975 resultados para Submarine warfare


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The mobile component of a community inhabiting a submarine boulder scree/cliff was investigated at Lough Hyne, Ireland at dawn, midday, dusk and night over a 1-week period. Line transects (50 m) were placed in the infralittoral (6 m) and circumlittoral (18 m) zones and also the interface between these two zones (12 m). The dominant mobile fauna of this cliff consisted of echinoderms (6 species), crustaceans (10 species) and fish (23 species). A different component community was identified at each time/depth interval using Multi-Dimensional Scaling (MDS) even though both species diversity (Shannon-Wiener indices) and richness (number of species) remained constant. These changes in community composition provided indirect evidence for migration by these mobile organisms. However, little evidence was found for migration between different zones with the exception of the several wrasse species. These species were observed to spend the daytime foraging in the deeper zone, but returned to the upper zone at night presumably for protection from predators. For the majority of species, migration was considered to occur to cryptic habitats such as holes and crevices. The number of organisms declined during the night, although crustacean numbers peaked, while fish and echinoderms were most abundant during day, possibly due to predator-prey interactions. This submarine community is in a state of flux, whereby, community characteristics, including trophic and energetic relationships, varied over small temporal (daily) and spatial (m) scales.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This chapter evaluates the potential for legal regulation of the resort to cyber warfare between states under the ‘jus ad bellum’ (the law on the use of force). Debate in the literature has largely concerned whether cyber warfare falls within the scope of Article 2(4) UNC. The first part of this chapter sets out this debate. It then goes on to argue that the ‘Article 2(4) debate’ often misses the fact that an act of cyber warfare can be considered a breach of a different legal rule: the principle of non-intervention. The chapter further considers some of the issues in applying either the prohibition of the use of force or the principle of non-intervention to cyber warfare, and then concludes by arguing that the debate should be reoriented to focus on another existing international legal obligation: the duty to prevent cyber-attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Cyber warfare is an increasingly important emerging phenomenon in international relations. The focus of this edited volume is on this notion of cyber warfare, meaning interstate cyber aggression, as distinct from cyber-terrorism or cyber-crime. Waging warfare in cyberspace has the capacity to be as devastating as any conventional means of conducting armed conflict. However, while there is a growing amount of literature on the subject within disciplines, there has been very little work done on cyber warfare across disciplines, which necessarily limits our understanding of it. This book is a major multidisciplinary analysis of cyber warfare, featuring contributions by world-leading experts from a mixture of academic and professional backgrounds.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The military offers a form of welfare-for-work but when personnel leave they lose this safety net, a loss exacerbated by the rollback neoliberalism of the contemporary welfare state. Increasingly the third sector has stepped in to address veterans’ welfare needs through operating within and across military/civilian and state/market/community spaces and cultures. In this paper we use both veterans’ and military charities’ experiences to analyse the complex politics that govern the liminal boundary zone of post-military welfare. Through exploring ‘crossing’ and ‘bridging’ we conceptualise military charities as ‘boundary subjects’, active yet dependent on the continuation of the civilian-military binary, and argue that the latter is better understood as a multidirectional, multiscalar and contextual continuum. Post-military welfare emerges as a competitive, confused and confusing assemblage that needs to be made more navigable in order to better support the ‘heroic poor’.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Sociologisk Forsknings digitala arkiv

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Information infrastructures are an eclectic mix of open and closed networks, private and public systems, the Internet, and government, military, and civilian organisations. Significant efforts are required to provide infrastructure protection, increase cooperation between sectors, and identify points of responsibility. The threats to infrastructures are many and various, and are increasing daily: information warfare, hackers, terrorists, criminals, activists, and even competing organisations all pose significant threats that cannot be sufficiently dealt with using the current infrastructure model. We present a National Information Infrastructure model that is based on defence against threats such as information warfare.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Research into Intelligent Agent (IA) technology and how it can assist computer systems in the autonomous completion of common office and home computing tasks is extremely widespread. The use oflA's is becoming more feasible as the functionality moves Into line with what users require for their everyday computing needs. However, this does not mean that IA technology cannot be exploited or developed for use in a malicious manner, such as within an Information Waifare (IW) scenario, where systems may be attacked autonomously by agent system implem-entations. This paper will discuss tne cilrrenlStcite Ofmalicious use of lA's as well as focusing on attack techniques, the difficulties brought about by such attacks as well as security methods, both proactive and reactive, that could be instated within compromised or sensitive systems.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper examines the ethics of the practice of information warfare at both the national and corporate levels. Initially examining the present and past actions of individual hackers, it moves to the more organised, future military and economic warfare scenarios. It examines the lack of legal or policy initiatives in this area.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The continuing erosion of civil liberties in Western democracies, and in particular Australia, as a response to the threat of terrorist attack - the position taken that laws eroding civil liberties will ultimately fail in its attempt to combat terrorist activity while adding to human insecurity and violence - counter-terrorism measures resulting in the militarisation of law enforcement and provoking terrorism - linking counter-terrorism with globalisation.

Relevância:

20.00% 20.00%

Publicador: