Results 71 to 80 of about 291,363 (254)

Complementarity in alliances: How strategic compatibility and hierarchy promote efficient cooperation in international security

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley   +1 more source

WAR AND DEFENSE IN VIRTUAL SPACE [PDF]

open access: yesAnnals: Series on Military Sciences, 2018
In the information society, information - as a weapon, target and strategic raw material is at the root of all decisions. Information warfare has become an area of exceptional research and development, for which increased attention is paid, but also ...
Gheorghe BOARU
doaj  

Civilian Direct Participation in Cyber Hostilities

open access: yesIDP, 2014
This article studies the application of a well-known notion of international humanitarian law, civilian direct participation in hostilities, to cyber warfare.According to the principle of distinction, civilians and combatants must be distinguished in ...
François Delerue
doaj   +1 more source

Teaching Next-Generation Cyber Warfare

open access: yesEuropean Conference on Cyber Warfare and Security
Cyberspace plays a unique and crucial role in an era of a new geopolitical competition between the major powers. Cyber warfare has the flexibility of being launched either below or above the threshold of armed conflict in supporting the achievement of ...
Jim Chen
semanticscholar   +1 more source

Preparing for hybrid warfare and cyber-attacks on health services' digital infrastructure: what nurse managers need to know.

open access: yesJournal of Nursing Management, 2022
AIM This article aims to outline the key concepts in hybrid warfare and cyber-attack to better inform nurses managers in their strategic contribution to the defence of critical digital infrastructure.
J. S. Wells
semanticscholar   +1 more source

Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello   +5 more
wiley   +1 more source

Similarity-Based Source Code Vulnerability Detection Leveraging Transformer Architecture: Harnessing Cross- Attention for Hierarchical Analysis

open access: yesIEEE Access
The growing complexity and volume of modern software have led to an increase in source code vulnerabilities, posing significant security risks. In response, deep learning-based automated source code vulnerability detection methods, particularly those ...
Sungmin Han   +5 more
doaj   +1 more source

The Subtle Knife

open access: yesThe Journal of Intelligence, Conflict and Warfare, 2019
This article looks to tie together the polar opposite of hybrid warfare and nuclear deterrence. The reason for this is that hybrid warfare and its effects on nuclear deterrence need to be explored as there appear to be substantial increases in hybrid ...
Peter Rautenbach
doaj   +1 more source

Enhancing awareness of cyber crime: a crucial element in confronting the challenges of hybrid warfare In Indonesia

open access: yesDefence and Security Studies
The Cyber Defense Center, abbreviated as Pushansiber, is an institution responsible for carrying out the duties and functions of the Defense Strategic Installation Agency.
Ihsania Karin Azzani   +2 more
semanticscholar   +1 more source

Konsep Cyber Attack, Cyber Crime, Dan Cyber Warfare Dalam Aspek Hukum Internasional

open access: yesRisalah Hukum, 2021
The movement of human activities initially carried out conventionally turned into digital. This phenomenon also applies to the flow of information traffic. Information that was previously disseminated conventionally has become digitalized.
Miko Aditiya Suharto   +1 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy