Results 41 to 50 of about 5,305 (181)
War as a Phenomenon of Inquiry in Management Studies
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley +1 more source
Perspectives for Cyber Strategists on Law for Cyberwar [PDF]
The proliferation of martial rhetoric in connection with the release of thousands of pages of sensitive government documents by the WikiLeaks organization underlines how easily words that have legal meanings can be indiscriminately applied to cyber ...
Dunlap, Charles J., Jr.
core +1 more source
ABSTRACT The Israel‐Iran war of 2025 has changed the geopolitical face of the Middle East, not only bringing up the issue of nuclear proliferation, but also putting international diplomacy to the test. This essay assesses the performance of liberal institutionalism based on the latest conflict, paying special attention to the Joint Comprehensive Plan ...
Hafeez Ullah Khan
wiley +1 more source
A Definitional Framework for Cyber Warfare. The Ukrainian Aspect
The article outlines a position, expressing the view that cyberspace opens up a new dimension of politics, in which cyber campaigns have the potential to become an important means or alternative to warfare in order to achieve strategic advantage.
Marek Górka
doaj +1 more source
Proportionality and its Applicability in the Realm of Cyber Attacks [PDF]
With an ever-increasing reliance on State cyber-attacks, the need for an international treaty governing the actions of Nation-States in the realm of cyberwarfare has never been greater.
Fenton, Hensey, III
core +1 more source
In July 2021, the IT management software company Kaseya was the victim of a ransomware cyberattack. The perpetrator of this attack was ransomware evil (REvil), an allegedly Russian‐based ransomware threat group. This paper addresses the general events of the incident and the actions executed by the constituents involved.
Suman Bhunia +5 more
wiley +1 more source
The Law and the Human Target in Information Warfare: Cautions and Opportunities [PDF]
This bachelor thesis will explore how two traffic shaping mechanisms can help preserve battery power while retaining a certain Quality of Service (QoS) in an Android based application developed for crisis management. The implemented user-space mechanisms
Hall, Henning, Luckey, Christian
core +2 more sources
Technological Innovations and International Humanitarian Law: Challenges and Tensions [PDF]
In recent years, armed conflicts have changed in nature (civil war, ‘terrorism’) and the means used are increasingly technological (robotisation, cyberwar). Faced with these developments, some would claim International Humanitarian Law (IHL) is outdated.
Eric Pomès
doaj +1 more source
Cybervandalism or Digital Act of War? America\u27s Muddled Approach to Cyber Incidents Will Not Deter More Crises [PDF]
If experts say a malicious [cyber] code \u27 has similar effects to a physical bomb, \u27 and that code actually causes a stunning breach of global internet stability, is it really accurate to call that event merely an instance of a cyber attack ?
Dunlap, Charles J., Jr.
core +1 more source
Optimal Hardening Model for Reliable and Resilient Cyber–Physical Power Systems
This study proposes a robust model for interdependent cyber and physical networks in power systems that optimises the investment cost to improve the reliability and resilience of the system, considering the cost of energy not supplied. ABSTRACT Power networks are increasingly becoming complex and multidimensional, with a high level of interdependency ...
Mohammad AlMuhaini
wiley +1 more source

