Results 41 to 50 of about 730,636 (308)
Some thoughts about psychological questions of asymmetric warfare [PDF]
The authors sum up the more capital questions of the asymmetric warfare and its psychological factors. They give overview about the military-scientific basis of the asymmetric warfare and its threats; interpretation of asymmetry in the activities of ...
Bolgár, Judit, Krajnc, Zoltán
core
Abstract Caste—an ascriptive social hierarchy in South Asia and its diaspora—is a globalized phenomenon. Recent caste‐based discrimination, particularly in technology companies and anti‐caste efforts to address it, has compelled academia, policy, and the technology industry to better understand contemporary mechanics of caste.
Nayana Kirasur, Britt Paris
wiley +1 more source
Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core +1 more source
Abstract This article examines how UK and US universities manage racial equality regimes through governance structures that prioritise institutional reputation over substantive racial justice reform. Drawing on Bourdieu's field, habitus and capital theory, the study demonstrates how universities neutralise racial justice efforts through bureaucratic ...
David Roberts
wiley +1 more source
Book Review: ‘The Weaponisation of Everything’ by Mark Galeotti
Published a month prior to the Russian invasion of Ukraine 24 February 2022, Mark Galeotti’s The Weaponisation of Everything: A Field Guide to the New Way of War is nevertheless relevant and important reading for those studying how to fight hybrid ...
Beth Lindley
doaj
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
Justified killing in an age of radically asymmetric warfare
The growing ability of the US to kill with impunity in war has prompted some to question whether such advantage challenges the moral justifications for inter-combatant violence. This scholarship, however, has yet to properly clarify both the explicit and
Neil Renic
semanticscholar +1 more source
The impacts of biological invasions
ABSTRACT The Anthropocene is characterised by a continuous human‐mediated reshuffling of the distributions of species globally. Both intentional and unintentional introductions have resulted in numerous species being translocated beyond their native ranges, often leading to their establishment and subsequent spread – a process referred to as biological
Phillip J. Haubrock +42 more
wiley +1 more source
Hybrid warfare: Conceptual adaptation [PDF]
The process of transforming the war of a multidimensional character and various tactics caused by modern threats to national, global and regional security and conditioned by technological development and manifested in different forms - conventional ...
Terzić Miroslav R. +2 more
doaj +1 more source
Introduction to the Spring/Summer 2010 Issue, Strategic Insights, v. 9, issue 1; Strategic Insights, v. 9, issue 1 (Spring/Summer 2010) ; pp. 1-2 [PDF]
This article appeared in Strategic Insights, v.9, issue 1 (Spring/Summer 2010) ; pp. 1-2This issue of Strategic Insights, explores the complex realm of asymmetric warfare, specifically the role it plays in a variety of weak and developing states.
Leavitt, Sandra R.
core

