Results 61 to 70 of about 291,363 (254)
Sharing the Same Playground? An Analysis of the Private Sector's Role in Tech Diplomacy
ABSTRACT This article takes the emergence of tech diplomacy as the motivation for an investigation into shifting relationships between traditional diplomatic actors and non‐state actors. The observation that ‘new diplomatic actors’ and new diplomatic venues have led to a ‘new kind of diplomacy’ dates back to at least the 1990s.
Katharina E. Höne
wiley +1 more source
The Paradox of Cyber Warfare and Clausewitz’s Conception of War
The technological advancements of the 21st century have broadened the traditional concepts of warfare and security. This broadened notion of warfare and security contains an important element of cyberspace.
Nageen Ashraf
doaj +1 more source
Cyber warfare has emerged as a critical aspect of modern conflict, as state and non-state actors increasingly leverage cyber capabilities to achieve strategic objectives.
M. Bouke, Azizol Abdullah
semanticscholar +1 more source
The ethics of responding to democratic backsliding abroad
Abstract The past decade has seen a marked shift as many previously liberal democratic states have backslidden, taking authoritarian turns. How should liberal actors respond to democratic backsliding by others? Although it might seem that it is vital for liberal actors to react robustly to avoid complicity or to maintain their liberal integrity, this ...
James Pattison
wiley +1 more source
The Legal Status of ‘Civilian Hackers’ under International Humanitarian Law
In response to the rising trend of civilian hackers participating in cyber conflicts, the International Committee of the Red Cross has recently issued guidelines regulating their conduct.
Michał Byczyński
doaj +1 more source
Approaches to cyber weapons classification problem
Article focuses on the problem of classification of modern and prospective cyber weapons. Suggested complex of characteristics, based on analytical approach allows for type determination for existing and future cyber weapons.
V. V. Kabernik
doaj +1 more source
Bistatic 3D SAR for wall parameter extraction in cluttered environments
Through‐wall radar is an emergent technology rooted in urban surveillance, a key component being synthetic aperture radar (SAR). Accurate through‐wall SAR relies on knowledge of the refractive index and thickness of any obscuring walls.
James Elgy, Daniel Andre, Mark Finnis
doaj +1 more source
Keamanan Nasional dalam Menghadapi Perubahan Cyber Warfare
Artikel ini bertujuan untuk memperoleh gambaran tentang cyber warfare dan tantangannya kedepan, strategi cyber security di Indonesia serta penguatan cyber security di Indonesia dalam rangka mewujudkan keamanan nasional.
Elfirda Putri +2 more
doaj +1 more source
Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core +1 more source
Bibliometric Analysis of Cyber Warfare Research in Africa: Landscape and Trends
As the digital landscape continues to evolve, cyber warfare has emerged as a prominent domain of warfare, with superpower nations actively demonstrating their capabilities in the cyberspace. This study posits that African countries exhibit a relative lag
J. Mtsweni, M. Thaba
semanticscholar +1 more source

