Results 51 to 60 of about 291,363 (254)

Possibility of applying the rules of international humanitarian law to cyber warfare

open access: yesPravo
Cyber warfare represents a new form of conflict in today’s world. Unlike earlier traditional armed conflicts, cyber warfare is different in terms of means, methods, techniques, and actors.
Sanela Veljković
doaj   +1 more source

Resilience in future cyber command and control [PDF]

open access: yesآینده‌پژوهی دفاعی
Objective: This research has been done with the aim of providing resilience features in future cyber command and control(C2). Methodology: The research method is descriptive with a qualitative and quantitative approach.
Mohammad Ghasemi Tadavani   +2 more
doaj   +1 more source

Modeling Correlation between Android Permissions Based on Threat and Protection Level Using Exploratory Factor Plane Analysis

open access: yesJournal of Cybersecurity and Privacy, 2021
The evolution of mobile technology has increased correspondingly with the number of attacks on mobile devices. Malware attack on mobile devices is one of the top security challenges the mobile community faces daily.
Moses Ashawa, Sarah Morris
doaj   +1 more source

Utilising journey mapping and crime scripting to combat cyber crime and cyber warfare attacks [PDF]

open access: yes, 2016
This paper discusses ways in which utilising methods from typically non-cyber disciplines, business and criminology, can successfully be applied to the cyber domain to aid the fight against and the prevention of cyber-attacks, including those used in ...
Hallaq, Bilal, Somer, Tiia, Watson, Tim
core  

Indonesia's Cyber Defense Strategy in Mitigating The Risk of Cyber Warfare Threats

open access: yesSyntax Idea, 2021
The purpose of this paper is to analyze and describe the strategy of the Indonesian government in mitigating the risk of dealing the threat of cyber warfare.
A. Permana
semanticscholar   +1 more source

Technology for Whom and for What? A Global South View of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT International politics is linked to its technical‐social character. Also, technology is socially constructed and thereby not entirely neutral or impartial. A tech‐driven geopolitical landscape has been a defining feature of contemporary world politics.
Eugenio V. Garcia
wiley   +1 more source

Cyber Warfare: National Security In Dealing With Changing Method of War

open access: yesKanun: Jurnal Ilmu Hukum, 2021
The purpose of this research is to identify cyber warfare as a model of War, its position in the perspective of international law, and the steps taken by the state in minimizing losses arising from cyber warfare. This research is normative research using
Maskun Maskun, Azhar Risaldy Rum
semanticscholar   +1 more source

Studying Tech Diplomacy—Introduction to the Special Issue on Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT This article serves as an introduction to the special issue on tech diplomacy, exploring its emergence and evolution as a distinct approach to global affairs in the era of the Fourth Industrial Revolution. Originating with Denmark's 2017 “TechPlomacy” initiative, tech diplomacy has gained global momentum, with over two dozen countries adopting
Corneliu Bjola, Markus Kornprobst
wiley   +1 more source

Cyber Warfare and the Crime of Aggression: The Need for Individual Accountability on Tomorrow’s Battlefield [PDF]

open access: yes, 2010
As cyberspace matures, the international system faces a new challenge in confronting the use of force. Non-State actors continue to grow in importance, gaining the skill and the expertise necessary to wage asymmetric warfare using non-traditional ...
Ophardt, Jonathan A.
core   +1 more source

Russian Aggression on Ukraine: Cyber Operations and the Influence of Cyberspace on Modern Warfare

open access: yesCONTEMPORARY MILITARY CHALLENGES, 2022
The contemporary security environment is global, dynamic, and unpredictable, particularly in terms of providing cyber security and cyber defence. Numerous analyzes of Russian hybrid operations have shown that the Russian Federation is conducting a number
Damjan Štrucl
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy