Cyberterrorism: Cyber Prevention Vs Cyber Recovery
September 18, 2023
The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against ...
Users’ Adoption Of Emergent Technologies: Towards an Acceptable Model for Safer Cyber-Assisted Olfactory Information Exchanges in Standard, Micro, and Nano Systems
September 18, 2023
The potential of terrorists and other enemies to use the Internet and/or other digital information technologies as transport vehicles of weapons of mass destruction (WMD) is becoming more evident. This threat may involve cyber-assisted biochemical transactions, which can be performed through olfactory information exchanges, to attack civilian and military targets anytime. In response, this research ...
Global Response to Cyberterrorism and Cybercrime: A Matrix for International Coperation and Vulnerability Assessment
September 18, 2023
Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation ...
Risk Of Cyberterrorism To Naval Ships Inport Naval Station Everett a model based project utilizing SIAM
September 18, 2023
Based on numerous high level concerns that the cyber threat is expected to increase, as well as the already documented uses of cyber warfare, it is necessary to ensure our naval ships are hardened against such attacks. In doing so, an influence net model was designed to discover the likelihood of a successful cyber attack. ...
Historical Events And Supply Chain Disruption: chemical, biological, radiological and cyber events
September 18, 2023
In the wake of the attacks of September 11, 2001, terrorism emerged as a legitimate threat not just to society, but to corporations as well. This new threat has challenged old business rules and prompted companies to rethink their supply chain operations. However, the events of September 11th were not the first or the only ...
A Discourse In Conflict: Resolving The Definitional Uncertainty Of Cyber War
September 18, 2023
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved. Using the methodology of discourse analysis, this thesis addresses this research need. Analysis has identified that the study of cyber war ...
Sony Pictures And The US Federal Government: A Case Study Analysis Of The Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory
September 18, 2023
In this case study, I analyze the 2014 North Korean computer database hack of Sony Pictures Entertainment (SPE), a serious national security crisis of cyberterrorism. I utilize Normal Accidents theory as a lens, to help explain how the accident within one system (SPE) and later crisis lead to the interaction with a second system (U.S. ...
Three Essays on International Cyber Threats: Target Nation Characteristics, International Rivalry, and Asymmetric Information Exchange
September 18, 2023
As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasing important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, ...
Cyberterrorists: Their Communicative Messages and the Effect on Targets
September 18, 2023
This qualitative study provides a semiotic perspective on cyberterrorism and its opportunity to cause maximal damage while using terrorist propaganda. The very definition of cyberterrorism refers to Internet use, technology, and computer-based networks against critical infrastructures. The application of Stamper’s Semiotic Ladder– morphological, empirical, syntactical, semantic, pragmatic and social world –to the various methods of ...
Cyber-security In The European Region: Anticipatory Governance And Practices
September 18, 2023
This thesis explores the nature of cyber security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The ...