Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 261 - 270 of 350 references
2020 - ASIAGLOBAL PAPERS

this paper outlines the variables that shape government decisions to intervene via trade policy and investment rules in these markets

Dual-use cybersecurity
2023 - Mustafa Ali Sezal - Informa UK Limited

This article seeks to understand which actors desire securitisation or its opposite, desecuritisation, of technology. The contribution of this research is twofold. Firstly, securitisation of technology has implications for understanding defence and security in contemporary Europe. Secondly, identifying the actors involved in (de)securitisation allows for the analysis of their different roles in determining security discourses around technologies. The article builds on the literature on securitisation theory.

Dual-use cybersecurity
2021 - MIT

I create a typology of technology sharing policies based on the ease and breadth of technology transfer they facilitate and explain choices amongst these policies with an original theory called Threats Over Time Theory (TOTT). TOTT predicts decisionmakers share technology when they face severe threats – to either the survival of their state or the organization that they lead. When such threats exist, decisionmakers adjust the liberalness of their desired technology sharing policy based two factors: the likelihood a future adversary may gain the technology because of the sharing – either through a leak or because recipient itself becomes an adversary – and the speed at which the shared technology is likely to become obsolete. I test TOTT using cases during and between the World Wars – the most recent previous period of multipolar international competition.

Cybersecurity and defense
2021 - Hamdi Kavak, Jose J Padilla, Saikou Y Diallo, Ross Gore, Daniele Vernon-Bido, Sachin Shetty - Oxford University Press (OUP)

In this article, we provide an introduction to simulation for cybersecurity and focus on threethemes: (1) an overview of the cybersecurity domain; (2) a summary of notable simulation research efforts for cybersecurity; and (3) a proposed way forward on how simulations could broaden cybersecurity efforts

Dual-use cybersecurity
2022 - Raja Waseem Anwar, Saqib Ali - Central Library of the Slovak Academy of Sciences

This paper presents the holistic view of the security landscape and highlights the security threats, challenges, and risks to the smart city environment.

Civilian cybersecurity
2021 - proquest

Based in computational social science, this paper argues for cybersecurity to adopt more proactive social and cognitive (non-kinetic) approaches to cyber and information defense. This protects the cognitive, attitudinal, and behavioral capacities requiredfor a democracy to function by preventing psychological apparatuses, such as confirmation bias and affective polarization, that trigger selective exposure, echo chambers, in-group tribalization, and out-group threat labelling. First, such policies advocate cyber hygiene through rapid alert detection networks and counterdisinformation command centers. Second, they advocate information hygiene through codes of online behavior stressing identity- and self-affirmation, as well as media literacy training and education programs. This supplements the bridging of the STEM and social sciences to present a policy framework for confronting information threats based on a blended understanding of computer science and engineering, social and cognitive psychology, political and communication science, and security studies.

Civilian cybersecurity
2023 - IISS

This report investigates the growing role of defence
software and AI/ML (machine learning) in military power
now and in the medium term. It focuses on three goals:to define software-defined defence, to assess ongoing practices and processes in the development of defence software and AI/ML, and identify recurring challenges,  to explore and assess the ongoing efforts towards
software-defined defence in five country case studies – China, France, Germany, the United Kingdom and the United States – and how SinoAmerican strategic competition is shaping them.

Cybersecurity and defense
2014 - Kelce S. Wilson, Muge Ayse Kiy - Institute of Electrical and Electronics Engineers (IEEE)

The results of successful hacking attacks against commercially available cybersecurity protection tools that had been touted as secure are distilled into a set of concepts that are applicable to many protection planning scenarios. The concepts, which explain why trust in those systems was misplaced, provides a framework for both analyzing known exploits and also evaluating proposed protection systems for predicting likely potential vulnerabilities. The concepts are: 1) differentiating security threats into distinct classes; 2) a five layer model of computing systems; 3) a payload versus protection paradigm; and 4) the nine Ds of cybersecurity, which present practical defensive tactics in an easily remembered scheme. An eavesdropping risk, inherent in many smartphones and notebook computers, is described to motivate improved practices and demonstrate real-world application of the concepts to predicting new vulnerabilities. Additionally, the use of the nine Ds is demonstrated as analysis tool that permits ranking of the expected effectiveness of some potential countermeasures.

Dual-use cybersecurity
2015 - IJARCST

Computer Security has become a major challenge in the present years due to the continuous global technological development and the different possibilities for the use of computer. Cyber threats are growing at an alarming rate and at the same pace with the online use of Personal Computers and mobile devices. This work surveys the state of Cyber Security emerging threats landscape, through the overview of related works reported between 2011 and 2013 in the literature by stakeholders and experts in Information Technology (IT) industry. Different type of Cyber emerging threats such as malicious attack, network attack and network abuse have been identiied with speciic interest on virus, Phishing, Spam and insider abuse to mention but a few. It has been established that these Cybercriminals tools are exhibiting common level of sophistication and advancement as the advances in Computer and mobile technologies.

Cybersecurity and defense
2024 - isaca

The annual ISACA research also identifies key skills gaps in cybersecurity, how artificial intelligence is impacting the field, the role of risk assessments and cyber insurance in enterprises' security programs, and more.

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.