Results 11 to 20 of about 1,709 (262)

OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS [PDF]

open access: greenJournal of Defense Resources Management, 2013
Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to ...
Giuseppe CAFORIO
doaj   +1 more source

Theoretical starting points in considering the concept of asymmetric warfare [PDF]

open access: yesВојно дело, 2023
The issue of the concept of asymmetric warfare is extremely important for modern military theoretical thought, since modern wars are based on the asymmetric strategic relationship of the conflicting parties.
Barišić Igor I., Vračar Milinko S.
doaj   +1 more source

Research on Russian Electronic Warfare Equipment and Application in Russia-Ukraine Conflict [PDF]

open access: yesHangkong bingqi, 2023
After implementing the “New Look” military reform, Russia focuses on constructing and developing electronic warfare equipment, which has become an important “asymmetric” weapon for acquiring information dominance to gain battlefield initiative.
Ling Haifeng, Li Rui, Bai Linyuan, He Weixiong
doaj   +1 more source

SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS

open access: yesJournal of Social Political Sciences, 2021
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake ...
Aththaariq Rizki   +1 more
doaj   +1 more source

Psychological warfare and military sciences [PDF]

open access: yesBaština, 2021
In this paper the brief development and contemporary trends in modern military psychology, in theory and praxis, were presented. The origins and concepts of psychological warfare and its basic characteristics were discussed. Also, similar terms, modified
Petrović Jelena R.
doaj   +1 more source

Analysis of presidential regulations concerning cyber security to bolster defense policy management

open access: yesDefense and Security Studies, 2023
As a developing country, Indonesia must effectively manage its national defense by implementing defense policies which can be interpreted as management activities that transform into defense policy management entities.
Rizky Ramadhianto   +3 more
doaj   +1 more source

Not Synonymous, but Substitutional: Conventional, Asymmetric, and Hybrid Warfare within the Framework of Battlefield Functions

open access: yesGüvenlik Stratejileri Dergisi, 2023
Although concepts related to conventional warfare and irregular warfare have been used in academic literature for a long time, the latter concept is intertwined closely with concepts such as asymmetric warfare, hybrid warfare, special warfare ...
Özgür Körpe
doaj   +1 more source

Policy Implementation of Lantamal VIII Manado in Handling Transnational Crimes in the North Sulawesi Marine Border

open access: yesJMSNI (Journal of Maritime Studies and National Integration), 2020
This study aims to identify the policy of Main Naval Base VIII (Lantamal VIII) Manado to handle transnational crimes in the Manado sea border, North Sulawesi.
Dian Handayani   +2 more
doaj   +1 more source

Hybrid warfare and asymmetric security threats [PDF]

open access: yesВојно дело, 2017
Globalization with all its positive and negative effects, current events on the international scene, practice of international relations development, outbreak and management of conflicts around the globe, emergence of nonlinear and asymmetric forms of ...
Mitrović Miroslav
doaj   +1 more source

Fronting the Return of Foreign Terrorist Fighters: the Rise and Fall of ASEAN Border Cooperation to Combat Non-Traditional Threats

open access: yesJurnal Hubungan Internasional, 2018
This paper argues that bilateral arrangements among ASEAN countries are no longer enough to address the convergence of non-traditional threats, primarily due to porous borders in Southeast Asia region.
Muhammad Suryadi   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy