Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Social and Behavioral Sciences (52)
- Business (35)
- Political Science (32)
- International Relations (29)
- Engineering (24)
-
- Law (24)
- Computer Engineering (20)
- National Security Law (18)
- Public Affairs, Public Policy and Public Administration (18)
- Defense and Security Studies (15)
- Computer and Systems Architecture (14)
- Physical Sciences and Mathematics (14)
- Digital Communications and Networking (13)
- Other Computer Engineering (13)
- Computer Law (11)
- Computer Sciences (11)
- Education (11)
- Military, War, and Peace (11)
- Systems Science (11)
- Intellectual Property Law (9)
- Portfolio and Security Analysis (9)
- Information Security (7)
- Psychology (7)
- Arts and Humanities (6)
- Cognitive Science (6)
- Communication (6)
- Technology and Innovation (6)
- Cognitive Psychology (5)
- Hospitality Administration and Management (5)
- Marketing (5)
- Keyword
-
- Cybersecurity (55)
- National security (45)
- International security (33)
- Security studies (27)
- Information operations (24)
-
- Intelligence analysis (24)
- Intelligence studies/education (23)
- Security policy (23)
- Strategy (23)
- Russia (22)
- Terrorism / counterterrorism (22)
- Asymmetric warfare (20)
- Defense policy (20)
- War studies (20)
- International relations (19)
- Counterterrorism (17)
- Foreign policy (15)
- Military affairs (15)
- Conflict studies (13)
- Intelligence collection (13)
- Nonstate actors (13)
- Social media (13)
- China (12)
- Homeland security (12)
- Threat assessment (12)
- Violent extremism (12)
- Counterintelligence (11)
- Global trends and risks (11)
- Globalization and global change (11)
- Irregular warfare (11)
- Publication Year
- Publication
-
- Journal of Strategic Security (173)
- Military Cyber Affairs (55)
- University of South Florida (USF) M3 Publishing (14)
- Journal of Global Business Insights (6)
- Genocide Studies and Prevention: An International Journal (4)
-
- Journal of Global Education and Research (3)
- Journal of Public Transportation (3)
- North American Bird Bander (3)
- Numeracy (3)
- Alambique. Revista académica de ciencia ficción y fantasía / Jornal acadêmico de ficção científica e fantasía (2)
- Bird Observer (2)
- Journal of African Conflicts and Peace Studies (2)
- Journal of Mediterranean Tourism Research (2)
- The Auk (1)
- University of South Florida (USF) - M3 Publishing (1)
Articles 1 - 30 of 274
Full-Text Articles in Entire DC Network
Regulating Deepfakes: An Indian Perspective, Shinu Vig
Regulating Deepfakes: An Indian Perspective, Shinu Vig
Journal of Strategic Security
Deepfakes are a growing concern throughout the world including India. Deepfakes can be used for several purposes, both innocuous or malicious. In India, several problems related to regulation of deepfakes have emerged. This paper makes an examination of current legal challenges posed by deepfakes as well as solutions in India that can be repurposed to address these challenges, including intellectual property laws, criminal laws, and the right to privacy. While these existing laws can be used to address certain aspects of the deep fake problem, there is an increasing recognition that specific legislations and regulations addressing deep fakes and synthetic …
Understanding Russian Hybrid Warfare Against Europe In The Energy Sector And In The Future ‘Energy-Resources-Climate’ Security Nexus., Maurizio Geri
Understanding Russian Hybrid Warfare Against Europe In The Energy Sector And In The Future ‘Energy-Resources-Climate’ Security Nexus., Maurizio Geri
Journal of Strategic Security
To avoid escalations to full kinetic (military) wars is imperative to win the non-kinetic part of the so-called “hybrid warfare”, which use both kinetic and non-kinetic methods. The goal of the non-kinetic methods of hybrid warfare, or as others call it “grey zone” activities, or “subthreshold” tactics, is to defeat hearts and minds, as well as pockets, of adversaries, with social, political, and economic tools. This article focuses on energy as the crucial sector of the economic tools, and specifically uses an innovative approach, what the author calls the ‘energy-resources-climate security nexus’, as a new battleground for future strategic competition …
Behavior And Taxonomic Status Of Grayson's Dove, Luis F. Baptista, William I. Boarman, Paraskevas Kandianidis
Behavior And Taxonomic Status Of Grayson's Dove, Luis F. Baptista, William I. Boarman, Paraskevas Kandianidis
The Auk
No abstract provided.
The Piranhas: Endgame Of Banking In Indonesia, F. Mario Andaru, Bambang Hadinugroho
The Piranhas: Endgame Of Banking In Indonesia, F. Mario Andaru, Bambang Hadinugroho
Journal of Global Business Insights
Neobank is a form of financial technology innovation that offers banking services without a branch office. This is a form of disruption in the banking industry. Therefore, this paper aims to look at the phenomenon regarding the shift in the banking industry due to the presence of neobanks and, at the same time, question whether this is the beginning of the extinction of conventional banking. Based on an analysis of the literature on fintech and digital banking from research, case studies, and news media in both English and Indonesian, this study discusses research related to neobank trends disrupting the conventional …
Application Of New Media In Peace Building And Conflict Resolution In Nigeria, Eric Msughter Aondover, Ademolu Patrick Okuneye, Timothy Ekeledirichukwu Onyejelem
Application Of New Media In Peace Building And Conflict Resolution In Nigeria, Eric Msughter Aondover, Ademolu Patrick Okuneye, Timothy Ekeledirichukwu Onyejelem
Journal of African Conflicts and Peace Studies
The role of new media in conflict prevention, resolution and escalation is now a global concern to both peace and conflict scholars and public policy makers. The kind of information the media disseminate is critical to sustaining peace and harmony in society and vice versa. New media has a long history. The media have suffered deprivation in the hands of both military and civilian regimes. However, this has not in anywhere diminished the growth of the media in all its ramifications. Traditional media genre like newspaper, radio and television has received much recognition and seminal attention, but social or new …
Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi
Atrocity Prevention In The Digital Era: Adapting Norms, Laws, And Code To Changes In The Ways Atrocities Are Committed, David J. Simon, Samhitha Josyula, Joshua Lam, Julian D. Melendi
Genocide Studies and Prevention: An International Journal
Emerging digital technologies have changed some of the ways that genocides are planned and executed. This paper examines those differences, calling attention to how changes in the execution of genocide should prompt a shift in the approaches to atrocity prevention. It develops a conceptual framework addressing how atrocity prevention efforts might adapt to new technology within three realms of potential prevention efforts: the ethical (norms), the legal (laws), and the digital (code).
The Relationship Between Physical Activity Level, Digital Game Addiction, And Academic Success Levels Of University Students, Aydin Ilhan
Journal of Global Education and Research
This study examined the relationship between physical activity, digital game addiction, and academic success among university students. Participants were university 704 students from Turkiye who did physical activity and played digital games. The sample group consisted of 704 university students (342 women and 362 men), selected through random sampling. Data were collected using demographic information forms, a digital game addiction scale, and an international short-form questionnaire about physical activity. The data were analyzed using Pearson correlation, t-tests, one-way ANOVA, and post-hoc tests. The findings revealed a significant negative relationship between academic success and both physical activity and digital game …
Online Teaching And Learning At Chinese Universities During Covid-19: Insiders’ Perspectives, Youliang Zhang, Yidan Zhu, Tongjie Chen, Tongfei Ma
Online Teaching And Learning At Chinese Universities During Covid-19: Insiders’ Perspectives, Youliang Zhang, Yidan Zhu, Tongjie Chen, Tongfei Ma
Journal of Global Education and Research
During attempts to prevent and control the COVID-19 pandemic in China, higher education programs shifted their traditional educational models to online models. This paper aimed to explore how Chinese universities organized online teaching and learning during the pandemic. It investigated the factors affecting the implementation of online teaching and provided policy recommendations for improving the quality of education in the post-pandemic period. The primary data for this study came from in-depth interviews with nine students and five teaching and administrative staff at eight major universities in mainland China. Literature was obtained in both English and Chinese from January 2020 to …
Nuclear War: A Scenario By Annie Jacobson, New York: Dutton, 2024., Edward M. Roche, Ph.D., Jd
Nuclear War: A Scenario By Annie Jacobson, New York: Dutton, 2024., Edward M. Roche, Ph.D., Jd
Journal of Strategic Security
No abstract provided.
Cold Rivals: The New Era Of Us-China Strategic Competition Ed. Evan S. Medeiros, Georgetown University Press, 2023., Mark T. Peters Ii Ph.D.
Cold Rivals: The New Era Of Us-China Strategic Competition Ed. Evan S. Medeiros, Georgetown University Press, 2023., Mark T. Peters Ii Ph.D.
Journal of Strategic Security
No abstract provided.
Digital Transformation Perceptions In Tourism Businesses: The Case Of Batman Province, Ferhat Kurt
Digital Transformation Perceptions In Tourism Businesses: The Case Of Batman Province, Ferhat Kurt
Journal of Mediterranean Tourism Research
This study explores the perceptions of digital transformation within tourism businesses in Batman Province, with a specific focus on accommodation, food and beverage and tourism agencies. Perceptions of digital transformation are considered to have of growing influence on the tourism business, and the research of these perceptions is a critical study not only for academic research but also for practical applications. Experiences, strategies, and challenges of the businesses in digitalization are studied with qualitative research methods, specifically semi structured interviews with five businesses running in Batman, Turkey. The findings highlight the varying degrees of digital transformation awareness and the different …
The Handbook Of African Intelligence Cultures. Ryan Shaffer, Editor. London: Rowman & Littlefield, 2023., Edward M. Roche Ph.D., Jd
The Handbook Of African Intelligence Cultures. Ryan Shaffer, Editor. London: Rowman & Littlefield, 2023., Edward M. Roche Ph.D., Jd
Journal of Strategic Security
No abstract provided.
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Improving Ethics Surrounding Collegiate-Level Hacking Education: Recommended Implementation Plan & Affiliation With Peer-Led Initiatives, Shannon Morgan, Dr. Sanjay Goel
Military Cyber Affairs
Cybersecurity has become a pertinent concern, as novel technological innovations create opportunities for threat actors to exfiltrate sensitive data. To meet the demand for professionals in the workforce, universities have ramped up their academic offerings to provide a broad range of cyber-related programs (e.g., cybersecurity, informatics, information technology, digital forensics, computer science, & engineering). As the tactics, techniques, and procedures (TTPs) of hackers evolve, the knowledge and skillset required to be an effective cybersecurity professional have escalated accordingly. Therefore, it is critical to train cyber students both technically and theoretically to actively combat cyber criminals and protect the confidentiality, integrity, …
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Using Digital Twins To Protect Biomanufacturing From Cyberattacks, Brenden Fraser-Hevlin, Alec W. Schuler, B. Arda Gozen, Bernard J. Van Wie
Military Cyber Affairs
Understanding of the intersection of cyber vulnerabilities and bioprocess regulation is critical with the rise of artificial intelligence and machine learning in manufacturing. We detail a case study in which we model cyberattacks on network-mediated signals from a novel bioreactor, where it is important to control medium feed rates to maintain cell proliferation. We use a digital twin counterpart reactor to compare glucose and oxygen sensor signals from the bioreactor to predictions from a kinetic growth model, allowing discernment of faulty sensors from hacked signals. Our results demonstrate a successful biomanufacturing cyberattack detection system based on fundamental process control principles.
Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta
Surmounting Challenges In Aggregating Results From Static Analysis Tools, Dr. Ann Marie Reinhold, Brittany Boles, A. Redempta Manzi Muneza, Thomas Mcelroy, Dr. Clemente Izurieta
Military Cyber Affairs
Aggregation poses a significant challenge for software practitioners because it requires a comprehensive and nuanced understanding of raw data from diverse sources. Suites of static-analysis tools (SATs) are commonly used to assess organizational security but simultaneously introduce significant challenges. Challenges include unique results, scales, configuration environments for each SAT execution, and incompatible formats between SAT outputs. Here, we document our experiences addressing these issues. We highlight the problem of relying on a single vendor's SAT version and offer a solution for aggregating findings across multiple SATs, aiming to enhance software security practices and deter threats early with robust defensive operations.
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Characterizing Advanced Persistent Threats Through The Lens Of Cyber Attack Flows, Logan Zeien, Caleb Chang, Ltc Ekzhin Ear, Dr. Shouhuai Xu
Military Cyber Affairs
Effective cyber defense must build upon a deep understanding of real-world cyberattacks to guide the design and deployment of appropriate defensive measures against current and future attacks. In this abridged paper (of which the full paper is available online), we present important concepts for understanding Advanced Persistent Threats (APTs), our methodology to characterize APTs through the lens of attack flows, and a detailed case study of APT28 that demonstrates our method’s viability to draw useful insights. This paper makes three technical contributions. First, we propose a novel method of constructing attack flows to describe APTs. This abstraction allows technical audiences, …
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Generative Machine Learning For Cyber Security, James Halvorsen, Dr. Assefaw Gebremedhin
Military Cyber Affairs
Automated approaches to cyber security based on machine learning will be necessary to combat the next generation of cyber-attacks. Current machine learning tools, however, are difficult to develop and deploy due to issues such as data availability and high false positive rates. Generative models can help solve data-related issues by creating high quality synthetic data for training and testing. Furthermore, some generative architectures are multipurpose, and when used for tasks such as intrusion detection, can outperform existing classifier models. This paper demonstrates how the future of cyber security stands to benefit from continued research on generative models.
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Securing The Void: Assessing The Dynamic Threat Landscape Of Space, Brianna Bace, Dr. Unal Tatar
Military Cyber Affairs
Outer space is a strategic and multifaceted domain that is a crossroads for political, military, and economic interests. From a defense perspective, the U.S. military and intelligence community rely heavily on satellite networks to meet national security objectives and execute military operations and intelligence gathering. This paper examines the evolving threat landscape of the space sector, encompassing natural and man-made perils, emphasizing the rise of cyber threats and the complexity introduced by dual-use technology and commercialization. It also explores the implications for security and resilience, advocating for collaborative efforts among international organizations, governments, and industry to safeguard the space sector.
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Commercial Enablers Of China’S Cyber-Intelligence And Information Operations, Ethan Mansour, Victor Mukora
Military Cyber Affairs
In a globally commercialized information environment, China uses evolving commercial enabler networks to position and project its goals. They do this through cyber, intelligence, and information operations. This paper breaks down the types of commercial enablers and how they are used operationally. It will also address the CCP's strategy to gather and influence foreign and domestic populations throughout cyberspace. Finally, we conclude with recommendations for mitigating the influence of PRC commercial enablers.
Deter, Disrupt, Or Deceive: Assessing Cyber Conflict As An Intelligence Contest, Robert Chesney And Max Smeets, Eds. Georgetown University Press, 2023, Chris Bronk, Phd
Deter, Disrupt, Or Deceive: Assessing Cyber Conflict As An Intelligence Contest, Robert Chesney And Max Smeets, Eds. Georgetown University Press, 2023, Chris Bronk, Phd
Journal of Strategic Security
No abstract provided.
Hybrid Warfare: How To Escape The Conceptual Gray-Zone, Borislav Bankov
Hybrid Warfare: How To Escape The Conceptual Gray-Zone, Borislav Bankov
Journal of Strategic Security
Hybrid warfare (HW) is one of the most debated concepts in contemporary military science. While most scholars agree that HW is conducted in the gray-zone between war and peace, they define the phenomenon differently. This disagreement has resulted in a conceptual gray-zone. The lack of theoretical clarity is exacerbated by the fact that authors have coined additional security and defense concepts that are based on the idea of hybridity, such as hybrid peace and hybrid influence. This article examines the different views on HW and aims to offer a more precise framework for its analysis. To fulfill its objective, it …
Engagement With Radical Propaganda Drives Cognitive Radicalization: An Analysis Of A Right-Wing Online Ecosystem, Julius B. Calvert
Engagement With Radical Propaganda Drives Cognitive Radicalization: An Analysis Of A Right-Wing Online Ecosystem, Julius B. Calvert
Journal of Strategic Security
Cognitive radicalization remains an issue for communities battling terrorism. Recent empirical investigations into the psycho-social processes involved with radicalization have revealed social exclusion, cognitive inflexibility, and perceived threats to an ingroup as significant predictors for one’s propensity to engage with radical content and commit to offline behaviors. This study investigates the utility of user engagement and the proxy effect on cognitive radicalization by examining users’ engagement with a radical-right online ecosystem. The study supported the assumption that content featuring outgroup prejudice would affect the cognitive radicalization process. Several results demonstrate the importance of user engagement in the process of radicalization. …
Western Bird Banding Association Annual Meeting 2009 Abstracts Of Presentations, North American Bird Bander
Western Bird Banding Association Annual Meeting 2009 Abstracts Of Presentations, North American Bird Bander
North American Bird Bander
No abstract provided.
Abstracts From Wbba's 2007 Annual Meeting, North American Bird Bander
Abstracts From Wbba's 2007 Annual Meeting, North American Bird Bander
North American Bird Bander
No abstract provided.
Eastern Regional News, North American Bird Bander
Eastern Regional News, North American Bird Bander
North American Bird Bander
No abstract provided.
Effect Of Influencers On The Intention To Taste Local Food And Beverages, Yeliz Demir, Serkan Bertan
Effect Of Influencers On The Intention To Taste Local Food And Beverages, Yeliz Demir, Serkan Bertan
Journal of Mediterranean Tourism Research
The study aims to determine the impact of influencers promoting local food and beverages on individuals’ intention to taste local food. In this study, Instagram accounts were selected as the social media platform. The research data were obtained from Turkish Instagram users over the age of 18 by using an online survey and purposive sampling method, and usable data were obtained from 81 people. Of the participants, 56.8% stated that they follow Instagram accounts related to gastronomy, and 43.2% stated that they do not follow these social media accounts but look at the photos and videos of gastronomy accounts when …
Marsh Birding The West Meadows Wildlife Management Area In West Bridgewater, Steve Arena
Marsh Birding The West Meadows Wildlife Management Area In West Bridgewater, Steve Arena
Bird Observer
No abstract provided.
Bird Sightings: November-December 1998 Summary, Marjorie W. Rines, Simon A. Perkins, Robert H. Stymeist
Bird Sightings: November-December 1998 Summary, Marjorie W. Rines, Simon A. Perkins, Robert H. Stymeist
Bird Observer
No abstract provided.
Megacities And Urban Warfare In The 21st Century: The City As The Cemetery Of Revolutionaries And Resources, José De Arimatéia Da Cruz Ph.D./Mph
Megacities And Urban Warfare In The 21st Century: The City As The Cemetery Of Revolutionaries And Resources, José De Arimatéia Da Cruz Ph.D./Mph
Journal of Strategic Security
No abstract provided.