Results 51 to 60 of about 18,788 (185)
Impact of China on commodity exporters
Abstract We compare the effect of a domestic shock in China and the US on the real economy and financial markets of various commodity‐exporting countries. To obtain a reliable indicator for China's macroeconomic conditions, we estimate a Bayesian dynamic factor model using block‐exclusion restrictions to identify a China factor and a US factor from ...
Arpita Chatterjee, Richa Saraf
wiley +1 more source
The Obama/Pentagon War Narrative, the Real War and Where Afghan Civilian Deaths Do Matter [PDF]
This article investigates two related issues: (1) the on-the-ground experience of the fierce US war. in Afghanistan, in contrast to the Pentagon story and the mainstream media; (2) The relentless efforts of Obama and the Pentagon to control the public ...
Herold, Marc W.
core +1 more source
Malaysia's strategic approach: Unpacking the “action‐reaction spiral” logic in the South China Sea
Abstract The phrase “action‐reaction” has been frequently reiterated in public speeches by Malaysian leaders, formal documents, and behind‐the‐scenes discussions. This article contends that this expression operates as a manifestation of Malaysian policymakers' comprehension of the security dilemma and their strategic assessment of their position within
Emirza Syailendra
wiley +1 more source
Wikileaks: how web technologies are changing the game for freedom of information. [PDF]
A true information and political earthquake resulted from the collision of the two great plates of internet freedom and US diplomacy. The epicenter? Wikileaks, a well known website led by Julian Assange since 2006 that encourages online whistle-blowing ...
Heusser, Felipe
core
A blockchain‐based secure framework for data management
Data management is a crucial requirement due to the autonomous and constrained nature of Unmanned Aerial Vehicles (UAVs), Internet of Things (IoTs) and the aviation domain. This research underscores the shortcomings of previously suggested and existing frameworks emphasizing the absence of a comprehensive approach that successfully incorporates ...
Ozan Zorlu, Adnan Ozsoy
wiley +1 more source
The Practice of Friendship Balancing: Russia‐Israel Relations, 2015 to 2021
Abstract Since the Gaza war erupted in October 2023, Israel's reactions have been met with criticism from a key friend: Russia. However, Moscow's public condemnation of the humanitarian crisis has not changed its material or normative policies toward Israel in other respects.
Chen Kertcher, Dima Course
wiley +1 more source
Wikileaks: A paradigm shift? [PDF]
Este artículo realiza un análisis mediológico de Wikileaks a partir de algunos conceptos clásicos de la Comunicación: transparencia, visibilidad, secreto, rumor, sospecha, líder de opinión, público y privado, sobreinformación. Del mismo modo, se describe
Magallón Rosa, Raúl
core +1 more source
Public diplomacy of authoritarianism: Strategic use of Suzanne Mubarak
Abstract A leader's wife can be a key player in consolidating his authoritarianism through her public diplomacy activities. Taking the example of Egypt's former First Lady, Suzanne Mubarak (1981–2011), this article demonstrates how her role in public diplomacy framed her as a “modern” woman with a mission of “modernizing” women or the country's whole ...
Mustafa Menshawy
wiley +1 more source
Wikileaks: transparencia total. Límites y posibilidades de una demanda utópica
El affaire Wikileaks ha puesto sobre la mesa la idea de transparencia social y política en sociedades complejas como las nuestras. No resulta fácil dilucidar los alcances de tal concepto. ¿Qué entraña exactamente esa clase de transparencia?
Luis Pablo Francescutti
doaj
Model for cryptography protection of confidential information [PDF]
УДК 004.056 Борсуковський Ю.В., Борсуковська В.Ю. Модель криптографічного захисту конфіденційної інформації В даній статті проведено детальний аналіз вимог щодо формування моделі криптографічного захисту конфіденційної інформації.
Борсуковська, Вікторія Юріївна +1 more
core

