Cyber Operations Between Russia and Ukraine During Ukrainian Conflict
When the Ukraine crisis started in 2013, discussions about possible cyber warfare appeared. Debates about the usage of cyber tools in war conflicts have already been considered for the last few years and conflicts where actors possess these capacities ...
Miroslava Pavlíková
doaj +1 more source
A discourse in conflict : resolving the definitional uncertainty of cyber war : a thesis presented in partial fulfilment for the requirements for the degree of Master of Arts in Defence and Security Studies at Massey University, Albany, New Zealand [PDF]
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved.
Hughes, Dan
core
Military objectives in cyber warfare [PDF]
This Chapter discusses the possible problems arising from the application of the principle of distinction under the law of armed conflict to cyber attacks.
APV Rogers +21 more
core +1 more source
Threat Modeling for Cyber Warfare Against Less Cyber-Dependent Adversaries
Cyber warfare poses a substantial threat in today's interconnected world, where digital attacks can transcend physical boundaries and affect targets globally.
Shreyas Kumar, Gourav Nagar
semanticscholar +1 more source
CYBER WARFARE AS PART OF RUSSIA AND UKRAINE CONFLICT
Russia and Ukraine have had tense relations since 2014, with violence erupting as a result. Cyber-attacks have become an integral aspect of this conflict, in addition to the border issue and the separatist movement in Ukraine.
Ujang Priyono
semanticscholar +1 more source
Assessing Capability Complexity Using Enterprise Architecture Framework
ABSTRACT This study proposes a structured and quantitative methodology to evaluate the holistic complexity of system‐of‐systems (SoSs), employing the Zachman Architecture Framework (ZAF) as its foundational analytical tool. A five‐phase analytical procedure is developed and empirically validated, encompassing: (1) refinement of complexity measures, (2)
Javad Bakhshi, Mahmoud Efatmaneshnik
wiley +1 more source
Collaborating in future states—Contextual instability, paradigmatic remaking, and public policy
Abstract Collaboration is ubiquitous in public policy life, with its presence and profile determined by prevailing governance conditions. Commitments to globalisation and marketisation in the latter part of the 20th century marked the onset of an era defined by collaboration, between and across tiers and spheres of government, with non‐state actors ...
Helen Sullivan
wiley +1 more source
Pengaruh Cyber Security Strategy Amerika Serikat Menghadapi Ancaman Cyber Warfare [PDF]
This research describes United States of America\u27s Cyber Security Strategy facing the cyber warfare threads from 2009 till 2014. The main goals are securing cyber vital infrastructures and digital informations of United States.
Saputera, M. Y. (Moehammad) +1 more
core
Cyber Warfare and National Security in Nigeria
Nigeria is a theatre for many cybercriminal activities and attacks that have constantly threatened her national security. Many institutions, including financial and telecommunications, have continued to suffer huge monetary losses as a result of cyber ...
Kingsley Chigozie Udegbunam Kingsley Chigozie Udegbunam +1 more
semanticscholar +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source

