Results 71 to 80 of about 34,930 (170)
The DoD Law of War Manual and its Critics: Some Observations [PDF]
The U.S. Department of Defense’s (DoD) new Law of War Manual has generated serious debate about its treatment of a variety of issues including human shields, the status of journalists, cyber operations, the precautions to be taken prior to attacks and ...
Dahlgren, Christoffer, Grahn, Sebastian
core +1 more source
Secure web application development and global regulation [PDF]
The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations.
Glisson, L.M. +2 more
core +1 more source
A Comprehensive Revisit to the Safe‐Haven Assets Literature
ABSTRACT A large number of studies examine the safe‐haven characteristics of different asset classes. However, this paper addresses a lack of systematic literature reviews and bibliometric analyses with a sound theoretical viewpoint the safe‐haven assets literature by focusing on 1305 studies published in top‐tier journals during 2013–2026 from the ...
Javed Bin Kamal +3 more
wiley +1 more source
Modelling real‐world effects in near‐field SAR collections for compressive sensing
The ability to control sidelobes in a SAR image is critical to forming images that are useful for interpretation and exploitation. QinetiQ has developed the RIBI sensing system, which utilises a distributed coherent array of sensors to produce ...
George A. J. Price +4 more
doaj +1 more source
A Threat to Cyber Resilience : A Malware Rebirthing Botnet [PDF]
This paper presents a threat to cyber resilience in the form of a conceptual model of a malware rebirthing botnet which can be used in a variety of scenarios. It can be used to collect existing malware and rebirth it with new functionality and signatures
Brand, Murray +2 more
core +2 more sources
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Do deepfakes, digital replicas and human digital twins justify personality rights?
Abstract Unauthorised deepfakes are deeply problematic, from the spreading of misinformation to non‐consensual pornographic content. This paper asks whether deepfakes, digital replicas and human digital twins justify personality rights. To address this question, it examines the harms that deepfakes can cause through disinformation, demeaning content ...
Hayleigh Bosher
wiley +1 more source
Regulating critical technologies: National security and intellectual property
Abstract In recent years, claims of ‘national security’ have surged internationally to protect various security interests including public health, economic security and cybersecurity. National industrial strategies for building critical technologies challenge the scope of ‘national security’ in international intellectual property (IP) protection ...
Phoebe Li, Atilla Kasap
wiley +1 more source
A Survey of Game Theoretic Approaches to Modelling Decision-Making in Information Warfare Scenarios
Our increasing dependence on information technologies and autonomous systems has escalated international concern for information- and cyber-security in the face of politically, socially and religiously motivated cyber-attacks. Information warfare tactics
Kathryn Merrick +3 more
doaj +1 more source
"Out of the loop": autonomous weapon systems and the law of armed conflict [PDF]
The introduction of autonomous weapon systems into the “battlespace” will profoundly influence the nature of future warfare. This reality has begun to draw the attention of the international legal community, with increasing calls for an outright ban on ...
Schmitt, Michael N. +1 more
core

