Results 61 to 70 of about 730,636 (308)
RUSSIAN OFFENSIVE STRATEGY IN THE CONDITIONS OF THE MODERN INFORMATION WARFARE
Despite rather volume scientific knowledge of information warfares and methods of their maintaining, the general understanding of information warfare is still not present. And this circumstance does very difficult counteraction to this threat.
Elena S Alexeyeva
doaj +1 more source
Impact of a Modular Escape Game on Undergraduate and Continuing Dental Education
ABSTRACT Purpose This study aimed to assess the educational impact and perceived relevance of a pedagogical escape game designed to reinforce key concepts related to dental biomaterials. Methods In 2023, a modular escape game comprising four mandatory stations and one bonus station was developed and integrated into two pedagogical settings: a ...
Sara Bergman +24 more
wiley +1 more source
Introduction: Targeting in an Asymmetrical World [PDF]
This is the introduction to a collection of articles to be published in the Valparaiso University Law Review. The articles address the challenges presented by non-traditional warfare and non-traditional combatants in the contexts of the War on Terror and
Telman, D. A. Jeremy
core +5 more sources
Digging Into Israel: The Sophisticated Tunneling Network of Hamas
By the end of Operation Protective Edge in August 2014, the Israel Defense Force (IDF) claimed to have discovered and destroyed more than 30 tunnels spanning from beneath Gaza into Israeli territory.
Nicole J. Watkins, Alena M. James
doaj +1 more source
SITREP: The NPS Maritime Defense and Security Research Program Newsletter ; v. 54 (March 2011) [PDF]
This February 2011 issue of the Naval Postgraduate School (NPS) Maritime Defense and Security Research Program Newsletter highlights the following: "The Center for Asymmetric Warfare Sensor Island." It also provides links to future events, reports ...
core
‘New’ and ‘old’ wars – the changing dimensions of warfare [PDF]
The article aims to present the issue of ‘old’ versus ‘new’ wars in relation to their specific features. It focuses on the characteristics of both phenomena, as well as providing an analysis of the causes and sources of armed conflicts and their changing
Antczak, Anna
core +3 more sources
The Rise of Human–Computer Integration in Marketing: A Theory Synthesis
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco +5 more
wiley +1 more source
ABSTRACT This article analyzes the Taliban's post‐2021 governance model through the Islamic Public Administration (IPA) framework, focusing on justice, equality, and women's inclusion. It asks: (1) How does the Taliban's governance align with core IPA principles?
Parwiz Mosamim +1 more
wiley +1 more source
OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS [PDF]
Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to ...
Giuseppe CAFORIO
doaj
The threat of IS proxy warfare on Indonesian Millennial Muslims
So far, terrorism tends to be considered using asymmetric warfare methods rather than proxy warfare methods. Even though some terror attacks around the world carried out by people inspired by terrorism indicate that terrorist groups such as IS are ...
M Affan
doaj +1 more source

