History Of Anarchism In Russia
In: International affairs
ISSN: 1468-2346
739298 Ergebnisse
Sortierung:
In: International affairs
ISSN: 1468-2346
In: International affairs
ISSN: 1468-2346
In: International affairs
ISSN: 1468-2346
In: International affairs
ISSN: 1468-2346
v. 1. From the Roman invasion to the Wars of Roses -- v. 2. From the Wars of the Roses to the Great Rebellion -- v. 3. From the Great Rebellion to the fall of Marlborough -- v. 4. From the fall of Marlborough to the Peninsular War -- v. 5. From the Peninsular War to the death of Sir Robert Peel -- v. 6. From the death of Sir Robert Peel to the illness of the Prince of Wales -- v. 7. From the illness of the Prince of Wales to the British occupation of Egypt -- v. 8. From the British occupation of Egypt to the opening of Parliament, 1895 -- v. 9. From the opening of Parliament, 1895, to the death of Queen Victoria and accession of Edward VII. ; Mode of access: Internet.
BASE
v. l. From the Roman invasion to the wars of the roses.--v. 2. From the wars of the roses to the great rebellion.--v. 3. From the great rebellion to the fall of Marlborough.--v. 4. From the fall of Marlborough to the peninsular war.--v. 5. From the peninsular war to the death of Sir Robert Peel.--v. 6. From the death of Sir Robert Peel to the illness of the Prince of Wales.--v. 7 From the illness of the Prince of Wales to the British occupation of Egypt.--v. 8. From the British occupation of Egypt to the opening of Parliament, 1895. ; Mode of access: Internet.
BASE
Companies continuously struggle to quantify the value of their information in an attempt to gain a better understanding of the return on investment of their information technology (IT) architecture. One approach companies have taken to place a numeric value on information is to treat it as a traditional economic asset (e.g. equipment, buildings, and vehicles) that is governed by its own unique set of laws. Once an enterprise understands the behavior of information it can incorporate Skyrme's "10 value adding aspects of information" when developing IT architecture, thus maximizing the potential value of their information. Like most enterprises, the Intelligence Community (IC) is continuously trying to assess the value of their Intelligence Sharing Architecture. Currently, work is being done inside the Department of Defense (DoD) using Value Focused Thinking (VFT) to compare the value of different Intelligence, Surveillance and Reconnaissance (ISR) force mixtures. The current ISR force sizing study is very beneficial for evaluating today's ISR force mixtures, but little research has been done to evaluate the ISR force mixtures of the future. This research will present a generic methodology allowing any enterprise to determine the value of future IT architecture; specifically, it will be applied to the IC for determining the value of intelligence gathering capabilities for the year 2040.
BASE
Capital controls, policy measures used by governments to regulate cross-country financial flows, have become standard policy options in many emerging market economies. This paper will focus on what capital controls reveal about the state of the economy and the implications of such revelation for policy efficacy. Using a small open economy model with a collateral constraint and over-borrowing relative to the social optimum, I incorporate a representative agent's Bayesian updating of information in response to change in policy and show that the efficacy of capital controls to contain financial crises and improve welfare could be undermined if the agent rationally learns from policy. Empirically, this paper finds that capital controls convey important information market participants use to improve their understanding of fundamentals. This paper highlights the need for policymakers to take into account the un-intended consequences of information revelation in the design of capital ow management policies.
BASE
How information literate are Facebook users? An online survey (N = 742) was conducted to examine how Facebook allows users to develop skills and abilities concerning the correct use of information (e.g., knowing how to find information, correctly dealing with information on Facebook, and adhering to privacy, as well as legislation governing Internet policies). One approach, based on the Association of College and Research Libraries standards and the derived research model, provides the framework for our study design and data interpretation. We investigate users' self-assessments of their perceptions of information literacy on Facebook. Concerning evaluation, adherence to laws/ethics, and privacy, our participants performed well. In terms of representation, making use of, and creating information, however, they felt less sure of themselves. Taking all building blocks into account, users appear to rate themselves, on average, at a medium level of information literacy (1.71 on a scale between 0 and 3). In addition, the differences between our women and men are statistically very significant. Men estimated their information literacy levels to be higher than women did. Comparing general Facebook use with Facebook groups' behavior indicates that general Facebook functions develop more information literacy abilities than do operations in Facebook group functions. Thus, users' general information behavior strongly influences their information literacy levels on Facebook.
BASE
In: Revista da Escola de Guerra Naval: periódico especializado em estudos estratégicos, Band 28, Heft 2, S. 707-722
ISSN: 2359-3075
The aim of this article is to understand how the information disorder influences and sets the stage for using the information as a weapon. It claims that bearing in mind the means, the message, and the audience, information can be utilized as a weapon of mass disruption. The paper examines the chaotic environment that surrounds the informational sphere, the information disorder. It analyses why it is possible to assert that information is a weapon of mass disruption, and it presents definitions to support the analysis, beginning with the meaning of disruption and conceptualizing the term "weapons of mass disruption". The paper brings another concept that has evolved recently, the "Cognitive Warfare". The essay states that information disorder background supports and provides the necessary conditions to the use of information as a weapon of mass disruption. At the same time, this weaponization itself feeds back and boosts disorder, in a vicious cycle that represents a direct threat to global security. It concludes that when introduced into a disordered world fueled by emerging technology and social media, information may cause harsh damage in a culture or government by exploring manipulation and the vulnerabilities and cognitive biases of the human brain.
Intro -- THE HISTORY OF MEN: Essays in the History of American and British Masculinities -- Contents -- Preface -- Acknowledgments -- Introduction -- 1. Invisible Masculinity -- American Masculinities -- 2. Born to Run: Fantasies of Male Escape from Rip Van Winkle to Robert Bly -- 3. Consuming Manhood: The Feminization of American Culture and the Recreation of the Male Body, 1832-1920 -- 4. Baseball and the Reconstitution of American Masculinity, 1880-1920 -- 5. Men's Responses to Feminism at the Turn of the Century -- 6. The Cult of Masculinity: American Social Character and the Legacy of the Cowboy -- 7. From "Conscience and Common Sense" to "Feminism for Men": Pro-Feminist Men's Rhetoric of Support for Women's Equality -- British Masculinities -- 8. From Lord and Master to Cuckold and Fop: Masculinity in 17th-Century England -- MUNDUS FOPPENSIS AND THE LEVELLERS -- 9. "Greedy Kisses" and "Melting Extasy": Notes on the Homosexual World of Early 18th-Century England as Found in Love Letters Between a certain late Nobleman and the famous Mr. Wilson -- Notes -- References -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- R -- S -- T -- U -- V -- W -- Y.
In: Cornell Law Review, Band 101
SSRN