Results 61 to 70 of about 688,366 (162)

Targeting by Transnational Terrorist Groups [PDF]

open access: yesarXiv, 2010
Many successful terrorist groups operate across international borders where different countries host different stages of terrorist operations. Often the recruits for the group come from one country or countries, while the targets of the operations are in another.
arxiv  

Improving Road Safety through Deterrence-Based Initiatives : A review of research

open access: yesSultan Qaboos University Medical Journal, 2011
The efficacy of road safety countermeasures to deter motorists from engaging in illegal behaviours is extremely important when considering the personal and economic impact of road accidents on the community.
Jeremy D Davey, James E Freeman
doaj  

On the Economics of Ransomware [PDF]

open access: yesarXiv, 2017
While recognized as a theoretical and practical concept for over 20 years, only now ransomware has taken centerstage as one of the most prevalent cybercrimes. Various reports demonstrate the enormous burden placed on companies, which have to grapple with the ongoing attack waves.
arxiv  

Computation of a 30750-Bit Binary Field Discrete Logarithm [PDF]

open access: yesarXiv, 2020
This paper reports on the computation of a discrete logarithm in the finite field $\mathbb F_{2^{30750}}$, breaking by a large margin the previous record, which was set in January 2014 by a computation in $\mathbb F_{2^{9234}}$. The present computation made essential use of the elimination step of the quasi-polynomial algorithm due to Granger ...
arxiv  

SUSPENSION OF START III IN CONTEXT OF THE DETERRENCE THEORY [PDF]

open access: yesНаучно-аналитический вестник Института Европы РАН
The article examines the prospects for changing the security balance after Russia’s sus- pension of the START Treaty. The author analyzes the possibilities of creating asymmetric advan- tages for Russia from the positions of offensive and defensive ...
Dmitry B. Grafov
doaj   +1 more source

Using Private and Public Assessments in Security Information Sharing Agreements [PDF]

open access: yesarXiv, 2016
Information sharing among organizations has been gaining attention as a method for improving cybersecurity. However, the associated disclosure costs act as deterrents for firms' voluntary cooperation. In this work, we take a game-theoretic approach to understanding firms' incentives in these agreements.
arxiv  

Determinants for Drunk Driving Recidivism—An Application of the Integrated Prototype Willingness Model

open access: yesBehavioral Sciences
The paper applies the prototype willingness model (PWM) and incorporates components of the theory of planned behavior (TPB), along with deterrence factors, to understand the behavioral intentions, willingness, and recidivism behaviors of individuals ...
Rong-Chang Jou, Han-Wen Hsu
doaj   +1 more source

An Analysis of Indo-Pakistan Nuclear Doctrines

open access: yesالإيضاح, 2016
This study explores the dynamics of nuclear politics in Indo-Pakistan relations. The events after the nuclearization of South Asia aroused an extensive discussion about the basic reasons of countries becoming nuclear.
Ms Shabana Noreen   +1 more
doaj  

Home - About - Disclaimer - Privacy