Hasil untuk "Military Science"

Menampilkan 19 dari ~19555099 hasil · dari DOAJ, arXiv, CrossRef, Semantic Scholar

JSON API
DOAJ Open Access 2025
Global image of countries in international wars: A scoping review of influencing factors.

Dongyong Li, Kim Hua Tan, Jamsari Alias et al.

This scoping review investigates factors influencing the international or global image of countries involved in international wars. Following Arksey and O'Malley's 5-step framework, key sources for the search include academic databases such as Google Scholar, Scopus, and Web of Science. Reporting followed the PRISMA extension for Scoping Reviews (PRISMA-ScR) (Peters et al., 2020) and was guided by the Joanna Briggs Institute (JBI) methodological guidelines. We systematically analyzed 56 peer-reviewed articles published between 2015 and 2024. Our analysis reveals that a country's global image during war is predominantly shaped by the dynamic interplay of three core factors: (1) Historical factors, providing cognitive and affective frameworks for interpreting conflict; (2) Diplomatic factors, managing critical narrative alignment and credibility constraints; and (3) Leadership factors, embodying national resolve through symbolic representation and communicative authenticity. These factors function as interdependent pillars, where historical narratives constrain diplomatic choices, leadership enacts diplomatic narratives, and diplomacy mediates historical burdens. While secondary factors (e.g., military conduct, cultural proximity) play a role, they are largely interpreted through these core mechanisms. Additionally, the review highlights the role of emerging factors-including digital technology, affective investments, subliminal priming, diversity of information sources, and visual tropes-which represent evolving mechanisms of image formation in contemporary wars. There is a surge in research coinciding with major contemporary wars (e.g., Russo-Ukrainian War). Crucially, this interdependence underscores the necessity for integrated statecraft that strategically aligns historical reframing, diplomatic consistency, and leadership authenticity. However, the efficacy of these core factors is significantly mediated and amplified by secondary factors-such as military conduct, governmental credibility, cultural proximity, and geopolitical positioning-which collectively shape the perception and credibility of a nation's projected image. Furthermore, emerging factorsintroduce new complexities into the image formation process, accelerating the spread and emotional resonance of narratives while also increasing scrutiny of state actions. These findings offer critical insights for policymakers, media professionals, and scholars seeking to understand and manage a nation's global standing during and beyond conflict, moving beyond media-centric explanations of wartime perception.

Medicine, Science
DOAJ Open Access 2025
Efficacy and safety profile of biotechnological agents and Janus kinase inhibitors in VEXAS syndrome: data from the international AIDA Network VEXAS registry

Antonio Vitale, Antonio Vitale, Valeria Caggiano et al.

BackgroundVEXAS syndrome, a recently identified systemic autoinflammatory disorder, poses new diagnostic and management challenges. Based on experience with other autoinflammatory diseases, anti-interleukin (IL)-1, anti-IL-6, anti-tumor necrosis factor (TNF) biotechnological agents, and Janus kinase inhibitors (JAKis) have been widely employed in VEXAS patients. The aim of this study is to evaluate the global effectiveness and safety of biotechnological agents and JAKis using data from the real-world context.MethodsClinical, laboratory, and therapeutic data from VEXAS patients were obtained from the international AIDA Network VEXAS registry.ResultsIn total, 69 VEXAS patients were enrolled in the study. Among them, 12 patients (13 treatment courses) received IL-1 inhibitors, 12 patients (13 treatment courses) were administered anti-IL-6 agents, 8 patients (9 treatment courses) were treated with anti-TNF agents, and 16 patients (17 treatment courses) were treated with JAKis. A complete response was observed in 3 patients (23%) treated with anti-IL-1 agents, 2 patients (15%) receiving IL-6 inhibitors, 1 patient (11%) receiving TNF inhibitors, and 4 patients (23.5%) treated with JAKis. The mean prednisone (or equivalent) dosage significantly decreased during anti-IL-1 treatment (p = 0.01), while glucocorticoids changed during anti-IL-6, anti-TNF, and JAKi treatment in a non-significant fashion. A total of 21 patients experienced adverse events, 3 of which led to death (gut perforation, Legionnaires’ disease, and infectious pneumonia) while on JAKis; treatment withdrawal was required for 8 out of 21 patients.ConclusionIL-1 and IL-6 inhibitors, along with JAKis, represent promising therapeutic options for VEXAS patients, albeit careful monitoring is mandatory to control disease activity and ensure safety.

Therapeutics. Pharmacology
arXiv Open Access 2025
Funding the Frontier: Visualizing the Broad Impact of Science and Science Funding

Yifang Wang, Yifan Qian, Xiaoyu Qi et al.

Understanding the broad impact of science and science funding is critical to ensuring that science investments and policies align with societal needs. Existing research links science funding to the output of scientific publications but largely leaves out the downstream uses of science and the myriad ways in which investing in science may impact human society. As funders seek to allocate scarce funding resources across a complex research landscape, there is an urgent need for informative and transparent tools that allow for comprehensive assessments and visualization of the impact of funding. Here we present Funding the Frontier (FtF), a visual analysis system for researchers, funders, policymakers, university leaders, and the broad public to analyze multidimensional impacts of funding and make informed decisions regarding research investments and opportunities. The system is built on a massive data collection that connects 7M research grants to 140M scientific publications, 160M patents, 10.9M policy documents, 800K clinical trials, and 5.8M newsfeeds, with 1.8B citation linkages among these entities, systematically linking science funding to its downstream impacts. As such, Funding the Frontier is distinguished by its multifaceted impact analysis framework. The system incorporates diverse impact metrics and predictive models that forecast future investment opportunities into an array of coordinated views, allowing for easy exploration of funding and its outcomes. We evaluate the effectiveness and usability of the system using case studies and expert interviews. Feedback suggests that our system not only fulfills the primary analysis needs of its target users, but the rich datasets of the complex science ecosystem and the proposed analysis framework also open new avenues for both visualization and the science of science research.

en cs.HC
DOAJ Open Access 2024
“We do others’ Jobs”: a qualitative study of non-nursing task challenges and proposed solutions

Hekmat Al-Akash, Ayman Aldarawsheh, Rami Elshatarat et al.

Abstract Introduction Non-nursing tasks (NNTs) have become a prevalent issue among healthcare professionals, affecting nurses globally. This study delves into the experiences of Jordanian nurses regarding NNTs, aiming to uncover challenges and propose solutions within the Jordanian healthcare context. Objective Explore the impact of NNTs on Jordanian nurses’ roles, workload, and satisfaction. Additionally, the study aims to identify various types of NNTs performed by nurses, understand their impact, and propose solutions to mitigate challenges associated with these tasks. Methods A qualitative-exploratory research design was employed for this study. Semi-structured interviews were conducted with Jordanian nurses using a purposeful sampling approach to ensure a diverse representation of experiences and perspectives. Thematic analysis was used to identify recurring themes and patterns related to NNTs, their challenges, and potential solutions. Ethical guidelines were strictly followed to maintain participant confidentiality and ensure the integrity of the data collected. Results Analysis of the interviews revealed four major themes: challenges of NNTs, types of NNTs, impact of NNTs, and proposed solutions. Nurses faced significant difficulties due to task ambiguity, role confusion, and increased workload from NNTs, which included administrative duties, clerical work, and tasks typically performed by other healthcare professionals. These NNTs negatively impacted nurses’ effectiveness, productivity, and job satisfaction by diverting time and energy from primary nursing responsibilities, causing professional strain. To address these issues, participants suggested clearer job descriptions, stricter task assignment protocols, and systemic changes to tackle the root causes of NNTs. Conclusion This study sheds light on the pervasive challenges posed by NNTs among Jordanian nurses and emphasizes the importance of addressing these issues to enhance nursing care quality and nurse well-being. By proposing actionable solutions tailored to the Jordanian context, this research contributes to the global discourse on NNTs and underscores the need for organizational support and advocacy to optimize nurses’ roles and improve patient care outcomes.

DOAJ Open Access 2024
Artificial intelligence in the sphere of cybersecurity: innovations, challenges, and development prospects

Роман Пантюшенко, Юлія Чайка

The relevance of the study is due to the need for effective protection of information systems in the face of ever-growing cyber threats. In the modern digital world, where cyberattacks are becoming increasingly complex and widespread, the use of artificial intelligence in cybersecurity is extremely relevant. The problem of cybersecurity is becoming increasingly important and conducting relevant research is becoming a necessary aspect of ensuring security in the digital space. In this context, we propose an article that examines the role of artificial intelligence, innovations, challenges, and prospects of its development in the sphere of cybersecurity. Additionally, it explores the utilization of artificial intelligence for automating processes of detecting, analysing, and responding to cyber threats, and its practical significance for enhancing security levels in the digital space and the effectiveness of cyber threat protection. The main approaches for this study are trend analysis and expert assessments, which allow for a comprehensive review of the directions of artificial intelligence development in the field of cybersecurity, the benefits and challenges of its implementation, as well as potential opportunities and threats to information security. The article discusses advanced security information and event management systems designed to collect, analyse and respond to cyber threats and other systems aimed at specific aspects of protection and expanding automation capabilities to improve the security level of information systems. The materials of the article are of theoretical value for further scientific research on the use of artificial intelligence in the sphere of cybersecurity and reflect important features of its influence on this area. This research can contribute not only to deepening the understanding of the theoretical aspects of the use of artificial intelligence in cybersecurity but also to identifying specific practical applications and innovations that will help improve protection against cyber threats in the future.

Military Science
DOAJ Open Access 2024
ШЛЯХИ ФОРМУВАННЯ ГОТОВНОСТІ МАЙБУТНІХ ОФІЦЕРІВ-ПРИКОРДОННИКІВ ДО ПРОТИДІЇ НЕГАТИВНОМУ ІНФОРМАЦІЙНО-ПСИХОЛОГІЧНОМУ ВПЛИВУ У ПОЛОНІ ПРОТИВНИКА

Юрій ЮРЧАК

Проаналізовано унікальні методики протистояння військовополонених негативному інформаційно-психологічному впливу під час конфліктів, зокрема воєнних ситуацій. Визначено важливість та роль керування інформаційними аспектами у контексті ведення війни та перебування у полоні, забезпечення безпеки державного кордону та підвищення обороноздатності країни. Вивчено взаємозв’язок між інформаційним впливом і перебігом воєнних операцій. Окреслено стратегію підготовки майбутніх офіцерів прикордонної служби до протидії негативному інформаційно-психологічному впливу у полоні. Закцентовано на важливості психологічної стійкості та готовності до відсічі ворожій пропаганді під час воєнних конфліктів. У статті викладено історію інформаційної війни, психологічні та фізіологічні аспекти полону, а також фази, які проходить військовослужбовець у полоні. Установлено, що іноді цю інформацію подають із вираженням співчуття, що призводить до значного зниження оборонної готовності військовополонених. У додаток до цього погіршення мотивації та втрата смислового сприйняття серед військовополонених мають дуже негативні наслідки, включно із втратою інтересу до професійної діяльності, розчаруванням у вибраній сфері занять і іншими подібними аспектами. Надано практичні рекомендації для збереження морального духу та психологічного здоров’я у полоні.

Education, Military Science
arXiv Open Access 2024
A Cohesive Deep Drilling Field Strategy for LSST Cosmology

Philippe Gris, Humna Awan, Matthew R. Becker et al.

The Vera C. Rubin Observatory Legacy Survey of Space and Time (LSST) will image billions of astronomical objects in the wide-fast-deep primary survey and in a set of minisurveys including intensive observations of a group of deep drilling fields (DDFs). The DDFs are a critical piece of three key aspects of the LSST Dark Energy Science Collaboration (DESC) cosmological measurements: they provide a required calibration for photometric redshifts and weak gravitational lensing measurements and they directly contribute to cosmological constraints from the most distant type Ia supernovae. We present a set of cohesive DDF strategies fulfilling science requirements relevant to DESC and following the guidelines of the Survey Cadence Optimization Committee. We propose a method to estimate the observing strategy parameters and we perform simulations of the corresponding surveys. We define a set of metrics for each of the science case to assess the performance of the proposed observing strategies. We show that the most promising results are achieved with deep rolling surveys characterized by two sets of fields: ultradeep fields (z<1.1) observed at a high cadence with a large number of visits over a limited number of seasons; deep fields (z<0.7), observed with a cadence of ~3 nights for ten years. These encouraging results should be confirmed with realistic simulations using the LSST scheduler. A DDF budget of ~8.5% is required to design observing strategies satisfying all the cosmological requirements. A lower DDF budget lead to surveys that either do not fulfill photo-z/WL requirements or are not optimal for SNe Ia cosmology.

en astro-ph.CO, astro-ph.IM
arXiv Open Access 2024
Behavior Matters: An Alternative Perspective on Promoting Responsible Data Science

Ziwei Dong, Ameya Patil, Yuichi Shoda et al.

Data science pipelines inform and influence many daily decisions, from what we buy to who we work for and even where we live. When designed incorrectly, these pipelines can easily propagate social inequity and harm. Traditional solutions are technical in nature; e.g., mitigating biased algorithms. In this vision paper, we introduce a novel lens for promoting responsible data science using theories of behavior change that emphasize not only technical solutions but also the behavioral responsibility of practitioners. By integrating behavior change theories from cognitive psychology with data science workflow knowledge and ethics guidelines, we present a new perspective on responsible data science. We present example data science interventions in machine learning and visual data analysis, contextualized in behavior change theories that could be implemented to interrupt and redirect potentially suboptimal or negligent practices while reinforcing ethically conscious behaviors. We conclude with a call to action to our community to explore this new research area of behavior change interventions for responsible data science.

en cs.CY, cs.HC
DOAJ Open Access 2023
Modern management methods in the implementation of construction projects on the example of contingency plans

Magdalena Kowacka, Dariusz Skorupka, Agnieszka Bekisz et al.

The implementation of processes comprising the overall project management consists in the use of various tools, methods and techniques depending on the type of the project. The knowledge of the industry and the characteristics of construction projects make it possible to select those which, on the one hand, will not cause difficulties for the contractors and on the other, will, in fact, constitute a necessary complement to the technical skills of the project manager. Construction companies face situations that have a profound impact on the failure of projects. Such occurrences include a large number of simultaneously implemented projects, the appointment of a person who knows the project mainly from the implementation side as the project manager, a failure to perform risk analysis and procedures that become irrelevant when deadlines are approaching. After reviewing the available construction projects, analysing the literature, consulting experts and making observations, the authors determined that the majority of difficulties and failures result from omissions or errors that take place during the project planning and implementation stages. The following paper outlines the selected elements of project management, whose application in construction projects may significantly affect their final success and the results obtained. It also includes an example of the use of modern management methods, which certainly include risk management methods. A utilitarian tool addressing the effects of risk analysis is a contingency plan. Contingency may be translated as eventuality, possibility and sometimes also as coincidence.

Engineering (General). Civil engineering (General)
DOAJ Open Access 2023
Investigation of solitary wave structures for the stochastic Nizhnik–Novikov–Veselov (SNNV) system

Tahira Sumbal Shaikh, Muhammad Zafarullah Baber, Nauman Ahmed et al.

The current study deals with the stochastic Nizhnik–Novikov–Veselov (SNNV) system analytically under the multiplicative noise effect. The Nizhnik–Novikov–Veselov equation is an extension of the KdV equation with applications in shallow-water waves, ionic acoustic waves in plasma, long internal waves in density-stratified oceans, and sound waves on crystal networks. The stochastic wave structures are constructed with the help of the Sardar subequation method. The different solutions are extracted which are in the form of solitons and solitary wave structures in the noise effect. Additionally, the stochastic behavior appears in the 3-dim, 2-dim, and their corresponding contour representations by the various selection of parameters.

arXiv Open Access 2023
A Vision for Semantically Enriched Data Science

Udayan Khurana, Kavitha Srinivas, Sainyam Galhotra et al.

The recent efforts in automation of machine learning or data science has achieved success in various tasks such as hyper-parameter optimization or model selection. However, key areas such as utilizing domain knowledge and data semantics are areas where we have seen little automation. Data Scientists have long leveraged common sense reasoning and domain knowledge to understand and enrich data for building predictive models. In this paper we discuss important shortcomings of current data science and machine learning solutions. We then envision how leveraging "semantic" understanding and reasoning on data in combination with novel tools for data science automation can help with consistent and explainable data augmentation and transformation. Additionally, we discuss how semantics can assist data scientists in a new manner by helping with challenges related to trust, bias, and explainability in machine learning. Semantic annotation can also help better explore and organize large data sources.

en cs.AI, cs.DB
DOAJ Open Access 2022
A Novel Single-Fed Dual-Band Dual-Circularly Polarized Dielectric Resonator Antenna for 5G Sub-6GHz Applications

Javed Iqbal, Usman Illahi, Muhammad Abbas Khan et al.

In this research article, a single-fed dual-band circular polarized (CP) dielectric resonator antenna (DRA) for dual-function communication, such as GPS and WLAN, was made. Initially, the proposed design process was initiated by designing a linearly polarized singly fed-DRA. To attain CP fields, the cross-shape conformal metal strip was optimized to excite the fundamental and the high-order mode in the two frequency bands. The metallic strip (parasitic) was utilized on top of the rectangular DRA to improve and widen the impedance and axial ratio (AR) bandwidth. This step led to a 2.73% improvement on the lower band and an impact of 6.5% on the upper band while on the other side a significant improvement was witnessed in the AR bandwidth in both frequency bands. A prototype was designed and fabricated in order to validate its operations. The measurement outcomes of the proposed antennas authenticated wideband impedance bandwidths of 6.4% and 25.26%, and 3-dB axial ratios (AR) of 21.26% and 27.82% respectively. The prototype is a decent candidate for a global positioning system (GPS) and wireless local area network (WLAN).

Technology, Engineering (General). Civil engineering (General)
arXiv Open Access 2022
A Bibliometric Perspective of Social Science Scientific Communities of Pakistan and India

Sami Ul-Haq, Saeed-Ul Hassan

In this study, we use research publication data from the field of social science to identify collaboration networks among social science research communities of India and Pakistan. We have used Scopus database to extract information of social science journals for both countries India and Pakistan. Study of this data is significant as both countries have common social issues and many of common social values. Keywords analysis has been done to see common research areas in both communities like poverty, education, the issue of gender etc. Despite having many of the common social issues, collaboration among social science research communities of both countries is not strong.

en cs.DL, cs.IR
DOAJ Open Access 2021
Pane, vino e carri: logistica e vettovagliamento nello stato visconteo trecentesco

Fabio Romanoni

In every age the supply of an army took huge logistical effort, especially because it consisted of several thousand soldiers, hundred carts and, where conditions allowed it, chips transported everything needed for soldiers sustenance while the resources were bought in the territories crossed by them. Feeding large military contingent by plundering the countryside was not only difficult but also it was not politically recommended, in particular when soldiers were passing in the domains of the allies. Sometimes, the army supply was as difficult as the fight itself, considering that a marching soldier could bring supplies that were enough for only ten days. The all other supplies had to be carried by ox carriages, unfortunately oxen were very slow, and they slowed the movements of the forces, moreover, till the development of road engineering in the 18th century, European itineraries were not in good conditions. At that time, especially in Italy logistic and provisioning were unsolved problems nonetheless, thanks to unpublished materials I’m going to analyze the functioning of these issues limited to the territories in Visconti possession during the 14th century.

History (General) and history of Europe, Military Science
arXiv Open Access 2021
Data science and Machine learning in the Clouds: A Perspective for the Future

Hrishav Bakul Barua

As we are fast approaching the beginning of a paradigm shift in the field of science, Data driven science (the so called fourth science paradigm) is going to be the driving force in research and innovation. From medicine to biodiversity and astronomy to geology, all these terms are somehow going to be affected by this paradigm shift. The huge amount of data to be processed under this new paradigm will be a major concern in the future and one will strongly require cloud based services in all the aspects of these computations (from storage to compute and other services). Another aspect will be energy consumption and performance of prediction jobs and tasks within such a scientific paradigm which will change the way one sees computation. Data science has heavily impacted or rather triggered the emergence of Machine Learning, Signal/Image/Video processing related algorithms, Artificial intelligence, Robotics, health informatics, geoinformatics, and many more such areas of interest. Hence, we envisage an era where Data science can deliver its promises with the help of the existing cloud based platforms and services with the addition of new services. In this article, we discuss about data driven science and Machine learning and how they are going to be linked through cloud based services in the future. It also discusses the rise of paradigms like approximate computing, quantum computing and many more in recent times and their applicability in big data processing, data science, analytics, prediction and machine learning in the cloud environments.

en cs.DC, cs.LG
DOAJ Open Access 2020
Le “Troupes de la Marine et des Colonies” e l’intervento francese in Messico

Jean-Baptiste Murez

From 1862 to 1864 a foot regiment and an artillery battery of the French Navy Troops (circa 1500 men) were engaged at land during the begining of the Second French Intervention in Mexico. They were used as a combat force, from the port of Veracruz to the central city of Puebla, on the road to Mexico City. They took part in the two battles of Puebla (may 1862 and march-may 1863) where they fought gallantly. Their main mission, however, was to protect the convoys, to be a garrison among the Mexican people and to pursue the guerrillas who were hostile to the French presence. From August 1863, the infantry was sent to the northern port of Tampico, in order to secure this strategic point, rich from its custom duties. They stayed here until March 1864, when they came back to France because of their exhaustion due to tropical diseases. To maintain them in good order, the ministry sent 864 reinforcements during the length of their presence.

History (General) and history of Europe, Military Science
arXiv Open Access 2020
Data Science: A Comprehensive Overview

Longbing Cao

The twenty-first century has ushered in the age of big data and data economy, in which data DNA, which carries important knowledge, insights and potential, has become an intrinsic constituent of all data-based organisms. An appropriate understanding of data DNA and its organisms relies on the new field of data science and its keystone, analytics. Although it is widely debated whether big data is only hype and buzz, and data science is still in a very early phase, significant challenges and opportunities are emerging or have been inspired by the research, innovation, business, profession, and education of data science. This paper provides a comprehensive survey and tutorial of the fundamental aspects of data science: the evolution from data analysis to data science, the data science concepts, a big picture of the era of data science, the major challenges and directions in data innovation, the nature of data analytics, new industrialization and service opportunities in the data economy, the profession and competency of data education, and the future of data science. This article is the first in the field to draw a comprehensive big picture, in addition to offering rich observations, lessons and thinking about data science and analytics.

S2 Open Access 2019
Militarism goes to school

Seth Kershner, S. Harding

Schools are a primary site for socialization into societies that support war, and the United States is no exception. The tradition of military recruiters visiting high schools is deeply ingrained in the United States, with many schools logging visits from the military every second or third day school is in session (Harding & Kershner 2018, 326). “Military science” classes, with instructor salaries split between local school districts and the Pentagon, are now so prevalent that in 10 states one out of every three public high schools offers such instruction (Goldman et al. 2017). With the U.S. military’s presence in public schools expanding, and a leading policy think tank advocating for the establishment of yet more high school “military science” programs (Goldman et al. 2017), this special section is particularly timely. The articles in this section engage with the question of the militarization of schools and of the lives of teenagers from a different perspective, shedding light on the processes by which societies are prepared for war through the militarization of the civilian educational system. Scholarly attention to the militarization of American schools has been increasing in recent years. Drawing on fieldwork at a California high school, Abajian (2013, ii) described a pervasive ‘web of militarism’ in public schools: omnipresent military recruiters, the paramilitary Junior Reserve Officers’ Training Corps (JROTC) program, and career guidance offices filled with brochures promoting the armed forces. In ‘privileging military values’ and giving military careers ‘unparalleled promotion in comparison to other postsecondary’ career paths, Abajian found that many U.S. schools effectively create a ‘school-to-military pipeline.’ These findings support the vision of U.S. military recruiting strategists. In their trade journals, planning documents, and training manuals, recruiters are urged to achieve ‘school ownership’ and to convert educational institutions into ‘forward operating bases’ from which they can more effectively launch ‘aggressive assaults’ on high school juniors – a demographic group considered by one high-ranking Marine Recruiting official to be the ‘future of the all-volunteer military’ (United States Army Recruiting Command 2006; Recruiter Journal, September 2008, 8; United States Army Recruiting Command, Chicago Recruiting Battalion 2014, 9; Long 2006, 8). The extent to which these recruitment practices rely on infiltrating schools demonstrates the ‘fragile and contingent’ nature of the armed forces in late-capitalist societies (Enloe 2015, 6). ‘Militaries,’ according to Cynthia Enloe, ‘are not automatically raised or sustained, not easily mobilized or deployed’ (6). Indeed, the work of enlisting enough

7 sitasi en Political Science
DOAJ Open Access 2019
Voluntary defense networks in emergency preparedness in developed countries: the case of Sweden

Elvira Kaneberg, Susanne Hertz, Leif-Magnus Jensen

Voluntary networks are actors in civil society and central to the emergency preparedness efficiency of developed countries’. This study focuses on the voluntary defense networks in Sweden, a unique set of networks that contribute to the efficiency of emergency preparedness. Through interviews with experts in Swedish civil and military fields and their associated voluntary defense networks, as well as secondary data, we examined the coordination of these voluntary defense networks in practice. Although voluntary network coordination is highly associated with efficiency, in practice, most voluntary networks are not well coordinated. This study confirms that civil and military practitioners in developed countries, struggling with the coordination of voluntary networks are not isolated in their struggle; inattentive practices are indeed the norm. This article also establishes a course that civil and military practitioners can follow to improve emergency response efficiency.

Military Science

Halaman 32 dari 977755