Chapter 1. Introduction -- Chapter 2. The Portrayal of Women in Jihadi Organizations -- Chapter 3. Operation-based Jihadi Organizations -- Chapter 4. State-building Jihadi Organizations -- Chapter 5. Women in Operation-based Jihadi Organizations -- Chapter 6. Women in State-building Jihadi Organizations: Legitimacy -- Chapter 7. Women in State-building Jihadi Organizations: Public Goods and Service Provision -- Chapter 8. Women in State-building Jihadi Organizations: Security -- Chapter 9. Conclusion.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Intro -- Foreword -- Preface -- Contents -- Acronyms -- List of Figures -- List of Tables -- Chapter 1: Introduction -- 1.1 Introduction to Modern Conflict -- PMESII -- DIME and Conflict Domains -- DIME/PMESII -- Contemplations on Conflict -- 1.2 Introduction to Ontologies -- Definition of Ontology -- Representing Knowledge in an Ontology -- Ontology Languages -- Foundational, Core, and Domain Ontologies -- 1.3 Previous Work -- 1.4 Organization of the Book -- Chapter 2: Modern Conflict -- 2.1 Conflict -- Unconventional Conflict -- Conventional Conflict -- New Rules -- Hybrid War -- Cyber War -- 2.2 Definition of Modern Conflict -- Operations Conducted in Modern Conflict -- Conventional Warfare -- Unconventional Warfare -- Operations Other than War -- Cyberwar, Intelligence, and Special Operations -- Relative Likelihood of Overall Conflict Types -- Conflict as a Complex Adaptive System -- 2.3 Theories of Conflict -- Sun Tzu -- Machiavelli -- Clausewitz -- Liddell Hart -- Wylie -- The Maritime Theory -- The Air Theory -- The Continental Theory -- The Mao Theory -- Comparison of the Theories -- DuBois, Hughes, and Low -- Axioms -- Components of Combat -- Combat Functions and Processes -- Combat Potential and Combat Power -- Combat Structure -- US Marine Corps -- The Nature of War -- The Theory of War -- Preparing for War -- The Conduct of War -- Chinese Thinking -- Unrestricted Warfare -- Chinese Military Strategy -- The Hundred-Year Marathon -- Qualitative Analyses -- Qualitative Combat Analyses -- Qualitative Non-combat Analyses -- Quantitative Analyses -- Grand Strategy -- 2.4 Illustrations of Conflict -- Attrition Warfare and the Cold War -- Maneuver Warfare and Desert Storm -- Castle Warfare -- Naval Warfare -- Unconventional Conflict -- Cyber and Information War -- Diplomatic Conflict -- Economic Conflict.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Intro -- Foreword -- Preface -- Contents -- List of Figures -- List of Tables -- Acronyms -- Chapter 1: Introduction -- Introduction to Unconventional Conflict -- Definition of Unconventional Conflict -- Characterization of Unconventional Conflict -- Operations Conducted in Unconventional Conflict -- Organizing Principles for Unconventional Conflict -- Introduction to Ontologies -- Definition of Ontology -- Representing Knowledge in an Ontology -- Foundational and Core Ontologies -- Ontology Languages -- Philosophy and Pragmatism -- Chapter 2: Overview of the Unconventional Conflict Ontology -- Sources for the Unconventional Conflict Ontology -- Haskins List -- IW Decomposition List -- FASP Taxonomy -- Hillson Taxonomy -- HSCB Taxonomy -- Metrics V3 Taxonomy -- OCRS Taxonomy -- PRIME Taxonomy -- Doing Windows Network -- ISSM Network -- VV& -- A Tool Ontology -- Corruption Model Ontology -- MPICE Ontology -- Inferences as a Source -- Situation-Independent Ontology -- Context -- Metric PMESII Ontology -- Metric Type Ontology -- Actor Ontology -- Action Ontology -- Environment Ontology -- Stocks-and-Flows Ontology -- Semantic Concept Ontology -- Recap of What We Can Say About What We Know -- Situation-Dependent Ontology -- Goal-Task-Owner (GTO) Structures -- Owner Rules -- AAR Structures -- Actor Relations Structures -- Theories Ontology -- A Total Ontology -- New Context Diagram -- Ontology Relationships -- Adding to the Ontology -- Chapter 3: Actor Ontology -- Ontology Organization -- Individual Actors -- Key Leader Actors -- Other Individual Actors -- Significant Group Actors -- Social Organization Actors -- Economic Organization Actors -- Armed Force Actors -- Political Organization-Unarmed Actors -- Political Organization-Armed Actors -- Demographic Group Actors -- Static Population Actors -- Mobile Population Actors -- Inanimate Actors.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
Intro -- Foreword -- Praise for Cognitive Superiority -- Prologue to Warfare in a Cyber Age -- The Conflict Domains -- The Combatants -- The Conflict Matrix -- The Inevitable Effects -- The Claim -- The Audience -- Contents -- List of Figures -- List of Tables -- About the Authors -- Chapter 1: Introduction: Humans and Their Matrix -- The Technium -- The Noosphere -- The Target: Humans -- Change -- Defining Revolutions -- The Cyber Revolution -- More than Cyber -- Sensing-the Surveilled World (the Panopticon) -- Complexity Science and Network Dynamics -- The Six Domains of Conflict -- The Fourth Domain: Space -- The Fifth Domain: Cyber -- Cognition, the Sixth Domain -- The Time Frames and Battlefields -- Biosecurity (the Essential Tool Is Information) -- The Combatants -- Winning in the Sixth Domain -- The Cognitive Battleground -- Cognitive Superiority (Condensed) -- Organization of the Book -- Chapter 2: The Technium: Tools and Targets of the Conflicts -- The Targets in the Technium -- Basic Technium Components -- Cognified Objects (Toward the Internet of Things) -- Communication (Apropos the Technium) -- Vulnerabilities in the Technium (Surfaces of Attack) -- Attack-Tools of the Technium -- Malware and Defenses -- Malware -- Bots -- Memes -- Malicious Actions -- Computational Propaganda -- Time Duration of Successful Attacks -- Defensive Tools and Actions -- Trust Technologies -- Influence, Persuasion, Manipulation, Coercion, Control -- Computerized Persuasion -- Persuasion Through Search Engines -- Persuasion in the xR World -- Persuasion in the AI World -- Fake News and Disinformation (the Power of Perfidy) -- Detecting Fake News and Disinformation -- Narrative Warfare -- Surveillance and the Panopticon (Our Surveilled World) -- Sensing and Communication -- Computation -- Status -- Biological Tools -- Biosecurity and Biological Attacks.
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext: