Results 31 to 40 of about 34,930 (170)

Resilience in future cyber command and control [PDF]

open access: yesآینده‌پژوهی دفاعی
Objective: This research has been done with the aim of providing resilience features in future cyber command and control(C2). Methodology: The research method is descriptive with a qualitative and quantitative approach.
Mohammad Ghasemi Tadavani   +2 more
doaj   +1 more source

Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis

open access: yesJournal of Cybersecurity and Privacy, 2021
The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily.
Moses Ashawa, Sarah Morris
doaj   +1 more source

Pengaruh Cyber Security Strategy Amerika Serikat Menghadapi Ancaman Cyber Warfare [PDF]

open access: yes, 2015
This research describes United States of America\u27s Cyber Security Strategy facing the cyber warfare threads from 2009 till 2014. The main goals are securing cyber vital infrastructures and digital informations of United States.
Saputera, M. Y. (Moehammad)   +1 more
core  

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Technology for Whom and for What? A Global South View of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley   +1 more source

Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley   +1 more source

The Paradox of Cyber Warfare and Clausewitz’s Conception of War

open access: yesNUST Journal of International Peace and Stability
The technological advancements of the 21st century have broadened the traditional concepts of warfare and security. This broadened notion of warfare and security contains an important element of cyberspace.
Nageen Ashraf
doaj   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Sharing the Same Playground? An Analysis of the Private Sector's Role in Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article takes the emergence of tech diplomacy as the motivation for an investigation into shifting relationships between traditional diplomatic actors and non‐state actors. The observation that ‘new diplomatic actors’ and new diplomatic venues have led to a ‘new kind of diplomacy’ dates back to at least the 1990s.
Katharina E. Höne
wiley   +1 more source

The Legal Status of ‘Civilian Hackers’ under International Humanitarian Law

open access: yesActa Universitatis Lodziensis Folia Iuridica
In response to the rising trend of civilian hackers participating in cyber conflicts, the International Committee of the Red Cross has recently issued guidelines regulating their conduct.
Michał Byczyński
doaj   +1 more source

Home - About - Disclaimer - Privacy