Open Access. Powered by Scholars. Published by Universities.®
Military and Veterans Studies Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Defense and Security Studies (6)
- Peace and Conflict Studies (5)
- Other Political Science (3)
- Political Science (3)
- Business (2)
-
- Computer Sciences (2)
- Databases and Information Systems (2)
- Engineering (2)
- International Relations (2)
- Management Information Systems (2)
- Organizational Behavior and Theory (2)
- Other Computer Sciences (2)
- Physical Sciences and Mathematics (2)
- Policy Design, Analysis, and Evaluation (2)
- Political Theory (2)
- Public Affairs (2)
- Public Policy (2)
- Risk Analysis (2)
- American Studies (1)
- Arts and Humanities (1)
- Criminology (1)
- Eastern European Studies (1)
- Gender and Sexuality (1)
- International and Area Studies (1)
- Law (1)
- Law and Politics (1)
- Military, War, and Peace (1)
- Institution
Articles 1 - 7 of 7
Full-Text Articles in Military and Veterans Studies
Book Revew : "Operation Linda Nchi" - Kenya's Military Experience In Somalia By Kdf / Mod, Nyagudi Musandu Nyagudi
Book Revew : "Operation Linda Nchi" - Kenya's Military Experience In Somalia By Kdf / Mod, Nyagudi Musandu Nyagudi
Nyagudi M Nyagudi
Review of KDF book on Military Operations in Somalia
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
From Cyber Terrorism To State Actors’ Covert Cyber Operations, Jan Kallberg, Bhavani Thuraisingham
Jan Kallberg
Historically, since the Internet started to become a common feature in our lives, hackers have been seen as a major threat. This view has repeatedly been entrenched and distributed by media coverage and commentaries through the years. Instead the first twenty year of the Internet was acceptably secure, due to the limited abilities of the attackers, compared to the threat generated from a militarized Internet with state actors conducting cyber operations. In reality, the Internet have a reversed trajectory for its security where it has become more unsafe over time and moved from a threat to the individual to a …
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Common Criteria Meets Realpolitik Trust, Alliances, And Potential Betrayal, Jan Kallberg
Jan Kallberg
Common Criteria for Information Technology Security Evaluation has the ambition to be a global standard for IT-security certification. The issued certifications are mutually recognized between the signatories of the Common Criteria Recognition Arrangement. The key element in any form of mutual relationships is trust. A question raised in this paper is how far trust can be maintained in Common Criteria when additional signatories enter with conflicting geopolitical interests to earlier signatories. Other issues raised are control over production, the lack of permanent organization in the Common Criteria, which leads to concerns of being able to oversee the actual compliance. As …
Operation Ajax; Roots Of A Tree Grown In Distrust, Carter Matherly
Operation Ajax; Roots Of A Tree Grown In Distrust, Carter Matherly
Carter Matherly PhD
No abstract provided.
In Conflict Part Ii, Daniel Sylvester
In Conflict, Daniel Sylvester
Feminist Resistance In Serbia, Donna M. Hughes Dr., Lepa Mladjenovic, Zorica Mrsevic
Feminist Resistance In Serbia, Donna M. Hughes Dr., Lepa Mladjenovic, Zorica Mrsevic
Donna M. Hughes
In the last four years the Socialist Federal Republic of Yugoslavia has broken apart. Driven by nationalism, the wars in Slovenia, Croatia and Bosnia have killed an estimated 300,000 people, wounded another 1,500,00 and forced 4,500,000 people to become refugees. While the world see daily reports of Serbian aggression and nationalist extremism, feminists in Serbia have been protesting all acts of aggression, included that advocated by their own government and supporting the victims of violence.