Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 131 - 140 of 350 references
2014 - Andrew James, Thomas Teichler, Dr Robert Gurrman and Mrs Pascal Petit - Emerald

This paper aims to provide a meta-analysis of the main themes emerging from public domain foresight studies on the defence and security environment undertaken in the decade since the 9/11 attacks on the USA. The authors focus mainly on foresight studies undertaken in Europe

Dual-use cybersecurity
2020 - Joe Burton, Clare Lain - Informa UK Limited

Drawing on the societal security concept established by the Copenhagen School of International Relations, we seek to reframe cybersecurity theory and policy. In the first section of the article we establish a theoretical approach to cybersecurity that emphasises the impact of cyberattacks on society, including on the health, energy and transport sectors. The second section draws on the history of cyberconflict to assess the ways the internet has been used to exacerbate societal tensions between identity groups and to create incohesion and societal security dilemmas. This section reinterprets the way the Kosovo War, Millennium (Y2 K) Bug, 9/11 and the WannaCry incident shaped and reflected cyber policy. The final section explores how a process of cyber desecuritisation might be achieved, including through discursive change and an enhanced role for the societal sector in the event of major cyberattacks.

Civilian cybersecurity
2018 - Jacopo Bellasio, Richard Flint, Nathan Ryan, Susanne Sondergaard, Cristina Monsalve, Arya Meranto, Anna Knack - RAND Corporation

This document is a proof-of-concept operational toolbox designed to facilitate the development of national-level cybersecurity capacity building programmes and of holistic policy and investment strategies to tackle challenges in the cyber domain. The document seeks to enable a better translation of the results of national cyber maturity reviews and assessments into tangible policy recommendations and investment strategies, allowing policymakers to develop their countries' cybersecurity capacity.

Civilian cybersecurity
2015 - Joseph N. Pelton, Indu B. Singh - Springer International Publishing

Digital Defense , which is designed to become your basic guide to
cybersecurity. This is a book devoted to protecting you, your family, and especially seniors against cyberatacks

Civilian cybersecurity
2020 - ceeol

Dual-use technologies, which mean technologies used for both military and civil applications, are evolving in the context of digitalization. Even in pre-digital era, at the dawns of the technological progress of mankind, the use of technologies was ambivalent, both for warfare and civil wellbeing. Now however, we assist to a fast blending of dual use and digital processes which is changing the landscape of the business models. We name this new process interaction as Dual-use Digital Blending (DDB). This paper is investigating the trends of evolution of this blended dual-use digital transformation technologies and their impact on the new geo-economic and geopolitical confrontations, on the trade flows and economic balance of power.

Dual-use cybersecurity
2023 - Anna Hurova - International Society of Philosophy and Cosmology

The dual use of satellite services raises the question about the legitimacy of the counter actions against their functionality during the armed conflict. This article focused on the examination of the content of the key principles of international humanitarian law, i.e. distinction and proportionality, concerning their application to the space activity. In this context, the criterions of pre and post evaluation of input of space services to the military operation were analysed. The risk of creation of a cloud of space debris because of a breach of humanitarian law was also observed.

Dual-use cybersecurity
2020 - CISSM

This paper focuses on the spread of dual-use enabling technologies not only due to a relative lack of policy attention but also due to the positive feedback loop created by adoption of these technologies, which makes them more likely to spur further innovations and consequently transform systems. Many of these enabling technologies have been driven by military and defense-related demand

Dual-use cybersecurity
2018 - Marcello Ienca, Effy Vayena - SMW Supporting Association

This paper identifies three major trends that are likely to characterise dual use dilemmas in the near future: the diversification of dual use domains, the digitalisation of potential threats and the proliferation of
actors.

Dual-use cybersecurity
2018 - Seumas Miller - Springer International Publishing

It first explains the concept of dual use and then offers analyses of collective knowledge and collective ignorance. It goes on to present a theory of collective responsibility, followed by four chapters focusing on a particular scientific field or industry of dual use concern: the chemical industry, the nuclear industry, cyber-technology and the biological sciences.

Dual-use cybersecurity
2023 - Geert De Cubber, Pierre Edouard Ouendo, Emile Le Flécher, Alexandre La Grappe, Enzo Ghisoni, Danial Hawari, Daniela Doroftei, Emmanouil Maroulis - IEEE

As robots are more and more leaving the protected lab environment, they are also more and more used for civil security and military use cases. Very often, these civil and military robotics development projects share large similarities and there is a substantial potential for dual use. In this paper, we will present and study three practical European projects where security field robots are being developed.

Dual-use cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.