Skip to main content

Collection: Online Resources

Filter results

Loading...

Search results

List view record 721: The role of defence/military in regional security cooperation : an interpretation of the ASEAN PracticeList view anchor tag for record 721: The role of defence/military in regional security cooperation : an interpretation of the ASEAN Practice
List view record 722: Army News : 2007 special issueList view anchor tag for record 722: Army News : 2007 special issue
List view record 723: Are there any special ethical problems posed by the use of autonomous weapon systems in war?List view anchor tag for record 723: Are there any special ethical problems posed by the use of autonomous weapon systems in war?
List view record 724: Decisive battle and operational art: contradictory or complementary notions?List view anchor tag for record 724: Decisive battle and operational art: contradictory or complementary notions?
Thumbnail for Decisive battle and operational art: contradictory or complementary notions?

Decisive battle and operational art: contradictory or complementary notions?

2023
In this essay, the author explores the dynamic relationship between the traditional military concepts of ‘Decisive Battle’ and ‘Operational Art’. While ‘Decisive Battle’ traditionally embodies the idea of a single, pivotal confrontation that determines the outcome of a conflict, ‘Operational Art...
List view record 725: Navy News: Feature StoriesList view anchor tag for record 725: Navy News: Feature Stories
List view record 726: Ethical problems posed by the use of autonomous weapon systems in warList view anchor tag for record 726: Ethical problems posed by the use of autonomous weapon systems in war
Thumbnail for Ethical problems posed by the use of autonomous weapon systems in war

Ethical problems posed by the use of autonomous weapon systems in war

Singapore Armed Forces2021
The author has structured the essay in five parts. He first defines what Autonomous Weapon Systems (AWS) and Artificial Intelligence (AI) are. He describes the rules that AWS are expected to operate under when dealing with combatants and non-combatants. He then explains why accounting for the act...
List view record 727: U.S. Army War College guide to national security issuesList view anchor tag for record 727: U.S. Army War College guide to national security issues
List view record 728: Attributing cyber attacks [journal article]List view anchor tag for record 728: Attributing cyber attacks [journal article]
Thumbnail for Attributing cyber attacks [journal article]

Attributing cyber attacks [journal article]

Rid, Thomas, 1975-In: Journal of Strategic Studies, Vol. 38 Nos. 1-2, p. 4-37
Who did it? Attribution is fundamental. Human lives and the security of the state may depend on ascribing agency to an agent. In the context of computer network intrusions, attribution is commonly seen as one of the most intractable technical problems, as either solvable or not solvable, and as d...
List view record 729: Military Professionalism - A Platoon Commander's ViewList view anchor tag for record 729: Military Professionalism - A Platoon Commander's View
Clear current selections
items currently selected
View my active Pick list
0Items in my active Pick list