Post Type Description
Hacktivism: An Analysis of the Motive to Disseminate Confidential Information
September 18, 2023Anonymous, LulzSec, and the AntiSec movement are Internet-based organizations seeking to obtain and disseminate confidential data. Governments worldwide have made an attempt to crack down on these groups in response to the actions taken by them. Several countries, including the United States (Federal Bureau of Investigation, 2011a; 2011b; Department of Justice, 2011), the United Kingdom ...
The Geneva Conventions in Modern Warfare: A Contemporary Analysis of Conflict Classification, Combatant Status, and Detainee Treatment in the War on Terror
September 18, 2023This study is focused on three topics regarding Geneva Convention III. First, is the process of classifying conflicts either as a Common Article 2 or Common Article 3 armed conflict at the onset of hostilities. Conflict classification is critical to the implementation of the Geneva Conventions in warfare and carries with it vast implications dependent ...
Cyberterrorism: Cyber Prevention Vs Cyber Recovery
September 18, 2023The technological age has forced the U.S. to engage a new set of national security challenges. Several potential adversaries have cyberspace capabilities comparable to those of the U.S., and are constantly conducting surveillance, gathering technical information, and mapping critical nodes that could be exploited in future conflicts. How can the U.S. government best defend against ...
Users’ Adoption Of Emergent Technologies: Towards an Acceptable Model for Safer Cyber-Assisted Olfactory Information Exchanges in Standard, Micro, and Nano Systems
September 18, 2023The potential of terrorists and other enemies to use the Internet and/or other digital information technologies as transport vehicles of weapons of mass destruction (WMD) is becoming more evident. This threat may involve cyber-assisted biochemical transactions, which can be performed through olfactory information exchanges, to attack civilian and military targets anytime. In response, this research ...
Global Response to Cyberterrorism and Cybercrime: A Matrix for International Coperation and Vulnerability Assessment
September 18, 2023Cyberterrorism and cybercrime present new challenges for law enforcement and policy makers. Due to its transnational nature, a real and sound response to such a threat requires international cooperation involving participation of all concerned parties in the international community. However, vulnerability emerges from increased reliance on technology, lack of legal measures, and lack of cooperation ...
Risk Of Cyberterrorism To Naval Ships Inport Naval Station Everett a model based project utilizing SIAM
September 18, 2023Based on numerous high level concerns that the cyber threat is expected to increase, as well as the already documented uses of cyber warfare, it is necessary to ensure our naval ships are hardened against such attacks. In doing so, an influence net model was designed to discover the likelihood of a successful cyber attack. ...
Historical Events And Supply Chain Disruption: chemical, biological, radiological and cyber events
September 18, 2023In the wake of the attacks of September 11, 2001, terrorism emerged as a legitimate threat not just to society, but to corporations as well. This new threat has challenged old business rules and prompted companies to rethink their supply chain operations. However, the events of September 11th were not the first or the only ...
A Discourse In Conflict: Resolving The Definitional Uncertainty Of Cyber War
September 18, 2023Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved. Using the methodology of discourse analysis, this thesis addresses this research need. Analysis has identified that the study of cyber war ...
Sony Pictures And The US Federal Government: A Case Study Analysis Of The Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory
September 18, 2023In this case study, I analyze the 2014 North Korean computer database hack of Sony Pictures Entertainment (SPE), a serious national security crisis of cyberterrorism. I utilize Normal Accidents theory as a lens, to help explain how the accident within one system (SPE) and later crisis lead to the interaction with a second system (U.S. ...
Three Essays on International Cyber Threats: Target Nation Characteristics, International Rivalry, and Asymmetric Information Exchange
September 18, 2023As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasing important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, ...