scispace - formally typeset
Search or ask a question

Showing papers by "Swedish National Defence College published in 2013"


Book
08 Aug 2013
TL;DR: In this article, the EU as crisis manager: a new role for the Union, assisting overwhelmed states: the evolving use of the Civil Protection Mechanism, and managing transboundary crises: the gradual emergence of EU capacity.
Abstract: 1. The EU as crisis manager: a new role for the Union 2. Assisting overwhelmed states: the evolving use of the Civil Protection Mechanism 3. The EU as global crisis manager: how emerging tools shaped ambitious policy aims 4. Managing transboundary crises: the gradual emergence of EU capacity 5. Managing future crises: challenges and prospects for the European Union.

93 citations


Journal ArticleDOI
TL;DR: In this article, the authors examined how authentic leadership relates to risk perception in safety critical organizations (SCO), and they hypothesized that authentic leaders influence risk perception for SCO employees.
Abstract: Purpose – This study aims to examine how authentic leadership relates to risk perception in safety critical organizations (SCOs). It is hypothesized that authentic leaders influence risk perception ...

69 citations


Journal ArticleDOI
TL;DR: In this paper, the effects of the early life variables and sex on the principal component scores (PC scores) were analyzed using linear modeling. But the results suggest that the early environment of dogs have long-lasting effects on their behaviour and coping styles in a stressful test situation and this knowledge can be used in the work with breeding of future military or police working dogs.

63 citations


Journal ArticleDOI
TL;DR: In this paper, the authors presented an agenda for crisis management research and training in Europe, here that article is revisited through a comprehensive review of social science scholarship in the field of crisis management.
Abstract: Fifteen years ago we presented an agenda for crisis management research and training in Europe, here that article is revisited through a comprehensive review of social science scholarship in the fi ...

46 citations


Journal ArticleDOI
TL;DR: In this paper, the authors present a more detailed ship security risk analysis than described in the International Ship and Port Facility Security code and evaluate to what extent this more detailed analysis increases ship security and facilitates the effective selection of risk control options.

41 citations


Journal ArticleDOI
TL;DR: An art-based leadership intervention has been evaluated in comparison to a conventional leadership development program and the effect of this intervention is explored.
Abstract: Purpose – In the present study an art-based leadership intervention has been evaluated in comparison to a conventional leadership development program. The purpose of this paper is to explore effect ...

35 citations


Journal ArticleDOI
TL;DR: The authors examined the ethico-political dimensions of contemporary Western-led "population-centric" war and found that winning wars is about winning the "hearts and minds" of local populations, about persuasion rather than confrontation.
Abstract: Contemporary Western war-fighting is animated by the fictitious imagination of a war free from antagonism. In this logic, winning wars is about winning the ‘hearts and minds’ of local populations, about persuasion rather than confrontation. In recent years, the concept of ‘strategic communication’ (SC) has been elevated to the top echelons of strategic thinking in United States military circles, focusing attention on how to communicate ‘effectively’ with local populations. Via an analysis of the concept of SC, this article examines the ethico-political dimensions of contemporary Western-led ‘population-centric’ war. Through a reading inspired by Judith Butler's recent work in Precarious life (London: Verso 2006) and Frames of war (London: Verso 2009), and an analysis that turns on the link between ethics and ontology, I reflect on the significance of the ‘communications turn’ in warfare for our study of war in ontological terms.

32 citations



Journal ArticleDOI
01 Dec 2013
TL;DR: It is concluded that cyberspace is emerging as a new tool for state power that will likely reshape future warfare and is hard to precisely assess future effects, risks and potentials.
Abstract: The growing importance of cyberspace to modern society, and its increasing use as an arena for dispute, is becoming a national security concern for governments and armed forces globally. The special characteristics of cyberspace, such as its asymmetric nature, the lack of attribution, the low cost of entry, the legal ambiguity, and its role as an efficient medium for protest, crime, espionage and military aggression, makes it an attractive domain for nation-states as well as non-state actors in cyber conflict.This paper studies the various non-state actors who coexist in cyberspace, examines their motives and incitements, and analyzes how and when their objectives coincide with those of nation-states. Literature suggests that many nations are currently pursuing cyberwarfare capabilities, oftentimes by leveraging criminal organizations and irregular forces. Employment of such non-state actors as hacktivists, patriot hackers, and cybermilitia in state-on-state cyberspace operations has also proved to be a usable model for conducting cyberattacks. The paper concludes that cyberspace is emerging as a new tool for state power that will likely reshape future warfare. However, due to the lack of concrete cyberwarfare experience, and the limited encounters of legitimate cyberattacks, it is hard to precisely assess future effects, risks and potentials.

24 citations


Journal ArticleDOI
TL;DR: In this article, a theoretical analysis followed by an operationalisation of key concepts and two small-scale empirical cross-sectional tests is presented to further the theoretical understanding of leadership in emergency type organizations by modelling contextual aspects which are assumed to influence it.
Abstract: Purpose – The purpose of this paper is to further the theoretical understanding of leadership in emergency type organisations by modelling contextual aspects which are assumed to influence it.Design/methodology/approach – A theoretical analysis followed by an operationalisation of key concepts and two small‐scale empirical cross‐sectional tests.Findings – Contextual conditions at the group, organisation, and environmental levels that are assumed to influence leadership in emergency type organisations were modelled in lower‐ to higher‐extent bipolar dimensions. An empirical test involving Scandinavian military officers (n=57) and Swedish health care (ambulance) professionals (n=39) yielded profiles for leaders at three different hierarchical levels during severely demanding operations: field‐level group/team leaders; field‐level commanders/managers; and high‐level strategic commanders/managers. Considerable differences were found between the three profiles on scales designed to measure environmental and mo...

21 citations


Proceedings ArticleDOI
12 Aug 2013
TL;DR: A framework for offensive CCI based on technical tools and techniques for data mining, anomaly detection, and extensive sharing of cyber threat data is proposed and placed within the distinct context of military intelligence.
Abstract: Although the traditional strategies for cyber defense in use today are necessary to mitigate broad ranges of common threats, they are not well-suited to protect against a persistent antagonist with access to advanced system exploitation techniques and knowledge of existing but yet undiscovered software vulnerabilities. Addressing the threat caused by such antagonists requires a fast and offensive Cyber Counterintelligence (CCI) process, and a more efficient inter-organizational information exchange. This paper proposes a framework for offensive CCI based on technical tools and techniques for data mining, anomaly detection, and extensive sharing of cyber threat data. The framework is placed within the distinct context of military intelligence, in order to achieve a holistic, offensive and target-centric view of future CCI. The main contributions offered are (i) a comprehensive process that bridges the gap between the various actors involved in CCI, (ii) an applied technical architecture to support detection and identification of data leaks emanating from cyber espionage, and (iii) deduced intelligence community requirements.

Journal ArticleDOI
TL;DR: In this paper, the authors explore the mechanisms behind the ability of political leaders to win praise and support in times of crisis by studying one such case of crisis exploitation: the Swedish government's communication during the 2008 financial crisis.
Abstract: This article explores the mechanisms behind the ability of political leaders to win praise and support in times of crisis by Studying one such case of crisis exploitation: the Swedish government’s communication during the 2008 financial crisis. Looking back at the first term in office for the centre-right Alliance government, the government was initially struggling with historically low results in the regular opinion polls and a new electoral victory seemed to be beyond reach. However, this trend changed completely in the midst of the financial crisis when the government and its most prominent ministers from the dominant Moderate Party regained public support and confidence, and were able to win the next national election in 2010. The article argues that in order to explain successful political communication in times of crisis both the frames advocated by the political actors themselves and the media need to be taken into account. Based on this assumption the article proposes that successful political com...

Journal ArticleDOI
25 Sep 2013
TL;DR: In this article, the authors explore which components military personnel in peacekeeping operations perceive as contributing to trust in their superior and subordinate leaders during international or national operations, and find that they perceive themselves as contributing in a positive manner.
Abstract: The aim was to explore which components military personnel in peacekeeping operations perceive as contributing to trust in their superior and subordinate leaders during international or national op ...

Journal ArticleDOI
TL;DR: In this paper, the authors conducted an analysis of the relationship between civil-military relations and the autonomy of the military profession in Sweden and the perceived level of external threats in Sweden.
Abstract: Civil-military relations and the autonomy of the military profession in Sweden have varied over time depending on the perceived level of external threats. In this article, we set out to conduct an ...

MonographDOI
02 Apr 2013
TL;DR: In this paper, the authors connect the study of statebuilding to broader aspects of social theory and the historical study of the state, bringing forth new questions and starting points, both academically and pr...
Abstract: This volume connects the study of statebuilding to broader aspects of social theory and the historical study of the state, bringing forth new questions and starting-points, both academically and pr ...

Journal ArticleDOI
TL;DR: In the EU project AniBioThreat, early warning is the main topic in work package 3 (WP 3), and a strategy has been generated based on an iterative approach to bring law enforcement agencies and human and animal health institutes together.
Abstract: Current trends in biosecurity and cybersecurity include (1) the wide availability of technology and specialized knowledge that previously were available only to governments; (2) the global economic recession, which may increase the spread of radical non-state actors; and (3) recent US and EU commission reports that reflect concerns about non-state actors in asymmetric threats. The intersectoral and international nature of bioterrorism and agroterrorism threats requires collaboration across several sectors including intelligence, police, forensics, customs, and other law enforcement organizations who must work together with public and animal health organizations as well as environmental and social science organizations. This requires coordinated decision making among these organizations, based on actionable knowledge and information sharing. The risk of not sharing information among organizations compared to the benefit of sharing information can be considered in an "information sharing risk-benefit analysis" to prevent a terrorism incident from occurring and to build a rapid response capability. In the EU project AniBioThreat, early warning is the main topic in work package 3 (WP 3). A strategy has been generated based on an iterative approach to bring law enforcement agencies and human and animal health institutes together. Workshops and exercises have taken place during the first half of the project, and spin-off activities include new preparedness plans for institutes and the formation of a legal adviser network for decision making. In addition, a seminar on actionable knowledge was held in Stockholm, Sweden, in 2012, which identified the need to bring various agency cultures together to work on developing a resilient capability to identify early signs of bio- and agroterrorism threats. The seminar concluded that there are a number of challenges in building a collaborative culture, including developing an education program that supports collaboration and shared situational awareness.

Journal ArticleDOI
TL;DR: In recent years, the European Union has taken a number of steps towards improving civil protection cooperation in Europe, and European leaders regularly declare the importance of boosting cooperation to improve civil protection as mentioned in this paper.
Abstract: In recent years the European Union has taken a number of steps towards improving civil protection cooperation in Europe. European leaders regularly declare the importance of boosting cooperation to ...

Proceedings Article
01 Jan 2013
TL;DR: This paper explores the cyber threats as one possible aspect of hybrid threats and describes three ways of dealing with them.
Abstract: Hybrid threats use conventional and unconventional means to achieve their goals. In this paper we explore the cyber threats as one possible aspect of hybrid threats. We describe three ways of appro ...

Journal ArticleDOI
TL;DR: In this article, the first study of team learning in the Swedish Armed Forces is presented. Andersen et al. followed a military staff exercise and used Edmondson's theoretical model for studying and analyzing team learning, which consists of context support, team leader coaching, team psychology safety and team learning behavior.
Abstract: The critical dependence of armed forces on teams carrying out tasks in a continuously changing, uncertain and often dangerous environment, raises questions about how to better understand factors that enable or hamper effective team learning. So far there is no developed field of research into team learning in the Swedish Armed Forces. This is the first of several studies within the Swedish Armed Forces to explore and gain a better understanding of team learning. In this first study of team learning we followed a military staff exercise. The theoretical base in this study is Amy Edmondson’s theoretical model for studying and analyzing team learning. The model consists of context support, team leader coaching, team psychology safety and team learning behavior. The results of this study supports the theoretical model of team learning and describe factors that are important for creating good conditions for team learning behavior.

Journal ArticleDOI
04 Dec 2013
TL;DR: In this paper, a small, wirelessly powered and read resonating antenna circuit with an integrated pressure sensor was designed and evaluated for harsh environments, where high temperature prevents the use of conventional, silicon-based microdevices.
Abstract: This paper reports on the design, manufacturing and evaluation of a small, wirelessly powered and read resonating antenna circuit with an integrated pressure sensor. The work aims at developing miniature devices suitable for harsh environments, where high temperature prevents the use of conventional, silicon-based microdevices. Here, the device is made of alumina with platinum as conducting material. Ceramic green tapes were structured using high-precision milling, metallized using screen printing, and subsequently laminated to form stacks before they were sintered. The device's frequency shift as a function of temperature was studied up to 900°C. The contributions to the shift both from the thermomechanical deformation of the device at large, and from the integrated and, so far, self-pressurized sensor were sorted out. A total frequency shift of 3200 ppm was observed for the pressure sensor for heating over the whole range. Negligible levels of thermally induced radius of curvature were observed. With three-point bending, a frequency shift of 180 ppm was possible to induce with a curvature of radius of 220 m at a 10 N load. The results indicate that a robust pressure sensor node, which can register pressure changes of a few bars at 900°C and wirelessly transmit the signal, is viable.

Book ChapterDOI
01 Jan 2013
TL;DR: In this article, the authors conclude that the reasoning of the Special Court for Sierra Leone is unconvincing and displays a misapprehension of the protective reach of the law of armed conflict.
Abstract: In its 2009 judgment in the case of Prosecutor v Sesay, Kallon and Gbao, the Special Court for Sierra Leone asserted that “the killing of a member of an armed group by another member of the same group does not constitute a war crime”. The current chapter subjects that categorical assertion to critical examination. It concludes that the reasoning of the Special Court for Sierra Leone is unconvincing and displays a misapprehension of the protective reach of the law of armed conflict.

01 Jan 2013
TL;DR: In this paper, a key motivation in using games for educational purposes is to enhance user motivation and involvement to the subject matter, and games have always been utilized as a means to t...
Abstract: A key motive in using gaming for educational purposes is to enhance user motivation and involvement to the subject matter. Within military education, games have always been utilized as a means to t ...

Journal ArticleDOI
TL;DR: In this article, the authors validate a theoretical model of a civil contingencies agency management system, and develop methodological development by employing qualitative information from the participants of the training process of the management system.
Abstract: Purpose – The aim of this article is twofold: (1) validation of a theoretical model of a civil contingencies agency management system, and (2) methodological development by employing qualitative me ...

Posted Content
TL;DR: In this paper, the authors introduce the notion of environmental threats to global peace and security, so called "eco-threats", and look into shortcomings of environmental protection during hostilities under the Law of Armed Conflict (LOAC).
Abstract: This short paper introduces the reader to the notion of environmental threats to global peace and security, so called ‘eco-threats’, and looks into shortcomings of environmental protection during hostilities under the Law of Armed Conflict (LOAC).