Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Military and Veterans Studies

Book Revew : "Operation Linda Nchi" - Kenya's Military Experience In Somalia By Kdf / Mod, Nyagudi Musandu Nyagudi Jul 2015

Book Revew : "Operation Linda Nchi" - Kenya's Military Experience In Somalia By Kdf / Mod, Nyagudi Musandu Nyagudi

Nyagudi M Nyagudi

Review of KDF book on Military Operations in Somalia


From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham Mar 2013

From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham

Jan Kallberg

Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …


Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg Jul 2012

Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg

Jan Kallberg

Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …


Operation Ajax; Roots Of A Tree Grown In Distrust, Carter Matherly Dec 2011

Operation Ajax; Roots Of A Tree Grown In Distrust, Carter Matherly

Carter Matherly PhD

No abstract provided.


In Conflict Part Ii, Daniel Sylvester Jan 2009

In Conflict Part Ii, Daniel Sylvester

Daniel Sylvester

No abstract provided.


In Conflict, Daniel Sylvester Jan 2008

In Conflict, Daniel Sylvester

Daniel Sylvester

No abstract provided.


Feminist Resistance In Serbia, Donna M. Hughes Dr., Lepa Mladjenovic, Zorica Mrsevic Dec 1994

Feminist Resistance In Serbia, Donna M. Hughes Dr., Lepa Mladjenovic, Zorica Mrsevic

Donna M. Hughes

In the last four years the Socialist Federal Republic of Yugoslavia has broken apart. Driven by nationalism, the wars in Slovenia, Croatia and Bosnia have killed an estimated 300,000 people, wounded another 1,500,00 and forced 4,500,000 people to become refugees. While the world see daily reports of Serbian aggression and nationalist extremism, feminists in Serbia have been protesting all acts of aggression, included that advocated by their own government and supporting the victims of violence.