排序方式: 共有4条查询结果,搜索用时 15 毫秒
1
1.
Cyber operations are relatively a new phenomenon of the last two decades.During that period,they have increased in number,complexity,and agility,while their design and development have been processes well kept under secrecy.As a consequence,limited data(sets)regarding these incidents are available.Although various academic and practitioner public communities addressed some of the key points and dilemmas that surround cyber operations(such as attack,target identification and selection,and collateral damage),still methodologies and models are needed in order to plan,execute,and assess them in a responsibly and legally compliant way.Based on these facts,it is the aim of this article to propose a model that i))estimates and classifies the effects of cyber operations,and ii)assesses proportionality in order to support targeting decisions in cyber operations.In order to do that,a multi-layered fuzzy model was designed and implemented by analysing real and virtual realistic cyber operations combined with interviews and focus groups with technical-military experts.The proposed model was evaluated on two cyber operations use cases in a focus group with four technical-military experts.Both the design and the results of the evaluation are revealed in this article. 相似文献
2.
Jihadist violence is typically associated with being particularly indiscriminate. Often, as in variations of the ‘new terrorism’ thesis, this characteristic is proposed to correspond in some way to its other attributes such as its globalised, decentralised and ‘postmodern’ religious nature. Recent work appears to give more substance to such claims, by claiming to show a relationship between indiscriminate violence and decentralised group organisation. However, in this paper we show, based on an analysis of jihadist targeting in Western Europe and America from 2001 to 2013, that targeting choices by jihadists unconnected to organised militant groups have in fact been consistently more, rather than less discriminate in their targeting choices than their better-integrated peers. Drawing on this finding, as well as a broader reading of jihadist targeting discourses, we argue for a more complex understanding of the relationship between radicalisation, extremist ideology, decentralisation, and targeting choice. 相似文献
3.
4.
David French Jonathan Boff Jacqueline L. Hazelton Eric Sayers Bradford Lee Colin S. Gray 《战略研究杂志》2013,36(6):897-909
The purpose of this article is to analyse British strategic nuclear targeting between 1974 and 1979, prior to the successful completion of the sophisticated modification to Polaris submarine-missile system codenamed Chevaline. It will use as its starting point the parameters for UK strategic nuclear targeting, and the foundation of the ‘Moscow Criterion’, prior to the deployment of Britain's Polaris submarines which began in 1968. It will then discuss the recommendation by the Chiefs of Staff to retarget Polaris in 1975/76 and the implications of that recommendation in terms of the British approach to strategic nuclear deterrence. The article will conclude with an assessment of these retargeting decisions on the decision to replace Polaris with the US Trident system in 1980. 相似文献
1