Warfare (tagged articles)
The keyword Warfare is tagged in the following 15 articles.
It is often thought that great military strategists do not engage in simple, frontal assaults, but instead devise complex plans meant to deceive, manipulate, and surprise their enemies. However, do such strategies always lead to victory? If not,... Read Article »
Although terrorism has been present in the world for centuries, it is only since the 1980s that suicide terrorism has become an object of study for academics and an existing concern for government professionals. While discourses on suicide terrorism... Read Article »
Cyber security is a compelling problem for scholars of International Politics. Internet technology is so thoroughly integrated into civil society, commerce, governance, critical infrastructures, intelligence collection and law enforcement that the... Read Article »
In Cyber War Will Not Take Place1, Thomas Rid develops his argument on the concept of "cyberwar", previously formulated in an article of the same name2 published in January 2012. His chief point is that "cyber war has never happened in the past,... Read Article »
In June 2012, two years after the initial discovery of the Stuxnet worm,1 an excerpt from David Sanger's then soon to be released book entitled Confront and Conceal was published in the New York Times.2 This piece, purportedly based on the testimony... Read Article »
Cybersecurity is presented in the growing literature on the subject as an essentially "slippery" object for state security.1 The Internet puts a lot of stress on the conventional conception of state security as the insurance of the state's survival... Read Article »
The present study explores the portrayal of women in ancient Greek literature within the context of Warfare
. More specifically, this work focuses on Classical Period Greek literature, particularly between 450 and 350 BCE, written by Athenian men... Read Article »
This paper analyzes the grey market for cyber materials by evaluating the current nature of transactions within the market. This paper claims that vendors ought to be required to disclose information (to companies) on the vulnerabilities, exploits... Read Article »
There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of cyber-threats.1 Whether these dangers are capable of generating... Read Article »
'Attack' is a term of central importance in the Law of Armed Conflict, the body of international rules and standards that regulate conduct in armed conflict (jus in bello). A 1977 amendment to the Geneva Conventions of 1949, 'Protocol I,' defines... Read Article »
The last decade of American military policy has been dedicated to fighting an enigma – how to wage war against an enemy that does not think, act, or fight like we do; an enemy that wears no uniform, utilizes any tactic, and swears its allegiance... Read Article »
Today, we live in the aftermath of the Internet revolution. Humanity has never before been more interconnected or had as much access to the same tools and information. As a driving force behind globalization and modern progress, the Internet enables... Read Article »
The Internet is the world’s great equalizer. As the driving force behind globalization and modern progress, the Internet has enabled us to communicate with others across the world almost instantly and provides a medium for cultural, informational... Read Article »
This paper considers the combat motivations of British men during the First World War; why did men fight, and once in the trenches, continue to figh? The paper focuses on British forces, due to the amount of available material regarding Britain... Read Article »
Botulinum toxin is widely known for causing a type of food poisoning known as botulism. According to the Center for Disease Control, botulism is a rare but serious paralytic illness caused by the bacterium Clostridium botulinum (Center for Disease... Read Article »
Expedited Article Review
Submit an article and get a decision fast.
If you need a fast decision, INQUIRIES Journal offers expedited processing of your submission for a small fee. Depending on the expedited review option you choose, you can receive a decision in as few as 3-days.
In addition to a shorter review period, the fee supports the journal's continued operation. Standard submissions are always free. Learn more » - Submit an Article to Inquiries Journal -