5th Australian Security and Intelligence Conference Proceedings of the 5th Australian Security and Intelligence Conference

نویسنده

  • Craig Valli
چکیده

The development of a counter-insurgency doctrine is an evolutionary process: no two insurgencies are the same. However, certain fundamental principals remain consistent and these can be applied to meet the required circumstances. The creation of an overarching plan encompassing a combination of military, political and social actions under the strong control of a single authority is central. Therefore, understanding the basics allows for the development of a tactical strategy based upon a structured plan. Compiling the ‘Plan’ should be based upon the lessons learnt from the past. To this end, the methodology used is supported by a literature review and interviews from participants in a limited assessment of the two historical conflicts: Malaya and Kenya. Based upon the findings, a condensed table is presented to aid analysis, using a French doctrinal approach as a tool for interpretation. In addition, this is supported by quotes from the respondents involved in the research process. These findings are the preliminary results of a research study looking at what was effective during the prosecution of the selected insurgencies. Outcomes indicate that the fundamental principals are pertinent today and are therefore generally applicable.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AI 2004: Advances in Artificial Intelligence, 17th Australian Joint Conference on Artificial Intelligence, Cairns, Australia, December 4-6, 2004, Proceedings

It's coming again, the new collection that this site has. To complete your curiosity, we offer the favorite ai 2004 advances in artificial intelligence 17th australian joint conference on artificial intelligence cairns australia december 4 6 2004 proceedings book as the choice today. This is a book that will show you even new to old thing. Forget it; it will be right for you. Well, when you are...

متن کامل

Artificial Intelligence: Theories, Models and Applications, 5th Hellenic Conference on AI, SETN 2008, Syros, Greece, October 2-4, 2008. Proceedings

Any books that you read, no matter how you got the sentences that have been read from the books, surely they will give you goodness. But, we will show you one of recommendation of the book that you need to read. This artificial intelligence theories models and applications 5th hellenic conference on ai setn 2008 syros greece october 2 4 2008 proceedings lecture notes in artificial intelligence ...

متن کامل

Modeling Decisions for Artificial Intelligence, 5th International Conference, MDAI 2008, Sabadell, Spain, October 30-31, 2008. Proceedings

Bring home now the book enPDFd modeling decisions for artificial intelligence 5th international conference mdai 2008 sabadell spain october 30 31 2008 proceedings lecture notes in computer science to be your sources when going to read. It can be your new collection to not only display in your racks but also be the one that can help you fining the best sources. As in common, book is the window t...

متن کامل

Analyzing Security Protocols Using Association Rule Mining

Current studies to analyzing security protocols using formal methods require users to predefine authentication goals. Besides, they are unable to discover potential correlations between secure messages. This research attempts to analyze security protocols using data mining. This is done by extending the idea of association rule mining and converting the verification of protocols into computing ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012