The impacts of ocean acidification on marine ecosystems and reliant human communities

SC Doney, DS Busch, SR Cooley… - Annual Review of …, 2020 - annualreviews.org
Racism. Sexism. Heterosexism. Gender binarism. Together, they comprise intimately
harmful, distinct, and entangled societal systems of self-serving domination and privilege …

Machine learning for social science: An agnostic approach

J Grimmer, ME Roberts… - Annual Review of Political …, 2021 - annualreviews.org
Social scientists are now in an era of data abundance, and machine learning tools are
increasingly used to extract meaning from data sets both massive and small. We explain …

Cyber security meets security politics: Complex technology, fragmented politics, and networked science

M Dunn Cavelty, A Wenger - Contemporary Security Policy, 2020 - Taylor & Francis
In the last decade, cyber incidents have become more expensive, more disruptive, and in
many cases more political, with a new body of theoretically informed research emerging in …

The dual role of artificial intelligence in developing smart cities

ME Zamponi, E Barbierato - Smart Cities, 2022 - mdpi.com
Defining smart city pillars, and their nature and essence, continues to be debated in the
scientific literature. The vast amount of information collected by electronic devices, often …

[图书][B] Radical war: Data, attention and control in the twenty-first century

M Ford, A Hoskins - 2022 - books.google.com
This book examines the digital explosion that has ripped across the battlefield, weaponizing
our attention and making everyone a participant in wars without end." Smart" devices, apps …

Fancy bears and digital trolls: Cyber strategy with a Russian twist

B Jensen, B Valeriano, R Maness - Military Strategy in the 21st …, 2020 - taylorfrancis.com
How states employ coercion to achieve a position of advantage relative to their rivals is
changing. Cyber operations have become a modern manifestation of political warfare. This …

The microfoundations of state cybersecurity: Cyber risk perceptions and the mass public

N Kostyuk, C Wayne - Journal of Global Security Studies, 2021 - academic.oup.com
Cybersecurity represents a unique national security challenge for states: data breaches with
the potential for national, macro-level consequences are most likely to occur at the micro …

Why Cyber Dogs Have Yet to Bark Loudly in Russia's Invasion of Ukraine (Summer 2022)

N Kostyuk, E Gartzke - 2022 - repositories.lib.utexas.edu
Prior to the Russian invasion of Ukraine, pundits agreed that the ongoing crisis was likely to
involve extensive cyber conflict. Some argued that cyber war would accompany traditional …

A fragile public preference for cyber strikes: Evidence from survey experiments in the United States, United Kingdom, and Israel

R Shandler, ML Gross, D Canetti - Contemporary Security Policy, 2021 - Taylor & Francis
To what extent does the public support the use of cyber weapons? We propose that public
exposure to the destructive potential of cyber-attacks will dispel the clear cross-national …

A new and better quiet option? Strategies of subversion and cyber conflict

L Maschmeyer - Journal of Strategic Studies, 2023 - Taylor & Francis
Theorizing on cyber conflict has moved from warfare to conflict short of war, but strategic
thought has not kept pace. This article argues cyber conflict is subversive, builds on …