Results 61 to 70 of about 730,636 (308)

RUSSIAN OFFENSIVE STRATEGY IN THE CONDITIONS OF THE MODERN INFORMATION WARFARE

open access: yesRUDN Journal of Public Administration, 2016
Despite rather volume scientific knowledge of information warfares and methods of their maintaining, the general understanding of information warfare is still not present. And this circumstance does very difficult counteraction to this threat.
Elena S Alexeyeva
doaj   +1 more source

Impact of a Modular Escape Game on Undergraduate and Continuing Dental Education

open access: yesJournal of Dental Education, EarlyView.
ABSTRACT Purpose This study aimed to assess the educational impact and perceived relevance of a pedagogical escape game designed to reinforce key concepts related to dental biomaterials. Methods In 2023, a modular escape game comprising four mandatory stations and one bonus station was developed and integrated into two pedagogical settings: a ...
Sara Bergman   +24 more
wiley   +1 more source

Introduction: Targeting in an Asymmetrical World [PDF]

open access: yes, 2012
This is the introduction to a collection of articles to be published in the Valparaiso University Law Review. The articles address the challenges presented by non-traditional warfare and non-traditional combatants in the contexts of the War on Terror and
Telman, D. A. Jeremy
core   +5 more sources

Digging Into Israel: The Sophisticated Tunneling Network of Hamas

open access: yesJournal of Strategic Security, 2016
By the end of Operation Protective Edge in August 2014, the Israel Defense Force (IDF) claimed to have discovered and destroyed more than 30 tunnels spanning from beneath Gaza into Israeli territory.
Nicole J. Watkins, Alena M. James
doaj   +1 more source

SITREP: The NPS Maritime Defense and Security Research Program Newsletter ; v. 54 (March 2011) [PDF]

open access: yes, 2011
This February 2011 issue of the Naval Postgraduate School (NPS) Maritime Defense and Security Research Program Newsletter highlights the following: "The Center for Asymmetric Warfare Sensor Island." It also provides links to future events, reports ...

core  

‘New’ and ‘old’ wars – the changing dimensions of warfare [PDF]

open access: yes, 2018
The article aims to present the issue of ‘old’ versus ‘new’ wars in relation to their specific features. It focuses on the characteristics of both phenomena, as well as providing an analysis of the causes and sources of armed conflicts and their changing
Antczak, Anna
core   +3 more sources

The Rise of Human–Computer Integration in Marketing: A Theory Synthesis

open access: yesPsychology &Marketing, EarlyView.
ABSTRACT Human–computer integration (HCInt) technologies, which merge human bodily, cognitive, and sensory functions with computational processes, are reshaping the foundations of consumer experience. Unlike traditional human–computer interaction, HCInt entails adaptive and reciprocal coupling through AI‐driven augmentation, wearables, muscle–computer ...
Carlos Velasco   +5 more
wiley   +1 more source

Islamic Public Administration in Practice: The Taliban's “Gender Apartheid” Governance in Afghanistan

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT This article analyzes the Taliban's post‐2021 governance model through the Islamic Public Administration (IPA) framework, focusing on justice, equality, and women's inclusion. It asks: (1) How does the Taliban's governance align with core IPA principles?
Parwiz Mosamim   +1 more
wiley   +1 more source

OFFICER AND COMMANDER IN ASYMMETRIC WARFARE OPERATIONS [PDF]

open access: yesJournal of Defense Resources Management, 2013
Starting from the data of a field research conducted among soldiers with asymmetric warfare experiences from nine different countries, the author seeks to identify and shed light on the various problems that officers with command responsibilities had to ...
Giuseppe CAFORIO
doaj  

The threat of IS proxy warfare on Indonesian Millennial Muslims

open access: yesIndonesian Journal of Islam and Muslim Societies, 2018
So far, terrorism tends to be considered using asymmetric warfare methods rather than proxy warfare methods. Even though some terror attacks around the world carried out by people inspired by terrorism indicate that terrorist groups such as IS are ...
M Affan
doaj   +1 more source

Home - About - Disclaimer - Privacy