Results 11 to 20 of about 117,404 (305)

Socio-psychological techniques of information warfare

open access: yesБезопасность информационных технологий, 2022
Since the end of the XX century, information technologies have begun to actively penetrate into all spheres of society, which led it to a new stage, so-called "informational".
Anatoly A. Malyuk
doaj   +1 more source

Eurasian Security from the Perspective of the Concept of Information-Psychological and Cognitive Confrontation

open access: yesЕвразийская интеграция: экономика, право, политика, 2023
The article is devoted to the analysis of the cognitive aspect of information and psychological confrontation in the Eurasian space, as well as to the study of the evolution of ideas that are currently commonly referred to by the term “information and ...
I. F. Kefeli, R. S. Vykhodets
doaj   +1 more source

Gender, war and militarism: making and questioning the links [PDF]

open access: yes, 2008
The gender dynamics of militarism have traditionally been seen as straightforward, given the cultural mythologies of warfare and the disciplining of ‘masculinity’ that occurs in the training and use of men's capacity for violence in the armed services ...
Bourke J.   +23 more
core   +1 more source

Statistical Models for Predicting Threat Detection From Human Behavior

open access: yesFrontiers in Psychology, 2018
Users must regularly distinguish between secure and insecure cyber platforms in order to preserve their privacy and safety. Mouse tracking is an accessible, high-resolution measure that can be leveraged to understand the dynamics of perception ...
Timothy Kelley   +2 more
doaj   +1 more source

The Central Intelligence Agency’s armed Remotely Piloted Vehicle-supported counter-insurgency campaign in Pakistan – a mission undermined by unintended consequences? [PDF]

open access: yes, 2014
This paper views America's 'drones-first' counter-insurgency effort in Pakistan through the lens of Merton's theory of the unintended consequences of purposive action.
Bennett, Simon
core   +2 more sources

The Subtle Knife

open access: yesThe Journal of Intelligence, Conflict and Warfare, 2019
This article looks to tie together the polar opposite of hybrid warfare and nuclear deterrence. The reason for this is that hybrid warfare and its effects on nuclear deterrence need to be explored as there appear to be substantial increases in hybrid ...
Peter Rautenbach
doaj   +1 more source

The evolution of the concept of information warfare in the modern information society of the post-truth era [PDF]

open access: yesDefence Science Review, 2022
Objectives Compare selected concepts of information warfare and show the evolution of the Western concept of WI,resulting from the development of the information society, social-media and the resources by which information warfare is conducted ...
Patrycja Bryczek-Wróbel   +1 more
doaj   +1 more source

FEAR – ELEMENTS OF SLAVIC „PSYCHOLOGICAL WARFARE”

open access: yesJournal of Ancient History and Archaeology, 2015
The author of the article, using contemporary interdisciplinary methods of study (including those from the field of social psychology), sets out to explain the mechanisms of fear employed by Slavs against the Roman army.
Łukasz Różycki
doaj   +1 more source

Propaganda, disinformation, informational, psychological and mental warfare as instruments of power in globalized world [PDF]

open access: yesKošická bezpečnostná revue, 2023
The report elaborates on the issue of disinformation as a tool for manipulation, influence and governance, the issue of information warfare. In connection with this, the basics of the concept are defined related to the terms disinformation, “disinformer”,
Viktor PORADA, Anton LISNÍK
doaj  

"Narco" Emotions: Affect and Desensitization in Social Media during the Mexican Drug War [PDF]

open access: yes, 2015
Social media platforms have emerged as prominent information sharing ecosystems in the context of a variety of recent crises, ranging from mass emergencies, to wars and political conflicts.
De Choudhury, Munmun   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy