Results 101 to 110 of about 34,930 (170)

Fight Like a Girl: Fitness Testing as Gendered Organizational Logic in the U.S. Army

open access: yesGender, Work &Organization, Volume 33, Issue 2, Page 399-411, March 2026.
ABSTRACT Organizational logics related to excellence and equity are changing rapidly in contemporary workplaces, yet limited research examines the impacts of specific policy initiatives, including why some fail—or even backfire. This study examines one such recent policy case: a temporary period of gender‐neutral fitness testing in the United States ...
Carrie Carter
wiley   +1 more source

Theories of Revolution: Contemporary Approaches, Debates, and Limitations

open access: yesSociology Compass, Volume 20, Issue 3, March 2026.
ABSTRACT This article provides an overview of recent developments in the study of revolutions. It briefly reviews the historical development of approaches to revolution, the pre‐scientific approach and the first three generations of theories of revolution.
Jiří Juhász
wiley   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

State opinio juris and international humanitarian law pluralism [PDF]

open access: yes, 2015
International humanitarian law has developed through a pluralistic process. Its history reveals a pattern of rough proportionality between State opinio juris and non-State expressions of law.
Schmitt, Michael N., Watts, Sean
core   +1 more source

Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]

open access: yes, 2019
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H.   +2 more
core   +1 more source

Perspectives for Cyber Strategists on Law for Cyberwar [PDF]

open access: yes, 2011
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core   +1 more source

Laboratory multistatic 3D SAR with polarimetry and sparse aperture sampling

open access: yesIET Radar, Sonar & Navigation
With the advent of constellations of SAR satellites, and the possibility of swarms of SAR UAV's, there is increased interest in multistatic SAR image formation.
Richard Welsh, Daniel Andre, Mark Finnis
doaj   +1 more source

Polarimetry for Sparse Multistatic 3D SAR

open access: yesIET Radar, Sonar & Navigation
There is significant interest in multistatic SAR image formation, due to the increased development of satellite constellations and UAV swarms for remote sensing applications. The exploitation of the finer resolution and wider coverage of these geometries
Richard Welsh, Daniel Andre, Mark Finnis
doaj   +1 more source

Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]

open access: yes
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core  

Combined intensity and coherent change detection with four classes for laboratory multistatic polarimetric synthetic aperture radar

open access: yesIET Radar, Sonar & Navigation
Satellites and drone swarms can be used to collect multistatic Synthetic Aperture Radar (SAR) images. Synthetic Aperture Radar images can be used for Intelligence Surveillance and Reconnaissance.
Alexander Hagelberg   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy