Results 41 to 50 of about 5,305 (181)

War as a Phenomenon of Inquiry in Management Studies

open access: yesJournal of Management Studies, EarlyView.
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley   +1 more source

Perspectives for Cyber Strategists on Law for Cyberwar [PDF]

open access: yes, 2011
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core   +1 more source

Liberal Institutionalism in Crisis: Reassessing the Iran‐West Nuclear Standoff Amid the 2025 Israel–Iran War

open access: yesDigest of Middle East Studies, Volume 35, Issue 1, Winter 2026.
ABSTRACT The Israel‐Iran war of 2025 has changed the geopolitical face of the Middle East, not only bringing up the issue of nuclear proliferation, but also putting international diplomacy to the test. This essay assesses the performance of liberal institutionalism based on the latest conflict, paying special attention to the Joint Comprehensive Plan ...
Hafeez Ullah Khan
wiley   +1 more source

A Definitional Framework for Cyber Warfare. The Ukrainian Aspect

open access: yesPolish Political Science Yearbook
The article outlines a position, expressing the view that cyberspace opens up a new dimension of politics, in which cyber campaigns have the potential to become an important means or alternative to warfare in order to achieve strategic advantage.
Marek Górka
doaj   +1 more source

Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]

open access: yes, 2019
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core   +1 more source

Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia   +5 more
wiley   +1 more source

The Law and the Human Target in Information Warfare: Cautions and Opportunities [PDF]

open access: yes, 2000
This bachelor thesis will explore how two traffic shaping mechanisms can help preserve battery power while retaining a certain Quality of Service (QoS) in an Android based application developed for crisis management. The implemented user-space mechanisms
Hall, Henning, Luckey, Christian
core   +2 more sources

Technological Innovations and International Humanitarian Law: Challenges and Tensions [PDF]

open access: yesPolish Political Science Yearbook, 2017
In recent years, armed conflicts have changed in nature (civil war, ‘terrorism’) and the means used are increasingly technological (robotisation, cyberwar). Faced with these developments, some would claim International Humanitarian Law (IHL) is outdated.
Eric Pomès
doaj   +1 more source

Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]

open access: yes, 2017
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core   +1 more source

Optimal Hardening Model for Reliable and Resilient Cyber–Physical Power Systems

open access: yesIET Smart Grid, Volume 8, Issue 1, January/December 2025.
This study proposes a robust model for interdependent cyber and physical networks in power systems that optimises the investment cost to improve the reliability and resilience of the system, considering the cost of energy not supplied. ABSTRACT Power networks are increasingly becoming complex and multidimensional, with a high level of interdependency ...
Mohammad AlMuhaini
wiley   +1 more source

Home - About - Disclaimer - Privacy