Time filter

Source Type

Security-Widefield, United States

Wahlgren P.,University of Stockholm | Wingfield T.C.,George rshall European Center For Security Studies
Computer | Year: 2010

Deterrence, civil defense, collective defense, and arms control were key national security doctrines in the 20th century, and they are being reevaluated now for application to cyberspace. © 2010 IEEE. Source

Von Heinegg W.H.,European University Viadrina | Schmitt M.N.,Us Naval War College | Wingfield T.C.,George rshall European Center For Security Studies
Computer | Year: 2012

A cyberattack involving military or intelligence operations might not rise to the level of a use of force under international law. © 2012 IEEE. Source

Peresin A.,University of Zagreb | Cervone A.,George rshall European Center For Security Studies
Studies in Conflict and Terrorism | Year: 2015

An unprecedented number of Western women have recently joined the Islamic State of Iraq and Syria (ISIS). The group has envisaged strictly non-combat roles for them, but violence is an essential part of their embraced ideology and several signs suggest that they could claim a more militant role. Their marginalization, however, is essential for the preservation of ISIS’s power system and it is consequently unlikely that it would accommodate such aspiration, at least in the areas of the proclaimed caliphate. It could be different in the West, where women returning from conflict areas or those, even more numerous, anxious to join but unable to travel, could engage in violent acts. © Taylor & Francis Group, LLC. Source

Mullins S.,George rshall European Center For Security Studies | Mullins S.,University of Wollongong
Terrorism and Political Violence | Year: 2013

This study aims to address the relative lack of research examining the Canadian experience of terrorism relating to the "Global Salafi Jihad." The fundamental research question was "What have people living in, or from, Canada been doing to support or advance violent jihad either at home or abroad?" Data were collected on individuals active from the 1980s through to the end of 2011 in an effort to be as exhaustive as possible. They were analysed according to three broad categories: background variables; operational variables; and investigations and outcomes. The sample was further divided into two and results compared according to whether individuals began offending before or after September 11, 2001, in order to assess change over time. The article begins with a brief history of terrorism in Canada, followed by the methodology, analysis of variables, and summary and conclusions. Cases included and excluded from the analysis are listed in Appendices A and B respectively. © 2013 Copyright Taylor and Francis Group, LLC. Source

Sarkesain J.F.,The Aerospace Corporation | Wingfield T.C.,George rshall European Center For Security Studies | Dementis G.,U.S. Navy | Sousa G.N.B.,Portuguese Navy
Computer | Year: 2010

Cyberwarfare countermeasures must consider more than technological capabilities. © 2006 IEEE. Source

Discover hidden collaborations