Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 131 - 140 of 357 references
2019 - Andrew James - Springer International Publishing

After 9/11 foresight studies show a shift in security thinking away from a focus on state-centric threats towards a much broader view of security risks recently. This expanded perspective includes risks presented by the vulnerability of European society to the failure of critical infrastructure, to pandemics, environmental change and resource-based conflicts. The chapter places a particular emphasis on the treatment of technological change in these defence and security foresight studies and argues that the growing importance of dual-use technologies is likely to mean that defence will play a declining role as a sponsor and lead user of advanced technologies in the future.

Dual-use cybersecurity
2014 - Andrew James, Thomas Teichler, Dr Robert Gurrman and Mrs Pascal Petit - Emerald

This paper aims to provide a meta-analysis of the main themes emerging from public domain foresight studies on the defence and security environment undertaken in the decade since the 9/11 attacks on the USA. The authors focus mainly on foresight studies undertaken in Europe

Dual-use cybersecurity
2020 - Joe Burton, Clare Lain - Informa UK Limited

Drawing on the societal security concept established by the Copenhagen School of International Relations, we seek to reframe cybersecurity theory and policy. In the first section of the article we establish a theoretical approach to cybersecurity that emphasises the impact of cyberattacks on society, including on the health, energy and transport sectors. The second section draws on the history of cyberconflict to assess the ways the internet has been used to exacerbate societal tensions between identity groups and to create incohesion and societal security dilemmas. This section reinterprets the way the Kosovo War, Millennium (Y2 K) Bug, 9/11 and the WannaCry incident shaped and reflected cyber policy. The final section explores how a process of cyber desecuritisation might be achieved, including through discursive change and an enhanced role for the societal sector in the event of major cyberattacks.

Civilian cybersecurity
2018 - Jacopo Bellasio, Richard Flint, Nathan Ryan, Susanne Sondergaard, Cristina Monsalve, Arya Meranto, Anna Knack - RAND Corporation

This document is a proof-of-concept operational toolbox designed to facilitate the development of national-level cybersecurity capacity building programmes and of holistic policy and investment strategies to tackle challenges in the cyber domain. The document seeks to enable a better translation of the results of national cyber maturity reviews and assessments into tangible policy recommendations and investment strategies, allowing policymakers to develop their countries' cybersecurity capacity.

Civilian cybersecurity
2015 - Joseph N. Pelton, Indu B. Singh - Springer International Publishing

Digital Defense , which is designed to become your basic guide to
cybersecurity. This is a book devoted to protecting you, your family, and especially seniors against cyberatacks

Civilian cybersecurity
2020 - ceeol

Dual-use technologies, which mean technologies used for both military and civil applications, are evolving in the context of digitalization. Even in pre-digital era, at the dawns of the technological progress of mankind, the use of technologies was ambivalent, both for warfare and civil wellbeing. Now however, we assist to a fast blending of dual use and digital processes which is changing the landscape of the business models. We name this new process interaction as Dual-use Digital Blending (DDB). This paper is investigating the trends of evolution of this blended dual-use digital transformation technologies and their impact on the new geo-economic and geopolitical confrontations, on the trade flows and economic balance of power.

Dual-use cybersecurity
2022 - European Union

This Directive:

(a) lays down obligations on Member States to take specific measures aimed at ensuring that services which are essential for the maintenance of vital societal functions or economic activities within the scope of Article 114 TFEU are provided in an unobstructed manner in the internal market, in particular obligations to identify critical entities and to support critical entities in meeting the obligations imposed on them;

(b) lays down obligations for critical entities aimed at enhancing their resilience and ability to provide services as referred to in point (a) in the internal market;

(c) establishes rules:

(i) on the supervision of critical entities;

(ii) on enforcement;

(iii) for the identification of critical entities of particular European significance and on advisory missions to assess the measures that such entities have put in place to meet their obligations under Chapter III;

(d) establishes common procedures for cooperation and reporting on the application of this Directive;

(e) lays down measures with a view to achieving a high level of resilience of critical entities in order to ensure the provision of essential services within the Union and to improve the functioning of the internal market.

2023 - Anna Hurova - International Society of Philosophy and Cosmology

The dual use of satellite services raises the question about the legitimacy of the counter actions against their functionality during the armed conflict. This article focused on the examination of the content of the key principles of international humanitarian law, i.e. distinction and proportionality, concerning their application to the space activity. In this context, the criterions of pre and post evaluation of input of space services to the military operation were analysed. The risk of creation of a cloud of space debris because of a breach of humanitarian law was also observed.

Dual-use cybersecurity
2020 - CISSM

This paper focuses on the spread of dual-use enabling technologies not only due to a relative lack of policy attention but also due to the positive feedback loop created by adoption of these technologies, which makes them more likely to spur further innovations and consequently transform systems. Many of these enabling technologies have been driven by military and defense-related demand

Dual-use cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.