Results 51 to 60 of about 18,788 (185)

Impact of China on commodity exporters

open access: yesReview of International Economics, Volume 32, Issue 3, Page 1462-1491, August 2024.
Abstract We compare the effect of a domestic shock in China and the US on the real economy and financial markets of various commodity‐exporting countries. To obtain a reliable indicator for China's macroeconomic conditions, we estimate a Bayesian dynamic factor model using block‐exclusion restrictions to identify a China factor and a US factor from ...
Arpita Chatterjee, Richa Saraf
wiley   +1 more source

The Obama/Pentagon War Narrative, the Real War and Where Afghan Civilian Deaths Do Matter [PDF]

open access: yes, 2012
This article investigates two related issues: (1) the on-the-ground experience of the fierce US war. in Afghanistan, in contrast to the Pentagon story and the mainstream media; (2) The relentless efforts of Obama and the Pentagon to control the public ...
Herold, Marc W.
core   +1 more source

Malaysia's strategic approach: Unpacking the “action‐reaction spiral” logic in the South China Sea

open access: yesAsian Politics &Policy, Volume 16, Issue 3, Page 357-376, July 2024.
Abstract The phrase “action‐reaction” has been frequently reiterated in public speeches by Malaysian leaders, formal documents, and behind‐the‐scenes discussions. This article contends that this expression operates as a manifestation of Malaysian policymakers' comprehension of the security dilemma and their strategic assessment of their position within
Emirza Syailendra
wiley   +1 more source

Wikileaks: how web technologies are changing the game for freedom of information. [PDF]

open access: yes, 2010
A true information and political earthquake resulted from the collision of the two great plates of internet freedom and US diplomacy. The epicenter? Wikileaks, a well known website led by Julian Assange since 2006 that encourages online whistle-blowing ...
Heusser, Felipe
core  

A blockchain‐based secure framework for data management

open access: yesIET Communications, Volume 18, Issue 10, Page 628-653, June 2024.
Data management is a crucial requirement due to the autonomous and constrained nature of Unmanned Aerial Vehicles (UAVs), Internet of Things (IoTs) and the aviation domain. This research underscores the shortcomings of previously suggested and existing frameworks emphasizing the absence of a comprehensive approach that successfully incorporates ...
Ozan Zorlu, Adnan Ozsoy
wiley   +1 more source

The Practice of Friendship Balancing: Russia‐Israel Relations, 2015 to 2021

open access: yesMiddle East Policy, Volume 31, Issue 2, Page 67-82, Summer 2024.
Abstract Since the Gaza war erupted in October 2023, Israel's reactions have been met with criticism from a key friend: Russia. However, Moscow's public condemnation of the humanitarian crisis has not changed its material or normative policies toward Israel in other respects.
Chen Kertcher, Dima Course
wiley   +1 more source

Wikileaks: A paradigm shift? [PDF]

open access: yes
Este artículo realiza un análisis mediológico de Wikileaks a partir de algunos conceptos clásicos de la Comunicación: transparencia, visibilidad, secreto, rumor, sospecha, líder de opinión, público y privado, sobreinformación. Del mismo modo, se describe
Magallón Rosa, Raúl
core   +1 more source

Public diplomacy of authoritarianism: Strategic use of Suzanne Mubarak

open access: yesDigest of Middle East Studies, Volume 33, Issue 2, Page 125-148, Spring 2024.
Abstract A leader's wife can be a key player in consolidating his authoritarianism through her public diplomacy activities. Taking the example of Egypt's former First Lady, Suzanne Mubarak (1981–2011), this article demonstrates how her role in public diplomacy framed her as a “modern” woman with a mission of “modernizing” women or the country's whole ...
Mustafa Menshawy
wiley   +1 more source

Wikileaks: transparencia total. Límites y posibilidades de una demanda utópica

open access: yesEstudios sobre el Mensaje Periodístico, 2012
El affaire Wikileaks ha puesto sobre la mesa la idea de transparencia social y política en sociedades complejas como las nuestras. No resulta fácil dilucidar los alcances de tal concepto. ¿Qué entraña exactamente esa clase de transparencia?
Luis Pablo Francescutti
doaj  

Model for cryptography protection of confidential information [PDF]

open access: yes, 2018
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна   +1 more
core  

Home - About - Disclaimer - Privacy