Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 311 - 320 of 350 references
2024 - Csaba Krasznay - Walter de Gruyter GmbH

The Russia-Ukraine war has clearly shown that critical infrastructures are prime targets for cyber operations in addition to the physical domain. In practice, in many cases, these critical infrastructures are protected by civilian cybersecurity companies in the context of a managed security service, so their defense operations must necessarily be coordinated with military defense activities. This includes among others the sharing of information classified under different classification systems (national, EU, NATO) between different actors in national cyber defense, the inclusion of appropriate civilian experts in the armed forces, and the usage of cutting-edge cybersecurity technologies (e.g. AI-enabled solutions) that are first introduced for civilian use, with military organizations only having access to them later or possibly not encountering them at all due to procurement difficulties. The main goal of this paper is to introduce the existing opportunities and obstacles to civilians’ involvement in military cyber operations in the areas of legislation, technology, and human resources from the European perspective. Moreover, the paper deals with the actual questions of cybersecurity intelligence sharing between civilian and military entities and the European Union’s actions in order to improve the overall cybersecurity posture of the region.

Dual-use cybersecurity
2019 - Maaike Verbruggen - Wiley

Civilian innovation is often said to be an important facilitator in the development of Lethal Autonomous Weapon Systems (LAWS). This claim is held up as both a reason to ban LAWS urgently, and why a ban would be impractical. But we know little about how this dynamic plays out in practice. Theoretical insights on technology transfer can help to analyse the situation. They suggest that obtaining and utilising the civilian technology is harder than often assumed. Civil-military cooperation is hindered by the stark differences between the civilian and defence industries. Business practices are out of sync, there are few social ties between the two worlds, innovative cultures do not translate, and many civilian engineers resist cooperation with the military. Additionally, defence still needs to modify civilian technologies to meet military standards and develop military-exclusive applications of autonomy. While civilian innovation thus advances what is technologically possible, this does not automatically translate into major advances or rapid diffusion of LAWS.

Dual-use cybersecurity
2022 - Lai-Wan Wong, Voon-Hsien Lee, Garry Wei-Han Tan, Keng-Boon Ooi, Amrik Sohal - Elsevier BV

This paper investigates the role of general cybersecurity and cybersecurity policy awareness in enhancing supply chain cyber resilience reactive capabilities. Theorizing from the Protection Motivation Theory, 200 Small and Medium Enterprises (SMEs) were contacted to understand their perception of cybersecurity and policy awareness in affecting their overall cybersecurity hygiene. Data collection was carried out using a questionnaire survey and analysed via Partial Least Squares-based Structural Equation Modelling to validate the research framework.

Cybersecurity and defense
2020 - Bruno Oliveira Martins, Neven Ahmad - Routledge

This chapter addresses the central role played by dual-use technologies in security and defence research policies of the European Union. It puts forward the argument that the EU’s strong incentives to these technologies – on the grounds of its potential for generating economic, industrial and innovation synergies between the civilian and the military domains – are a political choice that have relevant consequences in the security politics of the Union.

Dual-use cybersecurity
2022 - Vinnytsia Ukraine, Andrii Pravdiuk - Enigma Corporation, spol. s r.o.

The article studies urgent issues of the legal regulation of cyber security in Ukraine in view of current challenges. It is stated that under conditions of intensification of cyberattacks on the information and telecommunication systems of the state authorities of Ukraine, computer networks need reliable protection. It was determined that cyberattack and cyberterrorism are negative phenomena that cause social crises, so research and analysis of Ukrainian legislation on cybersecurity is extremely important and necessary. Due to the rapid growth of cyber risks and cyber threats, it is important to monitor the current state of cybersecurity in our country, highlight the main problems of building a national cyber defense system and identify areas for their solution. This requires an analysis of the measures that have been implemented in the field of protection of computer and telecommunications networks from cyberattacks, as well as the definition of measures needed to be implemented to create conditions for the safe operation of cyberspace. The study reveals significant political, economic and social efforts aimed to strengthen cyber resilience, which the state is making to develop national cybersecurity capabilities. Considering the purpose and objectives of the scientific article, the authors have studied in detail the legal aspect. As a result of scientific research, it has been established that the legal regulation of cyber security in Ukraine is carried out by normative acts of various legal force: the Constitution of Ukraine, laws and regulations of Ukraine. The Constitution of Ukraine contains initial provisions on the organization of security of both the national cyberspace as a whole and the virtual space of public authorities of Ukraine, which are reflected in the laws as well as normative and legal regulations of Ukraine. Analysis of the current legislation in the field of cyber security has revealed some of its imperfections. It has been found that effective cybersecurity needs to be addressed comprehensively and requires coordinated action at the national, regional and international levels to prevent, prepare, and respond to the incidents by the government, the private sector and civil society. © 2022, Berostav Druzstvo. All rights reserved.

Cybersecurity and defense
2022 - Andrii V. Svintsytskyi - Escuela Militar de Cadetes Jose Maria Cordova

This article describes Ukraine’s cybersecurity system, its place, and its role in a single configuration of national security. The methods used include formal-dogmatic, comparative-legal, sociological, and hermeneutics. The research revealed that effective cybersecurity must be addressed comprehensively, requiring coordinated action at the national, regional, and international levels to prevent, prepare, and respond to incidents by the government, the private sector, and civil society. © 2020 University of Jordan,Deanship of Scientific Research. All rights reserved.

Civilian cybersecurity
2022 - European Union Institute for Security Studies

the increasing importance of dual-use

Dual-use cybersecurity
2022 - Elie Alhajjar, Kevin Lee - Academic Conferences International Ltd

general frame for the cyber threat landscape in US with focusing on 5 main categories: ransomware, social ingeneering, third party software, deep fakes and insider threats.

Cybersecurity and defense
2023 - Oliver A. Guidetti, Craig P. Speelman, Peter Bouhlas - Frontiers Media SA

Vigilance decrement refers to a psychophysiological decline in the capacity to sustain attention to monotonous tasks after prolonged periods. A plethora of experimental tasks exist for researchers to study vigilance decrement in classic domains such as driving and air traffic control and baggage security; however, the only cyber vigilance tasks reported in the research literature exist in the possession of the United States Air Force (USAF). Moreover, existent cyber vigilance tasks have not kept up with advances in real-world cyber security and consequently no longer accurately reflect the cognitive load associated with modern network defense. The Western Australian Cyber Defense Task (WACDT) was designed, engineered, and validated. Elements of network defense command-and-control consoles that influence the trajectory of vigilance can be adjusted within the WACDT. These elements included cognitive load, event rate, signal salience and workload transitions. Two forms of the WACDT were tested. In static trials, each element was adjusted to its maximum level of processing difficulty. In dynamic trials, these elements were set to increase from their minimum to their maximum values. Vigilance performance in static trials was shown to improve over time. In contrast, dynamic WACDT trials were characterized by vigilance performance declines. The WACDT provides the civilian human factors research community with an up-to-date and validated vigilance task for network defense accessible to civilian researchers. Copyright © 2023 Guidetti, Speelman and Bouhlas.

Civilian cybersecurity
2016 - MITRE

We are in the midst of a digital transformation. Technology connects the world and is changing everything. It changes how organizations deliver goods and services and how people live and work. At the same time, this improved connectivity increases our risks to data confidentiality, availability, integrity, human safety, and infrastructure reliability. Federal civilian organizations increasingly use networked technology to help deliver their missions, which can lead to attacks and disruption. Cyber-attacks often result in mission breaches that damage public trust and national and economic security. As mission executions are more dependent on networked technology, enterprise mission strategy and enterprise cybersecurity strategy must be linked.

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.