Open Access. Powered by Scholars. Published by Universities.®

Social and Behavioral Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 14 of 14

Full-Text Articles in Social and Behavioral Sciences

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Enter The Battleverse: China's Metaverse War, Josh Baughman May 2022

Enter The Battleverse: China's Metaverse War, Josh Baughman

Military Cyber Affairs

No abstract provided.


Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion Jan 2022

Book Review: This Is How They Tell Me The World Ends: The Cyberweapons Arms Race (2020) By Nicole Perlroth, Amy C. Gaudion

Dickinson Law Review (2017-Present)

No abstract provided.


Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener Jul 2020

Alternate Warfare: The Unseen Weapons Of Mass Destruction, Elyse Keener

Liberty University Journal of Statesmanship & Public Policy

Biological warfare is a national security concern that transcends centuries. In the current international climate, biowarfare is of particular interest due to the COVID-19 pandemic. This article seeks to follow historical cases of biological warfare and international response to these cases in order to understand the implications of COVID-19, if it were to be weaponized. Also covered is the current capabilities that Russia, China, and Iran are assessed to possess.


Geopolitics Of Rare Earth Elements, Bert Chapman Oct 2017

Geopolitics Of Rare Earth Elements, Bert Chapman

Libraries Faculty and Staff Presentations

Rare earth elements (REE) contain unique chemical physical properties such as lanthamum, are found in small concentrations, need extensive precise properties to separate, and are critical components of modern technologies such as laser guidance systems, personal electronics such as IPhones, satellites, and military weapons systems as varied as Virginia-class fast attack submarines, DDG-51 Aegis destroyers, the F-35 Joint Strike Fighter, and precision guided munitions. The U.S. has some rare earth resources, but is heavily dependent on access to them from countries as varied as Afghanistan, Bolivia, and China. Losing access to these resources would have significant adverse economic, military, and …


Artificial Islands In The South China Sea, Aaron Holmes May 2017

Artificial Islands In The South China Sea, Aaron Holmes

OSR Journal of Student Research

The purpose of this study was to understand the value and implications of artificial islands constructed by the People's Republic of China (PRC) in the South China Sea. Qualitative analysis was used with the available literature, sources, and treaties of the topics concerned. The paper concludes that the PRC gains many benefits primarily within the realm of energy security and explores what effects they may


Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee Jul 2016

Comparative Empirical Analysis On Computer Software Piracy Behaviors Between China And The United States: An Exploratory Study, Xiang Fang, Sooun Lee

Journal of International Technology and Information Management

Using the data collected from several universities in China and the United States, which have drastically different piracy rates, economic development stages, income levels, and national cultures, this study aims to identify which demographic factors affect software piracy significantly. Totally, the dataset includes 600 valid responses. Multivariate data analysis, supported by Multivariate Analysis of Variance and Turkey’s test, reveals that among various factors, country difference and gender most significantly influence software piracy. In addition, this study offers recommendations on how to curb software piracy effectively.


Do We Have The Reliable Data? An Exploration Of Data Quality For Aids Information System In China, Hong Chen, Ping Yu, Ning Wang Jan 2013

Do We Have The Reliable Data? An Exploration Of Data Quality For Aids Information System In China, Hong Chen, Ping Yu, Ning Wang

Faculty of Engineering and Information Sciences - Papers: Part A

A national AIDS program evaluation system has been applied to the ranking of the performance of involved public health organizations in China since 2007. The system provides quantitative performance comparison information based on automatic mining of the data stored in a unified web-based national information system, China AIDS Comprehensive Response Information Management System (the CRIMS). Hence, the quality of the AIDS program evaluation system is directly related to the data quality in the CRIMS. This study aims to evaluate the performance of the AIDS program evaluation system. The research method is qualitative interview of public health practitioners in Jiangxi Province. …


Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg Oct 2012

Analysis - Toward A New American Military., Adam Lowther, Jan Kallberg

Jan Kallberg

In releasing the United States Department of Defense’s (DoD) Sustaining U.S. Global Leadership: Priorities for 21st Century Defense and Defense Budget Priorities and Choices in January 2012, President Barack Obama and Secretary of Defense Leon Panetta offered a rationale for the administration’s reductions in defense spending. By stating that the shift in strategic direction is an effort to “put our fiscal house in order” and a response to the 2011 Budget Control Act, which requires DoD to reduce spending by $487 billion between fiscal years 2012 and 2021, the United States’ NATO partners in Europe were given considerable reason for …


Slides: Impacts Of Oil Shale On Carbon Emissions, Jeremy Boak Feb 2010

Slides: Impacts Of Oil Shale On Carbon Emissions, Jeremy Boak

The Promise and Peril of Oil Shale Development (February 5)

Presenter: Dr. Jeremy Boak, Center for Oil Shale Technology & Research, Colorado School of Mines

43 slides


Slides: The Elusive Bonanza, Randy Udall Feb 2010

Slides: The Elusive Bonanza, Randy Udall

The Promise and Peril of Oil Shale Development (February 5)

Presenter: Randy Udall, Co-founder, Association for the Study of Peak Oil-USA

62 slides


Trends. The Ghost In The Machine: Is Bill Clinton Running Us Policy On China, Ibpp Editor Apr 2001

Trends. The Ghost In The Machine: Is Bill Clinton Running Us Policy On China, Ibpp Editor

International Bulletin of Political Psychology

This article discusses aviation safety and the continuity of use/misuse of words by U.S. administrations, regardless of political affiliation.


Aerospace And Foreign Policy, Ibpp Editor Jun 1997

Aerospace And Foreign Policy, Ibpp Editor

International Bulletin of Political Psychology

The author discusses developing and implementing foreign policy towards the Peoples Republic of China regarding the market for aircraft and aerospace technology.


Cultural Transposition: Exploring Meanings Of And Strategies For Cross-Cultural Transfer Of Organizational Practices, Yongming Tang Jan 1993

Cultural Transposition: Exploring Meanings Of And Strategies For Cross-Cultural Transfer Of Organizational Practices, Yongming Tang

Engineering Management & Systems Engineering Theses & Dissertations

The research objective is to study the phenomenon of transferring organizational practices which are conceptualized in one culture to another different culture. The purpose of the study is (1) to understand how cultural values and beliefs are manifested in behavior; (2) to explore how the Western organizational practices are interpreted and assimilated into an organization in an Eastern culture; and (3) to explore strategies for the fit between local cultural orientations and imported organizational practices. A qualitative, interpretive, and reflexive research methodology was developed to conduct this study.

The study was conducted in two phases. The first phase was designed …