Results 101 to 110 of about 34,930 (170)
Fight Like a Girl: Fitness Testing as Gendered Organizational Logic in the U.S. Army
ABSTRACT Organizational logics related to excellence and equity are changing rapidly in contemporary workplaces, yet limited research examines the impacts of specific policy initiatives, including why some fail—or even backfire. This study examines one such recent policy case: a temporary period of gender‐neutral fitness testing in the United States ...
Carrie Carter
wiley +1 more source
Theories of Revolution: Contemporary Approaches, Debates, and Limitations
ABSTRACT This article provides an overview of recent developments in the study of revolutions. It briefly reviews the historical development of approaches to revolution, the pre‐scientific approach and the first three generations of theories of revolution.
Jiří Juhász
wiley +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
State opinio juris and international humanitarian law pluralism [PDF]
International humanitarian law has developed through a pluralistic process. Its history reveals a pattern of rough proportionality between State opinio juris and non-State expressions of law.
Schmitt, Michael N., Watts, Sean
core +1 more source
Peeling Back the Onion of Cyber Espionage after Tallinn 2.0 [PDF]
Tallinn 2.0 represents an important advancement in the understanding of international law’s application to cyber operations below the threshold of force.
McCarthy, Amy H. +2 more
core +1 more source
Perspectives for Cyber Strategists on Law for Cyberwar [PDF]
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core +1 more source
Laboratory multistatic 3D SAR with polarimetry and sparse aperture sampling
With the advent of constellations of SAR satellites, and the possibility of swarms of SAR UAV's, there is increased interest in multistatic SAR image formation.
Richard Welsh, Daniel Andre, Mark Finnis
doaj +1 more source
Polarimetry for Sparse Multistatic 3D SAR
There is significant interest in multistatic SAR image formation, due to the increased development of satellite constellations and UAV swarms for remote sensing applications. The exploitation of the finer resolution and wider coverage of these geometries
Richard Welsh, Daniel Andre, Mark Finnis
doaj +1 more source
Enter the cyber dragon: understanding Chinese intelligence agencies cyber capabilities [PDF]
This paper argues that the nature and tempo of Chinese cyber‑activities have policy implications for the Australian government. The paper provides an understanding of the key elements of the Chinese intelligence agencies that exploit the cyberdomain. It
Tobias Feakin
core
Satellites and drone swarms can be used to collect multistatic Synthetic Aperture Radar (SAR) images. Synthetic Aperture Radar images can be used for Intelligence Surveillance and Reconnaissance.
Alexander Hagelberg +2 more
doaj +1 more source

