National security and the future最新文献

筛选
英文 中文
TotalWarning 总警告
National security and the future Pub Date : 2023-12-18 DOI: 10.37458/nstf.24.3.1
Giliam de Valk
{"title":"Total\u0000Warning","authors":"Giliam de Valk","doi":"10.37458/nstf.24.3.1","DOIUrl":"https://doi.org/10.37458/nstf.24.3.1","url":null,"abstract":"It is explored[1] in what ways we can warn in order to protect our way of life and our critical infrastructures. From a methodological perspective, we could warn in four different ways. For to assess there is a threat, warning scenarios are composed for which critical indicators are developed. Subsequently, these critical indicators are monitored. It seems suited for a broad range of issues where access to information is limited. For to assess there is no threat, a barrier model can be constructed, focusing on critical chains of the process or production to be interrupted. It will lead to interventions for which politics must be willing to bear the costs. For to refute there is a threat, the adversaries modus operandi (AMO) are broken into visible activities during the preparation and execution of the hostile act. It is monitored though suspicious indicators, in which it is tried to refute that these indicators belong to a certain AMO. It seems suited to protect people and objects – like airports. For to refute there is no threat, the threat is broken down into its composing variables. For each variable, assumptions are formulated as if there is no threat. Subsequently, it is tried to falsify these assumptions. It seems suited for a wide range of issues, and can include both events and drivers in its analysis. [1] The author thanks Ludo Block and Danny Pronk for their comments and suggestions.","PeriodicalId":475234,"journal":{"name":"National security and the future","volume":" 63","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138994713","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ISIS’s digital Jihad Preparation ISIS 的数字圣战准备工作
National security and the future Pub Date : 2023-12-18 DOI: 10.37458/nstf.24.3.2
Eleni Kapsokoli
{"title":"ISIS’s digital Jihad Preparation","authors":"Eleni Kapsokoli","doi":"10.37458/nstf.24.3.2","DOIUrl":"https://doi.org/10.37458/nstf.24.3.2","url":null,"abstract":"The advent of the digital revolution has introduced several means for the collection, spread, and dissemination of information within the realm of communication, thus transcending geographical and time constraints. The swift digitization and transformation of contemporary societies have created an unusual security landscape, exerting its influence across every facet of human, societal, economic, and political life. Technology stands as a pivotal variable in the dynamic evolution of terrorism. Cyberspace has emerged as a fertile domain for the amplification and continuation of terrorist activities, representing a profound “transformation” at the operational level over recent decades. Terrorists have adeptly seized upon the potential of cyberspace, strategically imitating successful tactics employed by like-minded, assimilating lessons from past mistakes, and adapting to exigencies of both the present and future. The extensive deployment of information communication and technologies (ICTs) has substantially facilitated terrorists’ activities in a multitude of ways. This includes cost reduction, the generation of operational efficiencies, broader access to novel target demographics, the provision of anonymity, heightened security measures, the dissolution of organizational barriers, and the amplification of the scope and reach of their actions. The full spectrum of cyber activities conducted by terrorists can be comprehensively encapsulated within a model titled the “Digital Jihad”. This paper intends to apply this model in the context of examining the activities and strategies of the Islamic State of Iraq and Syria (ISIS).","PeriodicalId":475234,"journal":{"name":"National security and the future","volume":" 44","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138963331","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Iranian Involvement in the War in Ukraine and its Implication on Broader Arenas as the Middle-East - The Test Case of Unmanned Drones 伊朗卷入乌克兰战争及其对中东等更广泛领域的影响--无人机试验案例
National security and the future Pub Date : 2023-12-18 DOI: 10.37458/nstf.24.3.7
Barak Bouks
{"title":"The Iranian Involvement in the War in Ukraine and its Implication on Broader Arenas as the Middle-East - The Test Case of Unmanned Drones","authors":"Barak Bouks","doi":"10.37458/nstf.24.3.7","DOIUrl":"https://doi.org/10.37458/nstf.24.3.7","url":null,"abstract":"The war in Ukraine introduced new methods of combat. Washington Policy institute notes that 2,000-2,400 drones were ordered from Iran, while being launched towards Ukrainian infrastructures as electricity, according to Kiev. Iran had also used unmanned drones targeting civilian population centers. Through feedback and military buildup, Iran implements the noted strategy in parallel arenas via proxies as Hezbollah in Lebanon. Hezbollah had already threatened the Israeli gas rig Karish in July 2022. The noted combat drone tactics were implemented towards Israel in the Middle-Eastern arena, following the October 7th 2023 massacre and its subsequent war.","PeriodicalId":475234,"journal":{"name":"National security and the future","volume":"9 2","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138995029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信