Results 71 to 80 of about 34,930 (170)

The DoD Law of War Manual and its Critics: Some Observations [PDF]

open access: yes, 2014
The U.S. Department of Defense’s (DoD) new Law of War Manual has generated serious debate about its treatment of a variety of issues including human shields, the status of journalists, cyber operations, the precautions to be taken prior to attacks and ...
Dahlgren, Christoffer, Grahn, Sebastian
core   +1 more source

Secure web application development and global regulation [PDF]

open access: yes, 2007
The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations.
Glisson, L.M.   +2 more
core   +1 more source

A Comprehensive Revisit to the Safe‐Haven Assets Literature

open access: yesJournal of Economic Surveys, EarlyView.
ABSTRACT A large number of studies examine the safe‐haven characteristics of different asset classes. However, this paper addresses a lack of systematic literature reviews and bibliometric analyses with a sound theoretical viewpoint the safe‐haven assets literature by focusing on 1305 studies published in top‐tier journals during 2013–2026 from the ...
Javed Bin Kamal   +3 more
wiley   +1 more source

Modelling real‐world effects in near‐field SAR collections for compressive sensing

open access: yesIET Radar, Sonar & Navigation
The ability to control sidelobes in a SAR image is critical to forming images that are useful for interpretation and exploitation. QinetiQ has developed the RIBI sensing system, which utilises a distributed coherent array of sensors to produce ...
George A. J. Price   +4 more
doaj   +1 more source

A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]

open access: yes, 2011
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray   +2 more
core   +2 more sources

War as a Phenomenon of Inquiry in Management Studies

open access: yesJournal of Management Studies, EarlyView.
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley   +1 more source

Do deepfakes, digital replicas and human digital twins justify personality rights?

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley   +1 more source

Regulating critical technologies: National security and intellectual property

open access: yesThe Journal of World Intellectual Property, EarlyView.
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley   +1 more source

A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios

open access: yesFuture Internet, 2016
Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics
Kathryn Merrick   +3 more
doaj   +1 more source

"Out of the loop": autonomous weapon systems and the law of armed conflict [PDF]

open access: yes, 2013
The introduction of autonomous weapon systems into the “battlespace” will profoundly influence the nature of future warfare. This reality has begun to draw the attention of the international legal community, with increasing calls for an outright ban on ...
Schmitt, Michael N.   +1 more
core  

Home - About - Disclaimer - Privacy