1 - 3 of 3 articles
This paper builds on the work of scholars working on ontological security, cyber security, and computer science to understand the problem of threat assessment and vision before, during, and after cyber-attacks. The previous use of ontological security theory (OST) has been limited because it has...
Research about Palestinians in Israel during the period of military rule from 1948 to 1966 describes them as acquiescent and primarily focuses on the mechanisms of control imposed by Israel. This article examines the role played by improvised sung poetry in Palestinian weddings and social...
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.