Results 31 to 40 of about 692,540 (305)

Generating French virtual commuting network at municipality level [PDF]

open access: yesJournal of Transport and Land Use 7, 43-55 (2014), 2011
We aim to generate virtual commuting networks in the French rural regions in order to study the dynamics of their municipalities. Since we have to model small commuting flows between municipalities with a few hundreds or thousands inhabitants, we opt for a stochastic model presented by Gargiulo et al. 2012.
arxiv   +1 more source

Level of analysis problem in the post-cold war deterrence: The need for regional perspectives [PDF]

open access: yesJournal of Regional Security, 2015
The end of the Cold War has had profound effect on deterrence theory and practice. Contrary to the perceived belief that deterrence was a dead concept after the demise of the Cold War rivalries, it lives, even grabs more attentions with recent ...
Mehmetcik Hakan
doaj  

Counterfactual thinking & nuclear risk in the digital age: The role of uncertainty, complexity, chance, and human psychology

open access: yesJournal for Peace and Nuclear Disarmament, 2022
Will emerging technology increase the possibility of nuclear war? Given the multitude of ways emerging technology intersects with nuclear weapons, critical thinking about an imagined future that goes beyond net assessment, myopic mirror-imaging, and ...
James Johnson
doaj   +1 more source

Sociological Investigation of Academic Cheating among Students [PDF]

open access: yesپژوهش‌های راهبردی مسائل اجتماعی ایران, 2023
Introduction One of the pressing issues faced by universities today is "academic cheating," which has been causing significant and irreparable harm to the academic community due to its pervasive nature.
Akbar Aliverdinia   +2 more
doaj   +1 more source

Novel ultrasonic bat deterrents based on aerodynamic whistles [PDF]

open access: yesarXiv, 2023
Novel ultrasonic bat deterrents based on aerodynamic whistles are investigated experimentally and numerically. The baseline deterrent, a single-whistle design inspired by Beeken [1], is examined first. It consists of two resonating cavities/chambers. The whistle is ``powered'' by a regulated high-pressure air supply and the performance of the whistle ...
arxiv  

STRATEGIC TRANSFORMATIONS: INDIA'S PURSUIT OF COUNTERFORCE TARGETING AND REGIONAL STABILITY

open access: yesMargalla Papers, 2023
In the intricate web of South Asia's security dynamics, India and Pakistan's relationship holds the key to equilibrium. Geographical proximity demands swift responses, prompting India's strategic shift towards Counterforce targeting.
Mubeen Ashraf , Syed Saif ul Haq
doaj  

Why Mexicans (Dis) Obey the Law : Social Norms, Legal Punishment and Pluralistic Ignorance

open access: yesPublic Governance, Administration and Finances Law Review, 2023
This paper presents the results of an experimental research project on the causes of Mexicans’ law-abiding and non-abiding behaviour. Firstly, it explains the theories tested, namely, deterrence and normative theory of law-abidance, and defines the ...
Rebeca Pérez León
doaj   +1 more source

A theory of deterrence [PDF]

open access: yes, 1991
The purpose of this monograph is to start a theory of deterrence which has the capability of quantitatively answering the question of what is required to deter a nation or alliance from certain acts. Despite the existence of voluminous writing on deterrence, from the beginning of the nuclear age and even before, none of it attempts a theoretical ...
openaire   +3 more sources

Variation and development of the turtle chondrocranium, with a description of the common musk turtle (Sternotherus odoratus, Kinosternidae, Cryptodira, Testudines)

open access: yesThe Anatomical Record, EarlyView., 2023
Abstract Based on histological cross‐sections, the chondrocranium of the common musk turtle (Sternotherus odoratus) was reconstructed, described, and compared with other turtles. It differs from that of other turtle chondrocrania by possessing elongated, slightly dorsally orientated nasal capsules with three dorsolateral foramina, which might be ...
Luca Leicht   +2 more
wiley   +1 more source

The impact of an employee's psychological contract breach on compliance with information security policies: intrinsic and extrinsic motivation [PDF]

open access: yesCognition, Technology & Work, pp.1-17 (2023), 2023
Despite the rapid rise in social engineering attacks, not all employees are as compliant with information security policies (ISPs) to the extent that organisations expect them to be. ISP non-compliance is caused by a variety of psychological motivation.
arxiv  

Home - About - Disclaimer - Privacy