Results 91 to 100 of about 730,636 (308)
Asymmetric Conflicts with Endogenous Dimensionality [PDF]
This article examines a two-stage model of asymmetric conflict based on the classic Colonel Blotto game in which players have, in the first stage, the ability to increase the number of battlefields contested.
Brian Roberson +2 more
core
The Old Regime (of Mutualisation) and the Revolution (of Big Data)
ABSTRACT In his classic work L'ancien régime et la révolution, Alexis de Tocqueville proposes a reinterpretation of the French Revolution: behind the spectacular ruptures associated with the event, profound continuities are at play. Beyond the specific case of the French Revolution, Tocqueville calls for vigilance in mobilizing the notion of revolution
Pierre Francois
wiley +1 more source
21st Century Simulation: Exploiting High Performance Computing and Data Analysis [PDF]
This paper identifies, defines, and analyzes the limitations imposed on Modeling and Simulation by outmoded paradigms in computer utilization and data analysis.
Baer, Garth D. +2 more
core
The Technology of Terror: Accounting for the Strategic Use of Terrorism [PDF]
To comprehend why a group would intentionally target civilians, we need to understand why other groups do not. In this chapter, we argue that disgruntled groups face three main choices when addressing their dissatisfaction: suffering a disadvantageous ...
Christopher K. Butler, Scott Gates
core
High-technologies, armed conflicts and human security [PDF]
El examen de las amenazas para la seguridad y el bienestar de las personas inherentes al concepto de seguridad humana exige ocuparse también de las consecuencias que la utilización de las altas tecnologías puedan ocasionar en relación con los conflictos ...
Mar García Rico, Elena del
core
Bound by blood and bloodshed: Sibling ties and participation in genocidal violence
Abstract Focusing on the 1994 genocide in Rwanda, we examine how sibling relationships—one of the most salient familial bonds—influence individual engagement in violence during mass atrocity. Drawing on an adaptation of differential association and social learning theories for contexts of mass atrocity, we analyze a novel dataset linking over 300,000 ...
Jack G. R. Wippell +3 more
wiley +1 more source
The Case of Microsoft\u27s Surface Tablet: Going Behind the Strategy with SWOT [PDF]
Following its development at Harvard Business School in the 1950s, the SWOT framework became a frequently used decision tool. While the complexity organizations confront in the modern business world has increased, SWOT provides an intuitive way to ...
King, David R., Peterson, Todd
core +1 more source
Hybrid Warfare – A Form of Asymmetric Conflict
For a few decades now, a vivid scholarly discussion centred on new forms of conflict has been developing. Military historians and political scientists entered into debates building consistent pro and counter-arguments about whether armed conflict at the ...
Laura M. Herța
semanticscholar +1 more source
Abstract The final Stuart monarch, Queen Anne, has often been overlooked in studies of visual and material culture, particularly of fashion and dress. This article is the first to undertake a qualitative and quantitative analysis of the wardrobe accounts of Queen Anne, situating her consumption within the context of the eighteenth‐century fashion ...
Sarah A. Bendall
wiley +1 more source
Hybrid Warfare Studies and Russia’s Example in Crimea
Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel.
Mehmet Seyfettin EROL, Şafak OĞUZ
doaj

