Books and journals Case studies Expert Briefings Open Access
Advanced search

Search results

1 – 10 of over 29000
To view the access options for this content please click here
Book part
Publication date: 15 October 2008

Use and impact of Information-Communication Technology in modern conflict: The war in Iraq

Uroš Svete

Technology has always been one of the decisive factors, by which the outcome of conflict or war ought to be influenced without any doubt. But with…

HTML
PDF (199 KB)
EPUB (152 KB)

Abstract

Technology has always been one of the decisive factors, by which the outcome of conflict or war ought to be influenced without any doubt. But with Information-Communication Technology (ICT) appearance it seems the revolutionary changes began concerning conflict perception, the organisation of actors waging a war and (spatial) spheres where conflicts are taking place. The case of last Iraqi war should confirm this thesis. The main purpose of my research paper is therefore to prove that ICT has really multidimensional impacts regarding recent conflicts and wars and these impacts should be analysed with interdisciplinary approach in any case.

So my research paper based especially on strategic (defence) studies as well as on communication and sociological theory guidelines, what actually ensures a real interdisciplinary approach. Within these three basic theoretical approaches the concepts such as propaganda, perception management and information operations/warfare as well as asymmetric warfare, have also been used.

Regarding research limitations and future work to do, my proposal is focusing towards information theory and informatics science, which should also be incorporated in modern conflict analysis. Without very good knowledge of how Internet is working and what are its technical possibilities there is no change, virtual part of recent conflicts is being treated properly.

Practical implications of the paper are visible especially in the proposal (model) how recent conflicts should be treated and understood and this is not important just for strategists and intelligence personal but also for journalists, academics etc. And practical implications as well as methodology approach based on the interdisciplinary has also added the main value and originality of the paper. It must be clear that the way how reality is constructed through the ICT (what is actually the point of constructivism theory) has tremendous importance also within conflict and strategic studies.

Details

Armed Forces and Conflict Resolution: Sociological Perspectives
Type: Book
DOI: https://doi.org/10.1016/S1572-8323(08)07006-9
ISBN: 978-1-8485-5122-0

To view the access options for this content please click here
Book part
Publication date: 21 June 2014

Close to the edge: Cyberterrorism today

Giampiero Giacomello

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks…

HTML
PDF (230 KB)
EPUB (284 KB)

Abstract

Purpose

This chapter examines the phenomenon of cyberterrorism, which is a form of terrorism that could be potentially devastating as terrorists could, through computer networks, wreak havoc in the critical infrastructure of an advanced country.

Methodology/approach

Review of relevant literature.

Findings

The chapter argues that there are actually two types of cyberterrorism: “Hard-Rock” and “Lite.” Both are potential “force multiplier” for terrorists. The former relies on attacking a country’s infrastructures via computer networks and blocking the working of critical functions like water and energy distribution and the like. Because of its complexity and costs, this type of cyberterrorism is far from frequent and actually almost non-existent. The latter type (Lite) is much more commonplace and is the capability by terrorist organizations to use the Web (and the Internet) to communicate with their affiliates, recruit new elements and, most importantly, publicize their deeds.

Research limitations/implications

Because the use of the Web and the Internet by terrorists give intelligence agencies more opportunities to actually monitor them, this form of terrorism is much more a “double-edged sword” than regular terrorism.

Originality/value of the chapter

The chapter tries to better classify and compare the two forms of cyberterrorism; it also shows how remote the prospect of Hard-Rock Cyberterrorism still is.

Details

Understanding Terrorism
Type: Book
DOI: https://doi.org/10.1108/S1572-8323(2014)0000022015
ISBN: 978-1-78350-828-0

Keywords

  • Cyberterrorism
  • information operations
  • psychological operations
  • computer networks
  • terrorists’ communications

To view the access options for this content please click here
Article
Publication date: 11 October 2011

Terrorism and the internet: a double‐edged sword

Shima D. Keene

The purpose of this paper is to highlight the extent of the use of the internet by terrorist organisations to achieve their strategic and operational objectives.

HTML
PDF (84 KB)

Abstract

Purpose

The purpose of this paper is to highlight the extent of the use of the internet by terrorist organisations to achieve their strategic and operational objectives.

Design/methodology/approach

The methodology adopted consisted of an extensive literature review on topics to include Islamic terrorism, cyber crime, globalisation, and financial crime, supported by field work to verify findings.

Findings

Al‐Qaeda has become a radical Islamic phenomenon held together through its global network of communities, both virtual and physical. One significant enabler has been the internet, which enables anonymous communication, aids recruitment, encourages the sharing of knowledge, as well as playing a significant role in the spreading of propaganda. The understanding of the use of internet‐based technologies, not only as a potential target for terrorist attack, but as a tool to achieve its ideological and operational goals, remains a neglected area of study requiring further focus.

Originality/value

This paper serves as a useful guide to alert and educate counter‐terrorism professionals, law enforcement and policy makers of the significance of the extent of the use of the internet for purposes such as operational planning, recruitment, psychological operations and fund raising. It is essential that these subjects should not be viewed as a peripheral issue to cyber‐terrorism, but instead, should be considered to be central to the existing counter‐terrorism effort.

Details

Journal of Money Laundering Control, vol. 14 no. 4
Type: Research Article
DOI: https://doi.org/10.1108/13685201111173839
ISSN: 1368-5201

Keywords

  • Internet
  • Terrorism
  • Globalization
  • Al‐Qaeda
  • Internet technology
  • Risk assessment
  • Psychological operations

To view the access options for this content please click here
Book part
Publication date: 29 November 2012

Are Covert Operations the only Effective (Military) Answer to Asymmetric Warriors?

Uroš Svete

Purpose – An analysis of the security implications of asymmetric warfare and counterinsurgency.Methodology/approach – This chapter provides a review of the relevant…

HTML
PDF (158 KB)
EPUB (100 KB)

Abstract

Purpose – An analysis of the security implications of asymmetric warfare and counterinsurgency.

Methodology/approach – This chapter provides a review of the relevant literature based on historical, defense-strategic and also a wider security-political qualitative approach.

Findings – The results show that the military is not always the best and the only instrument to counter asymmetric war. Intelligence and covert action play a certain role, but cause additional problems, also with regard to international law.

Research limitations/implications – Further research should be done with regard to a coordination and cooperation of the various actors and bodies engaged in countering insurgency and asymmetric warfare.

Originality/value of paper – This is a research paper with practical implications.

Details

New Wars, New Militaries, New Soldiers: Conflicts, the Armed Forces and the Soldierly Subject
Type: Book
DOI: https://doi.org/10.1108/S1572-8323(2012)0000019008
ISBN: 978-1-78052-638-6

Keywords

  • Asymmetric warfare
  • counterinsurgency
  • covert action

To view the access options for this content please click here
Article
Publication date: 13 February 2017

Matching expectations for successful university student volunteering

Megan Paull, Maryam Omari, Judith MacCallum, Susan Young, Gabrielle Walker, Kirsten Holmes, Debbie Haski-Leventhal and Rowena Scott

The purpose of this paper is to demonstrate the importance of expectation formation and matching for university student volunteers and their hosts.

HTML
PDF (311 KB)

Abstract

Purpose

The purpose of this paper is to demonstrate the importance of expectation formation and matching for university student volunteers and their hosts.

Design/methodology/approach

This research involved a multi-stage data collection process including interviews with student volunteers, and university and host representatives from six Australian universities. The project team undertook an iterative process of coding and interpretation to identify themes and develop understanding of the phenomenon.

Findings

University student volunteering has the potential to fail to meet the expectations of at least one of the parties to the relationship when the expectations of the parties are not clearly articulated. Universities operating volunteer programmes have an important role in facilitating expectation formation and matching, minimising the chances of mismatched expectations.

Research limitations/implications

The study confirms the operation of a psychological contract for university student volunteers and organisations who host them which is consistent with other research in volunteering demonstrating the importance of matching expectations.

Practical implications

The paper identifies the importance of expectation formation and matching for hosts and students, and highlights the role of universities in facilitating matchmaking.

Originality/value

This paper contributes to the growing body of research on the role of the psychological contract in volunteering, in particular in university student volunteering and host organisations.

Details

Education + Training, vol. 59 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/ET-03-2016-0052
ISSN: 0040-0912

Keywords

  • Volunteering
  • Psychological contract
  • Learning
  • Universities
  • Student volunteer management
  • University student volunteers

To view the access options for this content please click here
Book part
Publication date: 24 October 2018

The Boko Haram Conflict

Shola Abidemi Olabode

HTML
PDF (507 KB)
EPUB (684 KB)

Abstract

Details

Digital Activism and Cyberconflicts in Nigeria
Type: Book
DOI: https://doi.org/10.1108/978-1-78756-014-720181005
ISBN: 978-1-78756-014-7

To view the access options for this content please click here
Book part
Publication date: 19 November 2015

Leadership Models for Team Dynamics and Cohesion: The Mars Mission

Francis J. Yammarino, Michael D. Mumford, M. Shane Connelly, Eric Anthony Day, Carter Gibson, Tristan McIntosh and Tyler Mulhearn

In this chapter, we view team cohesion from a more generalized perspective of team dynamics, and focus on four leadership models for understanding these dynamics in teams…

HTML
PDF (1.1 MB)
EPUB (567 KB)

Abstract

In this chapter, we view team cohesion from a more generalized perspective of team dynamics, and focus on four leadership models for understanding these dynamics in teams in the context of the Mars Mission. Given the long duration of the mission with periods of no or intermittent communication and support, isolation and confinement, and the risk of great physical and psychological harm, having tailored leadership models for this unique team dynamics context is critical. And yet, many of these same dangerous conditions occur in other contexts such as for first responders, crisis management teams, Special Forces operations, and scientific exploration teams in extreme environments. As such, building from a model of leadership and team dynamics for dangerous contexts, for a long-duration space mission involving both Mission Control and the Astronaut Crew, these models of leadership and team dynamics include a collective-level approach for scientists and engineers, a primarily crew-based socioemotional approach, a leader-level crisis/emergency approach, and a dyadic or sortie-level approach. Implications of these models for effective leadership in building and maintaining team dynamics and cohesion for the Mars Mission and across a variety of other dangerous and extreme contexts are discussed.

Details

Team Cohesion: Advances in Psychological Theory, Methods and Practice
Type: Book
DOI: https://doi.org/10.1108/S1534-085620150000017009
ISBN: 978-1-78560-283-2

Keywords

  • Leadership models
  • team dynamics
  • dangerous contexts
  • Mars Mission

To view the access options for this content please click here
Expert briefing
Publication date: 14 October 2019

Reforms equip China for high-tech wars

Location:
CHINA

The Chinese military's Strategic Support Force.

HTML

Details

DOI: 10.1108/OXAN-DB247056

ISSN: 2633-304X

Keywords

Geographic
China
AP
Topical
international relations
computers
defence
military
reform
security
space
technology
telecommunications
To view the access options for this content please click here
Article
Publication date: 1 April 1998

The IW Threat from Sub‐State Groups: An Interdisciplinary Approach

Andrew Rathmell, Richard Overill, Lorenzo Valeri and John Gearson

This article is concerned with answering the question: What is the extent and nature of the Information Warfare (IW) threat from sub‐state radical political groups…

HTML
PDF (976 KB)

Abstract

This article is concerned with answering the question: What is the extent and nature of the Information Warfare (IW) threat from sub‐state radical political groups? Although there has been a great deal of speculation and theorising about the potential threat from terrorist groups, there has been little open source research on this subject. Even at a classified level, it appears that intelligence agencies are struggling with the construction of methodologies for threat assessment.

Details

Journal of Financial Crime, vol. 6 no. 2
Type: Research Article
DOI: https://doi.org/10.1108/eb025875
ISSN: 1359-0790

To view the access options for this content please click here
Book part
Publication date: 25 November 2009

South Korean experiences in peacekeeping and plan for the future

Kyudok Hong

This study attempts to introduce South Korea's unique experiences of civic operations made in Iraq and Lebanon. Koreans approached it with extreme caution since they are…

HTML
PDF (127 KB)
EPUB (223 KB)

Abstract

This study attempts to introduce South Korea's unique experiences of civic operations made in Iraq and Lebanon. Koreans approached it with extreme caution since they are seeing through two different lenses: “paying back syndrome” from the Korean War experiences is colliding with the “Vietnam syndrome” from the experiences of Vietnam War. Expanding its regional role through revitalizing PKOs is not an easy job for the ROK government despite the fact that President Lee has committed himself to increase its efforts since his campaign days. South Korea recently decided to send its KDX-II type destroyer to Somalia for joining the maritime peacekeeping while people in Korea strongly suspect that the Obama administration would soon request to send its troops to Afghanistan as a part of International Security Assistance Force (ISAF). As the Korean society is getting democratized, progressive NGOs have been opposing the government decision to send forces to assist the U.S. war efforts in Iraq and Afghanistan. It remains to be seen how President Lee persuades people to bear the burden and endure sacrifices. At least, four problems need to be addressed for Korea to become a major troop-contributing country (TCC): first, Korea needs to enact laws to deal with South Korea's participation in the UN PKOs. Second, Korea needs to find a way to include civilian experts in future activities of UN PKOs. Third, it needs to increase the budget and size of standby forces. Lastly, it needs to educate people to understand why Korea has to contribute further to make a safer world. It remains to be seen whether South Korea will continue to focus on its stabilization and reconstruction efforts without sending its combat troops.

Details

Advances in Military Sociology: Essays in Honor of Charles C. Moskos
Type: Book
DOI: https://doi.org/10.1108/S1572-8323(2009)000012A016
ISBN: 978-1-84855-891-5

Access
Only content I have access to
Only Open Access
Year
  • Last week (69)
  • Last month (259)
  • Last 3 months (857)
  • Last 6 months (1625)
  • Last 12 months (3193)
  • All dates (29966)
Content type
  • Article (24810)
  • Book part (3701)
  • Earlycite article (1269)
  • Case study (165)
  • Expert briefing (21)
1 – 10 of over 29000
Emerald Publishing
  • Opens in new window
  • Opens in new window
  • Opens in new window
  • Opens in new window
© 2021 Emerald Publishing Limited

Services

  • Authors Opens in new window
  • Editors Opens in new window
  • Librarians Opens in new window
  • Researchers Opens in new window
  • Reviewers Opens in new window

About

  • About Emerald Opens in new window
  • Working for Emerald Opens in new window
  • Contact us Opens in new window
  • Publication sitemap

Policies and information

  • Privacy notice
  • Site policies
  • Modern Slavery Act Opens in new window
  • Chair of Trustees governance statement Opens in new window
  • COVID-19 policy Opens in new window
Manage cookies

We’re listening — tell us what you think

  • Something didn’t work…

    Report bugs here

  • All feedback is valuable

    Please share your general feedback

  • Member of Emerald Engage?

    You can join in the discussion by joining the community or logging in here.
    You can also find out more about Emerald Engage.

Join us on our journey

  • Platform update page

    Visit emeraldpublishing.com/platformupdate to discover the latest news and updates

  • Questions & More Information

    Answers to the most commonly asked questions here