Skip to main content

Collection: Online Resources

Filter results

Loading...

Search results

List view record 711: Navy News: Feature StoriesList view anchor tag for record 711: Navy News: Feature Stories
List view record 712: Army News : 2007 special issueList view anchor tag for record 712: Army News : 2007 special issue
List view record 713: Are there any special ethical problems posed by the use of autonomous weapon systems in war?List view anchor tag for record 713: Are there any special ethical problems posed by the use of autonomous weapon systems in war?
List view record 714: Decisive battle and operational art: contradictory or complementary notions?List view anchor tag for record 714: Decisive battle and operational art: contradictory or complementary notions?
Thumbnail for Decisive battle and operational art: contradictory or complementary notions?

Decisive battle and operational art: contradictory or complementary notions?

2023
In this essay, the author explores the dynamic relationship between the traditional military concepts of ‘Decisive Battle’ and ‘Operational Art’. While ‘Decisive Battle’ traditionally embodies the idea of a single, pivotal confrontation that determines the outcome of a conflict, ‘Operational Art...
List view record 715: Ethical problems posed by the use of autonomous weapon systems in warList view anchor tag for record 715: Ethical problems posed by the use of autonomous weapon systems in war
Thumbnail for Ethical problems posed by the use of autonomous weapon systems in war

Ethical problems posed by the use of autonomous weapon systems in war

Singapore Armed Forces2021
The author has structured the essay in five parts. He first defines what Autonomous Weapon Systems (AWS) and Artificial Intelligence (AI) are. He describes the rules that AWS are expected to operate under when dealing with combatants and non-combatants. He then explains why accounting for the act...
List view record 716: U.S. Army War College guide to national security issuesList view anchor tag for record 716: U.S. Army War College guide to national security issues
List view record 717: Attributing cyber attacks [journal article]List view anchor tag for record 717: Attributing cyber attacks [journal article]
Thumbnail for Attributing cyber attacks [journal article]

Attributing cyber attacks [journal article]

Rid, Thomas, 1975-In: Journal of Strategic Studies, Vol. 38 Nos. 1-2, p. 4-37
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as d...
List view record 718: Military Professionalism - A Platoon Commander's ViewList view anchor tag for record 718: Military Professionalism - A Platoon Commander's View
List view record 719: Lloyd's MIU handbook of maritime security / Rupert Herbert-Burns, Sam Bateman, Peter LehrList view anchor tag for record 719: Lloyd's MIU handbook of maritime security / Rupert Herbert-Burns, Sam Bateman, Peter Lehr
List view record 720: The Psychology of Fake News By Nakiran Rajandran and Stephanie PhangList view anchor tag for record 720: The Psychology of Fake News By Nakiran Rajandran and Stephanie Phang
Thumbnail for The Psychology of Fake News By Nakiran Rajandran and Stephanie Phang

The Psychology of Fake News By Nakiran Rajandran and Stephanie Phang

Singapore Armed Forces2025
Grey zone conflicts target the human psychology – actors understand and capitalise on the psychological dynamics of ambiguity and manipulation to sow discord, erode trust, and exploit vulnerabilities to achieve a strategic advantage. Our service personnel are prime targets for such operations of ...
Clear current selections
items currently selected
View my active Pick list
749Items in my active Pick list