Results 31 to 40 of about 62,609 (209)
Writing About Espionage Secrets [PDF]
This article describes the author’s experiences researching three books on espionage history in three different countries and on three different topics.
Macrakis, Kristie
core +1 more source
Unnatural Wills: Inheritance Disputes and Inequality
ABSTRACT Within the conceptual frame of relational economic sociology, inheritance disputes are a canonical form of relational mismatch. But the social patterning of relational mismatches, and their various ties to inequality, remain murky. In this paper, I examine all known inheritance disputes in Dallas from 1895–1945 within their social context to ...
Shay O'Brien
wiley +1 more source
El espionaje en España en la guerra civil y la segunda guerra mundial: una visión general [PDF]
The espionage activity by both sides during the Spanish Civil War is the missing dimension of the conflict, given its crucial importance. Both Nationalists and Republicans used intelligence to frustrate arm dealings of their enemies in foreign countries,
Manuel Ros Agudo
doaj
Brook no compromise: How to negotiate a united front
Abstract Negotiating factional conflict is crucial to successful coordination: Political parties, rebel alliances, and authoritarian elites must all overcome internal disagreements to survive and achieve collective aims. Actors in these situations sometimes employ hardball tactics to block outcomes they dislike, but at the risk of causing coordination ...
Elaine Yao
wiley +1 more source
El espionaje militar republicano durante la Guerra Civil Española [PDF]
At the outbreak of the Spanish Civil War, the Popular Army of the Republic had to set up useful intelligence services to know the capabilities and intentions of its enemy.
Hernán Rodríguez Velasco
doaj
France, which had had good relations with the Ottoman Empire, occupied Egypt in 1798. Meanwhile, Napoleon’s contact with Paris was cut off when the French Navy was burned by the British Navy in Abukir.
Seydi Vakkas Toprak
doaj +1 more source
How does intellectual capital align with cyber security? [PDF]
Purpose – To position the preservation and protection of intellectual capital as a cyber security concern. We outline the security requirements of intellectual capital to help Boards of Directors and executive management teams to understand their ...
Renaud, Karen +2 more
core +3 more sources
Out of the dark – Psychological perspectives on people's fascination with true crime
Abstract The success of the true crime media genre reflects humanity's avid curiosity about violence, deviance, and murder, yet psychological research on this phenomenon is lacking. In this article, we highlight why true crime consumption may be relevant to various research fields that go beyond simple media preferences.
Corinna Perchtold‐Stefan +5 more
wiley +1 more source
Defending Korematsu?: Reflections on Civil Liberties in Wartime [PDF]
According to Justice William J. Brennan, After each perceived security crisis ended, the United States has remorsefully realized that the abrogation of civil liberties was unnecessary.
Tushnet, Mark V.
core +2 more sources
Success and failure in England's patent system: New evidence from patent applications, 1783–1834
Abstract Our understanding of the relationship between the English patent system and technical change during the industrial revolution is based entirely on the study of successful patents. We address this feature by providing the first study of unsuccessful patent applications in England during the first industrial revolution.
Stephen D. Billington, Joe Lane
wiley +1 more source

