Results 91 to 100 of about 1,657,998 (333)

The Need for International Laws of War to Include Cyber Attacks Involving State and Non-State Actors [PDF]

open access: yes, 2013
This article argues that existing international laws of war are inadequate and need to be adjusted and clearly defined to include cyber attacks involving state and non-state actors. Part II of this article describes the different forms and increasing use
DeLuca, Christopher D.
core   +1 more source

Implementing Indigenous Data Sovereignty in Australia: A Five‐Phase Framework for Indigenous Data Governance

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This article presents the development of a five‐phase Indigenous Data Governance (IDGov) Framework in Australia, focusing on partnerships between the Aboriginal Community Controlled Health Organisation (ACCHO) sector and non‐Indigenous health entities.
Jacob Prehn   +4 more
wiley   +1 more source

You want peace ? Get ready for war...in cyberspace

open access: yesJournal of Modern Science
Objectives A phenomenon is emerging in relations between states that is the opposite of a declaration of war, i.e. the phenomenon of 'unspeakable war', which, according to US experts, may even lead to a so-called 'electronic Pearl Harbour'.
Zbigniew Witkowski
doaj   +1 more source

Peacetime cyber responses and wartime cyber operations under international law: an analytical vade mecum [PDF]

open access: yes, 2017
Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations examines the application of extant international law principles and rules to cyber activities occurring during both peacetime and armed conflict.
Schmitt, Michael
core   +1 more source

EU cybersecurity capacity building in the Mediterranean and the Middle East [PDF]

open access: yes, 2020
Cyberthreats on the Rise The 2008 Report on the implementation of the European Security Strategy included “cybersecurity” for the first time among the priorities of the EU’s external action, stating that: “modern economies are heavily reliant on critical
Lannon, Erwoan
core  

Estimation and rapid identification of later stages during embryonic development of the oviparous lizard Sceloporus aeneus (Squamata: Phrynosomatidae)

open access: yesThe Anatomical Record, EarlyView.
Abstract Stages of embryonic development for reptiles have been presented in tables that may include all or part of embryonic development. When oviposition occurs in some lizards, embryos are already in the later stages of development; likewise, the size of the eggs increases as incubation time progresses.
Nivia Rocio Antonio‐Rubio   +3 more
wiley   +1 more source

Scenarios for the Hybrid war of Israel against the Islamic Republic of Iran in the horizon of 2029 [PDF]

open access: yesعلوم و فنون نظامی
Objective: Since the beginning of the Islamic Revolution, Israel has sought to control and limit Iran's influence and, if possible, to change Iran, and after trying different ways from hard-war to soft influence, it has turned to a new way of war, i.e ...
Khalil Koulivand   +2 more
doaj   +1 more source

Broadening the semiaquatic scene: Quantification of long bone microanatomy across pinnipeds

open access: yesThe Anatomical Record, EarlyView.
Abstract Investigations of bone microanatomy are commonly used to explore lifestyle strategies in vertebrates. While distinct microanatomical limb bone features have been established for exclusively aquatic and terrestrial lifestyles, identifying clear patterns for the semiaquatic lifestyle remains more challenging.
Apolline Alfsen   +10 more
wiley   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Longitudinal links of negative student–teacher relationships and positive class climate with traditional bullying and cyberbullying perpetration

open access: yesBritish Educational Research Journal, EarlyView.
Abstract The current study aimed to investigate whether negative student–teacher relationships and within‐class perceptions of the class climate at the individual level, and positive class climates at the classroom level in fifth grade, were associated with traditional bullying and cyberbullying perpetration 1 year later, in sixth grade, in a sample of
Robert Thornberg   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy