Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Keyword
-
- Abstracts (1)
- Battleverse (1)
- Brunei Darussalam (1)
- China (1)
- Counter-Terrorism (1)
-
- Cyber (1)
- Cyber war (1)
- Cybersecurity (1)
- Ethnopolitical conflict (1)
- Italy (1)
- Kenya (1)
- Keywords: Identity- Crisis Management- Peace- International Relations- Civilization- Culture- Conflict- Religion. (1)
- Message Authentication (1)
- Metaverse (1)
- Political theory (1)
- Power Line Communication (1)
- Power Projection (1)
- Refugees (1)
- Risk (1)
- Russia (1)
- Security Studies (1)
- Serial Protocols (1)
- Sexual violence (1)
- Small States (1)
- Theological anthropology (1)
- Ukraine (1)
- Undergraduate research (1)
- Virtual reality (1)
- War (1)
- Women (1)
Articles 1 - 8 of 8
Full-Text Articles in Psychology
Role Of Identity In Peace Process: A Re-Interpretation Of The Islamic Heritage, Yasmine Z. Radwan
Role Of Identity In Peace Process: A Re-Interpretation Of The Islamic Heritage, Yasmine Z. Radwan
Future Journal of Social Science
Reviewing the Western theories and ideologies on building and maintaining peace reflected in the conflict management and resolution in practice always indicates an imperative need for another perspective that could play an integral role in the international society. Regardless of the continuing call for an Islamic contribution in this field on the part of some Western scholars, the Muslim society itself based on a specific culture and a distinctive identity requires a different approach with particular tools that could fit its epistemological model. Exploring this approach, which is the main concern and the main aim of this paper, would never …
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Power Projection And Counter-Terrorism: Strategies For Small States Like Brunei Darussalam, Brice Tseen Fu Lee, Gulshan Bibi Ms
Journal of Terrorism Studies
This study delves into the intricacies of power projection strategies and counter-terrorism measures, emphasizing their relevance to small states, with a specific focus on Brunei Darussalam. Using a dual matrix model, the research categorizes various strategies based on risk-reward parameters, offering a structured insight into potential approaches these states can employ against potential aggressors. The counter-terrorism matrix is the initial focal point, recognizing the contemporary significance of terror threats and their unique challenges for small nations. Subsequently, the power projection matrix offers a broader view of defense tactics beyond counter-terrorism. By synthesizing information from primary academic sources, the study aims …
African Ethnopolitical Rivalry In A Public Theological Lens: Building Bridges Between The Luo And Kikuyu, Dan Kidha Kidha
African Ethnopolitical Rivalry In A Public Theological Lens: Building Bridges Between The Luo And Kikuyu, Dan Kidha Kidha
The Journal of Social Encounters
This research explores African ethnopolitical rivalry within a public theological framework, aiming to build bridges between the Luo and Kikuyu communities of Kenya. It argues that as a community enterprise, theology should engage with the public and be concerned about the wellbeing of God's people. Ethnopolitical conflict is a major impediment to human flourishing in sub- Saharan Africa, causing loss of life, displacement, and fractured identity. The paper draws on practical and public theologies to understand the lived contexts of human experience and argues that a robust interdisciplinary approach is necessary to uplift those affected by ethnic conflicts. As an …
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum
Military Cyber Affairs
Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …
Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols
Du Undergraduate Showcase: Research, Scholarship, And Creative Works, Caitlyn Aldersea, Justin Bravo, Sam Allen, Anna Block, Connor Block, Emma Buechler, Maria De Los Angeles Bustillos, Arianna Carlson, William Christensen, Olivia Kachulis, Noah Craver, Kate Dillon, Muskan Fatima, Angel Fernandes, Emma Finch, Colleen Cassidy, Amy Fishman, Andrea Francis, Stacia Fritz, Simran Gill, Emma Gries, Rylie Hansen, Shannon Powers, Jacqueline Martinez, Zachary Harker, Ashley Hasty, Mykaela Tanino-Springsteen, Kathleen Hopps, Adelaide Kerenick, Colin Kleckner, Ci Koehring, Elijah Kruger, Braden Krumholz, Maddie Leake, Lyneé Alves, Seraphina Loukas, Yatzari Lozano Vazquez, Haley Maki, Emily Martinez, Sierra Mckinney, Mykaela Tanino-Springsteen, Audrey Mitchell, Kipling Newman, Audrey Ng, Megan Lucyshyn, Andrew Nguyen, Stevie Ostman, Casandra Pearson, Alexandra Penney, Julia Gielczynski, Tyler Ball, Anna Rini, Christina Rorres, Simon Ruland, Helayna Schafer, Emma Sellers, Sarah Schuller, Claire Shaver, Kevin Summers, Isabella Shaw, Madison Sinar, Claudia Pena, Apshara Siwakoti, Carter Sorensen, Madi Sousa, Anna Sparling, Alexandra Revier, Brandon Thierry, Dylan Tyree, Maggie Williams, Lauren Wols
DU Undergraduate Research Journal Archive
DU Undergraduate Showcase: Research, Scholarship, and Creative Works
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane
Military Cyber Affairs
No abstract provided.
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Ukrainian Women Refugees In Italy And Their Risk Of Sexual Violence: An Interview With Luisanna Porcu, Lepa Mladjenović
Ukrainian Women Refugees In Italy And Their Risk Of Sexual Violence: An Interview With Luisanna Porcu, Lepa Mladjenović
Dignity: A Journal of Analysis of Exploitation and Violence
No abstract provided.