This study aims to define objectively what are the elements that should be considered in the repositioning of international cooperation, less under its value, which is unquestionable, but more under the optics of the procedure, how can it be operationalized. International cooperation goes beyond the regulatory effort, which, although an important step, is insufficient. It is inserted in an environment in which there is a multiplicity of forces and instances, non-converging and tensioned. At the same time, in the authors’ view, it is not about cooperation between states or between states and international organizations only, it must understand the private sector equally, which has the expressive property of the technologies used.
Humanity is increasingly dependent on space assets, as most critical infrastructure relies on space systems. At the same time, space operations are entirely cyberspace dependent, and space systems present a set of unique challenges that make them especially attractive for hackers. Nevertheless, the national regulatory systems for cyber activities are still underdeveloped, and has a consequence there is still a of lack of proposals for the regulation of cyberspace at the international level.
Our study explores how cyber-capabilities and cyber-attacks drive investment in cybersecurity systems. We assume that cybersecurity investment is a strategic decision in the organizations. To analyze this research question, we make use of the Cyber Security Breaches Survey data, with a sample consisting of 4,163 UK organizations in the periods 2018 to 2019, and employ machine learning techniques (ANN and K-mean cluster).
By integrating theoretical insights with practical strategies, this paper elucidates key challenges and opportunities in securing AI-driven systems, offering insights for policymakers, researchers, and practitioners alike.
Nowadays unmanned aircrafts are widely available at a reasonable price for civilians. This change in the market raises cybersecurity related concerns. In this paper we are focusing on three aspects of the cybersecurity challenges: data protection element, cyberattack element and general concerns over drones from the Asian market. The first element is extremely important when it comes to ethical and rightful drone use. A drone fitted with a camera or a video recording device can easily violate personal data. The cyberattack element aims to make sure the user understands that their device can be hacked, and not just simply the drone itself but various devices connected to them. Lastly, we are focusing on raising awareness of using drones from the Asian market. These types of products sometimes get into the spotlight due to built-in cyberissues. This part is aimed to raise general awareness over data protection coming from third party device use.
Recent information and cybersecurity research have focused on improving individuals’ security compliance behavior. However, improved security performance remains a challenge since individuals often fail to comply with security best practices. In this study, we investigate a new individual cybersecurity compliance behavior model proposed by Donalds and Osei-Bryson (2017). Specifically, we investigate the influence of individual decision styles on their cybersecurity compliance behavior and other antecedents of such behavior. To empirically validate the hypotheses in the Donalds & Osei-Bryson model, we used data collected from 248 individuals and then use multiple regression to examine the assertions of the model.
Over the past decade, people everywhere have become as dependent on the virtual world for their daily activities as they are dependent on the physical world for human activities. Global fiber optic networks have enabled communication in an unprecedented manner, connecting people in unique ways, propelling global supply chains, and giving consumers access to a variety of data from around the world. The online world is threatened by interstate rivals that engage in influence operations, economic espionage, and intelligence gathering and criminal groups that steal identities, ransom data, and grow their enterprises. Insiders facilitate intrusions wittingly and unwittingly raising the importance of corporations’ roles in cybersecurity. This convergence between the virtual and physical worlds with the government and the corporate upends the entire frame of reference for national security, which is tilted toward physical attack and strict jurisdictional lines. As cybersecurity integrates further into U.S. national security, a new approach is needed to incorporate a human security construct at the user level. This article is adapted from their forthcoming book, Security in the Cyber Age from Georgetown University Press. The views expressed are their own.
In this chapter, we systematically introduce and review the Cybersecurity Dynamics foundation for the Science of Cybersecurity , with emphasis on the three active research axes or pillars in cybersecurity metrics, cybersecurity first-principle modeling and analysis, and cybersecurity data analytics. We review the core concepts, technical approaches, research axes, and results that have been obtained in this endeavor.
In this survey, we analyzed previously conducted attack and defense studies described in 151 papers from 2008 to 2019 for a systematic and comprehensive investigation of autonomous vehicles. We classified autonomous attacks into the three categories of autonomous control system, autonomous driving systems components, and vehicle-to-everything communications.
To address cybersecurity vulnerabilities in control systems, this paper proposes a supervisory control and data acquisition (SCADA) security framework that includes real-time monitoring, anomaly detection, impact analysis, and mitigation strategies, alongside an attack-tree-based methodology to evaluate system vulnerabilities.