883: 2841: 2780: 2762: 2710: 2553: 2495: 2426: 2355: 2347: 2246: 2100: 2011: 1915: 1833: 1803: 1726: 1642: 1554:
Entanglement and interdependence: interdependence between actors can have a deterrent effect
1490: 1309: 886: 793: 570: 562: 479: 1542:
Denial: preventing adversaries from achieving military objectives by defending against them
1250:
and spent substantial amounts of money and manpower on gaining relative influence over the
7694: 7654: 7609: 7524: 7519: 7240: 7192: 7079: 6844: 6814: 6784: 6556: 6551: 6546: 6464: 5946: 5933: 4365: 3347: 1828: 1813: 1733:
presumption which prohibits the killing of innocent life. Consequently, such theories are
1706: 1646: 1601: 1470: 1428: 1174: 939: 806: 801: 733:
are supportive, and opposition within the defending state's domestic politics is limited.
556:
A distinction is sometimes made between nuclear deterrence and "conventional deterrence."
444: 356: 263: 247: 187: 48: 7559: 4987:"#SorryNotSorry: Why states neither confirm nor deny responsibility for cyber operations" 4452: 2015: 1919: 1697:
during arms negotiations between the United States and Russia allows each state to make
694:
The main source of disproportionality is an objective that goes beyond policy change to
7634: 7624: 7614: 7549: 7539: 7529: 7514: 7310: 7290: 7275: 7270: 7230: 7197: 7182: 7177: 7167: 6976: 6353: 5958: 5859: 4230: 4208: 2785: 1838: 1793: 1729:
have noted that the implementation of such theories is inconsistent with a fundamental
1478: 1366: 1028: 976: 906: 671: 329: 7816: 7674: 7664: 7619: 7604: 7584: 7410: 7355: 7330: 7202: 7172: 7162: 7149: 7054: 6996: 6931: 6864: 6194: 6190: 5638: 5613: 5548: 5352: 5268: 5221: 5018: 4957: 4899: 4696: 4635: 4089: 4016: 3956: 3902: 3836: 3522: 3464: 3295: 3229: 2977: 2911: 2732: 2575: 2454: 2268: 1798: 1730: 1650: 1560: 1481:
argued Musk had been deterred by Russia after the country's ambassador warned him an
1466: 1354: 1313: 1260:
wrote in 1959 that a credible nuclear deterrent must be always ready but never used.
1215: 1190: 1182: 695: 655: 651: 647: 381: 371: 182: 5727: 5126: 4833: 4585: 4524: 4144: 3797:"Nuclear Superiority and the Balance of Resolve: Explaining Nuclear Crisis Outcomes" 3149: 2515: 2377: 2214: 2194: 2168: 2148: 573:
and Kenneth Osgood, "Munich and appeasement have become among the dirtiest words in
470:
an actor from taking an action (i.e. maintain the status quo). Deterrence is unlike
7649: 7644: 7499: 7074: 6616: 6536: 6489: 6198: 4746: 4714: 4553: 4105:"The Spread of Nuclear Weapons and International Conflict: Does Experience Matter?" 3065: 1783: 1506: 1219: 620:
military conflict or short-term threat from arising (known as general deterrence).
528: 376: 227: 84: 37: 5465: 5433: 5416: 5252: 5110: 4730: 4664: 4619: 4569: 4207:
Bell, Mark S.; Miller, Nicholas L. (2022), Narang, Vipin; Sagan, Scott D. (eds.),
3506: 3448: 2558: 2541: 5480: 5378: 5286: 4680: 4215:, Deterrence in the New Nuclear Age, Cornell University Press, pp. 209–229, 4170: 3758: 3672: 3586: 3548: 3080: 2666: 2590: 2051: 1960: 7766: 7569: 7564: 7544: 7340: 7325: 7134: 7104: 7039: 7029: 6859: 6794: 6770: 6702: 6581: 6561: 6474: 6459: 6374: 5449: 5236: 5094: 4066:"Nuclear balance and the initiation of nuclear crises: Does superiority matter?" 3674:
The Meaning of the Nuclear Revolution: Statecraft and the Prospect of Armageddon
3490: 3432: 3403:"The Truth About Tripwires: Why Small Force Deployments Do Not Deter Aggression" 2846: 2766: 1734: 1510: 1455: 1382: 1342: 1325: 1289: 1251: 1231: 750: 616: 566: 511: 391: 386: 339: 217: 197: 133: 99: 74: 65: 6097: 6055: 6013: 5482:
The Revolution that Failed: Nuclear Competition, Arms Control, and the Cold War
1551:
Escalation: raising the probability that costs will be imposed on the adversary
27:
Military strategy during the Cold War with regard to the use of nuclear weapons
7395: 7049: 6586: 5530: 4941: 4875: 4081: 3878: 3812: 3141: 1778: 1669: 1605: 1386: 1378: 1333: 1305: 1301: 1227: 1223: 5719: 5597: 5260: 5213: 5118: 5060: 5010: 4949: 4883: 4825: 4817: 4786: 4738: 4688: 4627: 4577: 4516: 4128: 4120: 4008: 3886: 3820: 3638: 3514: 3456: 3279: 3213: 2961: 2895: 2640: 2567: 2542:"Strategies of Extended Deterrence: How States Provide the Security Umbrella" 2507: 2438: 2369: 2306: 2293:
Glaser, Bonnie S.; Weiss, Jessica Chen; Christensen, Thomas J. (2023-11-30).
7300: 7220: 7044: 6692: 6447: 6215: 5926: 4777: 4764: 4065: 1843: 1462: 1390: 324: 237: 232: 222: 111: 5873: 4801: 2499: 2336:"Active Denial: Redesigning Japan's Response to China's Military Challenge" 2122: 2094: 6256: 5897:"IS IT TIME TO JUNK OUR NUKES? THE NEW WORLD DISORDER MAKES THEM OBSOLETE" 5188:"The Subversive Trilemma: Why Cyber Operations Fall Short of Expectations" 5151: 4050: 3938: 2714: 2250: 800:
In an article celebrating Schelling's Nobel Memorial Prize for Economics,
7735: 7235: 6499: 6437: 6416: 5770: 5740: 5324: 5204: 5187: 4508: 3999: 3982: 3760:
The Logic of American Nuclear Strategy: Why Strategic Superiority Matters
3433:"Advancing without Attacking: The Strategic Game around the Use of Force" 2483: 2360: 2351: 1718: 1638: 1432: 1277: 1211: 440: 163: 128: 6738: 5334: 5068: 5044: 5002: 4136: 4104: 3894: 3862: 3828: 3796: 3177:, Washington, D.C: United States Institute of Peace Press, pp. 3–14 3173:
George, A (1991), "The General Theory and Logic of Coercive Diplomacy",
3019: 3003: 2104: 7456: 7446: 7124: 6124: 6082: 6040: 5998: 5605: 5573: 4033:
Lee, Kyung Suk; Kim, James D.; Jin, Hwalmin; Fuhrmann, Matthew (2023).
3646: 3614: 3385: 3287: 3255: 3221: 3189: 2969: 2937: 2903: 2871: 2446: 2414: 2335: 1722: 1528: 1394: 1195:
The state must not respond to false alarms of a strike by the adversary
914: 643:
threatened to launch US nuclear weapons in response to Soviet attacks.
79: 4802:"Invisible Digital Front: Can Cyber Attacks Shape Battlefield Events?" 4034: 6591: 6479: 5523:
Before and After the Fall: World Politics and the End of the Cold War
4715:"Weaving Tangled Webs: Offense, Defense, and Deception in Cyberspace" 4420:
Bar, Shmuel, (2022). "Deterrence after Ukraine—a critical analysis,"
1494: 1292:
of communism, an aggressive stance on behalf of the US especially on
1288:
The early stages of the Cold War were generally characterized by the
675: 659: 6116: 6074: 6032: 5990: 5589: 4255:"The Nautilus Institute Nuclear Strategy Project: US FOIA Documents" 3630: 3491:"Trivial Tripwires?: Military Capabilities and Alliance Reassurance" 3377: 3271: 3205: 2953: 2887: 2430: 1328:
from Vietnam, the normalization of US relations with China, and the
5380:
Perception and Misperception in International Politics: New Edition
4765:"The role of effects, saliencies and norms in US Cyberwar doctrine" 3744:"The Anatomy of Deterrence" as found in Strategy in the Missile Age 1268:
theoretical and empirical basis for notions of "nuclear learning."
569:
failed, contributes to deterrence theory. In the words of scholars
463:
context is the application of deterrence theory to avoid conflict.
7225: 6566: 6323: 5977:
Ullman, Richard H. (Summer 1989). "The Covert French Connection".
5288:
Cooperation Under Fire: Anglo-German Restraint During World War II
2802:"How Does Nuclear Deterrence Differ from Conventional Deterrence?" 1185:, there are three requirements for successful nuclear deterrence: 810: 667: 663: 36: 4172:
When Proliferation Causes Peace: The Psychology of Nuclear Crises
451:, according to which a full-scale nuclear attack on a power with 6343: 5517:
Jervis, Robert (2021), Bartel, Fritz; Monteiro, Nuno P. (eds.),
3175:
Forceful Persuasion: Coercive Diplomacy as an Alternative to War
2872:"Conventional Deterrence and Conventional Retaliation in Europe" 1693:, such as China, India, Pakistan, Britain, and France. Pursuing 1370: 1362: 1345:
in the early 2010s. Since then, relations have been less clear.
1170: 730: 550: 492:"General deterrence" is considered successful when an actor who 6742: 6260: 6623: 1911:
Introduction: Cross-Domain Deterrence, from Practice to Theory
1332:, the policy of containment was abandoned and a new policy of 192: 89: 772:: interactions tend to be between dyads (or triads) of states 553:
was founded 1949 with a role including deterring aggression.
541:
No air attack, once it is launched, can be completely stopped
5450:"A New Concert for Europe: Security and Order After the War" 5045:"Escalation Dynamics and Conflict Termination in Cyberspace" 2668:
The Use of Force: Military Power and International Politics
2053:
The Use of Force: Military Power and International Politics
726: 650:
capability. A nuclear deterrent is sometimes composed of a
2759:
NL ARMS Netherlands Annual Review of Military Studies 2020
1493:, a retired four-star U.S. Air Force general and a former 3746:, Princeton: Princeton University Press, pp. 264–304 3190:"Rational Deterrence Theory and Comparative Case Studies" 2007:
Cross-Domain Deterrence: Strategy in an Era of Complexity
736:
The other important considerations outlined by Jentleson
51:(shown at Pier 86 in New York, its home as a museum ship) 5925:
Kristensen, Hans M, Robert S Norris, and Ivan Oelrich. "
6098:"Reviewed work: On War and Morality., Robert L. Holmes" 4209:"The Limits of Nuclear Learning in the New Nuclear Age" 1312:, who is taken to be the founder of this policy in his 6014:"Reviewed work: On War and Morality, Robert L. Holmes" 1538:
There are various ways to engage in cyber deterrence:
725:
achieved if other major international actors like the
4602:
Borghard, Erica D.; Lonergan, Shawn W. (2021-08-03).
3256:"Testing Deterrence Theory: Rigor Makes a Difference" 2938:"Why the Soviets Can't Win Quickly in Central Europe" 2415:"What Makes Deterrence Work? Cases from 1900 to 1980" 2056:. Rowman & Littlefield Publishers. pp. 3–5. 678:, have only sea-based and air-based nuclear weapons. 654:, as in the case of the nuclear weapons owned by the 6205:. Baltimore: Johns Hopkins University Press. 270 pp. 3364:
Jervis, Robert (1982). "Deterrence and Perception".
3004:"THE GHOST OF MUNICH: America's Appeasement Complex" 1545:
Punishment: the imposition of costs on the adversary
784:: outcomes reflect actors' cost-benefit calculations 7744: 7703: 7485: 7429: 7211: 7113: 7020: 6878: 6777: 6680: 6632: 6430: 6387: 6362: 6316: 6307: 5937: 447:and is related to but distinct from the concept of 5639:"Don't Be So Confident in Nuclear Decision-Making" 2671:. Rowman & Littlefield Publishers. p. 3. 4035:"Nuclear Weapons and Low-Level Military Conflict" 3330:, New Haven: Yale University Press, pp. 1–34 3320: 3318: 3316: 2761:. The Hague: T.M.C. Asser Press. pp. 29–45. 1522:The deterrence of an adversary's cyber operations 5525:, Cambridge University Press, pp. 115–131, 5415:Driedger, Jonas J.; Polianskii, Mikhail (2023). 5143:Cyber Mercenaries: The State, Hackers, and Power 3489:Blankenship, Brian; Lin-Greenberg, Erik (2022). 1222:never engaged each other in warfare, but fought 6248:. Vol. 84, No. 3 (Sep, 1990), pp. 731–746. 5093:Borghard, Erica D.; Lonergan, Shawn W. (2017). 4800:Kostyuk, Nadiya; Zhukov, Yuri M. (2019-02-01). 4552:Borghard, Erica D.; Lonergan, Shawn W. (2017). 3983:"The Nuclear Balance Is What States Make of It" 2840:, Nl Arms, T.M.C. Asser Press, pp. 47–63, 2334:Heginbotham, Eric; Samuels, Richard J. (2018). 1401:, while overt support led to a ruling from the 6329:Collective Security Treaty Organization (CSTO) 6228:Complex Deterrence: Strategy In the Global Age 4273:"How Russia Is Beating the West at Deterrence" 3588:The Balance of Power and the Balance of Terror 3188:Achen, Christopher H.; Snidal, Duncan (1989). 1519:The use of cyber actions to deter other states 6754: 6272: 5741:"Nuclear endgame: The growing appeal of zero" 4926:"Constructing Norms for Global Cybersecurity" 4924:Finnemore, Martha; Hollis, Duncan B. (2016). 4860:"Constructing Norms for Global Cybersecurity" 4858:Finnemore, Martha; Hollis, Duncan B. (2016). 2150:Bombing to Win: Air Power and Coercion in War 1637:, have criticized nuclear deterrence theory. 1149: 778:: actors consider the choices of other actors 518:Costs Ă— P(Costs) > Benefits Ă— P(Benefits) 416: 8: 5801:"Documentary Advances Nuclear Free Movement" 4985:Brown, Joseph M.; Fazal, Tanisha M. (2021). 4447:, Oxford University Press, pp. 95–120, 4393:: CS1 maint: multiple names: authors list ( 3927:Sechser, Todd S.; Fuhrmann, Matthew (2017). 3861:Sechser, Todd S.; Fuhrmann, Matthew (2013). 3119: 3117: 3115: 3113: 3046: 3044: 3042: 3040: 3038: 2665:Art, Robert J.; Greenhill, Kelly M. (2015). 2050:Art, Robert J.; Greenhill, Kelly M. (2015). 1705:France has developed and maintained its own 4763:Farrell, Henry; Glaser, Charles L. (2017). 3002:Logevall, Fredrik; Osgood, Kenneth (2010). 2295:"Taiwan and the True Sources of Deterrence" 1300:. The period was characterized by numerous 6761: 6747: 6739: 6313: 6279: 6265: 6257: 4991:European Journal of International Security 4364:Koster, Ben Hodges, Timo S. (2022-05-05). 3716:. The Henry Stimson Center. Archived from 2595:. Princeton University Press. p. 20. 1156: 1142: 913: 902: 423: 409: 54: 6344:North Atlantic Treaty Organization (NATO) 6244:"Nuclear Myths and Political Realities". 5709: 5432: 5203: 5146:. Cambridge: Cambridge University Press. 4864:The American Journal of International Law 4776: 4665:"Stuxnet and the Limits of Cyber Warfare" 4493:"Deterrence and Dissuasion in Cyberspace" 3998: 3933:. Cambridge: Cambridge University Press. 3863:"Crisis Bargaining and Nuclear Blackmail" 3064: 2845: 2784: 2557: 2359: 1353:A third shift occurred with US President 6168:Schultz, George P. and Goodby, James E. 5668:"The Psychology of Nuclear Brinkmanship" 3615:"Why Nuclear Superiority Doesn't Matter" 2199:. Cornell University Press. p. 23. 2153:(1 ed.). Cornell University Press. 753:). Rational deterrence theory entails: 6349:Shanghai Cooperation Organisation (SCO) 4713:Gartzke, Erik; Lindsay, Jon R. (2015). 3550:The Spread of Nuclear Weapons: A Debate 3124:Jentleson, B.A.; Whytock, C.A. (2005), 2709:. Cornell University Press. p. 1. 2245:. Cornell University Press. p. 6. 2004:Gartzke, Eric; Lindsay, Jon R. (2019). 1908:Lindsay, Jon R.; Gartzke, Erik (2019). 1887:(first ed.). Osprey. p. 108. 1875: 1863:and requires rational decision makers." 1855: 1276:The US policy of deterrence during the 1036: 921: 905: 510:This model is frequently simplified in 291: 255: 207: 162: 146: 64: 57: 4980: 4978: 4758: 4756: 4708: 4706: 4658: 4656: 4441:"Deterrence in and through Cyberspace" 4386: 4336:"What Russia Got by Scaring Elon Musk" 4329: 4327: 3930:Nuclear Weapons and Coercive Diplomacy 1914:. Oxford University Press. p. 2. 1425:Essentials of Post–Cold War Deterrence 335:Forum (alternative dispute resolution) 7833:Deterrence theory during the Cold War 6246:The American Political Science Review 6063:The American Political Science Review 5949:. April 2009. Accessed July 31, 2010. 5781:from the original on December 3, 2011 5751:from the original on December 3, 2011 5095:"The Logic of Coercion in Cyberspace" 4930:American Journal of International Law 4597: 4595: 4554:"The Logic of Coercion in Cyberspace" 4547: 4545: 4486: 4484: 4482: 4434: 4432: 4430: 3547:Sagan, Scott; Waltz, Kenneth (1995). 3397: 3395: 2477: 2475: 2408: 2406: 2404: 2402: 2400: 2398: 2329: 2327: 2088: 2086: 2084: 1965:. SAGE Publications. pp. 26–30. 842:Credibility (international relations) 482:or the use of full force in wartime. 7: 6230:(University of Chicago Press, 2009) 4604:"Deterrence by denial in cyberspace" 1999: 1997: 1995: 1993: 1954: 1952: 1950: 5967:32, no. 3 (September 1988): p. 424. 5479:Green, Brendan Rittenhouse (2020). 3254:Huth, Paul; Russett, Bruce (1990). 2413:Huth, Paul; Russett, Bruce (1984). 1685:form of deterrence, the concept of 6810:First-player and second-player win 6422:International relations since 1989 6412:Diplomatic history of World War II 6334:International Criminal Court (ICC) 6138:Holmes, Robert L. (14 July 2014). 4453:10.1093/oso/9780190908645.003.0005 4109:The Journal of Conflict Resolution 3053:Annual Review of Political Science 2706:Israel and Conventional Deterrence 2592:Analyzing Strategic Nuclear Policy 2484:"Selection Effects and Deterrence" 2242:Israel and Conventional Deterrence 2016:10.1093/oso/9780190908645.001.0001 1920:10.1093/oso/9780190908645.003.0001 1280:underwent significant variations. 1173:submarines, Schelling argues that 766:: actors are understood as unitary 593:research for at least 2000 years. 25: 6718:International political sociology 6170:The War that Must Never be Fought 5939:Federation of American Scientists 5907:from the original on July 2, 2019 5869:Bulletin of the Atomic Scientists 3341:"A Nobel Laureate Who's Got Game" 1962:Deterrence: A Conceptual Analysis 1475:Starlink communications in Crimea 1272:Stages of US policy of deterrence 6917:Coalition-proof Nash equilibrium 5961:. "Minimal Nuclear Deterrence." 4439:Schneider, Jacquelyn G. (2019), 1465:prevented Ukraine from carrying 1452:2022 Russian invasion of Ukraine 1419:achieve military superiority.". 6713:International political economy 5841:from the original on 2014-02-13 5811:from the original on 2023-04-05 5698:Journal of Theoretical Politics 5678:from the original on 2023-03-04 5649:from the original on 2023-07-07 5620:from the original on 2022-02-14 5555:from the original on 2024-02-24 5499:from the original on 2024-02-24 5397:from the original on 2024-02-24 5359:from the original on 2024-02-24 5305:from the original on 2023-04-05 5168:from the original on 2021-11-07 5075:from the original on 2021-11-06 5025:from the original on 2021-11-06 4964:from the original on 2021-11-07 4906:from the original on 2021-11-07 4892:10.5305/amerjintelaw.110.3.0425 4840:from the original on 2022-02-25 4642:from the original on 2021-11-06 4531:from the original on 2021-01-26 4469:from the original on 2021-11-06 4376:from the original on 2023-07-16 4366:"NATO Must Re-Learn Deterrence" 4346:from the original on 2023-09-16 4313:from the original on 2023-09-22 4283:from the original on 2023-06-05 4237:from the original on 2023-08-31 4189:from the original on 2023-12-01 4175:. Georgetown University Press. 4151:from the original on 2023-08-31 4039:International Studies Quarterly 3963:from the original on 2022-03-20 3909:from the original on 2022-05-07 3843:from the original on 2022-01-26 3777:from the original on 2023-04-10 3691:from the original on 2022-10-26 3653:from the original on 2022-01-28 3595:from the original on 2023-04-05 3567:from the original on 2023-04-10 3529:from the original on 2024-02-24 3471:from the original on 2024-02-24 3413:from the original on 2021-06-02 3302:from the original on 2021-09-11 3236:from the original on 2021-09-08 3156:from the original on 2021-04-26 3099:from the original on 2023-04-10 2984:from the original on 2021-09-05 2918:from the original on 2021-09-05 2818:from the original on 2021-10-25 2739:from the original on 2021-09-06 2685:from the original on 2024-02-24 2647:from the original on 2019-12-12 2629:"The General and World War III" 2609:from the original on 2023-04-10 2522:from the original on 2024-02-24 2461:from the original on 2021-09-11 2384:from the original on 2024-02-24 2313:from the original on 2023-12-01 2275:from the original on 2021-09-06 2221:from the original on 2023-04-05 2175:from the original on 2021-08-30 2129:from the original on 2022-05-19 2070:from the original on 2024-02-24 2032:from the original on 2021-08-30 1979:from the original on 2024-02-24 1936:from the original on 2021-08-30 670:. Other countries, such as the 7878:Subfields of political science 7843:International relations theory 6927:Evolutionarily stable strategy 6144:. Princeton University Press. 5964:Journal of Conflict Resolution 5485:. Cambridge University Press. 5383:. Princeton University Press. 5329:. Princeton University Press. 4806:Journal of Conflict Resolution 4334:Applebaum, Anne (2023-09-11). 3407:Texas National Security Review 3326:Schelling, T. C. (1966), "2", 3085:. Princeton University Press. 3066:10.1146/annurev.polisci.2.1.25 2870:Huntington, Samuel P. (1983). 2627:Rhodes, Richard (1995-06-11). 1702:its nuclear arsenal secretly. 1443: 1403:International Court of Justice 827:Signaling and bargaining power 300:Alternative dispute resolution 1: 6855:Simultaneous action selection 6212:. Cambridge University Press. 5777:. June 18, 2011. p. 66. 5466:10.1080/0163660X.2023.2192137 5434:10.1080/13523260.2023.2259153 5253:10.1080/01402390.2019.1631811 5111:10.1080/09636412.2017.1306396 4731:10.1080/09636412.2015.1038188 4620:10.1080/01402390.2021.1944856 4570:10.1080/09636412.2017.1306396 4213:The Fragile Balance of Terror 3742:Brodie, Bernard (1959), "8", 3585:Snyder, Glenn Herald (1965). 3507:10.1080/09636412.2022.2038662 3449:10.1080/09636412.2017.1360074 2936:Mearsheimer, John J. (1982). 2559:10.1080/09636412.2021.2010887 2193:Mearsheimer, John J. (1983). 2093:Schelling, Thomas C. (1966). 1405:against the United States in 1207:stability–instability paradox 18:Independent nuclear deterrent 7787:List of games in game theory 6967:Quantal response equilibrium 6957:Perfect Bayesian equilibrium 6892:Bayes correlated equilibrium 6681:Related fields and subfields 5831:"Cold Warriors say no nukes" 5771:"The Growing Appeal of Zero" 5421:Contemporary Security Policy 5291:. Cornell University Press. 5241:Journal of Strategic Studies 5186:Maschmeyer, Lennart (2021). 4681:10.1080/09636412.2013.816122 4608:Journal of Strategic Studies 4301:Darcy, Oliver (2023-09-12). 3677:. Cornell University Press. 2703:Shimshoni, Jonathan (1988). 2239:Shimshoni, Jonathan (1988). 1759:Confidence-building measures 1683:mutually assured destruction 1533:2015 Ukraine power grid hack 1473:by denying to enable needed 637:mutually assured destruction 7256:Optional prisoner's dilemma 6987:Self-confirming equilibrium 5049:Strategic Studies Quarterly 3763:. Oxford University Press. 3619:Political Science Quarterly 3553:. W.W. Norton. p. 20. 2847:10.1007/978-94-6265-419-8_4 2809:Strategic Studies Quarterly 2767:10.1007/978-94-6265-419-8_3 2589:Glaser, Charles L. (1990). 2010:. Oxford University Press. 1959:Morgan, Patrick M. (1977). 1598:Russian invasion of Ukraine 7894: 7873:Peace and conflict studies 7721:Principal variation search 7437:Aumann's agreement theorem 7100:Strategy-stealing argument 7012:Trembling hand equilibrium 6942:Markov perfect equilibrium 6937:Mertens-stable equilibrium 6723:Peace and conflict studies 6339:Non-Aligned Movement (NAM) 6183:Freedman, Lawrence. 2004. 5829:Ben Goddard (2010-01-27). 5235:Talmadge, Caitlin (2019). 4169:Cohen, Michael D. (2017). 4103:Horowitz, Michael (2009). 3867:International Organization 3801:International Organization 2488:International Interactions 1725:grounds. Scholars such as 1681:As opposed to the extreme 1588: 1504: 1408:Nicaragua v. United States 1339:mutual assured destruction 895:Mutual assured destruction 884: 839: 745:Rational deterrence theory 627:Furthermore, as Jentleson 449:mutual assured destruction 443:with regard to the use of 367:Peace and conflict studies 274:Mutual assured destruction 29: 7757:Combinatorial game theory 7416:Princess and monster game 6972:Quasi-perfect equilibrium 6897:Bayesian Nash equilibrium 6294: 6203:Psychology and Deterrence 6187:. New York: Polity Press. 6054:Rock, Stephen R. (1989). 6012:Meyers, Diana T. (1992). 5531:10.1017/9781108910194.008 4942:10.1017/S0002930000016894 4876:10.1017/S0002930000016894 4082:10.1177/00223433211067899 4070:Journal of Peace Research 3879:10.1017/S0020818312000392 3813:10.1017/S0020818312000367 3795:Kroenig, Matthew (2013). 3757:Kroenig, Matthew (2018). 3328:The Diplomacy of Violence 3142:10.1162/isec.2005.30.3.47 3079:Snyder, Glenn H. (1966). 2099:. Yale University Press. 1612:Misprediction of behavior 1604:can be seen as rewarding 881:Nuclear deterrence theory 782:Cost-benefit calculations 527:By November 1945 general 7838:Geopolitical terminology 7772:Evolutionary game theory 7505:Antoine Augustin Cournot 7391:Guess 2/3 of the average 7188:Strictly determined game 6982:Satisfaction equilibrium 6800:Escalation of commitment 6021:The Philosophical Review 5720:10.1177/0951629804041117 5572:Sagan, Scott D. (1994). 5454:The Washington Quarterly 4818:10.1177/0022002717737138 4769:Journal of Cybersecurity 4663:Lindsay, Jon R. (2013). 4121:10.1177/0022002708330388 3981:Logan, David C. (2022). 2147:Pape, Robert A. (1996). 1885:A Dictionary of Aviation 1883:Wragg, David W. (1973). 1450:By the beginning of the 1397:in Nicaragua led to the 1198:The state must maintain 764:Unitary actor assumption 537:Ohio Society of New York 453:second-strike capability 362:Non-aggression principle 320:Conflict style inventory 124:Nonviolent Communication 7777:Glossary of game theory 7376:Stackelberg competition 7002:Strong Nash equilibrium 6698:Foreign policy analysis 6510:International community 6288:International relations 6208:Morgan, Patrick. 2003. 5864:"The new abolitionists" 5377:Jervis, Robert (1976). 5323:Carson, Austin (2018). 4491:Nye, Joseph S. (2017). 4445:Cross-Domain Deterrence 4231:10.7591/j.ctv310vm0j.11 3671:Jervis, Robert (1989). 3613:Jervis, Robert (1979). 2196:Conventional Deterrence 1769:International relations 836:Reputations for resolve 792:The American economist 461:international relations 209:International relations 139:Speaking truth to power 7848:International security 7802:Tragedy of the commons 7782:List of game theorists 7762:Confrontation analysis 7472:Sprague–Grundy theorem 6992:Sequential equilibrium 6912:Correlated equilibrium 5901:washingtonpost dot com 5672:International Security 5578:International Security 5448:Jung, Karsten (2023). 5192:International Security 4497:International Security 4064:Suh, Kyungwon (2022). 3987:International Security 3366:International Security 3130:International Security 3082:Deterrence and Defense 2942:International Security 2876:International Security 2540:Lee, Do Young (2021). 2500:10.1080/03050620210390 2482:Fearon, James (2002). 2340:International Security 1819:Peace through strength 1591:Salami slicing tactics 776:Strategic interactions 591:international security 520: 508: 52: 7575:Jean-François Mertens 5152:10.1017/9781316422724 5043:Lin, Herbert (2012). 4778:10.1093/cybsec/tyw015 3939:10.1017/9781316227305 2800:Wirtz, James (2018). 2715:10.7591/9781501737831 2251:10.7591/9781501737831 1691:nuclear weapon states 1657:Nuclear Tipping Point 1491:Philip Breedlove 1393:. The funding of the 760:: actors are rational 516: 504: 284:Nuclear proliferation 40: 32:Deterrence (penology) 7828:Cold War terminology 7704:Search optimizations 7580:Jennifer Tour Chayes 7467:Revelation principle 7462:Purification theorem 7401:Nash bargaining game 7366:Bertrand competition 7351:El Farol Bar problem 7316:Electronic mail game 7281:Lewis signaling game 6825:Hierarchy of beliefs 6688:Comparative politics 6096:Lee, Steven (1992). 5205:10.1162/isec_a_00418 5140:Maurer, Tim (2018). 4509:10.1162/isec_a_00266 4261:on December 8, 2008. 4000:10.1162/isec_a_00434 3431:Altman, Dan (2018). 2352:10.1162/isec_a_00313 2215:10.7591/j.ctt1rv61v2 2169:10.7591/j.ctt1287f6v 1038:Nuclear-armed states 715:Coercive credibility 706:Secondly, Jentleson 350:Paradox of tolerance 7752:Bounded rationality 7371:Cournot competition 7321:Rock paper scissors 7296:Battle of the sexes 7286:Volunteer's dilemma 7158:Perfect information 7085:Dominant strategies 6922:Epsilon-equilibrium 6805:Extensive-form game 6470:Collective security 6354:United Nations (UN) 6141:On War and Morality 5876:on 17 February 2014 5335:10.2307/j.ctv346p45 5003:10.1017/eis.2021.18 4051:10.1093/isq/sqac067 3354:, October 12, 2005. 3352:The Washington Post 2105:10.2307/j.ctt5vm52s 1764:Decapitation strike 1631:nuclear disarmament 1585:Deterrence failures 1571:Intrawar deterrence 1298:sphere of influence 1200:command and control 891:Massive retaliation 641:massive retaliation 613:territorial dispute 531:, who led American 279:Nuclear disarmament 178:Conflict escalation 155:Conflict management 59:Conflict resolution 7731:Paranoid algorithm 7711:Alpha–beta pruning 7590:John Maynard Smith 7421:Rendezvous problem 7261:Traveler's dilemma 7251:Gift-exchange game 7246:Prisoner's dilemma 7163:Large Poisson game 7130:Bargaining problem 7035:Backward induction 7007:Subgame perfection 6962:Proper equilibrium 5945:2017-09-21 at the 5932:2015-06-20 at the 5903:. WP Company LLC. 3346:2019-09-25 at the 2096:Arms and Influence 1824:Prisoner's dilemma 1754:Chainstore paradox 1713:Ethical objections 1695:minimal deterrence 1687:minimum deterrence 1677:Minimum deterrence 1665:Stronger deterrent 1619:perfect deterrence 1437:biological weapons 1429:pre-emptive action 1399:Iran-Contra Affair 1377:, support for the 1294:developing nations 855:Interests at stake 722:economic sanctions 598:Arms and Influence 533:air raids on Japan 397:Track II diplomacy 345:Prisoner's dilemma 315:Conflict continuum 310:Conflict avoidance 95:Dispute resolution 53: 7853:Military strategy 7823:Cold War policies 7810: 7809: 7716:Aspiration window 7685:Suzanne Scotchmer 7640:Oskar Morgenstern 7535:Donald B. Gillies 7477:Zermelo's theorem 7406:Induction puzzles 7361:Fair cake-cutting 7336:Public goods game 7266:Coordination game 7140:Intransitive game 7070:Forward induction 6952:Pareto efficiency 6932:Gibbs equilibrium 6902:Berge equilibrium 6850:Simultaneous game 6736: 6735: 6708:International law 6577:Right of conquest 6542:National interest 6485:Deterrence theory 6383: 6382: 6370:League of Nations 6242:Waltz, Kenneth N. 6236:978-0-226-65002-9 6220:Patrick M. Morgan 6178:978-0-8179-1845-3 6151:978-1-4008-6014-2 5862:(30 March 2012). 5747:. June 16, 2011. 5540:978-1-108-90677-7 5519:"The Nuclear Age" 5492:978-1-108-48986-7 5390:978-1-4008-8511-4 5344:978-0-691-18424-1 5298:978-0-8014-2938-5 5161:978-1-107-12760-9 4462:978-0-19-090864-5 4409:Radio Free Europe 4222:978-1-5017-6701-2 4182:978-1-62616-495-6 3948:978-1-107-10694-9 3770:978-0-19-084918-4 3723:on 12 August 2017 3709:Krepon, Michael. 3684:978-0-8014-9565-6 3560:978-0-393-03810-1 3092:978-1-4008-7716-4 2857:978-94-6265-419-8 2776:978-94-6265-418-1 2724:978-1-5017-3783-1 2678:978-1-4422-3306-5 2602:978-1-4008-6202-3 2260:978-1-5017-3783-1 2206:978-1-5017-1325-5 2160:978-0-8014-3134-0 2114:978-0-300-00221-8 2063:978-1-4422-3306-5 2025:978-0-19-090960-4 1972:978-0-8039-0819-2 1929:978-0-19-090960-4 1809:Nuclear terrorism 1789:Nuclear blackmail 1774:Launch on warning 1749:Balance of terror 1707:nuclear deterrent 1699:nuclear stockpile 1423:document called " 1416:Mikhail Gorbachev 1330:Sino-Soviet Split 1166: 1165: 930:Nuclear explosion 899:Flexible response 579:US foreign policy 575:American politics 571:Frederik Logevall 547:nuclear weapons. 436:Deterrence theory 433: 432: 305:Anti-war movement 269:Nuclear blackmail 173:Communal violence 49:Regulus I missile 16:(Redirected from 7885: 7863:Nuclear strategy 7797:Topological game 7792:No-win situation 7690:Thomas Schelling 7670:Robert B. Wilson 7630:Merrill M. Flood 7600:John von Neumann 7510:Ariel Rubinstein 7495:Albert W. Tucker 7346:War of attrition 7306:Matching pennies 6947:Nash equilibrium 6870:Mechanism design 6835:Normal-form game 6790:Cooperative game 6763: 6756: 6749: 6740: 6728:Security studies 6520:Internationality 6515:Internationalism 6314: 6281: 6274: 6267: 6258: 6195:Richard N. Lebow 6172:, Hoover Press, 6156: 6155: 6135: 6129: 6128: 6102: 6093: 6087: 6086: 6069:(4): 1447–1448. 6060: 6051: 6045: 6044: 6018: 6009: 6003: 6002: 5974: 5968: 5956: 5950: 5923: 5917: 5916: 5914: 5912: 5892: 5886: 5885: 5883: 5881: 5872:. Archived from 5856: 5850: 5849: 5847: 5846: 5826: 5820: 5819: 5817: 5816: 5797: 5791: 5790: 5788: 5786: 5767: 5761: 5760: 5758: 5756: 5737: 5731: 5730: 5713: 5693: 5687: 5686: 5684: 5683: 5664: 5658: 5657: 5655: 5654: 5635: 5629: 5628: 5626: 5625: 5569: 5563: 5562: 5561: 5560: 5514: 5508: 5507: 5505: 5504: 5476: 5470: 5469: 5445: 5439: 5438: 5436: 5412: 5406: 5405: 5403: 5402: 5374: 5368: 5367: 5365: 5364: 5320: 5314: 5313: 5311: 5310: 5279: 5273: 5272: 5232: 5226: 5225: 5207: 5183: 5177: 5176: 5174: 5173: 5137: 5131: 5130: 5099:Security Studies 5090: 5084: 5083: 5081: 5080: 5040: 5034: 5033: 5031: 5030: 4982: 4973: 4972: 4970: 4969: 4921: 4915: 4914: 4912: 4911: 4855: 4849: 4848: 4846: 4845: 4797: 4791: 4790: 4780: 4760: 4751: 4750: 4719:Security Studies 4710: 4701: 4700: 4669:Security Studies 4660: 4651: 4650: 4648: 4647: 4599: 4590: 4589: 4558:Security Studies 4549: 4540: 4539: 4537: 4536: 4488: 4477: 4476: 4475: 4474: 4436: 4425: 4418: 4412: 4405: 4399: 4398: 4392: 4384: 4382: 4381: 4361: 4355: 4354: 4352: 4351: 4331: 4322: 4321: 4319: 4318: 4298: 4292: 4291: 4289: 4288: 4269: 4263: 4262: 4257:. Archived from 4251: 4245: 4244: 4243: 4242: 4204: 4198: 4197: 4195: 4194: 4166: 4160: 4159: 4157: 4156: 4100: 4094: 4093: 4061: 4055: 4054: 4030: 4024: 4023: 4002: 3978: 3972: 3971: 3969: 3968: 3924: 3918: 3917: 3915: 3914: 3858: 3852: 3851: 3849: 3848: 3792: 3786: 3785: 3783: 3782: 3754: 3748: 3747: 3739: 3733: 3732: 3730: 3728: 3722: 3715: 3706: 3700: 3699: 3697: 3696: 3668: 3662: 3661: 3659: 3658: 3610: 3604: 3603: 3601: 3600: 3582: 3576: 3575: 3573: 3572: 3544: 3538: 3537: 3535: 3534: 3495:Security Studies 3486: 3480: 3479: 3477: 3476: 3437:Security Studies 3428: 3422: 3421: 3419: 3418: 3399: 3390: 3389: 3361: 3355: 3338: 3332: 3331: 3322: 3311: 3310: 3308: 3307: 3251: 3245: 3244: 3242: 3241: 3185: 3179: 3178: 3170: 3164: 3163: 3162: 3161: 3121: 3108: 3107: 3105: 3104: 3076: 3070: 3069: 3068: 3048: 3033: 3030: 3024: 3023: 2999: 2993: 2992: 2990: 2989: 2933: 2927: 2926: 2924: 2923: 2867: 2861: 2860: 2849: 2833: 2827: 2826: 2824: 2823: 2817: 2806: 2797: 2791: 2790: 2788: 2754: 2748: 2747: 2745: 2744: 2700: 2694: 2693: 2691: 2690: 2662: 2656: 2655: 2653: 2652: 2624: 2618: 2617: 2615: 2614: 2586: 2580: 2579: 2561: 2546:Security Studies 2537: 2531: 2530: 2528: 2527: 2479: 2470: 2469: 2467: 2466: 2410: 2393: 2392: 2390: 2389: 2363: 2331: 2322: 2321: 2319: 2318: 2290: 2284: 2283: 2281: 2280: 2236: 2230: 2229: 2227: 2226: 2190: 2184: 2183: 2181: 2180: 2144: 2138: 2137: 2135: 2134: 2090: 2079: 2078: 2076: 2075: 2047: 2041: 2040: 2038: 2037: 2001: 1988: 1987: 1985: 1984: 1956: 1945: 1944: 1942: 1941: 1905: 1899: 1898: 1880: 1864: 1860: 1834:Security dilemma 1804:Nuclear strategy 1727:Robert L. Holmes 1602:Frozen conflicts 1501:Cyber deterrence 1483:attack on Crimea 1446:-Cold War period 1445: 1310:George F. Kennan 1158: 1151: 1144: 1095: 989:Target selection 917: 903: 887:Nuclear strategy 818:Military balance 794:Thomas Schelling 563:Lesson of Munich 425: 418: 411: 55: 21: 7893: 7892: 7888: 7887: 7886: 7884: 7883: 7882: 7868:Nuclear warfare 7858:Military ethics 7813: 7812: 7811: 7806: 7740: 7726:max^n algorithm 7699: 7695:William Vickrey 7655:Reinhard Selten 7610:Kenneth Binmore 7525:David K. Levine 7520:Daniel Kahneman 7487: 7481: 7457:Negamax theorem 7447:Minimax theorem 7425: 7386:Diner's dilemma 7241:All-pay auction 7207: 7193:Stochastic game 7145:Mean-field game 7116: 7109: 7080:Markov strategy 7016: 6882: 6874: 6845:Sequential game 6830:Information set 6815:Game complexity 6785:Congestion game 6773: 6767: 6737: 6732: 6676: 6667:Postcolonialism 6628: 6557:Non-state actor 6552:Non-belligerent 6547:Neutral country 6532:Interventionism 6465:Co-belligerence 6426: 6379: 6358: 6303: 6290: 6285: 6255: 6199:Janice G. Stein 6165: 6163:Further reading 6160: 6159: 6152: 6137: 6136: 6132: 6117:10.2307/2216042 6100: 6095: 6094: 6090: 6075:10.2307/1961738 6058: 6053: 6052: 6048: 6033:10.2307/2185583 6016: 6011: 6010: 6006: 5991:10.2307/1148862 5976: 5975: 5971: 5959:Nalebuff, Barry 5957: 5953: 5947:Wayback Machine 5934:Wayback Machine 5924: 5920: 5910: 5908: 5894: 5893: 5889: 5879: 5877: 5858: 5857: 5853: 5844: 5842: 5828: 5827: 5823: 5814: 5812: 5799: 5798: 5794: 5784: 5782: 5769: 5768: 5764: 5754: 5752: 5739: 5738: 5734: 5711:10.1.1.335.7353 5695: 5694: 5690: 5681: 5679: 5666: 5665: 5661: 5652: 5650: 5637: 5636: 5632: 5623: 5621: 5590:10.2307/2539178 5571: 5570: 5566: 5558: 5556: 5541: 5516: 5515: 5511: 5502: 5500: 5493: 5478: 5477: 5473: 5447: 5446: 5442: 5414: 5413: 5409: 5400: 5398: 5391: 5376: 5375: 5371: 5362: 5360: 5345: 5322: 5321: 5317: 5308: 5306: 5299: 5281: 5280: 5276: 5234: 5233: 5229: 5185: 5184: 5180: 5171: 5169: 5162: 5139: 5138: 5134: 5092: 5091: 5087: 5078: 5076: 5042: 5041: 5037: 5028: 5026: 4984: 4983: 4976: 4967: 4965: 4923: 4922: 4918: 4909: 4907: 4857: 4856: 4852: 4843: 4841: 4799: 4798: 4794: 4762: 4761: 4754: 4712: 4711: 4704: 4662: 4661: 4654: 4645: 4643: 4601: 4600: 4593: 4551: 4550: 4543: 4534: 4532: 4490: 4489: 4480: 4472: 4470: 4463: 4438: 4437: 4428: 4419: 4415: 4406: 4402: 4385: 4379: 4377: 4363: 4362: 4358: 4349: 4347: 4333: 4332: 4325: 4316: 4314: 4300: 4299: 4295: 4286: 4284: 4271: 4270: 4266: 4253: 4252: 4248: 4240: 4238: 4223: 4206: 4205: 4201: 4192: 4190: 4183: 4168: 4167: 4163: 4154: 4152: 4102: 4101: 4097: 4063: 4062: 4058: 4032: 4031: 4027: 3980: 3979: 3975: 3966: 3964: 3949: 3926: 3925: 3921: 3912: 3910: 3860: 3859: 3855: 3846: 3844: 3794: 3793: 3789: 3780: 3778: 3771: 3756: 3755: 3751: 3741: 3740: 3736: 3726: 3724: 3720: 3713: 3708: 3707: 3703: 3694: 3692: 3685: 3670: 3669: 3665: 3656: 3654: 3631:10.2307/2149629 3612: 3611: 3607: 3598: 3596: 3584: 3583: 3579: 3570: 3568: 3561: 3546: 3545: 3541: 3532: 3530: 3488: 3487: 3483: 3474: 3472: 3430: 3429: 3425: 3416: 3414: 3401: 3400: 3393: 3378:10.2307/2538549 3363: 3362: 3358: 3348:Wayback Machine 3339: 3335: 3325: 3323: 3314: 3305: 3303: 3272:10.2307/2010511 3253: 3252: 3248: 3239: 3237: 3206:10.2307/2010405 3187: 3186: 3182: 3172: 3171: 3167: 3159: 3157: 3126:"Who Won Libya" 3123: 3122: 3111: 3102: 3100: 3093: 3078: 3077: 3073: 3050: 3049: 3036: 3031: 3027: 3001: 3000: 2996: 2987: 2985: 2954:10.2307/2538686 2935: 2934: 2930: 2921: 2919: 2888:10.2307/2538699 2869: 2868: 2864: 2858: 2835: 2834: 2830: 2821: 2819: 2815: 2804: 2799: 2798: 2794: 2777: 2756: 2755: 2751: 2742: 2740: 2725: 2702: 2701: 2697: 2688: 2686: 2679: 2664: 2663: 2659: 2650: 2648: 2626: 2625: 2621: 2612: 2610: 2603: 2588: 2587: 2583: 2539: 2538: 2534: 2525: 2523: 2481: 2480: 2473: 2464: 2462: 2431:10.2307/2010184 2412: 2411: 2396: 2387: 2385: 2333: 2332: 2325: 2316: 2314: 2299:Foreign Affairs 2292: 2291: 2287: 2278: 2276: 2261: 2238: 2237: 2233: 2224: 2222: 2207: 2192: 2191: 2187: 2178: 2176: 2161: 2146: 2145: 2141: 2132: 2130: 2115: 2092: 2091: 2082: 2073: 2071: 2064: 2049: 2048: 2044: 2035: 2033: 2026: 2003: 2002: 1991: 1982: 1980: 1973: 1958: 1957: 1948: 1939: 1937: 1930: 1907: 1906: 1902: 1895: 1882: 1881: 1877: 1872: 1867: 1861: 1857: 1853: 1848: 1829:Reagan Doctrine 1814:Nuclear warfare 1744: 1715: 1679: 1667: 1647:Henry Kissinger 1627: 1625:Suicide attacks 1614: 1593: 1587: 1582: 1573: 1513: 1505:Main articles: 1503: 1471:Black Sea fleet 1469:on the Russian 1448: 1351: 1322: 1286: 1274: 1175:nuclear weapons 1162: 1113: 1093: 1083: 1052: 907:Nuclear weapons 901: 885:Main articles: 883: 870: 857: 844: 838: 829: 820: 807:Washington Post 802:Michael Kinsley 747: 717: 704: 684: 682:Proportionality 587: 525: 445:nuclear weapons 429: 357:Liaison officer 264:Nuclear warfare 248:Multilateralism 188:Just war theory 35: 28: 23: 22: 15: 12: 11: 5: 7891: 7889: 7881: 7880: 7875: 7870: 7865: 7860: 7855: 7850: 7845: 7840: 7835: 7830: 7825: 7815: 7814: 7808: 7807: 7805: 7804: 7799: 7794: 7789: 7784: 7779: 7774: 7769: 7764: 7759: 7754: 7748: 7746: 7742: 7741: 7739: 7738: 7733: 7728: 7723: 7718: 7713: 7707: 7705: 7701: 7700: 7698: 7697: 7692: 7687: 7682: 7677: 7672: 7667: 7662: 7660:Robert Axelrod 7657: 7652: 7647: 7642: 7637: 7635:Olga Bondareva 7632: 7627: 7625:Melvin Dresher 7622: 7617: 7615:Leonid Hurwicz 7612: 7607: 7602: 7597: 7592: 7587: 7582: 7577: 7572: 7567: 7562: 7557: 7552: 7550:Harold W. Kuhn 7547: 7542: 7540:Drew Fudenberg 7537: 7532: 7530:David M. Kreps 7527: 7522: 7517: 7515:Claude Shannon 7512: 7507: 7502: 7497: 7491: 7489: 7483: 7482: 7480: 7479: 7474: 7469: 7464: 7459: 7454: 7452:Nash's theorem 7449: 7444: 7439: 7433: 7431: 7427: 7426: 7424: 7423: 7418: 7413: 7408: 7403: 7398: 7393: 7388: 7383: 7378: 7373: 7368: 7363: 7358: 7353: 7348: 7343: 7338: 7333: 7328: 7323: 7318: 7313: 7311:Ultimatum game 7308: 7303: 7298: 7293: 7291:Dollar auction 7288: 7283: 7278: 7276:Centipede game 7273: 7268: 7263: 7258: 7253: 7248: 7243: 7238: 7233: 7231:Infinite chess 7228: 7223: 7217: 7215: 7209: 7208: 7206: 7205: 7200: 7198:Symmetric game 7195: 7190: 7185: 7183:Signaling game 7180: 7178:Screening game 7175: 7170: 7168:Potential game 7165: 7160: 7155: 7147: 7142: 7137: 7132: 7127: 7121: 7119: 7111: 7110: 7108: 7107: 7102: 7097: 7095:Mixed strategy 7092: 7087: 7082: 7077: 7072: 7067: 7062: 7057: 7052: 7047: 7042: 7037: 7032: 7026: 7024: 7018: 7017: 7015: 7014: 7009: 7004: 6999: 6994: 6989: 6984: 6979: 6977:Risk dominance 6974: 6969: 6964: 6959: 6954: 6949: 6944: 6939: 6934: 6929: 6924: 6919: 6914: 6909: 6904: 6899: 6894: 6888: 6886: 6876: 6875: 6873: 6872: 6867: 6862: 6857: 6852: 6847: 6842: 6837: 6832: 6827: 6822: 6820:Graphical game 6817: 6812: 6807: 6802: 6797: 6792: 6787: 6781: 6779: 6775: 6774: 6768: 6766: 6765: 6758: 6751: 6743: 6734: 6733: 6731: 6730: 6725: 6720: 6715: 6710: 6705: 6700: 6695: 6690: 6684: 6682: 6678: 6677: 6675: 6674: 6669: 6664: 6659: 6654: 6649: 6647:English school 6644: 6642:Constructivism 6638: 6636: 6630: 6629: 6627: 6626: 6621: 6620: 6619: 6614: 6612:Non-aggression 6609: 6604: 6599: 6589: 6584: 6579: 6574: 6569: 6564: 6559: 6554: 6549: 6544: 6539: 6534: 6529: 6528: 6527: 6522: 6512: 6507: 6502: 6497: 6492: 6487: 6482: 6477: 6472: 6467: 6462: 6457: 6456: 6455: 6450: 6445: 6434: 6432: 6428: 6427: 6425: 6424: 6419: 6414: 6409: 6404: 6399: 6393: 6391: 6385: 6384: 6381: 6380: 6378: 6377: 6372: 6366: 6364: 6360: 6359: 6357: 6356: 6351: 6346: 6341: 6336: 6331: 6326: 6320: 6318: 6311: 6305: 6304: 6302: 6301: 6295: 6292: 6291: 6286: 6284: 6283: 6276: 6269: 6261: 6254: 6253:External links 6251: 6250: 6249: 6239: 6224:James J. Wirtz 6213: 6210:Deterrence Now 6206: 6191:Jervis, Robert 6188: 6181: 6164: 6161: 6158: 6157: 6150: 6130: 6111:(4): 559–562. 6088: 6046: 6027:(2): 481–484. 6004: 5979:Foreign Policy 5969: 5951: 5918: 5887: 5860:Hugh Gusterson 5851: 5821: 5792: 5762: 5732: 5704:(2): 107–141, 5688: 5659: 5645:. 2023-02-26. 5630: 5564: 5539: 5509: 5491: 5471: 5440: 5427:(4): 544–560. 5407: 5389: 5369: 5343: 5315: 5297: 5283:Legro, Jeffrey 5274: 5247:(6): 864–887. 5227: 5178: 5160: 5132: 5105:(3): 452–481. 5085: 5035: 4997:(4): 401–417. 4974: 4936:(3): 425–479. 4916: 4870:(3): 425–479. 4850: 4812:(2): 317–347. 4792: 4752: 4725:(2): 316–348. 4702: 4675:(3): 365–404. 4652: 4614:(3): 534–569. 4591: 4564:(3): 452–481. 4541: 4478: 4461: 4426: 4413: 4400: 4356: 4323: 4293: 4279:. 2022-03-09. 4264: 4246: 4221: 4199: 4181: 4161: 4115:(2): 234–257. 4095: 4076:(2): 337–351. 4056: 4025: 3993:(4): 172–215. 3973: 3947: 3919: 3873:(1): 173–195. 3853: 3807:(1): 141–171. 3787: 3769: 3749: 3734: 3701: 3683: 3663: 3625:(4): 617–633. 3605: 3577: 3559: 3539: 3481: 3423: 3409:. 2021-06-02. 3391: 3356: 3333: 3312: 3266:(4): 466–501. 3260:World Politics 3246: 3200:(2): 143–169. 3194:World Politics 3180: 3165: 3109: 3091: 3071: 3034: 3025: 2994: 2928: 2862: 2856: 2828: 2792: 2775: 2749: 2723: 2695: 2677: 2657: 2633:The New Yorker 2619: 2601: 2581: 2552:(5): 761–796. 2532: 2471: 2425:(4): 496–526. 2419:World Politics 2394: 2346:(4): 128–169. 2323: 2285: 2259: 2231: 2205: 2185: 2159: 2139: 2113: 2080: 2062: 2042: 2024: 1989: 1971: 1946: 1928: 1900: 1893: 1874: 1873: 1871: 1868: 1866: 1865: 1854: 1852: 1849: 1847: 1846: 1841: 1839:Tripwire force 1836: 1831: 1826: 1821: 1816: 1811: 1806: 1801: 1796: 1794:Nuclear ethics 1791: 1786: 1781: 1776: 1771: 1766: 1761: 1756: 1751: 1745: 1743: 1740: 1714: 1711: 1678: 1675: 1666: 1663: 1629:Advocates for 1626: 1623: 1613: 1610: 1586: 1583: 1581: 1578: 1572: 1569: 1556: 1555: 1552: 1549: 1546: 1543: 1524: 1523: 1520: 1502: 1499: 1479:Anne Applebaum 1447: 1441: 1389:government in 1367:Saddam Hussein 1361:government of 1350: 1347: 1321: 1318: 1285: 1282: 1273: 1270: 1258:Bernard Brodie 1203: 1202: 1196: 1193: 1164: 1163: 1161: 1160: 1153: 1146: 1138: 1135: 1134: 1133: 1132: 1127: 1122: 1117: 1107: 1106: 1101: 1096: 1087: 1077: 1076: 1071: 1066: 1064:United Kingdom 1061: 1056: 1041: 1040: 1034: 1033: 1032: 1031: 1026: 1021: 1016: 1011: 1006: 1001: 996: 991: 986: 980: 979: 974: 969: 963: 962: 957: 952: 947: 942: 937: 932: 924: 923: 919: 918: 910: 909: 882: 879: 877:of tripwires. 869: 866: 856: 853: 840:Main article: 837: 834: 828: 825: 819: 816: 786: 785: 779: 773: 767: 761: 746: 743: 716: 713: 703: 700: 683: 680: 672:United Kingdom 586: 583: 524: 521: 512:game-theoretic 431: 430: 428: 427: 420: 413: 405: 402: 401: 400: 399: 394: 389: 384: 379: 374: 369: 364: 359: 354: 353: 352: 347: 337: 332: 330:Family therapy 327: 322: 317: 312: 307: 302: 294: 293: 289: 288: 287: 286: 281: 276: 271: 266: 258: 257: 253: 252: 251: 250: 245: 240: 235: 230: 225: 220: 212: 211: 205: 204: 203: 202: 201: 200: 190: 185: 180: 175: 167: 166: 160: 159: 158: 157: 149: 148: 144: 143: 142: 141: 136: 131: 126: 121: 120: 119: 117:Party-directed 109: 108: 107: 102: 97: 87: 82: 77: 69: 68: 62: 61: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 7890: 7879: 7876: 7874: 7871: 7869: 7866: 7864: 7861: 7859: 7856: 7854: 7851: 7849: 7846: 7844: 7841: 7839: 7836: 7834: 7831: 7829: 7826: 7824: 7821: 7820: 7818: 7803: 7800: 7798: 7795: 7793: 7790: 7788: 7785: 7783: 7780: 7778: 7775: 7773: 7770: 7768: 7765: 7763: 7760: 7758: 7755: 7753: 7750: 7749: 7747: 7745:Miscellaneous 7743: 7737: 7734: 7732: 7729: 7727: 7724: 7722: 7719: 7717: 7714: 7712: 7709: 7708: 7706: 7702: 7696: 7693: 7691: 7688: 7686: 7683: 7681: 7680:Samuel Bowles 7678: 7676: 7675:Roger Myerson 7673: 7671: 7668: 7666: 7665:Robert Aumann 7663: 7661: 7658: 7656: 7653: 7651: 7648: 7646: 7643: 7641: 7638: 7636: 7633: 7631: 7628: 7626: 7623: 7621: 7620:Lloyd Shapley 7618: 7616: 7613: 7611: 7608: 7606: 7605:Kenneth Arrow 7603: 7601: 7598: 7596: 7593: 7591: 7588: 7586: 7585:John Harsanyi 7583: 7581: 7578: 7576: 7573: 7571: 7568: 7566: 7563: 7561: 7558: 7556: 7555:Herbert Simon 7553: 7551: 7548: 7546: 7543: 7541: 7538: 7536: 7533: 7531: 7528: 7526: 7523: 7521: 7518: 7516: 7513: 7511: 7508: 7506: 7503: 7501: 7498: 7496: 7493: 7492: 7490: 7484: 7478: 7475: 7473: 7470: 7468: 7465: 7463: 7460: 7458: 7455: 7453: 7450: 7448: 7445: 7443: 7440: 7438: 7435: 7434: 7432: 7428: 7422: 7419: 7417: 7414: 7412: 7409: 7407: 7404: 7402: 7399: 7397: 7394: 7392: 7389: 7387: 7384: 7382: 7379: 7377: 7374: 7372: 7369: 7367: 7364: 7362: 7359: 7357: 7356:Fair division 7354: 7352: 7349: 7347: 7344: 7342: 7339: 7337: 7334: 7332: 7331:Dictator game 7329: 7327: 7324: 7322: 7319: 7317: 7314: 7312: 7309: 7307: 7304: 7302: 7299: 7297: 7294: 7292: 7289: 7287: 7284: 7282: 7279: 7277: 7274: 7272: 7269: 7267: 7264: 7262: 7259: 7257: 7254: 7252: 7249: 7247: 7244: 7242: 7239: 7237: 7234: 7232: 7229: 7227: 7224: 7222: 7219: 7218: 7216: 7214: 7210: 7204: 7203:Zero-sum game 7201: 7199: 7196: 7194: 7191: 7189: 7186: 7184: 7181: 7179: 7176: 7174: 7173:Repeated game 7171: 7169: 7166: 7164: 7161: 7159: 7156: 7154: 7152: 7148: 7146: 7143: 7141: 7138: 7136: 7133: 7131: 7128: 7126: 7123: 7122: 7120: 7118: 7112: 7106: 7103: 7101: 7098: 7096: 7093: 7091: 7090:Pure strategy 7088: 7086: 7083: 7081: 7078: 7076: 7073: 7071: 7068: 7066: 7063: 7061: 7058: 7056: 7055:De-escalation 7053: 7051: 7048: 7046: 7043: 7041: 7038: 7036: 7033: 7031: 7028: 7027: 7025: 7023: 7019: 7013: 7010: 7008: 7005: 7003: 7000: 6998: 6997:Shapley value 6995: 6993: 6990: 6988: 6985: 6983: 6980: 6978: 6975: 6973: 6970: 6968: 6965: 6963: 6960: 6958: 6955: 6953: 6950: 6948: 6945: 6943: 6940: 6938: 6935: 6933: 6930: 6928: 6925: 6923: 6920: 6918: 6915: 6913: 6910: 6908: 6905: 6903: 6900: 6898: 6895: 6893: 6890: 6889: 6887: 6885: 6881: 6877: 6871: 6868: 6866: 6865:Succinct game 6863: 6861: 6858: 6856: 6853: 6851: 6848: 6846: 6843: 6841: 6838: 6836: 6833: 6831: 6828: 6826: 6823: 6821: 6818: 6816: 6813: 6811: 6808: 6806: 6803: 6801: 6798: 6796: 6793: 6791: 6788: 6786: 6783: 6782: 6780: 6776: 6772: 6764: 6759: 6757: 6752: 6750: 6745: 6744: 6741: 6729: 6726: 6724: 6721: 6719: 6716: 6714: 6711: 6709: 6706: 6704: 6701: 6699: 6696: 6694: 6691: 6689: 6686: 6685: 6683: 6679: 6673: 6670: 6668: 6665: 6663: 6660: 6658: 6655: 6653: 6650: 6648: 6645: 6643: 6640: 6639: 6637: 6635: 6631: 6625: 6622: 6618: 6615: 6613: 6610: 6608: 6605: 6603: 6600: 6598: 6595: 6594: 6593: 6590: 6588: 6585: 6583: 6580: 6578: 6575: 6573: 6570: 6568: 6565: 6563: 6560: 6558: 6555: 6553: 6550: 6548: 6545: 6543: 6540: 6538: 6535: 6533: 6530: 6526: 6523: 6521: 6518: 6517: 6516: 6513: 6511: 6508: 6506: 6503: 6501: 6498: 6496: 6493: 6491: 6488: 6486: 6483: 6481: 6478: 6476: 6473: 6471: 6468: 6466: 6463: 6461: 6458: 6454: 6451: 6449: 6446: 6444: 6441: 6440: 6439: 6436: 6435: 6433: 6429: 6423: 6420: 6418: 6415: 6413: 6410: 6408: 6405: 6403: 6400: 6398: 6395: 6394: 6392: 6390: 6386: 6376: 6373: 6371: 6368: 6367: 6365: 6361: 6355: 6352: 6350: 6347: 6345: 6342: 6340: 6337: 6335: 6332: 6330: 6327: 6325: 6322: 6321: 6319: 6315: 6312: 6310: 6309:Organizations 6306: 6300: 6297: 6296: 6293: 6289: 6282: 6277: 6275: 6270: 6268: 6263: 6262: 6259: 6252: 6247: 6243: 6240: 6237: 6233: 6229: 6225: 6221: 6217: 6214: 6211: 6207: 6204: 6200: 6196: 6192: 6189: 6186: 6182: 6179: 6175: 6171: 6167: 6166: 6162: 6153: 6147: 6143: 6142: 6134: 6131: 6126: 6122: 6118: 6114: 6110: 6106: 6099: 6092: 6089: 6084: 6080: 6076: 6072: 6068: 6064: 6057: 6050: 6047: 6042: 6038: 6034: 6030: 6026: 6022: 6015: 6008: 6005: 6000: 5996: 5992: 5988: 5984: 5980: 5973: 5970: 5966: 5965: 5960: 5955: 5952: 5948: 5944: 5941: 5940: 5935: 5931: 5928: 5922: 5919: 5906: 5902: 5898: 5895:Nitze, Paul. 5891: 5888: 5875: 5871: 5870: 5865: 5861: 5855: 5852: 5840: 5836: 5832: 5825: 5822: 5810: 5806: 5802: 5796: 5793: 5780: 5776: 5775:The Economist 5772: 5766: 5763: 5750: 5746: 5745:The Economist 5742: 5736: 5733: 5729: 5725: 5721: 5717: 5712: 5707: 5703: 5699: 5692: 5689: 5677: 5673: 5669: 5663: 5660: 5648: 5644: 5640: 5634: 5631: 5619: 5615: 5611: 5607: 5603: 5599: 5595: 5591: 5587: 5584:(4): 66–107. 5583: 5579: 5575: 5568: 5565: 5554: 5550: 5546: 5542: 5536: 5532: 5528: 5524: 5520: 5513: 5510: 5498: 5494: 5488: 5484: 5483: 5475: 5472: 5467: 5463: 5459: 5455: 5451: 5444: 5441: 5435: 5430: 5426: 5422: 5418: 5411: 5408: 5396: 5392: 5386: 5382: 5381: 5373: 5370: 5358: 5354: 5350: 5346: 5340: 5336: 5332: 5328: 5327: 5319: 5316: 5304: 5300: 5294: 5290: 5289: 5284: 5278: 5275: 5270: 5266: 5262: 5258: 5254: 5250: 5246: 5242: 5238: 5231: 5228: 5223: 5219: 5215: 5211: 5206: 5201: 5197: 5193: 5189: 5182: 5179: 5167: 5163: 5157: 5153: 5149: 5145: 5144: 5136: 5133: 5128: 5124: 5120: 5116: 5112: 5108: 5104: 5100: 5096: 5089: 5086: 5074: 5070: 5066: 5062: 5058: 5054: 5050: 5046: 5039: 5036: 5024: 5020: 5016: 5012: 5008: 5004: 5000: 4996: 4992: 4988: 4981: 4979: 4975: 4963: 4959: 4955: 4951: 4947: 4943: 4939: 4935: 4931: 4927: 4920: 4917: 4905: 4901: 4897: 4893: 4889: 4885: 4881: 4877: 4873: 4869: 4865: 4861: 4854: 4851: 4839: 4835: 4831: 4827: 4823: 4819: 4815: 4811: 4807: 4803: 4796: 4793: 4788: 4784: 4779: 4774: 4770: 4766: 4759: 4757: 4753: 4748: 4744: 4740: 4736: 4732: 4728: 4724: 4720: 4716: 4709: 4707: 4703: 4698: 4694: 4690: 4686: 4682: 4678: 4674: 4670: 4666: 4659: 4657: 4653: 4641: 4637: 4633: 4629: 4625: 4621: 4617: 4613: 4609: 4605: 4598: 4596: 4592: 4587: 4583: 4579: 4575: 4571: 4567: 4563: 4559: 4555: 4548: 4546: 4542: 4530: 4526: 4522: 4518: 4514: 4510: 4506: 4502: 4498: 4494: 4487: 4485: 4483: 4479: 4468: 4464: 4458: 4454: 4450: 4446: 4442: 4435: 4433: 4431: 4427: 4423: 4417: 4414: 4410: 4404: 4401: 4396: 4390: 4375: 4371: 4367: 4360: 4357: 4345: 4341: 4337: 4330: 4328: 4324: 4312: 4308: 4304: 4297: 4294: 4282: 4278: 4274: 4268: 4265: 4260: 4256: 4250: 4247: 4236: 4232: 4228: 4224: 4218: 4214: 4210: 4203: 4200: 4188: 4184: 4178: 4174: 4173: 4165: 4162: 4150: 4146: 4142: 4138: 4134: 4130: 4126: 4122: 4118: 4114: 4110: 4106: 4099: 4096: 4091: 4087: 4083: 4079: 4075: 4071: 4067: 4060: 4057: 4052: 4048: 4044: 4040: 4036: 4029: 4026: 4022: 4018: 4014: 4010: 4006: 4001: 3996: 3992: 3988: 3984: 3977: 3974: 3962: 3958: 3954: 3950: 3944: 3940: 3936: 3932: 3931: 3923: 3920: 3908: 3904: 3900: 3896: 3892: 3888: 3884: 3880: 3876: 3872: 3868: 3864: 3857: 3854: 3842: 3838: 3834: 3830: 3826: 3822: 3818: 3814: 3810: 3806: 3802: 3798: 3791: 3788: 3776: 3772: 3766: 3762: 3761: 3753: 3750: 3745: 3738: 3735: 3719: 3712: 3705: 3702: 3690: 3686: 3680: 3676: 3675: 3667: 3664: 3652: 3648: 3644: 3640: 3636: 3632: 3628: 3624: 3620: 3616: 3609: 3606: 3594: 3590: 3589: 3581: 3578: 3566: 3562: 3556: 3552: 3551: 3543: 3540: 3528: 3524: 3520: 3516: 3512: 3508: 3504: 3500: 3496: 3492: 3485: 3482: 3470: 3466: 3462: 3458: 3454: 3450: 3446: 3442: 3438: 3434: 3427: 3424: 3412: 3408: 3404: 3398: 3396: 3392: 3387: 3383: 3379: 3375: 3371: 3367: 3360: 3357: 3353: 3349: 3345: 3342: 3337: 3334: 3329: 3321: 3319: 3317: 3313: 3301: 3297: 3293: 3289: 3285: 3281: 3277: 3273: 3269: 3265: 3261: 3257: 3250: 3247: 3235: 3231: 3227: 3223: 3219: 3215: 3211: 3207: 3203: 3199: 3195: 3191: 3184: 3181: 3176: 3169: 3166: 3155: 3151: 3147: 3143: 3139: 3135: 3131: 3127: 3120: 3118: 3116: 3114: 3110: 3098: 3094: 3088: 3084: 3083: 3075: 3072: 3067: 3062: 3058: 3054: 3047: 3045: 3043: 3041: 3039: 3035: 3029: 3026: 3021: 3017: 3013: 3009: 3008:World Affairs 3005: 2998: 2995: 2983: 2979: 2975: 2971: 2967: 2963: 2959: 2955: 2951: 2947: 2943: 2939: 2932: 2929: 2917: 2913: 2909: 2905: 2901: 2897: 2893: 2889: 2885: 2881: 2877: 2873: 2866: 2863: 2859: 2853: 2848: 2843: 2839: 2832: 2829: 2814: 2810: 2803: 2796: 2793: 2787: 2782: 2778: 2772: 2768: 2764: 2760: 2753: 2750: 2738: 2734: 2730: 2726: 2720: 2716: 2712: 2708: 2707: 2699: 2696: 2684: 2680: 2674: 2670: 2669: 2661: 2658: 2646: 2642: 2638: 2634: 2630: 2623: 2620: 2608: 2604: 2598: 2594: 2593: 2585: 2582: 2577: 2573: 2569: 2565: 2560: 2555: 2551: 2547: 2543: 2536: 2533: 2521: 2517: 2513: 2509: 2505: 2501: 2497: 2493: 2489: 2485: 2478: 2476: 2472: 2460: 2456: 2452: 2448: 2444: 2440: 2436: 2432: 2428: 2424: 2420: 2416: 2409: 2407: 2405: 2403: 2401: 2399: 2395: 2383: 2379: 2375: 2371: 2367: 2362: 2361:1721.1/118651 2357: 2353: 2349: 2345: 2341: 2337: 2330: 2328: 2324: 2312: 2308: 2304: 2300: 2296: 2289: 2286: 2274: 2270: 2266: 2262: 2256: 2252: 2248: 2244: 2243: 2235: 2232: 2220: 2216: 2212: 2208: 2202: 2198: 2197: 2189: 2186: 2174: 2170: 2166: 2162: 2156: 2152: 2151: 2143: 2140: 2128: 2124: 2120: 2116: 2110: 2106: 2102: 2098: 2097: 2089: 2087: 2085: 2081: 2069: 2065: 2059: 2055: 2054: 2046: 2043: 2031: 2027: 2021: 2017: 2013: 2009: 2008: 2000: 1998: 1996: 1994: 1990: 1978: 1974: 1968: 1964: 1963: 1955: 1953: 1951: 1947: 1935: 1931: 1925: 1921: 1917: 1913: 1912: 1904: 1901: 1896: 1894:9780850451634 1890: 1886: 1879: 1876: 1869: 1859: 1856: 1850: 1845: 1842: 1840: 1837: 1835: 1832: 1830: 1827: 1825: 1822: 1820: 1817: 1815: 1812: 1810: 1807: 1805: 1802: 1800: 1799:Nuclear peace 1797: 1795: 1792: 1790: 1787: 1785: 1782: 1780: 1777: 1775: 1772: 1770: 1767: 1765: 1762: 1760: 1757: 1755: 1752: 1750: 1747: 1746: 1741: 1739: 1736: 1732: 1731:deontological 1728: 1724: 1720: 1712: 1710: 1708: 1703: 1700: 1696: 1692: 1688: 1684: 1676: 1674: 1671: 1664: 1662: 1659: 1658: 1652: 1651:George Shultz 1648: 1644: 1643:William Perry 1640: 1636: 1632: 1624: 1622: 1620: 1611: 1609: 1607: 1603: 1599: 1592: 1584: 1579: 1577: 1570: 1568: 1564: 1562: 1561:Tanisha Fazal 1553: 1550: 1547: 1544: 1541: 1540: 1539: 1536: 1534: 1530: 1521: 1518: 1517: 1516: 1512: 1508: 1500: 1498: 1496: 1492: 1486: 1484: 1480: 1476: 1472: 1468: 1467:drone attacks 1464: 1459: 1457: 1453: 1442: 1440: 1438: 1434: 1430: 1426: 1420: 1417: 1412: 1410: 1409: 1404: 1400: 1396: 1392: 1388: 1384: 1380: 1376: 1375:Iran–Iraq War 1372: 1368: 1364: 1360: 1359:revolutionary 1356: 1355:Ronald Reagan 1348: 1346: 1344: 1340: 1335: 1331: 1327: 1319: 1317: 1315: 1314:Long Telegram 1311: 1307: 1303: 1299: 1295: 1291: 1283: 1281: 1279: 1271: 1269: 1265: 1261: 1259: 1255: 1253: 1249: 1245: 1241: 1237: 1233: 1229: 1225: 1221: 1217: 1216:United States 1213: 1208: 1201: 1197: 1194: 1192: 1191:second strike 1188: 1187: 1186: 1184: 1183:Kenneth Waltz 1181:According to 1179: 1176: 1172: 1159: 1154: 1152: 1147: 1145: 1140: 1139: 1137: 1136: 1131: 1128: 1126: 1123: 1121: 1118: 1116: 1112: 1109: 1108: 1105: 1102: 1100: 1097: 1091: 1088: 1086: 1082: 1079: 1078: 1075: 1072: 1070: 1067: 1065: 1062: 1060: 1057: 1055: 1054:United States 1051: 1049: 1045: 1044: 1043: 1042: 1039: 1035: 1030: 1027: 1025: 1022: 1020: 1017: 1015: 1012: 1010: 1009:Proliferation 1007: 1005: 1002: 1000: 997: 995: 992: 990: 987: 985: 982: 981: 978: 975: 973: 970: 968: 965: 964: 961: 958: 956: 953: 951: 948: 946: 943: 941: 938: 936: 933: 931: 928: 927: 926: 925: 920: 916: 912: 911: 908: 904: 900: 896: 892: 888: 880: 878: 874: 867: 865: 861: 854: 852: 848: 843: 835: 833: 826: 824: 817: 815: 812: 809: 808: 803: 798: 795: 790: 783: 780: 777: 774: 771: 768: 765: 762: 759: 756: 755: 754: 752: 744: 742: 739: 734: 732: 728: 723: 714: 712: 709: 701: 699: 697: 696:regime change 692: 689: 681: 679: 677: 673: 669: 665: 661: 657: 656:United States 653: 652:nuclear triad 649: 648:second-strike 644: 642: 638: 633: 630: 625: 621: 618: 614: 608: 604: 602: 599: 594: 592: 584: 582: 580: 576: 572: 568: 564: 560: 557: 554: 552: 548: 544: 542: 538: 534: 530: 522: 519: 515: 513: 507: 503: 500: 495: 490: 488: 483: 481: 477: 473: 469: 464: 462: 458: 454: 450: 446: 442: 437: 426: 421: 419: 414: 412: 407: 406: 404: 403: 398: 395: 393: 390: 388: 385: 383: 382:Peacebuilding 380: 378: 375: 373: 372:Peace process 370: 368: 365: 363: 360: 358: 355: 351: 348: 346: 343: 342: 341: 338: 336: 333: 331: 328: 326: 323: 321: 318: 316: 313: 311: 308: 306: 303: 301: 298: 297: 296: 295: 290: 285: 282: 280: 277: 275: 272: 270: 267: 265: 262: 261: 260: 259: 254: 249: 246: 244: 241: 239: 236: 234: 231: 229: 226: 224: 221: 219: 216: 215: 214: 213: 210: 206: 199: 196: 195: 194: 191: 189: 186: 184: 183:De-escalation 181: 179: 176: 174: 171: 170: 169: 168: 165: 161: 156: 153: 152: 151: 150: 145: 140: 137: 135: 132: 130: 127: 125: 122: 118: 115: 114: 113: 110: 106: 105:Collaborative 103: 101: 98: 96: 93: 92: 91: 88: 86: 83: 81: 78: 76: 73: 72: 71: 70: 67: 63: 60: 56: 50: 46: 45: 39: 33: 19: 7650:Peyton Young 7645:Paul Milgrom 7560:HervĂ© Moulin 7500:Amos Tversky 7442:Folk theorem 7153:-player game 7150: 7075:Grim trigger 7059: 6607:Multilateral 6537:Isolationism 6490:Expansionism 6484: 6245: 6227: 6209: 6202: 6184: 6169: 6140: 6133: 6108: 6104: 6091: 6066: 6062: 6049: 6024: 6020: 6007: 5985:(75): 3–33. 5982: 5978: 5972: 5962: 5954: 5938: 5921: 5909:. Retrieved 5900: 5890: 5878:. Retrieved 5874:the original 5867: 5854: 5843:. Retrieved 5834: 5824: 5813:. Retrieved 5804: 5795: 5783:. Retrieved 5774: 5765: 5753:. Retrieved 5744: 5735: 5701: 5697: 5691: 5680:. Retrieved 5671: 5662: 5651:. Retrieved 5642: 5633: 5622:. Retrieved 5581: 5577: 5567: 5557:, retrieved 5522: 5512: 5501:. Retrieved 5481: 5474: 5457: 5453: 5443: 5424: 5420: 5410: 5399:. Retrieved 5379: 5372: 5361:. Retrieved 5325: 5318: 5307:. Retrieved 5287: 5277: 5244: 5240: 5230: 5198:(2): 51–90. 5195: 5191: 5181: 5170:. Retrieved 5142: 5135: 5102: 5098: 5088: 5077:. Retrieved 5055:(3): 46–70. 5052: 5048: 5038: 5027:. Retrieved 4994: 4990: 4966:. Retrieved 4933: 4929: 4919: 4908:. Retrieved 4867: 4863: 4853: 4842:. Retrieved 4809: 4805: 4795: 4768: 4722: 4718: 4672: 4668: 4644:. Retrieved 4611: 4607: 4561: 4557: 4533:. Retrieved 4503:(3): 44–71. 4500: 4496: 4471:, retrieved 4444: 4421: 4416: 4408: 4403: 4378:. Retrieved 4369: 4359: 4348:. Retrieved 4340:The Atlantic 4339: 4315:. Retrieved 4306: 4296: 4285:. Retrieved 4276: 4267: 4259:the original 4249: 4239:, retrieved 4212: 4202: 4191:. Retrieved 4171: 4164: 4153:. Retrieved 4112: 4108: 4098: 4073: 4069: 4059: 4042: 4038: 4028: 4020: 3990: 3986: 3976: 3965:. Retrieved 3929: 3922: 3911:. Retrieved 3870: 3866: 3856: 3845:. Retrieved 3804: 3800: 3790: 3779:. Retrieved 3759: 3752: 3743: 3737: 3725:. Retrieved 3718:the original 3704: 3693:. Retrieved 3673: 3666: 3655:. Retrieved 3622: 3618: 3608: 3597:. Retrieved 3587: 3580: 3569:. Retrieved 3549: 3542: 3531:. Retrieved 3498: 3494: 3484: 3473:. Retrieved 3443:(1): 58–88. 3440: 3436: 3426: 3415:. Retrieved 3406: 3369: 3365: 3359: 3351: 3336: 3327: 3304:. Retrieved 3263: 3259: 3249: 3238:. Retrieved 3197: 3193: 3183: 3174: 3168: 3158:, retrieved 3136:(3): 47–86, 3133: 3129: 3101:. Retrieved 3081: 3074: 3056: 3052: 3028: 3014:(2): 13–26. 3011: 3007: 2997: 2986:. Retrieved 2945: 2941: 2931: 2920:. Retrieved 2882:(3): 32–56. 2879: 2875: 2865: 2837: 2831: 2820:. Retrieved 2808: 2795: 2758: 2752: 2741:. Retrieved 2705: 2698: 2687:. Retrieved 2667: 2660: 2649:. Retrieved 2632: 2622: 2611:. Retrieved 2591: 2584: 2549: 2545: 2535: 2524:. Retrieved 2491: 2487: 2463:. Retrieved 2422: 2418: 2386:. Retrieved 2343: 2339: 2315:. Retrieved 2298: 2288: 2277:. Retrieved 2241: 2234: 2223:. Retrieved 2195: 2188: 2177:. Retrieved 2149: 2142: 2131:. Retrieved 2095: 2072:. Retrieved 2052: 2045: 2034:. Retrieved 2006: 1981:. Retrieved 1961: 1938:. Retrieved 1910: 1903: 1884: 1878: 1858: 1784:N-deterrence 1717:In the post 1716: 1704: 1680: 1668: 1655: 1628: 1618: 1615: 1594: 1574: 1565: 1557: 1537: 1525: 1514: 1507:Cyberwarfare 1487: 1460: 1449: 1421: 1413: 1406: 1352: 1343:New Cold War 1323: 1287: 1275: 1266: 1262: 1256: 1220:Soviet Union 1204: 1180: 1167: 1115:South Africa 1110: 1094:(undeclared) 1080: 1046: 875: 871: 862: 858: 849: 845: 830: 821: 805: 799: 791: 787: 781: 775: 769: 763: 757: 748: 737: 735: 718: 707: 705: 693: 687: 685: 645: 634: 628: 626: 622: 609: 605: 601: 597: 595: 588: 561: 558: 555: 549: 545: 539:that since " 529:Curtis LeMay 526: 517: 509: 505: 498: 493: 491: 484: 465: 456: 435: 434: 377:Peace treaty 242: 228:Brinkmanship 85:Conciliation 43: 7767:Coopetition 7570:Jean Tirole 7565:John Conway 7545:Eric Maskin 7341:Blotto game 7326:Pirate game 7135:Global game 7105:Tit for tat 7040:Bid shading 7030:Appeasement 6880:Equilibrium 6860:Solved game 6795:Determinacy 6778:Definitions 6771:game theory 6703:Geopolitics 6582:Sovereignty 6562:Imperialism 6475:Colonialism 6460:Appeasement 6375:Warsaw Pact 5880:15 November 5785:January 17, 5755:January 17, 5326:Secret Wars 4424:, March 24. 4411:, April 07. 3372:(3): 3–30. 2948:(1): 3–39. 2494:(1): 5–29. 2123:j.ctt5vm52s 1735:prima facie 1635:Global Zero 1511:Cyberweapon 1456:John Bolton 1383:Afghanistan 1373:during the 1326:US drawdown 1290:containment 1284:Containment 1252:third world 1248:Afghanistan 1240:Middle East 1104:North Korea 1014:Disarmament 758:Rationality 751:game theory 702:Reciprocity 617:great power 611:there is a 567:appeasement 472:compellence 392:Rule of man 387:Peacemaking 340:Game theory 218:Appeasement 134:Negotiation 100:Rule of law 75:Arbitration 66:Nonviolence 7817:Categories 7411:Trust game 7396:Kuhn poker 7065:Escalation 7060:Deterrence 7050:Cheap talk 7022:Strategies 6840:Preference 6769:Topics of 6657:Liberalism 6602:Friendship 6587:Suzerainty 6185:Deterrence 5845:2013-11-15 5815:2010-06-10 5682:2023-03-04 5653:2023-03-04 5624:2022-02-14 5559:2021-12-17 5503:2021-11-20 5401:2021-11-20 5363:2021-12-07 5309:2021-12-07 5172:2021-11-07 5079:2021-11-06 5029:2021-11-06 4968:2021-11-06 4910:2021-11-06 4844:2021-11-15 4646:2021-11-06 4535:2021-11-06 4473:2021-11-06 4380:2023-08-11 4350:2023-09-12 4317:2023-09-15 4287:2023-08-11 4241:2023-08-31 4193:2023-08-31 4155:2023-08-31 3967:2022-05-07 3913:2022-05-07 3847:2022-05-07 3781:2022-05-07 3695:2022-01-28 3657:2022-01-28 3599:2022-01-28 3571:2022-02-15 3533:2022-02-21 3501:: 92–117. 3475:2021-06-03 3417:2021-06-03 3306:2021-09-11 3240:2021-09-11 3160:2021-07-14 3103:2021-11-20 2988:2021-09-05 2922:2021-09-05 2822:2021-09-05 2743:2021-09-06 2689:2021-08-28 2651:2023-11-30 2613:2021-09-18 2526:2021-09-06 2465:2021-09-11 2388:2021-09-06 2317:2023-12-01 2279:2021-09-06 2225:2021-09-05 2179:2021-08-30 2133:2021-08-30 2074:2021-08-28 2036:2021-08-30 1983:2021-08-30 1940:2021-08-30 1870:References 1779:Long Peace 1670:Paul Nitze 1633:, such as 1606:aggression 1589:See also: 1387:Sandinista 1379:mujahideen 1349:Reagan era 1306:Korean War 1302:proxy wars 1296:under its 1224:proxy wars 1125:Kazakhstan 1050:recognized 1024:Opposition 922:Background 686:Jentleson 457:Deterrence 243:Deterrence 7595:John Nash 7301:Stag hunt 7045:Collusion 6693:Diplomacy 6597:Bilateral 6495:Grey-zone 6448:Coalition 6407:1919–1939 6402:1814–1919 6397:1648–1814 6216:T.V. Paul 5706:CiteSeerX 5614:153925234 5598:0162-2889 5549:244858515 5460:: 25–43. 5353:240182441 5269:202312573 5261:0140-2390 5222:239770382 5214:0162-2889 5119:0963-6412 5061:1936-1815 5019:238358851 5011:2057-5637 4958:151870657 4950:0002-9300 4900:151870657 4884:0002-9300 4826:0022-0027 4787:2057-2085 4739:0963-6412 4697:154019562 4689:0963-6412 4636:238842794 4628:0140-2390 4578:0963-6412 4517:0162-2889 4422:Quillette 4129:0022-0027 4090:248609130 4017:248723655 4009:0162-2889 3957:157599829 3903:154642193 3887:0020-8183 3837:155075459 3821:0020-8183 3727:12 August 3639:0032-3195 3523:247040733 3515:0963-6412 3465:148987375 3457:0963-6412 3296:154490426 3280:0043-8871 3230:153591618 3214:0043-8871 3059:: 25–48, 2978:154732192 2962:0162-2889 2912:154133787 2896:0162-2889 2733:243305936 2641:0028-792X 2576:246241390 2568:0963-6412 2508:0305-0629 2455:153596965 2439:0043-8871 2370:0162-2889 2307:0015-7120 2269:243305936 1844:Wargaming 1580:Criticism 1463:Elon Musk 1391:Nicaragua 1324:With the 1244:Nicaragua 1019:Terrorism 1004:Espionage 999:Blackmail 994:Arms race 868:Tripwires 514:terms as: 499:immediate 325:Democracy 238:Diplomacy 233:Ceasefire 223:Armistice 147:Workplace 112:Mediation 42:USS  7736:Lazy SMP 7430:Theorems 7381:Deadlock 7236:Checkers 7117:of games 6884:concepts 6652:Feminism 6505:Idealism 6500:Hegemony 6453:Military 6438:Alliance 6431:Concepts 6417:Cold War 6299:Glossary 6201:. 1985. 5943:Archived 5930:Archived 5905:Archived 5839:Archived 5835:The Hill 5809:Archived 5779:Archived 5749:Archived 5728:13900591 5676:Archived 5674:. 2023. 5647:Archived 5618:Archived 5553:archived 5497:Archived 5395:Archived 5357:Archived 5303:Archived 5285:(1995). 5166:Archived 5127:46356854 5073:Archived 5069:26267261 5023:Archived 4962:Archived 4904:Archived 4838:Archived 4834:44364372 4640:Archived 4586:46356854 4529:Archived 4525:29361290 4467:archived 4389:cite web 4374:Archived 4344:Archived 4311:Archived 4281:Archived 4235:archived 4187:Archived 4149:Archived 4145:55200649 4137:20684583 3961:Archived 3907:Archived 3895:43282156 3841:Archived 3829:43282155 3775:Archived 3689:Archived 3651:Archived 3593:Archived 3565:Archived 3527:Archived 3469:Archived 3411:Archived 3344:Archived 3300:Archived 3234:Archived 3154:archived 3150:57572461 3097:Archived 3020:27870285 2982:Archived 2916:Archived 2813:Archived 2737:Archived 2683:Archived 2645:Archived 2607:Archived 2520:Archived 2516:35580738 2459:Archived 2382:Archived 2378:57570578 2311:Archived 2273:Archived 2219:Archived 2173:Archived 2127:Archived 2068:Archived 2030:Archived 1977:Archived 1934:Archived 1742:See also 1719:cold war 1639:Sam Nunn 1433:chemical 1278:Cold War 1218:and the 1212:Cold War 1120:Belarus 1099:Pakistan 984:Arsenals 955:Delivery 565:, where 487:credible 476:coercion 468:dissuade 441:Cold War 164:Violence 129:Pacifism 7488:figures 7271:Chicken 7125:Auction 7115:Classes 6672:Realism 6662:Marxism 6525:Liberal 6443:Entente 6389:History 6317:Present 6180:, 2015. 6125:2216042 6083:1961738 6041:2185583 5999:1148862 5911:July 2, 5807:. NPR. 5805:NPR.org 5643:Lawfare 5606:2539178 4747:4830861 3647:2149629 3386:2538549 3288:2010511 3222:2010405 2970:2538686 2904:2538699 2786:7711749 2447:2010184 1723:ethical 1529:Stuxnet 1395:Contras 1334:dĂ©tente 1320:DĂ©tente 1232:Vietnam 1130:Ukraine 972:Workers 967:Effects 950:Testing 940:Warfare 935:History 585:Concept 523:History 480:defense 256:Nuclear 198:studies 80:Auction 44:Growler 6634:Theory 6592:Treaty 6480:Crisis 6234:  6176:  6148:  6123:  6081:  6039:  5997:  5726:  5708:  5612:  5604:  5596:  5547:  5537:  5489:  5387:  5351:  5341:  5295:  5267:  5259:  5220:  5212:  5158:  5125:  5117:  5067:  5059:  5017:  5009:  4956:  4948:  4898:  4890:  4882:  4832:  4824:  4785:  4745:  4737:  4695:  4687:  4634:  4626:  4584:  4576:  4523:  4515:  4459:  4229:  4219:  4179:  4143:  4135:  4127:  4088:  4015:  4007:  3955:  3945:  3901:  3893:  3885:  3835:  3827:  3819:  3767:  3681:  3645:  3637:  3557:  3521:  3513:  3463:  3455:  3384:  3294:  3286:  3278:  3228:  3220:  3212:  3148:  3089:  3018:  2976:  2968:  2960:  2910:  2902:  2894:  2854:  2783:  2773:  2731:  2721:  2675:  2639:  2599:  2574:  2566:  2514:  2506:  2453:  2445:  2437:  2376:  2368:  2305:  2267:  2257:  2213:  2203:  2167:  2157:  2121:  2111:  2060:  2022:  1969:  1926:  1891:  1649:, and 1495:SACEUR 1238:, the 1236:Angola 1111:Former 1092:  1090:Israel 1081:Others 1069:France 1059:Russia 1029:Winter 977:Ethics 945:Design 897:, and 738:et al. 708:et al. 688:et al. 676:France 662:, the 660:Russia 629:et al. 459:in an 7226:Chess 7213:Games 6617:Peace 6572:Power 6567:Peace 6324:BRICS 6121:JSTOR 6101:(PDF) 6079:JSTOR 6059:(PDF) 6037:JSTOR 6017:(PDF) 5995:JSTOR 5724:S2CID 5610:S2CID 5602:JSTOR 5545:S2CID 5349:S2CID 5265:S2CID 5218:S2CID 5123:S2CID 5065:JSTOR 5015:S2CID 4954:S2CID 4896:S2CID 4888:JSTOR 4830:S2CID 4743:S2CID 4693:S2CID 4632:S2CID 4582:S2CID 4521:S2CID 4227:JSTOR 4141:S2CID 4133:JSTOR 4086:S2CID 4045:(5). 4013:S2CID 3953:S2CID 3899:S2CID 3891:JSTOR 3833:S2CID 3825:JSTOR 3721:(PDF) 3714:(PDF) 3643:JSTOR 3519:S2CID 3461:S2CID 3382:JSTOR 3292:S2CID 3284:JSTOR 3226:S2CID 3218:JSTOR 3146:S2CID 3016:JSTOR 2974:S2CID 2966:JSTOR 2908:S2CID 2900:JSTOR 2816:(PDF) 2805:(PDF) 2729:S2CID 2572:S2CID 2512:S2CID 2451:S2CID 2443:JSTOR 2374:S2CID 2265:S2CID 2211:JSTOR 2165:JSTOR 2119:JSTOR 1851:Notes 1461:When 1228:Korea 1085:India 1074:China 960:Yield 811:op‑ed 770:Dyads 668:India 664:China 502:that: 494:might 292:Other 6907:Core 6363:Past 6232:ISBN 6197:and 6174:ISBN 6146:ISBN 6105:NoĂ»s 5913:2019 5882:2013 5787:2012 5757:2012 5594:ISSN 5535:ISBN 5487:ISBN 5385:ISBN 5339:ISBN 5293:ISBN 5257:ISSN 5210:ISSN 5156:ISBN 5115:ISSN 5057:ISSN 5007:ISSN 4946:ISSN 4880:ISSN 4822:ISSN 4783:ISSN 4735:ISSN 4685:ISSN 4624:ISSN 4574:ISSN 4513:ISSN 4457:ISBN 4395:link 4370:CEPA 4277:Time 4217:ISBN 4177:ISBN 4125:ISSN 4005:ISSN 3943:ISBN 3883:ISSN 3817:ISSN 3765:ISBN 3729:2017 3679:ISBN 3635:ISSN 3555:ISBN 3511:ISSN 3453:ISSN 3276:ISSN 3210:ISSN 3087:ISBN 2958:ISSN 2892:ISSN 2852:ISBN 2771:ISBN 2719:ISBN 2673:ISBN 2637:ISSN 2597:ISBN 2564:ISSN 2504:ISSN 2435:ISSN 2366:ISSN 2303:ISSN 2255:ISBN 2201:ISBN 2155:ISBN 2109:ISBN 2058:ISBN 2020:ISBN 1967:ISBN 1924:ISBN 1889:ISBN 1509:and 1444:Post 1371:Iraq 1363:Iran 1246:and 1214:the 1205:The 1171:SSBN 731:NATO 674:and 666:and 551:NATO 7486:Key 6624:War 6113:doi 6071:doi 6029:doi 6025:101 5987:doi 5936:." 5716:doi 5586:doi 5527:doi 5462:doi 5429:doi 5331:doi 5249:doi 5200:doi 5148:doi 5107:doi 4999:doi 4938:doi 4934:110 4872:doi 4868:110 4814:doi 4773:doi 4727:doi 4677:doi 4616:doi 4566:doi 4505:doi 4449:doi 4307:CNN 4117:doi 4078:doi 4047:doi 3995:doi 3935:doi 3875:doi 3809:doi 3627:doi 3503:doi 3445:doi 3374:doi 3268:doi 3202:doi 3138:doi 3061:doi 3012:173 2950:doi 2884:doi 2842:doi 2781:PMC 2763:doi 2711:doi 2554:doi 2496:doi 2427:doi 2356:hdl 2348:doi 2247:doi 2101:doi 2012:doi 1916:doi 1435:or 1381:in 1369:of 1226:in 1048:NPT 729:or 193:War 90:Law 7819:: 7221:Go 6226:, 6222:, 6218:, 6193:, 6119:. 6109:26 6107:. 6103:. 6077:. 6067:83 6065:. 6061:. 6035:. 6023:. 6019:. 5993:. 5983:75 5981:. 5899:. 5866:. 5837:. 5833:. 5803:. 5773:. 5743:. 5722:, 5714:, 5702:16 5700:, 5670:. 5641:. 5616:. 5608:. 5600:. 5592:. 5582:18 5580:. 5576:. 5551:, 5543:, 5533:, 5521:, 5495:. 5458:46 5456:. 5452:. 5425:44 5423:. 5419:. 5393:. 5355:. 5347:. 5337:. 5301:. 5263:. 5255:. 5245:42 5243:. 5239:. 5216:. 5208:. 5196:46 5194:. 5190:. 5164:. 5154:. 5121:. 5113:. 5103:26 5101:. 5097:. 5071:. 5063:. 5051:. 5047:. 5021:. 5013:. 5005:. 4993:. 4989:. 4977:^ 4960:. 4952:. 4944:. 4932:. 4928:. 4902:. 4894:. 4886:. 4878:. 4866:. 4862:. 4836:. 4828:. 4820:. 4810:63 4808:. 4804:. 4781:. 4771:. 4767:. 4755:^ 4741:. 4733:. 4723:24 4721:. 4717:. 4705:^ 4691:. 4683:. 4673:22 4671:. 4667:. 4655:^ 4638:. 4630:. 4622:. 4612:46 4610:. 4606:. 4594:^ 4580:. 4572:. 4562:26 4560:. 4556:. 4544:^ 4527:. 4519:. 4511:. 4501:41 4499:. 4495:. 4481:^ 4465:, 4455:, 4443:, 4429:^ 4391:}} 4387:{{ 4372:. 4368:. 4342:. 4338:. 4326:^ 4309:. 4305:. 4275:. 4233:, 4225:, 4211:, 4185:. 4147:. 4139:. 4131:. 4123:. 4113:53 4111:. 4107:. 4084:. 4074:60 4072:. 4068:. 4043:66 4041:. 4037:. 4019:. 4011:. 4003:. 3991:46 3989:. 3985:. 3959:. 3951:. 3941:. 3905:. 3897:. 3889:. 3881:. 3871:67 3869:. 3865:. 3839:. 3831:. 3823:. 3815:. 3805:67 3803:. 3799:. 3773:. 3687:. 3649:. 3641:. 3633:. 3623:94 3621:. 3617:. 3591:. 3563:. 3525:. 3517:. 3509:. 3499:31 3497:. 3493:. 3467:. 3459:. 3451:. 3441:27 3439:. 3435:. 3405:. 3394:^ 3380:. 3368:. 3350:, 3315:^ 3298:. 3290:. 3282:. 3274:. 3264:42 3262:. 3258:. 3232:. 3224:. 3216:. 3208:. 3198:41 3196:. 3192:. 3152:, 3144:, 3134:30 3132:, 3128:, 3112:^ 3095:. 3055:, 3037:^ 3010:. 3006:. 2980:. 2972:. 2964:. 2956:. 2944:. 2940:. 2914:. 2906:. 2898:. 2890:. 2878:. 2874:. 2850:, 2811:. 2807:. 2779:. 2769:. 2735:. 2727:. 2717:. 2681:. 2643:. 2635:. 2631:. 2605:. 2570:. 2562:. 2550:30 2548:. 2544:. 2518:. 2510:. 2502:. 2492:28 2490:. 2486:. 2474:^ 2457:. 2449:. 2441:. 2433:. 2423:36 2421:. 2417:. 2397:^ 2380:. 2372:. 2364:. 2354:. 2344:42 2342:. 2338:. 2326:^ 2309:. 2301:. 2297:. 2271:. 2263:. 2253:. 2217:. 2209:. 2171:. 2163:. 2125:. 2117:. 2107:. 2083:^ 2066:. 2028:. 2018:. 1992:^ 1975:. 1949:^ 1932:. 1922:. 1645:, 1641:, 1608:. 1600:. 1535:. 1477:, 1411:. 1308:. 1254:. 1242:, 1234:, 1230:, 893:, 889:, 804:, 727:UN 658:, 7151:n 6762:e 6755:t 6748:v 6280:e 6273:t 6266:v 6238:. 6154:. 6127:. 6115:: 6085:. 6073:: 6043:. 6031:: 6001:. 5989:: 5915:. 5884:. 5848:. 5818:. 5789:. 5759:. 5718:: 5685:. 5656:. 5627:. 5588:: 5529:: 5506:. 5468:. 5464:: 5437:. 5431:: 5404:. 5366:. 5333:: 5312:. 5271:. 5251:: 5224:. 5202:: 5175:. 5150:: 5129:. 5109:: 5082:. 5053:6 5032:. 5001:: 4995:6 4971:. 4940:: 4913:. 4874:: 4847:. 4816:: 4789:. 4775:: 4749:. 4729:: 4699:. 4679:: 4649:. 4618:: 4588:. 4568:: 4538:. 4507:: 4451:: 4397:) 4383:. 4353:. 4320:. 4290:. 4196:. 4158:. 4119:: 4092:. 4080:: 4053:. 4049:: 3997:: 3970:. 3937:: 3916:. 3877:: 3850:. 3811:: 3784:. 3731:. 3698:. 3660:. 3629:: 3602:. 3574:. 3536:. 3505:: 3478:. 3447:: 3420:. 3388:. 3376:: 3370:7 3309:. 3270:: 3243:. 3204:: 3140:: 3106:. 3063:: 3057:2 3022:. 2991:. 2952:: 2946:7 2925:. 2886:: 2880:8 2844:: 2825:. 2789:. 2765:: 2746:. 2713:: 2692:. 2654:. 2616:. 2578:. 2556:: 2529:. 2498:: 2468:. 2429:: 2391:. 2358:: 2350:: 2320:. 2282:. 2249:: 2228:. 2182:. 2136:. 2103:: 2077:. 2039:. 2014:: 1986:. 1943:. 1918:: 1897:. 1157:e 1150:t 1143:v 424:e 417:t 410:v 34:. 20:)

Index

Independent nuclear deterrent
Deterrence (penology)

USS Growler
Regulus I missile
Conflict resolution
Nonviolence
Arbitration
Auction
Conciliation
Law
Dispute resolution
Rule of law
Collaborative
Mediation
Party-directed
Nonviolent Communication
Pacifism
Negotiation
Speaking truth to power
Conflict management
Violence
Communal violence
Conflict escalation
De-escalation
Just war theory
War
studies
International relations
Appeasement

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑