Historical Events And Supply Chain Disruption: chemical, biological, radiological and cyber events
September 18, 2023
In the wake of the attacks of September 11, 2001, terrorism emerged as a legitimate threat not just to society, but to corporations as well. This new threat has challenged old business rules and prompted companies to rethink their supply chain operations. However, the events of September 11th were not the first or the only ...
A Discourse In Conflict: Resolving The Definitional Uncertainty Of Cyber War
September 18, 2023
Since emerging in academic literature in the 1990s, definitions of ‘cyber war’ and cyber warfare’ have been notably inconsistent. There has been no research that examines these inconsistencies and whether they can be resolved. Using the methodology of discourse analysis, this thesis addresses this research need. Analysis has identified that the study of cyber war ...
Sony Pictures And The US Federal Government: A Case Study Analysis Of The Sony Pictures Entertainment Hack Crisis Using Normal Accidents Theory
September 18, 2023
In this case study, I analyze the 2014 North Korean computer database hack of Sony Pictures Entertainment (SPE), a serious national security crisis of cyberterrorism. I utilize Normal Accidents theory as a lens, to help explain how the accident within one system (SPE) and later crisis lead to the interaction with a second system (U.S. ...
Three Essays on International Cyber Threats: Target Nation Characteristics, International Rivalry, and Asymmetric Information Exchange
September 18, 2023
As the Internet is progressively integrated into industrial and defense-related networks around the globe, it is becoming increasing important to understand how state and sub-state groups can use Internet vulnerabilities as a conduit of attack. The current social science literature on cyber threats is largely dominated by descriptive, U.S.-centric research. While this scholarship is important, ...
Cyberterrorists: Their Communicative Messages and the Effect on Targets
September 18, 2023
This qualitative study provides a semiotic perspective on cyberterrorism and its opportunity to cause maximal damage while using terrorist propaganda. The very definition of cyberterrorism refers to Internet use, technology, and computer-based networks against critical infrastructures. The application of Stamper’s Semiotic Ladder– morphological, empirical, syntactical, semantic, pragmatic and social world –to the various methods of ...
Cyber-security In The European Region: Anticipatory Governance And Practices
September 18, 2023
This thesis explores the nature of cyber security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The ...
Cybercrimes against the Electricity Infrastructure: Exploring Hacker and Industry Perceptions
September 18, 2023
The US electricity infrastructure uses Industrial Control Systems (ICS) to oversee its operations. These systems are connected online for better efficiency, making them susceptible to cyberattacks. Current research has extensively addressed ICS vulnerabilities that can be exploited by cybercriminals. Vulnerabilities, however, are only one of the many factors influencing offender decision-making in cyberattacks. Furthermore, numerous ...
The Threat Of Cyberterrorism: Contemporary Consequences And Prescriptions
September 18, 2023
This study researches the varying threats that emanate from terrorists who carry their activity into the online arena. It examines several elements of this threat. First, it explores elements of virtual to virtual attacks. Second, it looks at threats against critical infrastructures that can be traced to online sources. Third, this thesis reports on ways ...
Confronting Cyberterrorism With Cyber Deception
September 18, 2023
This thesis concerns the possibility of deceiving cyberterrorists using defensive deception methods. As cyberspace today is a battleground for myriad cyber attacks and intrusions, it may only be a matter of time before terrorists choose to advance their deadly cause in cyberspace. We explore some of the questions raised regarding the threat of cyberterrorism by ...
Understanding The Expression Of Grievances In The Arabic Twitter-sphere Using Machine Learning
September 18, 2023
The purpose of this paper is to discuss the design, application and findings of a case study in which the application of a machine learning algorithm is utilised to identify the grievances in Twitter in an Arabian context. To understand the characteristics of the Twitter users who expressed the identified grievances, data mining techniques and ...