Results 91 to 100 of about 730,636 (308)

Asymmetric Conflicts with Endogenous Dimensionality [PDF]

open access: yes
This article examines a two-stage model of asymmetric conflict based on the classic Colonel Blotto game in which players have, in the first stage, the ability to increase the number of battlefields contested.
Brian Roberson   +2 more
core  

The Old Regime (of Mutualisation) and the Revolution (of Big Data)

open access: yesThe British Journal of Sociology, EarlyView.
ABSTRACT In his classic work L'ancien régime et la révolution, Alexis de Tocqueville proposes a reinterpretation of the French Revolution: behind the spectacular ruptures associated with the event, profound continuities are at play. Beyond the specific case of the French Revolution, Tocqueville calls for vigilance in mobilizing the notion of revolution
Pierre Francois
wiley   +1 more source

21st Century Simulation: Exploiting High Performance Computing and Data Analysis [PDF]

open access: yes, 2004
This paper identifies, defines, and analyzes the limitations imposed on Modeling and Simulation by outmoded paradigms in computer utilization and data analysis.
Baer, Garth D.   +2 more
core  

The Technology of Terror: Accounting for the Strategic Use of Terrorism [PDF]

open access: yes
To comprehend why a group would intentionally target civilians, we need to understand why other groups do not. In this chapter, we argue that disgruntled groups face three main choices when addressing their dissatisfaction: suffering a disadvantageous ...
Christopher K. Butler, Scott Gates
core  

High-technologies, armed conflicts and human security [PDF]

open access: yes, 2016
El examen de las amenazas para la seguridad y el bienestar de las personas inherentes al concepto de seguridad humana exige ocuparse también de las consecuencias que la utilización de las altas tecnologías puedan ocasionar en relación con los conflictos ...
Mar García Rico, Elena del
core  

Bound by blood and bloodshed: Sibling ties and participation in genocidal violence

open access: yesCriminology, EarlyView.
Abstract Focusing on the 1994 genocide in Rwanda, we examine how sibling relationships—one of the most salient familial bonds—influence individual engagement in violence during mass atrocity. Drawing on an adaptation of differential association and social learning theories for contexts of mass atrocity, we analyze a novel dataset linking over 300,000 ...
Jack G. R. Wippell   +3 more
wiley   +1 more source

The Case of Microsoft\u27s Surface Tablet: Going Behind the Strategy with SWOT [PDF]

open access: yes, 2013
Following its development at Harvard Business School in the 1950s, the SWOT framework became a frequently used decision tool. While the complexity organizations confront in the modern business world has increased, SWOT provides an intuitive way to ...
King, David R., Peterson, Todd
core   +1 more source

Hybrid Warfare – A Form of Asymmetric Conflict

open access: yes, 2017
For a few decades now, a vivid scholarly discussion centred on new forms of conflict has been developing. Military historians and political scientists entered into debates building consistent pro and counter-arguments about whether armed conflict at the ...
Laura M. Herța
semanticscholar   +1 more source

Queen Anne's Wardrobe: Fashion, Sartorial Politics, and the Representational Strategies of the Last Stuart Queen

open access: yesJournal for Eighteenth-Century Studies, EarlyView.
Abstract The final Stuart monarch, Queen Anne, has often been overlooked in studies of visual and material culture, particularly of fashion and dress. This article is the first to undertake a qualitative and quantitative analysis of the wardrobe accounts of Queen Anne, situating her consumption within the context of the eighteenth‐century fashion ...
Sarah A. Bendall
wiley   +1 more source

Hybrid Warfare Studies and Russia’s Example in Crimea

open access: yesGazi Akademik Bakış, 2015
Although Hybrid Warfare is an old concept, theoretical studies in the western countries mainly began in the post-Col War era, focusing on asymmetrical threats against conventional superiority of western countries such as USA or Israel.
Mehmet Seyfettin EROL, Şafak OĞUZ
doaj  

Home - About - Disclaimer - Privacy