Open Access. Powered by Scholars. Published by Universities.®
- Institution
-
- US Army War College (168)
- Embry-Riddle Aeronautical University (78)
- University of Nebraska at Omaha (66)
- Selected Works (62)
- Walden University (59)
-
- Old Dominion University (40)
- Universitas Indonesia (40)
- University of Tennessee, Knoxville (30)
- San Jose State University (29)
- Singapore Management University (28)
- World Maritime University (28)
- Purdue University (27)
- Claremont Colleges (26)
- Liberty University (25)
- Chinese Academy of Sciences (22)
- University of Nebraska - Lincoln (21)
- University of South Florida (21)
- Portland State University (20)
- University of Pennsylvania Carey Law School (18)
- Nova Southeastern University (16)
- University of Nevada, Las Vegas (15)
- Chulalongkorn University (14)
- Georgia State University (14)
- Missouri State University (14)
- University of Central Florida (13)
- University of Massachusetts Boston (13)
- Air Force Institute of Technology (11)
- Penn State Law (11)
- SIT Graduate Institute/SIT Study Abroad (11)
- Wayne State University (11)
- Keyword
-
- China (53)
- Cybersecurity (42)
- Russia (41)
- Terrorism (33)
- NATO (29)
-
- Security (28)
- Policy (23)
- Technology (23)
- National Security (21)
- Geopolitics (19)
- National security (19)
- United States (19)
- Social media (18)
- Cyberspace (16)
- Education (16)
- Cyber (15)
- Deterrence (15)
- Military (15)
- COVID-19 (14)
- Homeland security (14)
- Strategy (14)
- Ukraine (14)
- Artificial intelligence (13)
- War (12)
- Afghanistan (11)
- Cyber Operations (11)
- Defense (11)
- Internet (11)
- Leadership (11)
- Parameters (11)
- Publication Year
- Publication
-
- The US Army War College Quarterly: Parameters (126)
- Space and Defense (58)
- Walden Dissertations and Doctoral Studies (57)
- Annual ADFSL Conference on Digital Forensics, Security and Law (42)
- Monographs, Collaborative Studies, & IRPs (30)
-
- Jan Kallberg (23)
- Bulletin of Chinese Academy of Sciences (Chinese Version) (22)
- Publications (21)
- Research Collection School Of Computing and Information Systems (21)
- World Maritime University Dissertations (21)
- Theses and Dissertations (20)
- Libraries Faculty and Staff Scholarship and Research (17)
- Jurnal Kajian Stratejik Ketahanan Nasional (16)
- Mineta Transportation Institute (16)
- CGU Faculty Publications and Research (15)
- Chulalongkorn University Theses and Dissertations (Chula ETD) (14)
- Electronic Theses and Dissertations (14)
- MSU Graduate Theses (14)
- All Faculty Scholarship (13)
- New England Journal of Public Policy (12)
- Journal of Terrorism Studies (11)
- Penn State Journal of Law & International Affairs (11)
- Articles & Editorials (10)
- Dissertations (10)
- Independent Study Project (ISP) Collection (10)
- International Journal of Nuclear Security (10)
- Journal of Strategic Security (10)
- Engineering Management & Systems Engineering Faculty Publications (9)
- Graduate Program in International Studies Theses & Dissertations (9)
- Honors Theses (9)
- Publication Type
- File Type
Articles 1 - 30 of 1304
Full-Text Articles in Entire DC Network
Private Sector’S Perceptions And Adoption Of The E-Invoicing System In Egypt, Riham Mohamed Soliman
Private Sector’S Perceptions And Adoption Of The E-Invoicing System In Egypt, Riham Mohamed Soliman
Theses and Dissertations
This study explores the private sector’s perceptions and adoption of the mandated e-invoicing system, a key component of Egypt’s digital tax system. Twenty-three qualitative semi-structured interviews with the private sector to answer the research question: How does the private sector perceive the mandatory e-invoicing system adopted by the Egyptian government? Furthermore, the study explored the perceived impact of the Unified Theory of Acceptance and Use of Technology (UTAUT)’s four aspects on the private sector’s perceptions and adoption of the system, including performance expectancy, effort expectancy, social influence, and facilitating conditions. The study’s findings show that all respondents confirmed the four …
Towards A Digitally Mediated Transitional Justice Process? An Analysis Of Colombian Transitional Justice Organisations’ Posting Behaviour On Facebook, Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter
Towards A Digitally Mediated Transitional Justice Process? An Analysis Of Colombian Transitional Justice Organisations’ Posting Behaviour On Facebook, Jasmin Haunschild, Laura Guntrum, Sofía Cerrillo, Franziska Bujara, Christian Reuter
Peace and Conflict Studies
In Colombia, Transitional Justice (TJ) institutions were established after years of violent conflict as part of the 2016 peace agreement between the FARC and the Colombian government. By analysing the posting behaviour of the government-appointed TJ institutions on Facebook, we show how general TJ aims and opportunities for citizen participation were promoted in 2019. Our analysis reveals that the organisations rarely address topics related to reconciliation and that active online participation and two-way communication are rather scarce. Instead, Facebook is mainly used by the TJ organisations to increase solidarity with victims and disseminate information about their work and the TJ …
A Red Awakening: An Analysis Of China’S Quest For Global Dominance Through Economic Alternative Warfare Methods, Sarah Beddingfield
A Red Awakening: An Analysis Of China’S Quest For Global Dominance Through Economic Alternative Warfare Methods, Sarah Beddingfield
Senior Honors Theses
In the 2023 annual meeting of China’s parliament, Chinese President Xi made it clear to his political leaders and the world that he was preparing for war. This should come as no surprise after analysis of China's grand strategy points clearly to the intent to surpass the U.S. as the premier global superpower in all respects. China has been building towards this goal for years through untraditional methods of warfare, forcing the national security community to reevaluate its own strategy and assess the Chinese threat through a different lens. This thesis seeks to address one specific area in which China …
Smart Cities And How They Affect Those With Disabilities, Kassie Dover
Smart Cities And How They Affect Those With Disabilities, Kassie Dover
Honors Theses
This study investigates how to further improve the lives of people with Autism and Cerebral Palsy when it comes to the development of Smart Cities. This is an effort to provide a glimpse into the perspective of those with these disabilities when it comes to technological advancement. The focus of this study was Chattanooga,Tennessee and Los Angeles, California. These two cities are respectively on the East and West side of the country. Thus, there is of course a difference when how these two cities function. This was done through research under the guise of a question and answer methodology. The …
Exposure Of Future Nuclear Energy Infrastructure To Climate Change Hazards: A Review Assessment, Joana Portugal-Pereira, Miguel Esteban, Kathleen Araújo
Exposure Of Future Nuclear Energy Infrastructure To Climate Change Hazards: A Review Assessment, Joana Portugal-Pereira, Miguel Esteban, Kathleen Araújo
Public Policy and Administration Faculty Publications and Presentations
This review discusses climate hazards and specific risks associated with existing and new nuclear power plants under global warming level futures, with an emphasis on water-based risks for plants that rely on traditional water-cooling processes. Projected hazards, including extreme heatwaves, sea-level rise, and altered precipitation patterns pose significant challenges to the safe and efficient operation of nuclear plants. Additional risks include reduced water-cooling system efficiency, clogging due to biological contamination of water streams, water access issues in reactors during droughts, disruptions from extreme storms, and coastal sea level rise. These findings emphasise the importance of formulating appropriate adaptation strategies that …
Policy Solutions For Juvenile Cyber-Deviant Behaviors: Insights From Criminological Theory, Holly Verity Williams
Policy Solutions For Juvenile Cyber-Deviant Behaviors: Insights From Criminological Theory, Holly Verity Williams
All Dissertations
The aim of this thesis is to develop a deeper understanding of online deviance as a phenomenon among juveniles, both in terms of engagement and victimization, by applying Attachment Theory, Social Learning Theory, and Self-Control Theory. Throughout the literature, Attachment Theory, Social Learning Theory, and Self-Control Theory have been attributed as key criminological theories in the explanation of juvenile deviance offline, but little research has been applied to online deviance in this way. This thesis seeks to apply the same criminological theories to the phenomenon of online deviance among juveniles and compare outcomes to both online and offline deviance among …
Decisive Decade: Prc Global Strategy And The Pla As A Pacing Challenge – 2023 Pla Conference – Updated And Expanded
Monographs, Collaborative Studies, & IRPs
The US Army War College’s 2023 Conference on the People’s Liberation Army (PLA) was held February 22 to 24, 2023, at Carlisle Barracks, Pennsylvania. The conference, entitled “Decisive Decade: PRC Global Strategy and the PLA as Pacing Challenge,” featured presentations on PRC global and regional strategy, and the PLA’s enabling role by experts from a wide range of academic, media, and government agencies and organizations.
The conference papers better defined the notion of the PLA as a pacing challenge as evidenced by PRC strategies and activities in various regions to build a much stronger appreciation of how PLA operations in …
Cybersecurity Fiscal Statecraft Conundrums In South Africa, Sabelo Lyndon Mbokazi
Cybersecurity Fiscal Statecraft Conundrums In South Africa, Sabelo Lyndon Mbokazi
Walden Dissertations and Doctoral Studies
No abstract provided.
Cyber Defense Planning In Tabletop Exercises And Consideration Of A Fractured Flaw Theory For Security Applications, Patrick K. Kilroy Ii
Cyber Defense Planning In Tabletop Exercises And Consideration Of A Fractured Flaw Theory For Security Applications, Patrick K. Kilroy Ii
Doctoral Dissertations and Projects
Cybersecurity threats endanger every part of American life. Security and emergency preparedness professionals plan and prevent cyber-attacks using tabletop exercises. The tabletop exercises establish the risks and protection strategies for multiagency threats, thus, various agencies and industrial partners must work together in these training events. The purpose of this grounded study will be to develop criteria for selecting tabletop participants and explore the risks of participation. An additional consideration is the impact of the sponsoring agencies' agenda on the value of the outcome for the participants. There is sufficient evidence to justify the investigation of these issues. Failing to include …
Research On Chinese Data Sovereignty Policy Based On Lda Model And Policy Instruments, Han Qiao, Junru Xu
Research On Chinese Data Sovereignty Policy Based On Lda Model And Policy Instruments, Han Qiao, Junru Xu
Bulletin of Chinese Academy of Sciences (Chinese Version)
Data sovereignty has become an important component of national sovereignty in the dual context of the digital economy development and the overall national security concept. Major countries and regions are actively carrying out data sovereignty strategic deployment and engaging in fierce competition in data resources, data technology, and data rules. This work adopts the policy text analysis method to study China’s data sovereignty policy, and employs the LDA model and policy instruments to quantitatively analyze the process evolution and thematic characteristics of China’s data sovereignty policy. Drawing on these findings, this study comprehensively considers the global data sovereignty policy and …
Study On R&D Strategies In Nanoscale Science And Technology Of Powerhouses And Insights, Wenyue Bian, Xingjie Liang, Chunlei Ge, Zhongyang Hui, Xiaoqi Jia, Si Liu, Jing Ye, Xiaoyi Chen, Wenjun Wang, Huajun Ju
Study On R&D Strategies In Nanoscale Science And Technology Of Powerhouses And Insights, Wenyue Bian, Xingjie Liang, Chunlei Ge, Zhongyang Hui, Xiaoqi Jia, Si Liu, Jing Ye, Xiaoyi Chen, Wenjun Wang, Huajun Ju
Bulletin of Chinese Academy of Sciences (Chinese Version)
Nanoscale science and technology (nano S&T) are at the frontier of global strategic high-tech competition. After examining nearly 160 strategy and planning documents released by scientific and technological powerhouses from 2000 to 2023, the study finds ten common approaches adopted by the powerhouses to advance nano S&T as follows. (1) Recognizing nano S&T as a key area for the economy and global competition. (2) Establishing cross-department organizations to meet the cross-disciplinary nature of nano S&T. (3) Developing strategic plans to guide the development of nano S&T and implementing major programs with significant investment. (4) Establishing multidisciplinary nano S&T research centers …
Counterterrorism Legislation On Community Integration In Kenya, Collins Okinyi Odongo
Counterterrorism Legislation On Community Integration In Kenya, Collins Okinyi Odongo
Walden Dissertations and Doctoral Studies
No abstract provided.
China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens
China's Use Of Nontraditional Strategic Landpower In Asia, Sheena Chestnut Greitens
The US Army War College Quarterly: Parameters
This article argues that the People’s Republic of China uses its police and internal security forces as a nontraditional means of projecting strategic Landpower in the Indo-Pacific and Central Asia. Instead of limiting analysis of China’s power projection to military forces, this article employs new data on Chinese police engagements abroad to fill a gap in our understanding of the operating environment in Asia. Policymakers will gain an understanding of how these activities enhance China’s presence, partnerships, and influence across the region to inform the development of recommendations for a more effective response.
Strategy As Problem-Solving, Andrew Carr
Strategy As Problem-Solving, Andrew Carr
The US Army War College Quarterly: Parameters
This article proposes a new definition of strategy as problem-solving that challenges the focus on goals and assumptions of order within many post–Cold War approaches to strategy. It argues that the military needs strategy to diagnose the complex problems of the twenty-first century before they can be solved. Inspired by practitioners such as Andrew Marshall and George F. Kennan, this new definition clarifies what strategists do and offers a logic for distinguishing the use of the term strategy. Practitioners will also find problem-solving tools and pedagogies they can adopt today.
Us-Taiwan Relations And The Future Of The Liberal International Order, Christina Lai
Us-Taiwan Relations And The Future Of The Liberal International Order, Christina Lai
The US Army War College Quarterly: Parameters
Strengthening ties with Taiwan is the best chance the United States has to preserve the liberal international order in Asia and improve its security relative to China. This study offers a normative perspective on how Taiwan can contribute to US-led international institutions and the Asian regional order and reduce conflict risk. It concludes with recommendations for the United States and its partners to integrate Taiwan into multilateral institutions in Asia.
International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze
International Law, Self-Defense, And The Israel-Hamas Conflict, Eric A. Heinze
The US Army War College Quarterly: Parameters
This article examines the international law of self-defense as it applies to the ongoing Israel-Hamas conflict to determine whether the October 2023 attacks by Hamas against Israel can be interpreted under Article 51 of the UN Charter as an “armed attack” that gives Israel the right to use military force in self-defense against non-state actors. It situates the conflict within ongoing legal and political debates, shows how this conflict fits into a changing global reality where the most dangerous security threats do not exclusively emanate from other states and concludes that Israel’s resort to force in the current conflict appears …
Pornography: Social, Emotional And Mental Implications Among Adolescents, William K. Canady
Pornography: Social, Emotional And Mental Implications Among Adolescents, William K. Canady
National Youth Advocacy and Resilience Conference
This presentation will explain the historical development of pornography. It will highlight three segments: 1- Porn’s impact on brain development of reward pathways, ultimately increasing the appetite for more porn. 2- Porn can be a false substitute for real intimacy, resulting in decreased sexual satisfaction with a real person and increased verbal and physical aggression. 3- Porn promotes sex trafficking, promotes multiple sex partners and reduced STD prevention.
Chinese Digital Platform Companies’ Expansion In The Belt And Road Countries, Yujia He
Chinese Digital Platform Companies’ Expansion In The Belt And Road Countries, Yujia He
Patterson School of Diplomacy and International Commerce Faculty Publications
The emergence of digital platforms is shifting the digital economy toward a platform economy, and Chinese platform-based businesses like Alibaba, Tencent, and JD are increasingly expanding in the Global South. Alongside this, the Chinese government has been promoting digital economy collaboration with emerging markets through high-level engagement under the banner of the Belt and Road Initiative (BRI) and its digital economy component the Digital Silk Road (DSR). Despite significant market interest and policy attention, grounded empirical analysis of Chinese digital platforms’ expansion within Belt and Road Initiative countries is scarce. This study employs a mixed-methods approach, drawing on both quantitative …
Development Of Technology Pilot Training To Reduce The Number Of Senior Citizens Victimized By Computer Fraud Scams, James Eric Johnston
Development Of Technology Pilot Training To Reduce The Number Of Senior Citizens Victimized By Computer Fraud Scams, James Eric Johnston
Walden Dissertations and Doctoral Studies
There is need in the public sector to help people 60+ years of age in the safe, practical use of technology for business, personal use, and family interaction. This age group is targeted more than others involving technology fraud. The current study focused on which topics need to be part of Technology Fraud Pilot Training to reduce the victimization that is put upon seniors 60+ years of age. The project included measures that may improve understanding and safe usage of basic technology that is frequently used. These searches came from public administration, technology, government, city government, state sources, and others …
Advocacy Spotlight: 2024 Regulatory Reminders, Neema Katibai Jd
Advocacy Spotlight: 2024 Regulatory Reminders, Neema Katibai Jd
The Journal of the Michigan Dental Association
The Advocacy Spotlight column delves into critical regulatory reminders for dentists in 2024, emphasizing compliance challenges and potential disruptions to practice. Key areas covered include licensing, amalgam separator renewal, electronic prescribing, and Beneficial Ownership Information reporting. The article stresses the importance of staying informed about evolving regulations to ensure seamless practice operations.
Island Platforms And The Hyper-Terrestrialisation Of Singapore's Smart City-State, Orlando Woods, Tim Bunnell, Lily Kong
Island Platforms And The Hyper-Terrestrialisation Of Singapore's Smart City-State, Orlando Woods, Tim Bunnell, Lily Kong
Research Collection College of Integrative Studies
This paper foregrounds the importance of underlying territorial formations in realising a vision of the smart city. It argues that as a political technology of the state, territory should be understood as a platform upon which data works and the smart city unfolds. In this view, island territories – of which bordered city-states like Singapore provide paradigmatic examples – provide an integral, yet hitherto unexplored, component in the realisation of urban “smartness”. We illustrate these theoretical arguments through an analysis of how the territorial constraints that characterise Singapore’s island platform enable the state to accurately and effectively realise its vision …
Turkey Vs Italy: Gender And Cyber Security, Esra Merve Caliskan, Irem Itegin
Turkey Vs Italy: Gender And Cyber Security, Esra Merve Caliskan, Irem Itegin
Journal of Cybersecurity Education, Research and Practice
With the development of technology, security, a core human concern throughout history,has changed and branched out into new areas. Novel security concepts, including environmental security, economic security, and cybersecurity, have emerged as a result of these expanding areas. The importance of cybersecurity has increased in the linked world of today as a result of how prevalent technology is in our daily lives. This study looks at how the literature on international relations approaches the idea of cybersecurity, with an emphasis on the role gender dynamics play.
This study adopts a comprehensive strategy in recognition of the possibility that people of …
International Competition In The High North: Kingston Conference On International Security 2022
International Competition In The High North: Kingston Conference On International Security 2022
Monographs, Collaborative Studies, & IRPs
The 16th annual Kingston Consortium on International Security conference, “International Competition in the High North,” took place on October 11–13, 2022, in Kingston, Ontario, Canada. The conference examined the Arctic region in the context of ongoing climate change and against the backdrop of war in Ukraine. Over the past several years, the United States has acknowledged the growing importance of the Arctic as a strategic region, and the Department of Defense and each of the US military services have published Arctic policies or strategies. In addition, the Department of Defense has created a new regional study center, the Ted Stevens …
Digital Scientists And Parallel Sciences: The Origin And Goal Of Ai For Science And Science For Ai, Feiyue Wang, Yutong Wang
Digital Scientists And Parallel Sciences: The Origin And Goal Of Ai For Science And Science For Ai, Feiyue Wang, Yutong Wang
Bulletin of Chinese Academy of Sciences (Chinese Version)
Based on recent development in foundation model, parallel intelligence, decentralized science (DeSci), and other artificial intelligence (AI) technologies, from AI for Science (AI4S) to Science for AI (S4AI), this study discusses parallel sciences and digital scientists, and their impact and significance in paradigm shift for research and development as well as Industry 5.0 and intelligent industry, which demonstrate that paradigm shift is emerging and accelerating, and we must be prepared.
Experience And Thinking Of Promoting Open Source Of Achievement Of State-Funded Scientific Research Projects, Yuntao Long, Zhe Wang, Zheping Xu, Tao Wang, Yungang Bao, Yanjun Wu, Qigang Zhu, Rong Gu
Experience And Thinking Of Promoting Open Source Of Achievement Of State-Funded Scientific Research Projects, Yuntao Long, Zhe Wang, Zheping Xu, Tao Wang, Yungang Bao, Yanjun Wu, Qigang Zhu, Rong Gu
Bulletin of Chinese Academy of Sciences (Chinese Version)
In the era of digital economy, open source innovation has become the stimulator of innovation vitality, and is becoming an important source of high-quality supply of digital public goods. This study focuses on the importance of promoting the open source of state-funded scientific research projects, and summarizes the practical experience and policy measures of major countries and regions in the world on the open source of state-funded scientific research projects. It is also emphasized that the challenges of promoting the open source of state-funded scientific research projects in China. Suggestions for promoting the establishment of an open source mechanism of …
Strategic Research On Information Technology Promoting National Governance Modernization—Review On The S70th Xiangshan Science Conferences, Chao Zhang, Weiyu Duan, Kaihua Chen, Xiaoguang Yang, Yuntao Long
Strategic Research On Information Technology Promoting National Governance Modernization—Review On The S70th Xiangshan Science Conferences, Chao Zhang, Weiyu Duan, Kaihua Chen, Xiaoguang Yang, Yuntao Long
Bulletin of Chinese Academy of Sciences (Chinese Version)
This study systematically summarizes the reports and speeches of the S70th Xiangshan Science Conferences on the theme of “Strategic Research on Information Technology Promoting the National Governance Modernization” and summarizes the consensus of the conference in the following three aspects. (1) Important progress and achievements have been made in the four typical areas, i.e., smart justice, internet governance, data governance, and emergency management. (2) Using information technology to promote the modernization of national governance is confronted with unprecedented opportunities and challenges. And (3) it is necessary to take a series of effective measures to promote information technology to facilitate the …
J Mich Dent Assoc January 2024
J Mich Dent Assoc January 2024
The Journal of the Michigan Dental Association
Every month, The Journal of the Michigan Dental Association brings news, information, and features about Michigan dentistry to our state's oral health community and the MDA's 6,200+ members. No publication reaches more Michigan dentists!
The January issue sets the foundation for Children’s Dental Health Month in February, the reader will find the following original content:
- A cover commentary on Pediatric Dentistry
- A feature article on “Silver Diamine Fluoride as a Caries Management Option for the Young Child”.
- A feature on “Considerations Concerning Obesity-Related Education for Parents of Young Children”.
- Professional advice commentary on “Staying Focused on a Moving Target: Coping …
Identifying Barriers: Analysis Of Federal Law Enforcement Social Media And Recruitment Efforts, Reena Desai, Edgar Greer, Meghan Waldron
Identifying Barriers: Analysis Of Federal Law Enforcement Social Media And Recruitment Efforts, Reena Desai, Edgar Greer, Meghan Waldron
Doctor of Education Capstones
The Federal Bureau of Investigation Richmond Field Office seeks to diversify their applicant pool. In an effort to provide information on how to meet this need, our doctoral team analyzed the social media sites of six federal law enforcement agencies to include: the Federal Bureau of Investigation- Headquarters, Federal Bureau of Investigation-Richmond Field Office, Alcohol Tobacco & Firearms, the Federal Bureau of Prisons, the Drug Enforcement Agency, and the United States Marshal Service. By examining a 60-day window of images and their associated text on X (formerly Twitter), Facebook, and Instagram accounts, we wanted to gain a stronger understanding of …
Cybercrime Victimization: Online Routine Behaviors, Guardianship, And Identity Theft Victimization In A Nationally Reflective Sample, Ifeoluwa Stella Elegbe
Cybercrime Victimization: Online Routine Behaviors, Guardianship, And Identity Theft Victimization In A Nationally Reflective Sample, Ifeoluwa Stella Elegbe
Electronic Theses and Dissertations
In this digital era, cybercrime victimization has emerged as a significant issue, with identity theft being one of the most prevalent forms. This study examines the relationship between online routine behaviors, guardianship, demographics, and identity theft victimization in a nationally representative sample of U.S. adults utilizing routine activities theory (RAT) as a conceptual
framework. The research applies statistical methods such as descriptive statistics, correlation analysis, and logistic regression models to examine theoretically oriented hypotheses. The
hypotheses suggest connections between different online habitual behaviors, steps taken to
protect oneself, demographic characteristics, and the extent to which one has been a victim …
Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo
Opportunities And Challenges Posed By Disruptive And Converging Information Technologies For Australia's Future Defence Capabilities: A Horizon Scan, Pi-Shen Seet, Anton Klarin, Janice Jones, Mike Johnstone, Helen Cripps, Jalleh Sharafizad, Violetta Wilk, David Suter, Tony Marceddo
Research outputs 2022 to 2026
Introduction: The research project's objective was to conduct a comprehensive horizon scan of Network Centric Warfare (NCW) technologies—specifically, Cyber, IoT/IoBT, AI, and Autonomous Systems. Recognised as pivotal force multipliers, these technologies are critical to reshaping the mission, design, structure, and operations of the Australian Defence Force (ADF), aligning with the Department of Defence (Defence)’s offset strategies and ensuring technological advantage, especially in the Indo-Pacific's competitive landscape.
Research process: Employing a two-pronged research approach, the study first leveraged scientometric analysis, utilising informetric mapping software (VOSviewer) to evaluate emerging trends and their implications on defence capabilities. This approach facilitated a broader understanding …