Journal articles on the topic 'Digital weapon'

To see the other types of publications on this topic, follow the link: Digital weapon.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Digital weapon.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Czosseck, Christian, and Karlis Podins. "A Vulnerability-Based Model of Cyber Weapons and its Implications for Cyber Conflict." International Journal of Cyber Warfare and Terrorism 2, no. 1 (January 2012): 14–26. http://dx.doi.org/10.4018/ijcwt.2012010102.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Throughout history, mankind has developed and employed novel weapons and countermeasures. Both offensive and defensive weapon systems are limited by the laws of nature. Consequently, military concepts and doctrines were designed by implicitly taking into account those limitations. The digital age has introduced a new class of weaponry that poses an initial challenge to the common understanding of conflict and warfare due to their different characteristics: cyber weapons. This article explores the crucial differences between the conventional weapon and cyber weapon domains, starting a debate as to what extent classical concepts and doctrines are applicable to cyberspace and cyber conflict. The authors propose a definition of cyber weapons being an instrument consisting primarily of data and knowledge, presenting them in the form of prepared and executed computer codes on or a sequence of user interactions with a vulnerable system. The authors describe a vulnerability-based model for cyber weapons and for cyber defence. This model is then applied to describe the relationship between cyber-capable actors (e.g. States). The proposed model clarifies important implications for cyber coalition-building and disarmament. Furthermore, it presents a general solution for the problem of the destruction of cyber weapons, i.e., in the context of cyber arms control.
2

Kim, Eungsu, and Kiyeol Ryu. "Design for Weapon Live Test Decision Support System Using Digital Twin Architecture." Journal of the Korea Institute of Military Science and Technology 25, no. 5 (October 5, 2022): 501–12. http://dx.doi.org/10.9766/kimst.2022.25.5.501.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The purpose of the weapon live test during the phase of development is to provide essential information to decision makers that verify and validate the performance capabilities of weapons. Due to varying allocation and high variance of test resources with an increase in the weapon system’s capability, the test environment can get highly complex, which can lead to a decrease in the reliability of test results. This issue can be addressed by applying a decision support system that provides various timely information collected by resources during the test process. The decision support system can be designed by applying the concept of digital twins, that are defined as digital replicas of components, systems and processes. This paper describes a design methodology of the decision support system that consists of digital models and service functions using digital twin architecture. A case study illustrates the feasibility of the proposed methodology in supporting the weapon live test process.
3

Kim, Gakgyu, Kangkyun Jin, Yongju Cho, and Kyoungchan Won. "Initial operational capability of future weapon systems and field test method using digital twin." Journal of Advances in Military Studies 5, no. 3 (December 31, 2022): 1–22. http://dx.doi.org/10.37944/jams.v5i3.167.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The application of artificial-intelligence technology to weapon systems, is difficult to use in military applications for such reasons as killing or wounding problems, ethical problems, and field environment considerations; therefore, more-sophisticated techniques and development are required for testing and evaluation. There is an increasing demand for advanced weapon systems that incorporate new technologies, such as artificial intelligence, and for electrification, and a new paradigm that can confirm and verify the performance required for field operations is required. Therefore, through case studies on digital twins, a plan for field testing and initial operational capability in future weapon systems was developed. Five development directions were identified, including policies and systems, organization, establishment of infrastructure, and utilization plans, to establish a field test and initial operational capability. In addition, studies on economic ripple effects and cost-effectiveness were conducted based on application cases of digital twins in the private sector. An optimal method for users to safely verify performance by utilizing the digital twin method to overcome the difficulties of testing and evaluating weapon systems with new technologies from the time when the weapon system requirements are determined to mass production is proposed.
4

Puchnin, Aleksandr, and Pavel Minenko. "Digital crime weapons of the XXI century: object, means, tools." Vestnik of the St. Petersburg University of the Ministry of Internal Affairs of Russia 2022, no. 3 (October 3, 2022): 111–17. http://dx.doi.org/10.35750/2071-8284-2022-3-111-117.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article is devoted to the definition of a new subject of crime - digital weapons, the analysis of the degree and nature of the public danger of acts committed with its use. The phenomenon of digital means, tools, objects of crimes that arose as a result of the penetration of information and telecommunication technologies into everyday life is investigated. An attempt was made to formulate new categories that define inaccurate behavior on the Internet and integrate them into the current legislation. The question is raised about considering digital weapons as a threat to the national security of the Russian Federation. The timeliness and social conditionality of the criminalization of the circulation of digital data used to commit crimes and the establishment of criminal liability for the commission of acts using digital weapons are substantiated, the main measures aimed at counteracting such crimes are proposed. The legal nature and basic principles of the functioning of information tools for committing crimes are investigated. The study considers arrays of inaccurate user accounts of information and telecommunication networks as an example of a digital weapon. The article raises the question of the need to criminalize certain digital technologies that form the tools of criminals in the digital environment. Taking into account the problems raised in the article, the authors formulated proposals for improving the current legislation in the form of a new norm of the special part of the Criminal Code of the Russian Federation.
5

CHEN, Jie, Hao FANG, Bin XIN, and Fang DENG. "Modeling, Optimization and Control in Ground-based Digital Weapon Systems." Acta Automatica Sinica 39, no. 7 (March 25, 2014): 943–62. http://dx.doi.org/10.3724/sp.j.1004.2013.00943.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Mathew, Dr Alex, and Hannah Alex. "Cyberbiosecurity as the Foremost Biological Weapon to the Digital World." International Research Journal of Innovations in Engineering and Technology 06, no. 02 (2022): 75–79. http://dx.doi.org/10.47001/irjiet/2022.602013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Cyberbiosecurity has emerged as a new field combining cybersecurity and biosecurity. The convergence of cybersecurity and biosecurity can potentially impact the digital operations of enterprises in a variety of industries, including agriculture, manufacturing, and healthcare. This systematic review summarizes and synthesizes research on the increasing importance of cyber-biosecurity threats and the importance of cyber-biosecurity measures in combating the misuse of cyberspace and bioscience technology. The author performed three distinct searches through ProQuest, Web of Science, and MEDLINE databases. The author used keywords to identify 15 articles that met the systematic review’s purpose. Analysis of the 15 articles revealed that the intersection of current advancements in biosciences with conventional cyberspace security risks has promoted the awareness and discovery of threats in the cyberbiosecurity field. The author concludes that cybersecurity is the foremost biological weapon to the digital world when challenged by new technologies and security threats. As a result, cyberbiosecurity measures must safeguard the bioeconomy and address the possibility for or actual misuse of critical information, materials, and systems at the convergence of biosciences and cyberspace. Stakeholders interested in cyberbiosecurity outcomes need to be competent in its implementation.
7

Badarna, Ibrahim, and Anat Gesser-Edelsburg. "Exploring the Link between Masculine Perceptions, Violence, Social Media Influence, and Weapon Carrying and Use: A Qualitative Inquiry into Arab Adolescent Boys and Young Men in Israel." Social Sciences 13, no. 3 (March 13, 2024): 165. http://dx.doi.org/10.3390/socsci13030165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Within the Arab community of Israel, the influence of masculine perceptions, violence, the carrying of weapons, and their subsequent use are growing concerns that significantly impact public safety. The omnipresence of social media further complicates this narrative, potentially reshaping traditional notions and behaviors associated with masculinity. This study endeavors to delve deep into the relationships between masculinity, violence, and weapon carrying and use and the role that social media plays in shaping these dynamics among Arab adolescent boys and young men in Israel. By employing a qualitative constructivist lens, the research integrated content analysis, digital ethnography, and rhetorical semiotic analysis. The participants included 40 Israeli Arab Muslim and Christian adolescent boys and young men. A recurrent theme was the belief in “Maktub”, signifying preordained events, pointing to a profound cultural relationship with fatalistic views on violence. Participants’ backgrounds in relation to violence influenced their stance on weapon carrying. There was a prevalent mistrust towards law enforcement. Social media’s role was pronounced, with genre preferences acting as indicators of violent inclinations. Culturally sensitive interventions are imperative, and it is essential to construct an early childhood educational program that includes positive male role models while collaborating with epistemic authorities.
8

Chatterjee, Tirthankar, Debojyoti Bhattacharyya, Deepti Majumdar, and Madhusudan Pal. "Ergonomic Assessment of Multi Calibre Individual Weapon System in Virtual Reality Platform." Defence Science Journal 69, no. 3 (April 30, 2019): 240–48. http://dx.doi.org/10.14429/dsj.69.14426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The primary objective of the study was to assess the compatibility of multi calibre individual weapon system (MCIWS) with the shorter, medium and larger individual users of Indian Army. Three dynamic digital human models (DHM) 5thp, 50thp, 95thp army pooled (AP) population were considered to accommodate wide range (more than 90 per cent) of the army population for ergonomic analysis of the weapon system with the help of digital human modelling software Jack. Solid model of MCIWS which was in Parasolid file format X_T (*.x_t) was imported into NX5 (solid model design software) and subsequently converted to JT (*.jt) format. This solid model was later translated into Jack 5.0.1 environment. Standing, squatting and crawling with the weapon were adopted for the study. Angular deviations of important joints, posture prediction using OWAS, and comfort discomfort assessment using Dreyfus 3D method were carried out in the study. The result of the study revealed that the operation in squatting and crawling conditions may increase postural load on neck, shoulder and upper arm. The pistol grip size, shape and contour are acceptable for the taller population. Removal of corrugated gripping surface, reduction of grip diameter and space adjustment for gloves use will be effective for optimal use. The position and size of fore grip seemed suitable for the taller users. Sight system could be accessed by all three user populations. It is advised to avoid holding the weapon for long duration with hands to prevent overuse injury or undue fatigue.
9

Sundiev, Igor’ Yu, and Andrey B. Frolov. "Organizational and Digital Network Means of Terminal Destruction of Social Development." Economic Strategies 144, no. 3 (June 25, 2021): 58–69. http://dx.doi.org/10.33917/es-3.177.2021.58-69.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
At the moment, there is a change in the universal attractors of the historical process; in this regard, a new management model is required, corresponding to the new “program requirements” of the attractor “from the future”. The former political and economic regulators have fulfilled their role, but the patterns of thinking developed over the centuries do not allow for any other means of “reset” than destruction. The article analyzes who, why, and by what means attempts to preserve the existing world order. As a tool of destruction, the actors of globalization have chosen ultra-effective digital network methods of cross-border impact — a hidden organizational weapon that allows, without destroying the infrastructure facilities necessary to meet vital needs, to block the development of society through the deformation of the motivational and need base of a person. In order to identify the hidden impact of organizational weapons, the authors propose to use a methodological “polarizing filter” — a normative ranking that allows us to determine the direction of various social phenomena as the results of “horizontal” or “vertical” regulation, leading to the limit of destruction or development.
10

Pristiyono, Pristiyono, Juliana Juliana, and Yudi Prayoga. "MEASURING CUSTOMER TRUST THROUGH DIGITAL TRANSFORMATION OF BANKING AS A COMPETITIVE ADVANTAGE." Jurnal Ekonomi Bisnis dan Kewirausahaan 11, no. 2 (August 31, 2022): 214. http://dx.doi.org/10.26418/jebik.v11i2.51986.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The financial and banking industry has implemented digitalization as a marketing weapon and realized industry 4.0. The purpose of this study was to determine the extent of the implementation of banking digitalization in the expansion areas. The population of this research is the customers registered at Bank Sinar Mas Rantauprapat in 2021 as many as 1445 people. Research using multivariate data should use the number of samples in the survey as many as 200 samples with purposive sampling technique. Smart PLS data analysis through the stages of convergent validity, discriminant, composite reliability, Cronbach's alpha and R-square. The results show that customer trust is very important in the business practice of the financial or banking industry, this is because customer trust is the most effective weapon in the banking service industry based on digital transformation as banking services will be able to increase customer satisfaction and even loyalty and attract new customers. Digital transformation in the banking world is an important phenomenon as access to the realization of customer-company interactions through information and communication technology, making it easier for companies to win the competition and become a competitive advantage for banking.
11

Vizzini, R. W. "Integrated Flight/Propulsion Control System Considerations for Future Aircraft Application." Journal of Engineering for Gas Turbines and Power 107, no. 4 (October 1, 1985): 833–37. http://dx.doi.org/10.1115/1.3239819.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Flight and propulsion controls can effectively be integrated to provide operational benefits to the weapon system which cannot be achieved with either system acting independently. The key factor is the synergistic effect of digital computers and associated high-speed data links, engine condition monitoring, diagnostics, and shared power systems (hydraulic and electrical), thus providing potential improvements in reliability, life cycle cost, weight, and maintenance actions. This technical paper will address the integration concepts required for the airframe and the propulsion control configurations (for consideration in the design stages) to achieve the optimum weapon system configuration by assessing fiber optic and hardwired systems for future applications.
12

Woodlock, Delanie, Mandy McKenzie, Deborah Western, and Bridget Harris. "Technology as a Weapon in Domestic Violence: Responding to Digital Coercive Control." Australian Social Work 73, no. 3 (July 22, 2019): 368–80. http://dx.doi.org/10.1080/0312407x.2019.1607510.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Pitaya, Pitaya, and Ghifari Yuristiadhi Masyhari Makasi. "PENGUATAN STORYTELLING DALAM FORMAT DIGITAL UNTUK WISATA SEJARAH DI MUSEUM PUSAT TNI-AU DIRGANTARA MANDALA." Journal of Tourism and Economic 5, no. 1 (July 12, 2022): 1–17. http://dx.doi.org/10.36594/jtec.v5i1.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Indonesian Air Force Dirgantara Mandala Central Museum is a very special tourist attraction in Yogyakarta. This museum is a representative place to study the history of the struggle of the Indonesian people in the field of aerospace. Not only the main collection of weapons system and various other historical relics, the TNI-AU Dirgantara Mandala Central Museum also stores various patriotic and heroic stories from historical actors. Each museum collection that has its own story will be very interesting if it is expressed in the right storytelling scheme. The study focuses on how to include storytelling content related to the stories of the sky knights and the main weapon system. The method used is observation and literacy studies as well as scrutiny of documentation photos which is then recorded digitally to obtain a storytelling format model that is easy to observe repeatedly. The results show that digital storytelling may represent a new experience for tourists' understanding of museum collections. One important thing is that this storytelling format can be easily downloaded, duplicated, repeated to get information that is not only accurate but also convenient in understanding what has happened in the aerospace history of the Indonesian nation.
14

Pitaya and Ghifari Yuristiadhi Masyhari Makasi. "Penguatan Storytelling Dalam Format Digital Untuk Wisata Sejarah Di Museum Pusat TNI-AU Dirgantara Mandala." Journal Of Tourism And Economic 5, no. 1 (June 30, 2022): 1–17. http://dx.doi.org/10.36594/jtec/w3kf2r96.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The Indonesian Air Force Dirgantara Mandala Central Museum is a very special tourist attraction in Yogyakarta. This museum is a representative place to study the history of the struggle of the Indonesian people in the field of aerospace. Not only the main collection of weapons system and various other historical relics, the TNI-AU Dirgantara Mandala Central Museum also stores various patriotic and heroic stories from historical actors. Each museum collection that has its own story will be very interesting if it is expressed in the right storytelling scheme. The study focuses on how to include storytelling content related to the stories of the sky knights and the main weapon system. The method used is observation and literacy studies as well as scrutiny of documentation photos which is then recorded digitally to obtain a storytelling format model that is easy to observe repeatedly. The results show that digital storytelling may represent a new experience for tourists' understanding of museum collections. One important thing is that this storytelling format can be easily downloaded, duplicated, repeated to get information that is not only accurate but also convenient in understanding what has happened in the aerospace history of the Indonesian nation.
15

Zhou, Yuqi. "An Overview of Platform Economy and Its Algorithms: Strengths, Weaknesses and Regulatory Initiatives." BCP Business & Management 19 (May 31, 2022): 158–61. http://dx.doi.org/10.54691/bcpbm.v19i.738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Algorithm-based Platform Economy is growing rapidly, with digital capitalism as its core. Its advantage of accurately matching supply with demand has attracted an enormous amount of capital. However, the monopolistic nature of platform and the intelligent algorithms are constantly violating the bottom line of consumer privacy, making digital economy a weapon for capital to exploit the laboring people. Therefore, they should be strictly regulated, which is the only way for platform economy to deliver real benefits to working people.
16

De Cesaris, Alessandro. "What is a Digital Weapon? Towards a Functional Approach to Hypermodern Warfare Media." Philosophical Journal of Conflict and Violence 5, no. 1 (May 20, 2021): 35–51. http://dx.doi.org/10.22618/tp.pjcv.20215.1.139003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
There is a wide debate concerning cyberwar and the new dangers of the Internet, but this debate focuses too often on practical issues, while the conceptual and somehow strictly “philosophical” dimension remains unquestioned. In this article, I will try to show that a better understanding of what we mean when we speak about weapons, or at least a better understanding of the new difficulties entailed by digital technologies in the field of military devices, can help us to provide a better analysis of the risks and of the ethical issues connected to contemporary fighting. In particular, I will argue that the so-called “digital turn” entails a blurring of the distinction between weapons and non-weapons, because in what I will call our “hypermodern era” the criteria we traditionally used in order to make this distinction have become obsolete.
17

Wang, Sheng Nan, Hong Ping Zhou, Hong Wei Yuan, Hai Xiao Gan, Wen Long Wang, and Lin Gang Lan. "Strengthening of PBX Perforated Plate Based on Polymer Coating." Key Engineering Materials 891 (July 6, 2021): 137–42. http://dx.doi.org/10.4028/www.scientific.net/kem.891.137.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Perforated structure is the mechanical weak link of polymer-bonded explosive (PBX). Improving its mechanical property may promote the reliability and effectiveness of weapon system. In this study, strengthening of the perforated PBX plate is conducted by employing surface coating. Digital image correlation (DIC) analysis results suggest that the regional applied epoxy coating layer is able to improve the mechanical properties of the plate. By confining the deformation and releasing the stress concentration around the perforation, the coating layer enhances the load carrying ability and energy dissipation capacity of the plate significantly. This investigation may provide a convenient and effective structure modification method for energetic material, and at the same time, lay foundation to the performance optimization of weapon system.
18

Greer, Robert A. "The Navigation Sensor System Interface Project." Journal of Navigation 46, no. 2 (May 1993): 238–44. http://dx.doi.org/10.1017/s0373463300011577.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The AN/SSN-6 Navigation Sensor System Interface (NAVSSI) Project is a new system being designed with two primary objectives; to serve as the central distribution computer for navigation data to shipboard combat/weapon systems and to serve as the electronic chart display and information system (ECDIS). The NAVSSI will operate the digital nautical chart (DNC) database being developed by the Defense Mapping Agency (DMA). Our goal is for the digital nautical chart to replace the paper chart as a legal means of ownship navigation plotting. This paper will introduce the project and will primarily explore the use of digital nautical charts for ownship navigation with NAVSSI.
19

Woo, Sihyeong, Taesu Choi, and Dooyeol Lee. "Digital Maintenance Ecosystem Application Strategy for Condition-Based Maintenance of Air Weapon Systems." Journal of Applied Reliability 23, no. 4 (December 31, 2023): 311–24. http://dx.doi.org/10.33162/jar.2023.12.23.4.311.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Rowe, Neil C., Simson L. Garfinkel, Robert Beverly, and Panayotis Yannakogeorgos. "Challenges in Monitoring Cyberarms Compliance." International Journal of Cyber Warfare and Terrorism 1, no. 2 (April 2011): 35–48. http://dx.doi.org/10.4018/ijcwt.2011040104.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
A cyberweapon can be as dangerous as any weapon. Fortunately, recent technology now provides some tools for cyberweapons control. Digital forensics can be done on computers seized during or after hostilities. Cyberweapons differ significantly from other software, especially during development, and recent advances in summarizing the contents of storage media can locate possible cyberweapons quickly. Use of cyberweapons can be distinguished in the usual malicious Internet traffic by being aimed at targets associated with political, social, and cultural issues that are often known in advance, and those targets can then be monitored. Cyberweapons are relatively unreliable compared to other kinds of weapons because they are susceptible to flaws in software; therefore, cyberweapons require considerable testing, preferably against live targets. Thus, international “cyberarms agreements” could provide for forensics on cyberweapons and usage monitoring. Agreements also encourage more responsible cyberweapons use by stipulating attribution and reversibility. The authors discuss the kinds of international agreements that are desirable, and examine the recent interest of the U.S. government in such agreements.
21

Trupti Ulhas Chavan. "THE FUNCTION OF CLOUD COMPUTING TECHNOLOGY: AN INVALUABLE WEAPON AGAINST COVID-19." International Journal of Scientific Research in Modern Science and Technology 3, no. 3 (March 14, 2024): 08–12. http://dx.doi.org/10.59828/ijsrmst.v3i3.189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This study looks into how important cloud computing is to reducing the difficulties brought on by the COVID-19 epidemic. As the workforce becomes more reliant on digital solutions and works remotely more frequently, cloud computing becomes a vital tool for maintaining flexibility and company continuity. The study examines how cloud-based technologies, like scalable infrastructure and tools for remote collaboration, are being used to meet the extraordinary needs of distant work environments.
22

Hashimova, Albina. "PERSONNEL WORK PROCESS USING DIGITAL ECONOMY APPLICATION PROGRAMS." AGORA INTERNATIONAL JOURNAL OF ECONOMICAL SCIENCES 17, no. 2 (December 31, 2023): 78–86. http://dx.doi.org/10.15837/aijes.v17i2.6444.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Information technologies are emerging as systems that can meet the emerging demands of the business world in the conditions of increased competition and globalization. Today, with the help of information technology, it has become a value that can be multiplied and continuously produced and shared. Today, increased functionality with information technology has become the most important weapon of enterprises. Today, information technologies are used as the most important means of value creation, change, and renewal. The main purpose of the article is to determine the selection, training, and motivation of personnel for the digital economy. Also, the role of personnel emerging as a result of the digital revolution in the economy was particularly emphasized. The relevance of the study is that the increase in the labor productivity of the organization's employees and the increase in the efficiency of the personnel management system resulting from the use of digital technologies as a whole result in the increase of the competitiveness of the organizations.
23

Radziwill, Nicole M. "Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon." Quality Management Journal 25, no. 2 (April 3, 2018): 109–10. http://dx.doi.org/10.1080/10686967.2018.1436358.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Widayati, Ani, Eka Ary Wibawa, Yolandaru Septiana, and Razana Juhaida Johari. "Industrial Revolution Era 4.0: Digital Literacy of Accounting Education Students." Dinamika Pendidikan 17, no. 1 (June 26, 2022): 107–16. http://dx.doi.org/10.15294/dp.v17i1.36645.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This study aims to find out the different profile of digital literacy skills of four batches of Accounting Education students in the 4th industrial revolution era. As almost all human works will be replaced by robots and only those who have particular skills will be able to survive, it is essential to examine students’ digital literacy skills. A survey employed quantitative approach was conducted with a sample of 175 of four batches Accounting Education students of Universitas Negeri Yogyakarta. The data gathered with questionnaires technique were analysed using descriptive analysis followed with multivariate analysis. The results show that the four batches Accounting Education students have different profile of digital literacy skills in terms of selecting, addressing, and evaluating information. It is suggested for the students to be aware of the changes in digital technology and its contribution to the field of education and consider it as the weapon for them to improve their digital literacy skills.
25

Wang, Chen Ru, Lu Lu, Xia Wang, Wei Qi Jin, and Yong Zhang. "Target-Free Multi-Axes Parallelism Testing Based on Digital Image." Key Engineering Materials 552 (May 2013): 452–58. http://dx.doi.org/10.4028/www.scientific.net/kem.552.452.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the development of science and technology, the application to modern warfare of weapon systems identified with modules of laser ranging, infrared imaging and low-light viewing are more and more frequently nowadays. Their combat accuracy depends much on the parallelism of gun line and laser axis. In consequence, it is of great significance to detect and correct the non-parallelism for improving the aim and combat accuracy. The axis parallelism detection exists in not only the production and assembly, but also the adjustment in the combat clearance or field environment. It is the basic to ensure these multi-axis systems work efficiently, and is an essential link of system installation, use and maintenance. There are laboratory method and field detection method to detect the non-parallelism of gun line and laser axis. Now the laboratory method is more mature. At the same time, as it is difficult to avoid vibrations, temperature differences and harsh environment in the field detection, the axis parallelism detection in field environment is an important research direction. One of commonly used methodsaxis parallelism detection needs complex operation, specific environment, and using target, and could not realize the axis parallelism on-line detection in the fighting or running environment. To solve problems above, a multi-optic axis detecting system using a novel image processing way without target is presented in this paper. By using the method of digital image processing, it can test the non-parallelism of gun line and laser axis accurately, as the standard and correction parameter of the weapon systems axis parallelism. The system has advantages in small size, portable type, high precision, and no target. It is suitable for field detection. This paper introduces the operating principle of the system of axis parallelism detection based on digital Image without target, and focuses on the principle, realization method and experimental results of the parallelism detection of gun axis and the system of axis parallelism detection based on digital image without target. Corresponding author: Xia Wang, Associate Professor, Research interests in terms of photoelectric detection, infrared imaging system etc., TEL: 13811670583; Email: angelniuniu@bit.edu.cn
26

Utama, Agung Prija, Chandra Purnama, and Wawan Budi Darmawan. "DONALD TRUMP’S POLICY AGAINST NORTH KOREA’S BALLISTIC NUCLEAR WEAPON TEST." JWP (Jurnal Wacana Politik) 7, no. 2 (October 15, 2022): 97. http://dx.doi.org/10.24198/jwp.v7i2.41190.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This study aims to identify the typology of the United States foreign policy towards North Korea’s ballistic nuclear weapons test during the Donald Trump administration. The typology of foreign policy will be explained by using James N. Rosenau’s adaptive foreign policy model which refers to two factors that influence it, namely external and internal changes in the United States environment which are influenced by three classifications, namely personal change, political change, and social-economic change against each factor, both externaly and internaly. This research is a descriptive qualitative research. The data collection method used in this research is literature study. The data were obtained from various books, journals, electronic media and digital documents/reports, while the data analysis used sorting from the various data that had been collected and analyzing the data that was close to the focus in this study. Interpretation of the data obtained can then be poured through a description in form of writing and graphics. Based on the research that has been done, it was found that the typology of US foreign policy adaptation is promotive adaptation.
27

Mishra, Shivangi. "The dark industry of data brokers: need for regulation?" International Journal of Law and Information Technology 29, no. 4 (December 1, 2021): 395–410. http://dx.doi.org/10.1093/ijlit/eaab012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Abstract Measuring the impact of harm when the perpetrator is a faceless company operating in the shadows is akin to walking in the dark. You never know what’s awaiting you next! The data brokering industry is one such instance, possessing against you, arguably the strongest weapon today—a secret digital twin or a digital doppelganger of your attributes. In the ever-growing digital economy, is there a need to regulate this industry? This article identifies the lacuna in the law that permits its operation and argues for fixing the loopholes in order to regulate the data brokering industry. Furthermore, it sheds light on India’s missed opportunity to regulate the industry given the inchoate nature of data protection laws in the country. Finally, it raises ethical concerns and argues for a distinction between reasonable and unreasonable inferences building on Prof. Sandra Wachter’s concept of an ex ante right to reasonable inference.
28

DZIOPA, Zbigniew J., and Maciej NYCKOWSKI. "Modelling and Testing the Dynamic Properties of a Launcher with Unguided Missiles." Problems of Mechatronics Armament Aviation Safety Engineering 13, no. 4 (December 30, 2022): 51–66. http://dx.doi.org/10.5604/01.3001.0016.1457.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The work analyses the operation of the ZSMU-70 weapon module. The results allowed for the development of several guidelines, aiming to shape the dynamic properties of the WW-4 launcher in order to improve the effectiveness of the ZSMU-70 module. This meant that research was carried out at a military training ground. Unguided NLPR-70 missiles were launched. The launching process was recorded using a Phantom high-speed digital camera. The recorded images were then analysed using TEMA software. Based on the results of empirical research, a physical and mathematical model of the motion was formulated for both the ZSMU-70 module as well as the WW-4 launcher. A computer programme was developed and the motion of the system was simulated during the launching of the missiles. The results of the theoretical analysis were compared with the analogous results from the empirical research. Having the theoretical model verified, some system parameters were changed and guidelines were used to improve the effectiveness of the ZSMU-70 weapon module.
29

Davies, W. J., and R. W. Vizzini. "Engine Control Reliability and Durability Improvement Through Accelerated Mission Environmental Testing." Journal of Engineering for Gas Turbines and Power 109, no. 2 (April 1, 1987): 142–45. http://dx.doi.org/10.1115/1.3240016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The integration of aircraft control systems for future weapon systems will require the engine control system to meet the mission reliability of the flight control system. This will be accomplished through system redundancy and verified by accelerated environmental testing. Combined environment reliability testing (CERT) will assure control system structural integrity and reliability growth of engine-mounted digital electronic controls. Pratt & Whitney, under contract to the U.S. Navy, has recently completed a 10,000-hr CERT program. Dual full authority digital electronic controls (FADEC), connected by a fiber optic data link, were subjected to environmental tests simulating a composite F-14 mission profile. The FADEC units were also exposed to periodic high vibration levels which would be experienced after foreign object damage and salt spray testing to simulate aircraft carrier environment. The test results are reported herein providing insight not only into the reliability and durability of digital electronic controls but also into the equipment and procedures required for testing of future military and commercial engine control systems.
30

Erkan, Esra C¸ iftc¸ibași, and S¸ enol Uzun. "User services of tactical communications in the digital age." Journal of Telecommunications and Information Technology, no. 4 (December 30, 2004): 39–44. http://dx.doi.org/10.26636/jtit.2004.4.267.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Increasing demands on an extensive amount of digital data and information flows for C4I is forcing the modern armies to freeze and omit EUROCOM based tactical area communications system and to develop new concepts based on the adoption of modern communication systems such as ISDN, ATM described in the TACOMS Post 2000 Final Report II in NATO. ASELSAN, as a leading company in the military electronics arena, is following and participating all the activities of TACOMS Post 2000 together with Turkish Ministry of Defense. Turkey`s tactical area communications system TASMUS is a mature and fielded system, which will satisfy future communication needs of the 21st century C4I systems. In this paper, we describe the basic features and user services of TASMUS. With the support of simultaneous voice and data capabilities, TASMUS aims to form mobile, survivable, flexible and secure network to support all the present and future communication requirements of the tactical commanders. Using the near real time data communications feature, TASMUS is also significant for the network-centric warfare applications such as tactical sensor and weapon systems, besides the communication needs of the Turkish Army.
31

Bognár, Eszter Katalin. "Novel IT Technologies on the Digital Battlefield: The Application of Big Data and Data Mining Technologies." Hadmérnök 15, no. 4 (2020): 141–58. http://dx.doi.org/10.32567/hm.2020.4.10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
In modern warfare, the most important innovation to date has been the utilisation of information as a weapon. The basis of successful military operations is the ability to correctly assess a situation based on credible collected information. In today’s military, the primary challenge is not the actual collection of data. It has become more important to extract relevant information from that data. This requirement cannot be successfully completed without necessary improvements in tools and techniques to support the acquisition and analysis of data. This study defines Big Data and its concept as applied to military reconnaissance, focusing on the processing of imagery and textual data, bringing to light modern data processing and analytics methods that enable effective processing.
32

Indriya Himawan, Abdurrahman Faris, and Riska Widiyanita Batubara. "DIGITAL COMMERCE BERBASIS REHABILITASI BERSUMBERDAYA MASYARAKAT BAGI DIFABEL SLB KEMALA BHAYANGKARI GRESIK." Jurnal Pengabdian Manajemen 1, no. 2 (March 24, 2022): 75. http://dx.doi.org/10.30587/jpmanajemen.v1i2.3748.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The increasingly advanced technology gives rise to many new media that allow the development of marketing communications such as interactive television, the Internet, E-commerce, interactive telephone, and faxing. This led to changes in market segmentation, as well as the way to communicate with them. Then the cultural driving factor makes marketing communication more segmented but its reach is very broad. Certain cultures will receive communication that is appropriate to their culture. Each tool in the promotion mix has different characteristics and it is undeniable that there are still many companies that rely on one or two promotional tools to achieve their communication goals. This is in line with the marketing communication paradigm in the past which often used advertising as the "main weapon" to carry out a promotional activity, on the grounds that advertising media has a broad target audience, so that in a relatively short time the message to be conveyed by a company will be more effective. quickly reach the target audience.
33

Fedorenko, Vladimir A. "XI International conference on forensic study of weapons." Izvestiya of Saratov University. Economics. Management. Law 24, no. 2 (May 22, 2024): 232–35. http://dx.doi.org/10.18500/1994-2540-2024-24-2-232-235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article provides an overview of the two-day sessions of the XI International Conference on Forensic Study of Weapons, which was held at Saratov State University on October 17–18, 2023. The conference was attended by ballistics and criminologists experts from Saratov, Moscow, Volgograd, Nizhny Novgorod, St. Petersburg, the Kyrgyz Republic, the Republic of Armenia, Sri Lanka, the United Arab Emirates, Israel, the Republic of Belarus. The conference has been held on the basis of Saratov State University since 2011. The main issues of the conference are related to the introduction of modern technologies into forensic studies of firearms, ammunition and traces of their use. Promising methods for studying modern models of firearms, traces of their use, shot products, reconstruction of places of criminal use of firearms, identification of firearms by traces on fired bullets and spent cartridges were presented and discussed at the conference. The results of research into the effectiveness of using machine learning methods to automatically compare weapon traces on fired bullets and cartridges for the purpose of classifying them into firearms were presented in a number of reports. Separate reports were devoted to the reconstruction of crime scenes involving the use of firearms. The conference confirmed the status of a scientific platform bringing together criminologists, ballistics experts, specialists in the field of information and digital technologies, whose scientific interests are related to the study of weapons, ammunition and traces of their use.
34

Fan, Hengxu. "Leader in the Digital Entertainment Market: Netflix's Continued Success in a Fiercely Competitive Environment." Advances in Economics, Management and Political Sciences 73, no. 1 (March 5, 2024): None. http://dx.doi.org/10.54254/2754-1169/73/20231226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
As one of the world's largest digital entertainment providers, Netflix plays a crucial role in the entertainment and streaming industry. This article analyzes the main strategies for Netflix's success by using market research data, financial data, and user behavior data. Through analysis, it was found that high-quality original works are the key weapon for Netflix to win. With the help of big data and algorithm analysis, Netflix is deeply loved by consumers. In addition, Netflix's globalization strategy has gained market recognition and allowed it to maintain a competitive advantage in the global streaming media market. This article also reveals some key insights and elaborates on the challenges Netflix is currently facing from competitors and changes in user behavior patterns. Despite facing increasing competition, Netflix is still able to maintain its leading position as a streaming platform, relying on its unique strategy and continuous changes based on users and the market.
35

HEYETS, Valeriy. "SOCIAL REALITY IN THE DIGITAL SPACE." Economy of Ukraine 2022, no. 1 (January 26, 2022): 3–28. http://dx.doi.org/10.15407/economyukr.2022.01.003.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article reveals the nature of the transformation of social reality under the influence of the growing and profound use of information and communication technologies, which is based on a number of fundamental challenges that form a deep contradiction between man and his freedoms and society. Mass digitization of the latter allows to develop and bring to universalism the methods of controlling the behavior of the individual, as well as the methods of managing his psychological state. It is shown that the fundamental challenge of personal perception of reality in the digital space will be the “slipping reality”, which leads to a weakening of the preconditions of humanity and the emergence of conditions for human manipulation and choice between freedom and non-freedom (subordination). It is emphasized that algorithmization of decision-making based on the use of large databases will be increasingly used in management practice, for whose processing the so-called “weapon of mathematical destruction” is applied, which allows to lay down and realize the interest of those who collect, process and use them for their own purposes. It is substantiated that digitalization will preserve in the social space the deepening polarization of countries and populations in terms of income, ability to acquire knowledge, use of digital technologies, lifestyle, communicational abilities, etc., which may split society into those socialized on the basis of knowledge of the “mother tongue”, and those who, thanks to digitalization, have formed a social space with a “slipping reality”. There is a task to invent ways of socialization on the basis of socio-natural ethics in the social reality, which may continue to be deformed in the case of expanding existing practices in the use of digital technologies in society and the economy.
36

Li, Zhi. "Design of Shock Wave Storage and Test System with Variable Parameters Based on the Sensor of Piezoelectric Circuit." Wireless Communications and Mobile Computing 2021 (June 14, 2021): 1–11. http://dx.doi.org/10.1155/2021/5521745.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
With the wide application of science and technology in the field of weapons, shock wave is an important breakthrough point in weapon research, and the storage and testing system of shock wave is a breakthrough point that people pay most attention to at present. Shock wave data storage has the characteristics of large scale, complex structure, low cost efficiency, and strong timeliness. This paper mainly studies the design of shock wave storage test system with variable parameters based on numerical piezoelectric circuit sensor. Based on fluid dynamics simulation theory and numerical simulation method, the normal and concave-convex three-dimensional models of two pressure measuring devices are constructed by using the flow waveform of calculator, and then, the network is divided. The results show that, under the same inlet pressure, the larger the bulge or depression value, the greater the influence on the experimental results. The influence of disk is 10% higher than that of pen, and the change rate of relative difference is increased by 1.5% with the increase of concave-convex value. Finally, experiments are carried out in different environments to verify the reliability, survivability, and flexibility. The shock wave storage test system is optimized when the parameters of the digital voltage circuit sensor are variable.
37

Petrova, Ekaterina V. "Ecology of the Digital Environment as an Attempt to Respond to the Civilizational Challenges of the Digital Age." Voprosy Filosofii, no. 11 (2022): 99–109. http://dx.doi.org/10.21146/0042-8744-2022-11-99-109.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article is devoted to the analysis of the impact of digital technologies on the brain, consciousness and human nature as a whole. According to the author, this kind of impact is one of the most serious civilizational challenges of the dig­ital age. In her analysis, the author relies on the ecological approach as a holistic interdisciplinary methodological principle. The most important part of this ap­proach is the ecology of the digital environment. The digital environment in the article is considered as a new environment for a person, a new Umvelt, that is, the immediate environment that affects his inner world. Therefore, signs and stimuli that arise in the process of digital communication have such a signif­icant impact on cognitive processes. The communication situation of modern man is paradoxical in a certain sense: despite the ever-increasing complexity of technology, the communication process itself is impoverished and standard­ized. This negatively affects the evolution of the brain, as the emergence of new neural connections is not stimulated. The way out of this situation can be a pur­poseful stimulation of the development of critical thinking. Within the frame­work of an integrated ecological approach, the author relies on an ecological ap­proach to the visual perception of J. Gibson and the concept of Umwelt J. von Uexküll, substantiating a much broader theoretical applicability of environmental science than it is accepted in classical biological ecology. The author comes to the conclusion that the ecology of the digital environment contributes to find­ing answers to the civilizational challenges of the digital era and becomes the main weapon in the fight against the information and environmental crisis.
38

Miller, Andrew J., and William W. Schoening. "A CASE STUDY: USING SYSTEMS ENGINEERING TO FOSTER INNOVATION." INCOSE International Symposium 3, no. 1 (July 1993): 443–49. http://dx.doi.org/10.1002/j.2334-5837.1993.tb01611.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractThis paper presents a case study that traces the history of the McDonnell Douglas Interactive Warfare Simulation (IWARS) from its initial conception to its current state. IWARS is a digital wargaming system created by McDonnell Douglas Aerospace (MDA) to assess aerospace system requirements, impacts, and tactics in modern combat environments. IWARS is part of MDA's systems analysis program and has proven to be a valuable tool for testing weapon system design concepts and creating environments that foster innovation. IWARS itself is an innovative concept that was not readily accepted when first proposed. Systems engineering concepts were required at the earliest stages of development in order to successfully create and sell IWARS.
39

Verástegui Peña, Jorge Guillermo. "Historical evolution of political communication in electoral processes in Peru: development of democratic consciousness." SCIÉNDO 25, no. 3 (September 30, 2022): 321–24. http://dx.doi.org/10.17268/sciendo.2022.039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The objective of this study is to analyze the historical evolution of political communication in the electoral processes of Peru. Political communication has been filled with the means that are available to everyone, the use of the internet and social networks, form a conglomerate of digital communication, this digital issue is causing a great impact on all social and economic strata, political communication has advanced in such a way that communication between voter and politician is closer for the exchange ofideas and discuss proposals made by politicians, so when making a brief historical description of how political communication evolved in Peru as a state democracy and what were those changes that occurred in the political communication of Peru. It is concluded that the politician took advantage of the media to give a false promising speech and make them believe that in an eventual government of his, things would change radically, making the speech a weapon that the politician uses in his favor.
40

Toshchev, Vladimir. "Major Directions of Conflicts in the Information Space, and Their Specifics." Polylogos 8, no. 1 (27) (2024): 0. http://dx.doi.org/10.18254/s258770110028643-9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The article analyzes the concept of “information conflict”, which is quite new in the context of political science. To achieve the goal of the study, the article pays special attention to types of information conflict and specific examples from real political practice. The criteria for typologizing such conflicts have been established, and the existing differences in approaches to managing the information sphere have been highlighted. It is noted that in modern conditions a number of approaches have a political and ideological direction, which is important to take into account when considering specific situations. Today, in the context of human involvement in the digital environment, contradictions that previously existed in societies become more noticeable against the backdrop of constant information influence. The information technology sector is forcing the world community to think about the possible consequences of using cyber technologies as a military weapon. The article notes that there are precedents when cyber attacks became a casus belli for the use of traditional types of weapons. It is concluded that the potential risks associated with the information environment inevitably lead to attempts by the world's leading states to secure their communication networks, which, in turn, creates conflicts of a new type: for the dominance of one or another approach to managing the information space.
41

Ogawa, Susumu. "The Hypothesis–Testing Ordering System: A New Competitive Weapon of Japanese Convenience Stores in a New Digital Era." Industrial Relations: A Journal of Economy and Society 41, no. 4 (October 2002): 579–604. http://dx.doi.org/10.1111/1468-232x.00265.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Wilson, Grace, and Jeffrey Newcamp. "An Evaluation of the Boeing Diamond Process Model's Effectiveness for T‐7A Red Hawk Development." INCOSE International Symposium 33, no. 1 (July 2023): 883–94. http://dx.doi.org/10.1002/iis2.13059.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
AbstractThe Boeing‐Saab built T‐7A Red Hawk advanced trainer aircraft being built for the United States Air Force represents a systems engineering breakthrough because it was developed through a digital effort. This aircraft will replace the aging T‐38 Talon fleet, providing increased capability and safety for future pilot trainees. Its creation was indubitably the result of persistent systems engineering efforts and a dedication to digital development. This study analyzed how Boeing engineers created their own version of the systems engineering vee process model to advance the design process of the T‐7A physically and digitally. Their “Boeing Diamond” process methodology of top‐down system design utilized a digital engineering process and modern computer techniques. They emphasized the importance of maintainability to expand lifecycle utilization and lower system costs. Based on a literature review of the T‐7A Red Hawk and other aircraft, a comparison was drawn between the Boeing Diamond systems engineering design processes and the vee model to determine which could provide greater benefits. Through analysis, this study demonstrated that the T‐7A processes used encouraged engineers to adapt to the digital world. The study results indicated that the Boeing Diamond process for modeling and digital design supported an efficient approach to the development of the T‐7A Red Hawk and is applicable to other major weapon systems or capital equipment. This research recommends further study of the Boeing Diamond model and incorporation of its elements into traditional systems engineering models and other organizations.
43

Milić, Nevena. "Social networks as a segment of digital marketing in banking." Trendovi u poslovanju 8, no. 2 (2020): 57–69. http://dx.doi.org/10.5937/trendpos2002057m.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The accelerated development of information and communication technologies has led to a change in the way the banking sector operates. If a comparison is made between a traditional and modern banking, it can be clearly seen that new technologies have helped banks to develop and offer their customers new products and services, as well as to perform their marketing activities in a cheaper and more efficient way. The globalization of the financial market, the development of new technologies, as well as the growth of customer requirements are the causes of increasing competition in the banking market. In order to survive in the market and cope with the challenges of the modern age, banks are increasingly focusing on marketing, which is becoming the main weapon. Digital communication channels such as social networks, Web banners, blogs, display ads allow banks to place their products and services to customers in the best possible ways. The research conducted in this paper aims to indicate the impact of the use of digital communication channels on the profitability of the bank, and on the other hand to point out all the benefits of bank customers who use modern methods of advertising. The research methodology is based on a review of the literature. The subject of the research are the ways in which banks use digital communication channels, with special reference to social networks, which are the most represented communication channels in the banking market in the Republic of Serbia.
44

Ridho, Ali, Nurul Izzah S. M. Aksan, and Mohammad Sujud. "Simbiosis Mutualisme Media Massa dan Terorisme: Sebuah Analisis Kebijakan Pemerintah RI Melawan Terorisme." Jurnal Dakwah dan Komunikasi 7, no. 2 (November 28, 2022): 109. http://dx.doi.org/10.29240/jdk.v7i2.5766.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Terrorism is the enemy of humanity, nation and state in Indonesia. The rapid change and revolution in the world of technology, information, and communication is believed to be the biggest cause of the growth and development of terrorist ideologies. The majority of the mass and digital media on the other hand stand in the lap of capitalists who take advantage of the news of world terrorism, like a symbiosis of mutualism. The research focuses on the phenomenon of the relationship between mass and digital media and terrorism, as well as reading the steps of the Indonesian government in minimizing the spread of information and negative content of terrorism targeting the younger generation in Indonesia through social media. This research is a qualitative model with a content analysis approach and research data is obtained from various mass and digital media platforms, books, and reputable journals. The research concludes that the Indonesian government needs public cooperation, including mass and digital media, in an effort to minimize the spread of ideology and acts of terrorism in the digital realm. The notion of terrorism has infiltrated the younger generation through social media, so digital media literacy is considered a powerful weapon for the government to fight negative narratives targeting the millennial generation for the purpose of the ideological nation, recruitment, and acts of terror by terrorist organizations. In addition, it is necessary to create positive and soothing content as a resistance to transnational movements that differ in vision and mission from the ideology of the Indonesian state and society simultaneously and massively.
45

Kasiisii, Athikho Stephen, Siluvaimuthu Mariadoss, and Selvaraj Anthony Rahul Golden. "The Effectiveness of Digital Financial Inclusion in Improving Financial Capability." International Journal of Professional Business Review 8, no. 5 (May 11, 2023): e0839. http://dx.doi.org/10.26668/businessreview/2023.v8i5.839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Purpose: The aim of the study is to identify by exploring why digital financial inclusion has become more difficult recently. To find out what challenges faced by people where issues of financially excluded, deep-rooted problems have arisen in the path of inclusive economic development. Theoretical Framework: The financial success of the digital age is inspiring people. The digital revolution unfolds more opportunities for stakeholders to increase the inclusivity in finance of all eligible individuals with the help of technology. Design/Methodology/Approach: Any technological advancement will inevitably have both beneficial and bad effects. It is apt to focus on minimising any potential drawbacks. A wide range of assessments of the concept of digital financial inclusion, a literature review culminates as the foundation for the research design and subsequently highlights some pertinent issues. Findings: The study observed that the development of digital technology has made it a potent weapon for financial inclusion. The study points out ample space for adopting and adapting some uniqueness and good practices in the context of the place. Initiatives like Governmental person-to-person payments, domestic remittances, etc have a special significance for the financial inclusion of disadvantaged populations. Practical & Social implications: Create a digital platform to increase gender equality, minimize poverty, and enhance educational access. Greater disclosure of information and call for ingenious financial product designs. Originality/Value: Revisiting and restructuring frameworks for banking and financial institutions. Key players need to come together and collaborate in the process of a comprehensive reformative path.
46

Ravshanbekov, Bekjon. "Transition from Traditional Public Administration to Digital Public Administration and Adaptation of Public Administration to Emerging Technologies." International Journal of Law and Policy 2, no. 5 (May 30, 2024): 7–15. http://dx.doi.org/10.59022/ijlp.183.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Nowadays, modern technologies are rapidly entering every sphere of the state and society. At the same time, both the state and the people, who are the only source of state power, are equally interested in the formation of the state administration apparatus with the introduction of modern technologies and the implementation of almost all types of state services. Because the advanced technologies create a basis for the implementation of many works and processes related to state activities without requiring excessive time and effort. It's no secret that in the current globalization process, there are people who use modern technology as a weapon or use it to achieve their destructive goals. The tasks facing the state, such as rapid monitoring of such situations and achieving efficiency, effective use of technological tools as much as possible, solving emerging problems with optimal solutions, require adaptation to rapidly developing technologies and legal regulation of the use of technological tools.
47

Bezvesilna, O. M., V. D. Samoylov, and M. V. Ilchenko. "Mathematical Models of Main Units and Units of Automated Stabilization Instrument Complex." Èlektronnoe modelirovanie 43, no. 5 (October 4, 2021): 108–21. http://dx.doi.org/10.15407/emodel.43.05.108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
This work presents the developed mathematical models of the main components and units that are part of the stabilizer: control panel, gyrotachometer GT46, position sensor, control unit, etc. Mathematical models of the armament unit and turret with gearbox and motor are obtained. A mathematical model of analog and digital control path of the horizontal guidance channel is obtained; vertical guidance channel; results of mathematical modeling of control modes: for vertical channel, for horizontal channel. Mathematical models have been developed, which are used in modeling the stabilizer control modes, as well as in the study of changes in the circuit-technical solution of the weapon stabilizer in order to increase its accuracy. The reliability of the obtained results was confirmed by the results of experimental testing.
48

Zahro, Vikriatuz, Reni Putri Anggraeni, and Vicko Taniady. "Internalisasi Nilai Kebudayaan Lokal Bugis (Sipakatau, Sipakalebbi, dan Sipakainge)." PAKAR Pendidikan 18, no. 1 (June 5, 2021): 35–45. http://dx.doi.org/10.24036/pakar.v18i1.217.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
Character education is the primary weapon to form good quality students. However, the digital era's entry does not always have a positive impact, especially for students in Indonesia. The growth of individualistic attitudes, bullying behavior, lack of manners, and so on positively impact creating ethical and moral young generations. This is an urgency that must be addressed wisely in education to form a new character education model for students in Indonesia. Internalization of local-Bugis cultural values ​​is an urgency that must apply in the world of character education in Indonesia. The research method used in this research is a qualitative descriptive method using secondary data and a case study approach to the adverse effects of the digital era for students in Indonesia. This study's results indicate that the local value of Bugis, which is reflected through Sipakatau, Sipakalebbi, and Sipakainge, will positively impact the character development of students in Indonesia. So that in the end, based on these local Bugis values, it is hoped that students will be able to improve ethics and other behaviors for the better.
49

Seyedghorban, Zahra, Danny Samson, and Hossein Tahernejad. "Digitalization opportunities for the procurement function: pathways to maturity." International Journal of Operations & Production Management 40, no. 11 (November 5, 2020): 1685–93. http://dx.doi.org/10.1108/ijopm-04-2020-0214.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
PurposeThis research aims at investigating the common practical problem of how procurement can be transformed from tactical and administrative to becoming an organizational strategic partner and indeed a competitive weapon, using modern technologies in particular. We investigated how procurement can be reinvented, from being digitized to digitalized to digitally integrated, ultimately contributing in business terms beyond supply chain effectiveness but also to profit generation.Design/methodology/approachA case study approach was designed to investigate three firms, each at very different stages of digital maturity in procurement. Interviews with managers, investigation of processes and documentary materials and in-depth follow-up discussions were conducted.FindingsThe iterative digitalization transformation discovered encompasses complexities rooted in organizational structure, supply chain design and the management of the technology for employees' uptake. There are both operations and strategy implications as a result. This initial research phase led to mapping a model of digital maturity as well as identifying its underlying constructs.Originality/valueThis research discovered that the implementation of digital technologies can lead the procurement function of the supply chain to completely grow out of its administrative and clerical shell into a strategic, consultative, value-adding and potentially revenue-generating function, thereby contributing to the well-being of not only the supply chain but also the entire organization.
50

Świętochowski, Norbert, and Dariusz Rewak. "The role and place of artillery in combating “Anti-Access/Area Denial” A2/AD systems." Scientific Journal of the Military University of Land Forces 200, no. 2 (June 15, 2021): 387–401. http://dx.doi.org/10.5604/01.3001.0014.9797.

Full text
APA, Harvard, Vancouver, ISO, and other styles
Abstract:
The modern “Anti-Access/Area Denial” A2/AD systems are defined as a combination of all possible measures that can limit the ability of a potential opponent to enter and occupy a given area (operational theatre). Their action relies, among others, on radio-electronic disruption of digital guidance systems, communication, command and control systems, shooting down long-range maneuvering missiles, drones, and aircraft. The primary assumption of the anti-access concept is to deprive the enemy of the possibility of entering a given operational area (A2 – Anti-Access) through long-range destruction and depriving them of freedom of action in that theatre (AD – Area-Denial) by medium and short-range weapons. The Surface-to-Air Missiles (SAM), Anti-Ship Ballistic Missiles (ASBM), and Anti-Ship Manoeuvring Cruise Missile (ASCM) are used to carry out A2/AD tasks. Field artillery has also been used recently, particularly the Long-Range Precision Fires (LRPF). The purpose of the article is to determine the chance of using field artillery against the A2/AD systems. According to the authors, the NATO forces will lose control in the air in the first period of the conventional conflict with an equivalent opponent, and its rapid recovery will be a priority. Field artillery, as a weapon with ever greater possibilities of precise and deep destruction, can become a decisive factor, allowing dominance of A2/AD systems and enabling the implementation of tasks of its air-force and army aviation, as well as ground forces.

To the bibliography