Results 71 to 80 of about 291,363 (254)
Abstract How can defense alliances reap the efficiency gains of working together when coordination and opportunism costs are high? Although specializing as part of a collective comes with economic and functional benefits, states must bargain over the distribution of those gains and ensure the costs of collective action are minimized.
J. Andrés Gannon
wiley +1 more source
WAR AND DEFENSE IN VIRTUAL SPACE [PDF]
In the information society, information - as a weapon, target and strategic raw material is at the root of all decisions. Information warfare has become an area of exceptional research and development, for which increased attention is paid, but also ...
Gheorghe BOARU
doaj
Civilian Direct Participation in Cyber Hostilities
This article studies the application of a well-known notion of international humanitarian law, civilian direct participation in hostilities, to cyber warfare.According to the principle of distinction, civilians and combatants must be distinguished in ...
François Delerue
doaj +1 more source
Teaching Next-Generation Cyber Warfare
Cyberspace plays a unique and crucial role in an era of a new geopolitical competition between the major powers. Cyber warfare has the flexibility of being launched either below or above the threshold of armed conflict in supporting the achievement of ...
Jim Chen
semanticscholar +1 more source
AIM This article aims to outline the key concepts in hybrid warfare and cyber-attack to better inform nurses managers in their strategic contribution to the defence of critical digital infrastructure.
J. S. Wells
semanticscholar +1 more source
Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello +5 more
wiley +1 more source
The growing complexity and volume of modern software have led to an increase in source code vulnerabilities, posing significant security risks. In response, deep learning-based automated source code vulnerability detection methods, particularly those ...
Sungmin Han +5 more
doaj +1 more source
This article looks to tie together the polar opposite of hybrid warfare and nuclear deterrence. The reason for this is that hybrid warfare and its effects on nuclear deterrence need to be explored as there appear to be substantial increases in hybrid ...
Peter Rautenbach
doaj +1 more source
The Cyber Defense Center, abbreviated as Pushansiber, is an institution responsible for carrying out the duties and functions of the Defense Strategic Installation Agency.
Ihsania Karin Azzani +2 more
semanticscholar +1 more source
Konsep Cyber Attack, Cyber Crime, Dan Cyber Warfare Dalam Aspek Hukum Internasional
The movement of human activities initially carried out conventionally turned into digital. This phenomenon also applies to the flow of information traffic. Information that was previously disseminated conventionally has become digitalized.
Miko Aditiya Suharto +1 more
semanticscholar +1 more source

