- The Oxford Handbook of U.S. National Security
- About the Editors
- Foreword: U.S. National Security for the Twenty-First Century
- Introduction: Shape and Scope of U.S. National Security
- America’s Foreign Policy Traditions
- National Interests and Grand Strategy
- U.S. Foreign Policymaking and National Security
- Civil-Military Relations
- The Presidency and Decision Making
- The National Security Council: Is It Effective, or Is It Broken?
- The National Security Process
- Intelligence and National Security Decision Making
- Congress and National Security
- Diplomacy, the State Department, and National Security
- Development Assistance: Rationale and Applications
- Understanding and Improving U.S. Financial Sanctions
- The Political Economy of Security
- Budgeting for National Security
- Military Force Planning and National Security
- Military Operations and the Defense Department
- Alliances, Military Basing, and Logistics
- Homeland Security
- The United States and Iran: Challenges of Deterrence and Compellence
- U.S. Nuclear Strategy: The Search for Meaning
- International Cyber Conflict and National Security
- Encryption Wars: Who Should Yield?
- Space and National Security
- Human (In)Security
- Climate Change and Environmental Security
- Political Violence
- Women’s Participation in Political Violence
- International Terrorism
- Threats and Dangers in the Twenty-First Century
- International Rivalry and National Security
- Interstate Rivalry in East Asia
- The Transatlantic Security Landscape in Europe
- U.S. National Security in the Western Hemisphere
- Epilogue: Five Lessons for National Security Policymakers
Abstract and Keywords
International rivalries are discussed with an emphasis on their relevance to U.S. national security. Social-scientific research on these protracted, antagonistic, and often violent relationships serves as a wellspring of insight into national security challenges. A primary focus on rivalries between sovereign states is supplemented with discussion of rivalries involving nonstate actors, including armed groups associated with insurgency and terrorism. To anchor these discussions, the chapter briefly denotes definitional, conceptual, and operational aspects of rivalry research. Rivalries are linked to U.S. national security concerns through first-, second-, and third-order effects. The challenge of overcoming histories of hostility to achieve peaceful resolution of rivalries is examined. Future directions in rivalry research, including the imperative to incorporate contemporary policy concerns (such as cybersecurity and emerging technologies and techniques associated with international conflict), are discussed in a forward-looking manner that emphasizes the complementarity of scholarship and policy arenas.
Jonathan M. DiCicco (PhD, Rutgers University) is Associate Professor of Political Science at Canisius College in Buffalo, New York, where he teaches courses on national security, American foreign policy, leadership in international politics, and war. DiCicco is co-author of Presence, Prevention, and Persuasion (Lexington, 2004) and co-editor of International Relations: Introductory Readings (Kendall Hunt, 2017). His work related to rivalries and national security has been published in Political Research Quarterly, Foreign Policy Analysis, International Studies Perspectives, and Journal of Conflict Resolution.
Brandon Valeriano is the Donald Bren Chair of Armed Politics at the Marine Corps University. He also serves as a senior fellow in cyber security for the Niskanen Center. His three most recent coauthored books are Cyber War versus Cyber Realities, Russia’s Coercive Diplomacy, and Cyber Strategy. His ongoing research explores creating comprehensive cyber conflict data, external threats and video games, biological and psychological examinations of the cyber threat, and repression in cyberspace. He received a PhD from Vanderbilt University.
Access to the complete content on Oxford Handbooks Online requires a subscription or purchase. Public users are able to search the site and view the abstracts and keywords for each book and chapter without a subscription.
If you have purchased a print title that contains an access token, please see the token for information about how to register your code.