Skip to main content
Reference Type
Publication Year
Publication Area
Displaying 51 - 60 of 350 references
2020 - U.S. Governmen

Examining the ‘defending forward’ concept and the intersection between DoD and the private sector speaks to aligning instruments of national power to set the stage for the consolidation of Internet connectivity and an expansion of that capability. Both outcomes feed a new understanding of what a professional military does in the cyber age to safeguard a civilian interface that is revamping the norms of government across state boundaries. Implementing an effective cyber strategy necessitates recasting the US military’s cyber operations to support civilian efforts.

Civilian cybersecurity
2012 - Marthie Grobler, Joey Jansen van Vuuren - Informa UK Limited

The international scope of the Internet and wide reach of technological usage requires cyber defence systems to intersect largely with the application and implementation of international legislation. One of the problems associated with the technological revolution is that cyber space comprises complex and dynamic technological innovations to which no current legal system is well suited. A further complication is the lack of comprehensive treaties facilitating international cooperation with regard to cyber defence. The result is that many countries will not be properly prepared or adequately protected by legislation in the event of a cyber attack on a national level. The article investigates this problem by touching on the influence that cyber defence has on the international position of the government. The article addresses the principles of cyber security and cyber warfare acts, and briefly touches on cyber security collaboration efforts for South Africa. The authors are of the opinion that Africa does not follow a coordinated approach in dealing with cyber security, and that the various structures that have been established to deal with cyber security are inadequate to deal with issues holistically. To work towards such a coordinated approach, it is suggested that specific interventions be developed to address cyber crime. This approach should create and maintain a partnership or collaboration between business, government and civil society. The authors are of the opinion that unless these spheres of society work together, Africa's efforts to ensure a secure cyber space may be compromised. © 2012 Institute for Security Studies.

Cybersecurity and defense
2023 - IOSR

This research paper provides a critical analysis of the intersection between military artificial intelligence (AI), which is primarily focused on strategic defence purposes, and civilian AI, which primarily seeks to improve quality of life and economic productivity. This paper undertakes a thorough examination of contemporary advancements, regulatory structures, moral deliberations, and worldwide obstacles to delve into the multifaceted characteristics of artificial intelligence (AI technologies. Specifically, it investigates the inherent duality of these technologies and the complexities that emerge when their military and civilian applications intersect. This statement elucidates the ethical dilemmas presented by autonomous weapons, the cyber security risks arising from the incorporation of artificial intelligence (AI) into vital infrastructure, and the worldwide disparities in AI capacities.

Dual-use cybersecurity
2017 - Darko Galinec, William Steingartner - IEEE

This paper explores the relationship between cybersecurity and cyber defense, demonstrating how their integration can lead to cyber resilience. Additionally, a novel model of cyber resilience is presented, focusing on ways and means to achieve it in the face of emerging security risks.

Cybersecurity and defense
2024 - Cornel University

This paper presents a theoretical analysis and practical approach to the moral responsibilities when developing AI systems for non-military applications that may nonetheless be used for conflict applications. We argue that AI represents a form of crossover technology that is different from previous historical examples of dual- or multi-use technology as it has a multiplicative effect across other technologies.

Dual-use cybersecurity
2023 - RAND Corporation

In this report, we update the research summarized in the Capstone Report with current job
opening data to compare the civilian cybersecurity and IT workforces with those in the US

Civilian cybersecurity
2024 - Ogugua Chimezie Obi, Onyinyechi Vivian Akagha, Samuel Onimisi Dawodu, Anthony Chigozie Anyanwu `, Shedrack Onwusinkwue, Islam Ahmad Ibrahim Ahmad ` - Fair East Publishers

This comprehensive review explores the contemporary panorama of cybersecurity, focusing on the latest threats and the advanced defense strategies employed to mitigate them. The analysis encompasses a wide spectrum of cyber threats, including malware, ransomware, phishing attacks, and advanced persistent threats (APTs), shedding light on their evolving tactics, techniques, and procedures. The review delves into the intricate world of cybercrime, emphasizing the motives behind attacks and the diverse range of threat actors involved, from individual hackers to statesponsored entities.By examining recent case studies and real-world incidents, the review provides valuable insights into the dynamic nature of cyber threats, emphasizing the need for proactive and adaptive cybersecurity measures. Furthermore, the review critically evaluates cutting-edge defense mechanisms and strategies deployed to counteract these threats. It explores advancements in artificial intelligence, machine learning, and behavioral analytics, showcasing their pivotal roles in bolstering cybersecurity defenses.

Dual-use cybersecurity
2023 - Thea Riebe - Springer Fachmedien Wiesbaden

Besides the merits of increasing digitization and interconnectedness in private and professional spaces, critical infrastructures and societies are more and more exposed to cyberattacks. In order to enhance the preventative and reactive capabilities against cyberattacks, Computer Emergency Response Teams (CERTs) are deployed in many countries and organizations. In Germany, CERTs in the public sector operate on federal and state level to provide information security services for authorities, citizens, and enterprises. Their tasks of monitoring, analyzing, and communicating threats and incidents is getting more complex due to the increasing amount of information disseminated into public channels. By adopting the perspectives of Computer-Supported Cooperative Work (CSCW) and Crisis Informatics, we contribute to the study of organizational structures, technology use, and the impact on collaborative practices in and between state CERTs with empirical research based on expert interviews with representatives of German state CERTs (N=15) and supplementary document analyses (N=25).

Dual-use cybersecurity
2018 - Seumas Miller - Springer International Publishing

There are a number of different preliminary definitions of dual use familiar in the literature. Research or technology is dual use if it can be used for both: (1) Military and civilian (i.e. non-military) purposes; (2) Beneficial and harmful purposes—where the harmful purposes are to be realised by means of Weapons of Mass Destruction (WMDs); (3) Beneficial and harmful purposes—where either the harmful purposes involve the use of weapons as means, and usually WMDs in particular, or the harm aimed at is on a large-scale but does not necessarily involve weapons or weaponisation.

Dual-use cybersecurity
2014 - CIGI

Recognizing the precedent set by NATO for contracting cyber security, this brief focuses on the necessary fourth “C” in cyber security: contract.

Civilian cybersecurity
Are you a researcher or an expert on dual use? Contribute to the Knowledge base now.