To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Some key innovations in recent decades have led to improvements in understanding of Southern Hemisphere meteorology. These include more satellite data streams and better integration of these streams into modern data assimilation systems. These, in turn, have led to better representation of the Southern Hemisphere atmosphere in reanalysis datasets and a narrowing of the weather forecast skill gap between the Northern and Southern Hemispheres. The availability of better and longer reanalysis datasets has facilitated more study of the distributions and variability of extratropical storm systems, jetstreams, and the stormtracks in the Southern Hemisphere. These studies depict the Indian Ocean sector as the main genesis region for many extratropical cyclones, with a concentrated jetstream and highly transient synoptic systems dominating variability in the synoptic timeband. The Pacific Ocean sector is strongly influenced by the splitting of the polar and subtropical jets and features more, and longer-lived, blocking events, dominating variability in the slow synoptic band (5–10 days). The dynamical understanding of these systems has also advanced with the application of Rossby wave theory and backtracking studies that reveal the role of Rossby wave breaking in many extreme events. Even local extremes can be shown to depend on large-scale wavetrains that regulate the onset and persistence of the event. Studies of Southern Hemisphere meteorology have also highlighted major uncertainties in understanding. Climatologies of Southern Hemisphere synoptic systems, including fronts, cut-off lows, and blocking, are sensitive to the choices used to define these systems. This is particularly acute in the case of blocking, where there is no complete theory that accounts for the lifecycle, distribution, and variability of blocking events, and relatively fewer studies on Southern Hemisphere blocking characteristics. Similarly, there are a range of views (reflecting underlying choices) of what the Southern Hemisphere stormtracks look like and competing theories of how those stormtracks are influenced by tropical teleconnections.
Dunbar’s emphasis on dyadic relationships in group formation overlooks the roles of interdependence and joint commitment in social cohesion. We challenge his premise by highlighting the importance of group-level processes, particularly where top-down group pressures like cooperative breeding and out-group threat can induce joint commitment as an alternate means to sustain group cohesion.
Clostridioides difficile is the primary cause of healthcare-associated infectious diarrhea in hospitalized patients. The most common laboratory testing methods for C. difficile infection (CDI) are toxin detection via enzyme immunoassay (EIA) and polymerase chain reaction (PCR), which detect a toxogenic strain. This study examines the impact of Rhode Island’s largest hospital system changing from PCR-only to two-step CDI testing.
Methods:
A retrospective cohort study of 2,173 adult inpatients was conducted. Patients were grouped into two cohorts: those tested for toxigenic C. difficile via PCR-only (June 2019–May 2021, n = 1,194) and those tested with the two-step algorithm (June 2021–May 2023, n = 979). Cluster analysis identified patient risk groups for hypothesis generation, and complications such as death, colectomy, intensive care unit ICU transfer, and 30-day readmission were compared across these groups.
Results:
In the moderate-risk group, there was a significant reduction in ICU transfers and readmission rates with the two-step testing by 5% and 7%, respectively. There were no other significant differences in complications between testing groups. Anti-CDI antibiotics were discontinued in 15% (n = 106) of EIA-negative patients in the two-step testing group. Moderate-risk patients were less likely to have treatment discontinued than severe-risk patients (OR = 2.00, p = 0.016).
Discussion:
The two-step testing algorithm did not negatively affect patient outcomes and led to a modest decrease in anti-CDI treatment, supporting the safety of two-step CDI testing in hospitalized patients.
Over 15 million children in the United States have been infected with COVID-19; nearly 2,000 have died. Approval of COVID-19 vaccines for children enabled reductions in disease severity and mortality. Disparities in vaccine adoption exist along racial, ethnic, and rural–urban lines, with lower uptake among medically underserved populations (e.g. Black, non-Hispanic White rural populations) compared to urban White populations. This study examined efforts to recruit and engage a diverse cohort as part of a vaccine communication randomized trial conducted across 15 states and compared demographic characteristics of the enrolled cohort to the broader US population. To enhance recruitment of diverse populations, eligible clinics had to serve a significant proportion of medically underserved individuals based on race, ethnicity, or geographic location. Coordinators used both traditional (in-person daily clinic schedule review) and retrospective (EHR and billing data review) recruitment methods adapted to enrich engagement with focus populations. Demographic characteristics were compared to national statistics obtained from the CDC’s Household Pulse Survey. In total, 2999 parents/caregivers were screened; 725 were randomized (24.1%). Comparing enrolled subjects to the demographics of participating states, 17.3% vs 9.8% self-identified as Hispanic, 39.6% vs 13.0% as Black. Additionally, 34.3% self-described as living in a rural area. Of the 725 randomized, 512 (70.6%) completed the baseline survey. Of these 512, 422 (82.4%) also completed the final survey of the 24-week study. This analysis demonstrates the Institutional Development Award States Pediatric Clinical Trials Network can successfully recruit and engage populations from diverse and underrepresented populations in research.
Irregular war, like war, remains an enduring feature of security studies both as they relate to internal state security and sovereignty as well as to international relations. Irregular war may not always appear to hold political purposes; many today seem driven by religious ideology, but the institution of theocratic governance has a politics of its own. Thus, like regular war, irregular war is subordinate to a political purpose. Whether they occur on the periphery of regular wars or perform roles to keep state competition from escalating into conflict, irregular wars are often intricately tied to their regular counterparts. While two broad theories of counterinsurgency both claim to have prescriptions for winning an irregular fight, one – the good governance approach – is plagued by problems of implementation at the governmental level, and the other – coercion – entails unreasonable brutality against both insurgent and population, often unbefitting a liberal counterinsurgent force.
While the academic study of International Relations immediately following the World Wars was focused on the causes of war and the conditions of peace, the diversification of IR in the mid twentieth century led to the creation of a discrete subfield of security studies. For the remainder of the twentieth century, this subfield focused exclusively on the problem of war – conventional and nuclear – between nation-states. But the end of the Cold War and the proliferation of multiple, opaque, and transnational security risks opened an intellectual space within security studies for a re-envisioning of the analytical approaches to security, as well as to a widening of the agenda. Security was no longer linked exclusively to war but also to a wider range of issues, and security was no longer exclusively conceptualized as the continued existence of the state but applied also to a multitude of actors.
This chapter looks at how energy fits into our understanding of international security as part of the widening of the security agenda. First, we define exactly what energy security means. Then we look at what theories of international security predict around energy security before moving on to a case study of the Middle East as an energy supplier. The chapter rounds out with a look at how the great powers in today’s international system are approaching the energy challenge.
Rational choice theory is a social theory of decision-making that assumes individuals, groups, organizations, and states are strategic actors and thus make rational choices based on their preferences, available information, and the expected outcomes of their actions. The theory is based on the Enlightenment idea that individuals are autonomous and should seek their own self-interest, and that we can determine how an individual should behave by understanding how they might best maximize the utility of their decisions. Game theory is an approach within the rational choice framework that models mathematically the mutual best responses of each player according to their preference orderings.
The concept of human security was first introduced formally in the 1994 UNDP Report and signaled a significant shift of focus from state security to the security of individual human beings and human communities. Unlike the abstract and theoretical debates within academia around that time about deepening and widening the definition of security, the human security approach was born from within the policy world and was policy-oriented. In the thirty years since its introduction, human security has undergone a series of reformulations, come under serious criticism, and inspired significant policy initiatives and numerous debates. Nevertheless, it remains the most formidable contender against traditional state-centered thinking around national and international security. In this chapter, we will look at the emergence and evolution of the human security approach, its core components, and its relationship with other important notions such as human development and responsibility to protect.
Peace Science research is interested in understanding the causal relationships between independent and dependent variables. Based on prior knowledge or existing theories, they develop hypotheses about the strength and direction of impact of independent variables on dependent variables, whether they be arms races and war, economic stability and civil war, or democracy and peace. Quantitative methods provide researchers with a way of confirming or disconfirming these hypotheses.
Critical Security Studies (CSS) is a diverse and multidisciplinary field that approaches traditional security studies through a critical lens and examines the ways in which security discourses and practices reify and reinforce existing power relations and contribute to the marginalization, oppression, and precarity of various groups of people. CSS scholars ask whose security we center when we talk “Security,” and whose security we neglect or sacrifice, what issues are present/absent, who is afforded agency, and who appear only as voiceless victims. They examine the ways in which security and power are intertwined so that evoking security can generate power, enable various kinds of interventions, perpetuate relations of domination and subjugation, and reproduce social hierarchies. Many CSS scholars adopt an interpretivist methodology and normative approach to scientific knowledge; they are interested in analysis not just for the sake of it but for bringing about change to the status quo.
To link the economic sphere of international relations to the security sphere of international politics in this chapter, we treat economics as a function of politics and security. While controversial in some circles, this need not be so. Economists, historians, and political scientists have distinct answers to questions concerning the economy. That they differ in scope, interest, and focus should be viewed as alternatives for assessing the empirical world, not mutually exclusive representations of it. This is fundamental to the interdisciplinary approach of International Security. It should be no surprise that the vastness and complexity of the global economic system intersect with realms outside the purview of economics. Security is an arena in which the politics of economic decision-making are felt most intensely.
“Alignment” is an umbrella term to describe a relationship between two or more states that involves mutual expectations of some degree of policy coordination on security issues under certain conditions in the future. The types of alignment explored in this chapter are alliances, thin and thick security institutions, coalitions, and strategic partnerships. The distinguishing features of these alignments are their differing levels of formality and the reason for their creation, or their objectives. Strategic alignments remain one of the dominant means that sovereign states possess to cooperate and coordinate their actions around common threats and political interests. States are either pulled into distrustful relations through security dilemmas or they are obliged to work together to solve common problems. Alliances, security institutions, coalitions, and strategic partnerships offer a variety of ways that states may seek to address security issues, threats, or challenges to their territories or interests.
Global public health is now seen as a security issue by many nations across the globe. Aside from naturally occurring outbreaks of infectious disease, deliberate attacks involving biological agents have emerged as a major security concern and a source of public anxiety in recent decades. Though many public health and security experts now recognize that effective prevention and response to these threats depend on building resilient public health systems around the world and international cooperation in maintaining them, it is unclear that the kind of sustained political will and economic resources exist to address such a massive undertaking that would need to take a holistic approach to human security and incorporate measures addressing: poverty; food insecurity; environmental degradation; lack of access to basic health-care services; adequate education; housing; sanitation and clean water; as well as more conventional aspects of security.