Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 321 - 330 of 357 references
2020 - Bruno Oliveira Martins, Neven Ahmad - Routledge

This chapter addresses the central role played by dual-use technologies in security and defence research policies of the European Union. It puts forward the argument that the EU’s strong incentives to these technologies – on the grounds of its potential for generating economic, industrial and innovation synergies between the civilian and the military domains – are a political choice that have relevant consequences in the security politics of the Union.

Dual-use cybersecurity
2022 - Vinnytsia Ukraine, Andrii Pravdiuk - Enigma Corporation, spol. s r.o.

The article studies urgent issues of the legal regulation of cyber security in Ukraine in view of current challenges. It is stated that under conditions of intensification of cyberattacks on the information and telecommunication systems of the state authorities of Ukraine, computer networks need reliable protection. It was determined that cyberattack and cyberterrorism are negative phenomena that cause social crises, so research and analysis of Ukrainian legislation on cybersecurity is extremely important and necessary. Due to the rapid growth of cyber risks and cyber threats, it is important to monitor the current state of cybersecurity in our country, highlight the main problems of building a national cyber defense system and identify areas for their solution. This requires an analysis of the measures that have been implemented in the field of protection of computer and telecommunications networks from cyberattacks, as well as the definition of measures needed to be implemented to create conditions for the safe operation of cyberspace. The study reveals significant political, economic and social efforts aimed to strengthen cyber resilience, which the state is making to develop national cybersecurity capabilities. Considering the purpose and objectives of the scientific article, the authors have studied in detail the legal aspect. As a result of scientific research, it has been established that the legal regulation of cyber security in Ukraine is carried out by normative acts of various legal force: the Constitution of Ukraine, laws and regulations of Ukraine. The Constitution of Ukraine contains initial provisions on the organization of security of both the national cyberspace as a whole and the virtual space of public authorities of Ukraine, which are reflected in the laws as well as normative and legal regulations of Ukraine. Analysis of the current legislation in the field of cyber security has revealed some of its imperfections. It has been found that effective cybersecurity needs to be addressed comprehensively and requires coordinated action at the national, regional and international levels to prevent, prepare, and respond to the incidents by the government, the private sector and civil society. © 2022, Berostav Druzstvo. All rights reserved.

Cybersecurity and defense
2022 - Andrii V. Svintsytskyi - Escuela Militar de Cadetes Jose Maria Cordova

This article describes Ukraine’s cybersecurity system, its place, and its role in a single configuration of national security. The methods used include formal-dogmatic, comparative-legal, sociological, and hermeneutics. The research revealed that effective cybersecurity must be addressed comprehensively, requiring coordinated action at the national, regional, and international levels to prevent, prepare, and respond to incidents by the government, the private sector, and civil society. © 2020 University of Jordan,Deanship of Scientific Research. All rights reserved.

Civilian cybersecurity
2022 - European Union Institute for Security Studies

the increasing importance of dual-use

Dual-use cybersecurity
2022 - Elie Alhajjar, Kevin Lee - Academic Conferences International Ltd

general frame for the cyber threat landscape in US with focusing on 5 main categories: ransomware, social ingeneering, third party software, deep fakes and insider threats.

Cybersecurity and defense
2023 - Oliver A. Guidetti, Craig P. Speelman, Peter Bouhlas - Frontiers Media SA

Vigilance decrement refers to a psychophysiological decline in the capacity to sustain attention to monotonous tasks after prolonged periods. A plethora of experimental tasks exist for researchers to study vigilance decrement in classic domains such as driving and air traffic control and baggage security; however, the only cyber vigilance tasks reported in the research literature exist in the possession of the United States Air Force (USAF). Moreover, existent cyber vigilance tasks have not kept up with advances in real-world cyber security and consequently no longer accurately reflect the cognitive load associated with modern network defense. The Western Australian Cyber Defense Task (WACDT) was designed, engineered, and validated. Elements of network defense command-and-control consoles that influence the trajectory of vigilance can be adjusted within the WACDT. These elements included cognitive load, event rate, signal salience and workload transitions. Two forms of the WACDT were tested. In static trials, each element was adjusted to its maximum level of processing difficulty. In dynamic trials, these elements were set to increase from their minimum to their maximum values. Vigilance performance in static trials was shown to improve over time. In contrast, dynamic WACDT trials were characterized by vigilance performance declines. The WACDT provides the civilian human factors research community with an up-to-date and validated vigilance task for network defense accessible to civilian researchers. Copyright © 2023 Guidetti, Speelman and Bouhlas.

Civilian cybersecurity
2016 - MITRE

We are in the midst of a digital transformation. Technology connects the world and is changing everything. It changes how organizations deliver goods and services and how people live and work. At the same time, this improved connectivity increases our risks to data confidentiality, availability, integrity, human safety, and infrastructure reliability. Federal civilian organizations increasingly use networked technology to help deliver their missions, which can lead to attacks and disruption. Cyber-attacks often result in mission breaches that damage public trust and national and economic security. As mission executions are more dependent on networked technology, enterprise mission strategy and enterprise cybersecurity strategy must be linked.

Civilian cybersecurity
2020 - Christos-Minas Mathas, Costas Vassilakis, Konstantinos-Panagiotis Grammatikakis, Nicholas Kolokotronis, Dimitris Kavallieros, Vasiliki-Georgia Bilali - ACM

Smart Grids are energy delivery networks, constituting an evolution of power grids, in which a bidirectional flow between power providers and consumers is established. These flows support the transfer of electricity and information, in order to support automation actions in the context of the energy delivery network. Insofar, many smart grid implementations and implementation proposals have emerged, with varying degrees of feature delivery and sophistication.

Cybersecurity and defense
2020 - Theodoros Mavroeidakos, Vasilis Chaldeakis - Springer International Publishing

This paper sheds new light in the overall definition of the threat landscape that emerges by the convergence of CC and IoT in a SG.

Cybersecurity and defense
2022 - Noman H. Chowdhury, Marc T.P. Adam, Timm Teubner - Elsevier BV

Cybersecurity is a growing concern for private individuals and professional entities. Reports have shown that the majority of cybersecurity incidents occur because users fail to behave securely. Research on human cybersecurity (HCS) behavior suggests that time pressure is one of the important driving factors behind non-secure HCS behavior. However, there is limited conceptual work to guide researchers and practitioners in this regard. Against this backdrop, we investigate how the impact of time pressure on HCS behavior can be conceptualized within an integrative framework and which countermeasures can be used to reduce its negative impact. Altogether, we conducted 35 interviews with cybersecurity experts, non-security professionals, and private users.

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.