Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- National Security Law (5)
- Business (4)
- Defense and Security Studies (4)
- Portfolio and Security Analysis (4)
- Public Affairs, Public Policy and Public Administration (4)
-
- Cognitive Science (2)
- Computer Engineering (2)
- Computer Law (2)
- Computer and Systems Architecture (2)
- Digital Communications and Networking (2)
- Engineering (2)
- International Relations (2)
- Other Computer Engineering (2)
- Political Science (2)
- Psychology (2)
- Arts and Humanities (1)
- Asian Studies (1)
- Bioethics and Medical Ethics (1)
- Chinese Studies (1)
- Cognitive Psychology (1)
- East Asian Languages and Societies (1)
- Education (1)
- Health Law and Policy (1)
- Human Factors Psychology (1)
- Human Rights Law (1)
- Intellectual Property Law (1)
- International Law (1)
- International and Area Studies (1)
Articles 1 - 7 of 7
Full-Text Articles in Law
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman
Military Cyber Affairs
No abstract provided.
Enter The Battleverse: China's Metaverse War, Josh Baughman
Enter The Battleverse: China's Metaverse War, Josh Baughman
Military Cyber Affairs
No abstract provided.
Cold Genocide: Falun Gong In China, Maria Cheung, Torsten Trey, David Matas, Richard An
Cold Genocide: Falun Gong In China, Maria Cheung, Torsten Trey, David Matas, Richard An
Genocide Studies and Prevention: An International Journal
The article explores patterns of a cold genocide in the eradication campaign against Falun Gong. Falun Gong is a spiritual practice that has been targeted for eradication by the Chinese regime since 1999. In comparison to the documented cases of genocide, the genocide of Falun Gong stands out as anomalous because it is virtually ignored. The article seeks to elucidate the multi-faceted nature of this concealed genocide from an interdisciplinary perspective encompassing social work, medicine and law, In particular, the article demonstrates that the eradication campaign against Falun Gong is distinguishable as a cold genocide as it is: (1) multi-dimensional …
The Strategic Implications Of China's Rare Earths Policy, Shane Bilsborough
The Strategic Implications Of China's Rare Earths Policy, Shane Bilsborough
Journal of Strategic Security
Drawing on literature in China studies, strategic theory, and expert interviews, this article analyzes the possibility of "rare earths" being leveraged by the People's Republic of China (PRC) in a crisis. The evidence suggests China's position in the rare earths market could constitute a significant security liability for the United States. It also seems that even if coercion fails to materialize, China's rare earths policies have the potential to intensify security dilemmas in Sino-American relations.
Learning From Libya, Acting In Syria, Caitlin A. Buckley
Learning From Libya, Acting In Syria, Caitlin A. Buckley
Journal of Strategic Security
The international community has reached an impasse. The violence committed by Syrian President Assad's government against opposition forces, who have been calling for democratic reform, regime change, and expanded rights, has necessitated a response from the international community. This article explores various ways the international community could respond to the crisis in Syria and the consequences of each approach. It compares the current calamity in Syria to the crisis in Libya and examines the international community's response to the violence perpetrated by Qaddafi's regime. It further analyzes reports, primarily from the UN and news sources, about the ongoing predicament in …
China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal
China's Use Of Cyber Warfare: Espionage Meets Strategic Deterrence, Magnus Hjortdal
Journal of Strategic Security
This article presents three reasons for states to use cyber warfare and
shows that cyberspace is—and will continue to be—a decisive element in
China's strategy to ascend in the international system. The three reasons
are: deterrence through infiltration of critical infrastructure; militarytechnological
espionage to gain military knowledge; and industrial espionage
to gain economic advantage. China has a greater interest in using
cyberspace offensively than other actors, such as the United States, since
it has more to gain from spying on and deterring the United States than
the other way around. The article also documents China's progress in
cyber warfare and …
Social Cohesion And Islamic Radicalization: Implications From The Uighur Insurgency, Tong Zhao
Social Cohesion And Islamic Radicalization: Implications From The Uighur Insurgency, Tong Zhao
Journal of Strategic Security
This article starts with a critical review of the current literature on the Islamic radicalization and Uighur insurgency in Xinjiang, pointing out that existing literature focuses too narrowly on certain aspects of the Uighur insurgency, and is insufficient to explain the causal mechanism of the insurgency and Islamic radicalization. Built upon historical evidence, this article uses sociological analysis to explore the structural changes in the Uighur community over the past decades, and demonstrates the importance and effectiveness of social cohesion theory in identifying the key causal variables which underlie and determine the course of Uighur insurgency and Islamic radicalization. The …