You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This edited book demonstrates a new multidimensional comprehension of the relationship between war, the military and civil society by exploring the global rise of paramilitary culture. Moving beyond binary understandings that inform the militarization of culture thesis and examining various national and cultural contexts, the collection outlines ways in which a process of paramilitarization is shaping the world through the promotion of new warrior archetypes. It is argued that while the paramilitary hero is associated with military themes, their character is in tension with the central principals of modern military organization, something that often challenges the state’s perceived monopoly on violence. As such paramilitization has profound implications for institutional military identity, the influence of paramilitary organizations and broadly how organised violence is popularly understood
Since the prohibition of the threat or use of force and the resurgence of (economic) nationalism, economic warfare has become an increasingly important substitute for actual hostilities between states. Its manifestations range from medieval sieges to modern day trade wars. Despite its long history, economic warfare remains an elusive term, foreign to international law. This book seeks to identify those portions of international law that are applicable to economic warfare. What is the status quo of regulation? Is there a jus ad bellum oeconomicum? A jus in bello oeconomico? After putting forward its own definition of economic warfare, the book reviews historical case studies – reflecting the three main branches of international economic law: trade, investment and currency – to identify pertinent legal boundaries. While the case studies reveal that numerous rules of international (economic) law regulate (specific measures of) economic warfare, it remains to be seen whether – analogously to the prohibition of the threat or use of force – these selective limitations have the potential to coalesce into a general prohibition of economic warfare in the future.
This book presents original contributions on the theories and practices of emerging Internet, data and Web technologies and their applicability in businesses, engineering and academia, focusing on advances in the life-cycle exploitation of data generated from the digital ecosystem data technologies that create value, e.g. for businesses, toward a collective intelligence approach. The Internet has become the most proliferative platform for emerging large-scale computing paradigms. Among these, data and web technologies are two of the most prominent paradigms and are found in a variety of forms, such as data centers, cloud computing, mobile cloud, and mobile Web services. These technologies to...
This book constitutes the refereed proceedings of the First International Symposium on Mobile Internet Security, MobiSec 2016, held in Taichung, Taiwan, in July 2016. The 15 revised full papers presented were carefully reviewed and selected from 44 submissions. They are closely related to various theories and practical applications in mobility management to highlight the state-of-the-art research.
This book gathers high-quality papers presented at the First International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2019), which was organized by Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, on March 29–30, 2019. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.
This book presents the proceedings of four conferences: The 16th International Conference on Frontiers in Education: Computer Science and Computer Engineering + STEM (FECS'20), The 16th International Conference on Foundations of Computer Science (FCS'20), The 18th International Conference on Software Engineering Research and Practice (SERP'20), and The 19th International Conference on e-Learning, e-Business, Enterprise Information Systems, & e-Government (EEE'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020 as part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include ...
This book presents 94 papers from the 2nd International Conference of Reliable Information and Communication Technology 2017 (IRICT 2017), held in Johor, Malaysia, on April 23–24, 2017. Focusing on the latest ICT innovations for data engineering, the book presents several hot research topics, including advances in big data analysis techniques and applications; mobile networks; applications and usability; reliable communication systems; advances in computer vision, artificial intelligence and soft computing; reliable health informatics and cloud computing environments, e-learning acceptance models, recent trends in knowledge management and software engineering; security issues in the cyber world; as well as society and information technology.
This book presents the latest research findings, methods and development techniques related to Ubiquitous and Pervasive Computing (UPC) as well as challenges and solutions from both theoretical and practical perspectives with an emphasis on innovative, mobile and internet services. With the proliferation of wireless technologies and electronic devices, there is a rapidly growing interest in Ubiquitous and Pervasive Computing (UPC). UPC makes it possible to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. It also allows users to be online even while moving around, providing them with almost permanent access to their preferred services. Along with a great potential to revolutionize our lives, UPC also poses new research challenges.
EVOLVING NETWORKING TECHNOLOGIES This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination...