<?xml version="1.0" ?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>'Warfare' - Tagged Articles - Inquiries Journal</title>
    <link>http://www.inquiriesjournal.com/keyword/warfare</link>
    <description>Inquiries Journal provides undergraduate and graduate students around the world a platform for the wide dissemination of academic work over a range of core disciplines.</description>
    <language>en-us</language>
    <pubDate>Fri, 15 May 2026 05:52:43 -0400</pubDate>
    <lastBuildDate>Fri, 15 May 2026 05:52:43 -0400</lastBuildDate>
	
			<item>
				<title>Theoretical Utilisation of Biological Warfare from Aquatic Invasive Species</title>
				<link>http://www.inquiriesjournal.com/articles/1705/theoretical-utilisation-of-biological-warfare-from-aquatic-invasive-species</link>
				<description>By Richard J. Neale - The Peruvian population became infected from eating shellfish that had ingested plankton, and from drinking or bathing in water supplies drawn directly out of the rivers which at best had only minimal processing. It worked its way inland, and was spread faster due to massive overcrowding, whilst the waters themselves spread along the coastline. The lack of water purification, chlorination protocols, insufficient infrastructure with regards to medical facilities and waste disposal, coupled with minimal international support lead to 4,000 deaths within a matter of weeks, with a further 393,000 contracting...</description>
				<pubDate>Thu, 16 Nov 2017 11:42 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1705/theoretical-utilisation-of-biological-warfare-from-aquatic-invasive-species</guid>
			</item>
			<item>
				<title>When Trying to Surprise Your Opponents Backfires: Exposing the Weaknesses of the Indirect Approach</title>
				<link>http://www.inquiriesjournal.com/articles/1647/when-trying-to-surprise-your-opponents-backfires-exposing-the-weaknesses-of-the-indirect-approach</link>
				<description>By Joshua  Schwartz - It is often thought that great military strategists do not engage in simple, frontal assaults, but instead devise complex plans meant to deceive, manipulate, and surprise their enemies. However, do such strategies always lead to victory? If not, what are some of the reasons why they fail to? In order to answer these questions, this paper will examine one such strategy known as the &quot;indirect approach,&quot; which was developed by Basil Liddell Hart, a famous British historian and military strategist. The main concept of the indirect approach is that the optimal military strategy is to position your...</description>
				<pubDate>Mon, 22 May 2017 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1647/when-trying-to-surprise-your-opponents-backfires-exposing-the-weaknesses-of-the-indirect-approach</guid>
			</item>
			<item>
				<title>Suicide Terrorism as a Tactic: How Dominant, yet Subtle Representations Form Identities and Meanings</title>
				<link>http://www.inquiriesjournal.com/articles/1636/suicide-terrorism-as-a-tactic-how-dominant-yet-subtle-representations-form-identities-and-meanings</link>
				<description>By Frank  Mariscal - Although terrorism has been present in the world for centuries, it is only since the 1980s that suicide terrorism has become an object of study for academics and an existing concern for government professionals. While discourses on suicide terrorism have evolved, and passed through small, but varied cycles of resurgences, one of the bigger revivals of suicide terrorism discourse appeared in 2001, after the horrific attacks of 9/11. This paper analyzes the two major discourses surrounding the motivations that terrorist organizations in the Middle East have for utilizing the tactic of suicide bombing...</description>
				<pubDate>Sun, 30 Apr 2017 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1636/suicide-terrorism-as-a-tactic-how-dominant-yet-subtle-representations-form-identities-and-meanings</guid>
			</item>
			<item>
				<title>Crossed Wires: International Cooperation on Cyber Security</title>
				<link>http://www.inquiriesjournal.com/articles/1341/crossed-wires-international-cooperation-on-cyber-security</link>
				<description>By Madeline  Carr - Although cyber security is quite clearly a &amp;lsquo;post-state&#39; problem, it has actually proven very difficult to move beyond a Westphalian conception of either the problem or the possible solutions. This leads to a central paradox about cyber security as we currently conceive it: on the one hand, it appears to be a problem that cannot be dealt with effectively by state instruments like the military or law enforcement but despite that, there remains a strong expectation that the state retains responsibility for providing security in this realm. This paradox has led to an emphasis in cyber security...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1341/crossed-wires-international-cooperation-on-cyber-security</guid>
			</item>
			<item>
				<title>Book Review: &quot;Cyber War Will Not Take Place&quot;</title>
				<link>http://www.inquiriesjournal.com/articles/1342/book-review-cyber-war-will-not-take-place</link>
				<description>By Justine  Chauvin - In Cyber War Will Not Take Place1, Thomas Rid develops his argument on the concept of &quot;cyberwar&quot;, previously formulated in an article of the same name2 published in January 2012. His chief point is that &quot;cyber war has never happened in the past, it does not occur in the present, and it is unlikely that it will disturb our future&quot;;3 ergo the use of this concept to describe cyberoffenses is misleading.4 He has also written several articles related to cyberwar5, cyberweapons6 and cyberpeace,7 in which he argues against the militarization of the debate about cyberattacks,8 and in particular the confusing...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1342/book-review-cyber-war-will-not-take-place</guid>
			</item>
			<item>
				<title>Stuxnet: The World&#39;s First Cyber... Boomerang?</title>
				<link>http://www.inquiriesjournal.com/articles/1343/stuxnet-the-worlds-first-cyber-boomerang</link>
				<description>By Alex  Middleton - In June 2012, two years after the initial discovery of the Stuxnet worm,1 an excerpt from David Sanger&#39;s then soon to be released book entitled Confront and Conceal was published in the New York Times.2 This piece, purportedly based on the testimony of several current and former American, European and Israeli officials, declared that Stuxnet &amp;ndash; &quot;the world&#39;s first fully fledged cyber weapon&quot;3 was engineered by the United States and Israel as part of a wider covert operation aimed at undermining the Iranian nuclear program.4 Whilst the United States and Israel had long been suspected of developing...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1343/stuxnet-the-worlds-first-cyber-boomerang</guid>
			</item>
			<item>
				<title>The Internet as a Slippery Object of State Security: The Problem of Physical Border Insensitivity, Anonymity and Global Interconnectedness</title>
				<link>http://www.inquiriesjournal.com/articles/1344/the-internet-as-a-slippery-object-of-state-security-the-problem-of-physical-border-insensitivity-anonymity-and-global-interconnectedness</link>
				<description>By Memphis  Krickeberg - Cybersecurity is presented in the growing literature on the subject as an essentially &quot;slippery&quot; object for state security.1 The Internet puts a lot of stress on the conventional conception of state security as the insurance of the state&#39;s survival in the international realm. In addition, cybersecurity supposedly leads to a reconfiguration of state security which must be apprehended through new paradigms. In this article we establish a typology of the main arguments found in cybersecurity discourses that emphasize fundamental differences between cybersecurity and more conventional factors of state...</description>
				<pubDate>Sun, 31 Jan 2016 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1344/the-internet-as-a-slippery-object-of-state-security-the-problem-of-physical-border-insensitivity-anonymity-and-global-interconnectedness</guid>
			</item>
			<item>
				<title>Ancient Greek Women and Warfare: Building a More Accurate Portrait of Ancient Women Through Literature</title>
				<link>http://www.inquiriesjournal.com/articles/1049/ancient-greek-women-and-warfare-building-a-more-accurate-portrait-of-ancient-women-through-literature</link>
				<description>By A. H. Aghababian - The present study explores the portrayal of women in ancient Greek literature within the context of warfare. More specifically, this work focuses on Classical Period Greek literature, particularly between 450 and 350 BCE, written by Athenian men. The genres studied include tragedy, comedy, philosophical works, and histories. As a highly elusive and largely unexplored subject, the lives of the women of antiquity are often generalized by modern scholars. Feminists and classicists tend to recombine all the information they find, regardless of genre or context, attempting to produce a well-supported...</description>
				<pubDate>Tue, 16 Jun 2015 08:58 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1049/ancient-greek-women-and-warfare-building-a-more-accurate-portrait-of-ancient-women-through-literature</guid>
			</item>
			<item>
				<title>An Analysis on the Regulation of Grey Market Cyber Materials</title>
				<link>http://www.inquiriesjournal.com/articles/1193/an-analysis-on-the-regulation-of-grey-market-cyber-materials</link>
				<description>By Kelsey  Annu-Essuman - The creation of the computer network system and its spread throughout the international realm has opened doors for new ways of gathering information as well as manipulating this information for both protective and malicious purposes. While the material stored within computer systems is often thought of as being privy to the user of that system and whomever the user decides to share their data with, the rise in cyberattacks has proven otherwise. Cyber &quot;crime&quot; or &quot;attacks&quot;─the exploitation of Internet and, more generally, computer vulnerabilities in order to access and use private information ─...</description>
				<pubDate>Sat, 01 Nov 2014 12:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1193/an-analysis-on-the-regulation-of-grey-market-cyber-materials</guid>
			</item>
			<item>
				<title>Defending the Cyber Realm</title>
				<link>http://www.inquiriesjournal.com/articles/1082/defending-the-cyber-realm</link>
				<description>By Alex  Middleton - There is a widespread belief that as societies and governments become increasingly reliant upon information technology, they in turn are becoming more vulnerable to a whole range of cyber-threats.1 Whether these dangers are capable of generating enough damage to warrant a redistribution of government resources is the question at the heart of this essay. This paper provides an evaluation of the cyber-threat arguing that it deserves recognition as a top-tier priority given that it poses some significant challenges to both national security and economic prosperity. Whilst cyber -crime falls under...</description>
				<pubDate>Wed, 01 Jan 2014 07:58 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1082/defending-the-cyber-realm</guid>
			</item>
			<item>
				<title>The Law of Attack in Cyberspace: Considering the Tallinn Manual&#39;s Definition of &#39;Attack&#39; in the Digital Battlespace</title>
				<link>http://www.inquiriesjournal.com/articles/775/the-law-of-attack-in-cyberspace-considering-the-tallinn-manuals-definition-of-attack-in-the-digital-battlespace</link>
				<description>By Michael J. Norris - A lawful attack in armed conflict is predicated on four cumulative conditions. First, the target must be a &#39;military objective.&#39; Second, the &#39;means&#39; and &#39;method&#39; employed to attack the target must be lawful. Third, the attacker must take specified precautions. Finally, the attack must not cause damage to civilian objects or civilians excessive in relation to the concrete and direct military objective anticipated.[3] Attacks which do not meet these four conditions are considered unlawful. However, operations that do not meet the threshold of attack are not subject to the aforementioned conditions...</description>
				<pubDate>Tue, 22 Oct 2013 10:33 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/775/the-law-of-attack-in-cyberspace-considering-the-tallinn-manuals-definition-of-attack-in-the-digital-battlespace</guid>
			</item>
			<item>
				<title>The State&#39;s Struggle to Master Asymmetrical Warfare</title>
				<link>http://www.inquiriesjournal.com/articles/1610/the-states-struggle-to-master-asymmetrical-warfare</link>
				<description>By Joe  Wisniewski - The only way to truly study asymmetrical warfare is to take into account its long history. Thus, this paper utilizes a dataset that contains almost two hundred wars fought since 1817 in order to measure the relationship between the duration of asymmetrical war and the state&#39;s chances of victory. The results showcased little difference in the state&#39;s percentage of victory for short and medium length wars. For wars over three years, the chances of victory for the state plunged by thirty-one percent. This &quot;three year switch&quot; fits into existing models on how terrorism is effectively evolving to combat...</description>
				<pubDate>Mon, 31 Dec 2012 12:00 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/1610/the-states-struggle-to-master-asymmetrical-warfare</guid>
			</item>
			<item>
				<title>Cracking the Digital Vault: A Study of Cyber Espionage</title>
				<link>http://www.inquiriesjournal.com/articles/629/cracking-the-digital-vault-a-study-of-cyber-espionage</link>
				<description>By Constantine J. Petallides - The Internet originated with research funding provided by the Department of Defense Advanced Research Projects Agency (DARPA) to establish a military network. As its use expanded, a civilian segment evolved with support from the National Science Foundation (NSF) and other science agencies.[3] While wired connections between mainframes at certain bases existed as early as the late 1950s,[4] these rudimentary links had very limited functionality. The connection was usually unreliable, and in some cases could only transmit small bundles of data in one direction. While it is true that these connections...</description>
				<pubDate>Tue, 03 Apr 2012 08:05 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/629/cracking-the-digital-vault-a-study-of-cyber-espionage</guid>
			</item>
			<item>
				<title>Cyber Terrorism and IR Theory: Realism, Liberalism, and Constructivism in the New Security Threat</title>
				<link>http://www.inquiriesjournal.com/articles/627/cyber-terrorism-and-ir-theory-realism-liberalism-and-constructivism-in-the-new-security-threat</link>
				<description>By Constantine J. Petallides - This level of exposure and uncertainty creates a new security dilemma faced by all states. In his article &amp;ldquo;Virtual Defense,&amp;rdquo; James Adams adopts a strict neorealist approach to dealing with issues of cyber terrorism and security, and while he does lessen the security dilemma, he creates a tense, distrustful, and ultimately unsustainable international system. I argue along with Johan Eriksson and Giampiero Giocomello that to deal with these security threats, the Internet must be viewed as having its own customs and states must come together to promote its continued development and ensure...</description>
				<pubDate>Fri, 23 Mar 2012 10:00 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/627/cyber-terrorism-and-ir-theory-realism-liberalism-and-constructivism-in-the-new-security-threat</guid>
			</item>
			<item>
				<title>Combat Motivation During the First World War</title>
				<link>http://www.inquiriesjournal.com/articles/408/combat-motivation-during-the-first-world-war</link>
				<description>By Craig  Stewart-Hunter - This paper considers the combat motivations of British men during the First World War; why did men fight, and once in the trenches, continue to  figh? The paper focuses on British forces, due to the amount of available material regarding Britain and their continued  recruitment and combat activity during the conflict, as well as briefly examining how  propaganda might have influenced the minds of the male population into fighting in this conflict. This is done by examining historian&amp;rsquo;s arguments as to why these men continued to fight and how propaganda drove these men to volunteer and once...</description>
				<pubDate>Tue, 15 Mar 2011 12:53 EDT</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/408/combat-motivation-during-the-first-world-war</guid>
			</item>
			<item>
				<title>Botulinum Toxins: Bad Bug or Miracle Medicine?</title>
				<link>http://www.inquiriesjournal.com/articles/324/botulinum-toxins-bad-bug-or-miracle-medicine</link>
				<description>By Erin B. Byers - Botulinum toxin (abbreviated as BTX or BoNT for botulinum neurotoxin) is a protein produced by the spore-forming, anaerobic, bacilli bacterium Clostridium botulinum. C. botulinum spores are found in soil and marine sediment worldwide as well as in the gastrointestinal tracts of some animals, including humans. Botulinum neurotoxins (BoNT) are some of the most toxic proteins known with a median lethal dose (LD50) of 1 ng/kg to 3 ng/kg, depending on the transmission route (Montecucco &amp;amp; Molgo, 2005; Koirala, n.d.). Seven serologically distinct types of BoNT have been identified and are designated...</description>
				<pubDate>Tue, 16 Nov 2010 10:33 EST</pubDate>
				<guid>http://www.inquiriesjournal.com/articles/324/botulinum-toxins-bad-bug-or-miracle-medicine</guid>
			</item>
	</channel>
</rss>
