Algorithmic extremism? The securitization of artificial intelligence (AI) and its impact on radicalism, polarization and political violence

J Burton - Technology in society, 2023 - Elsevier
Artificial intelligence is often framed as a tool to be used to counter violent extremism. This
paper seeks to make a contribution to scholarship on the use of AI by considering the other …

A lot of cyber fizzle but not a lot of bang: Evidence about the use of cyber operations from wargames

J Schneider, B Schechter… - Journal of Global Security …, 2022 - academic.oup.com
Despite a burgeoning focus on cyber and international security, there is still great debate
about how cyber operations fit among other military and foreign policy means. Are they a …

[PDF][PDF] Narrow windows of opportunity: the limited utility of cyber operations in war

FAH Pedersen, JT Jacobsen - Journal of Cybersecurity, 2024 - academic.oup.com
The use of offensive cyber operations in war is no longer theoretical conjecture. Still, as we
witness their use, important questions remain. How are offensive cyber operations employed …

The Irregulars: Third-Party Cyber Actors and Digital Resistance Movements in the Ukraine Conflict

MW Smith, T Dean - … on Cyber Conflict: Meeting Reality (CyCon …, 2023 - ieeexplore.ieee.org
The Russian invasion of Ukraine and the subsequent rise of the IT Army of Ukraine (IT Army)
illustrate how an organized non-military, all volunteer, and multinational digital resistance …

Democracy, firms, and cyber punishment: what cyberspace challenge do democracies face from the private sector?

N Katagiri - Australian Journal of International Affairs, 2023 - Taylor & Francis
ABSTRACT I explore four sets of explanations on what makes it hard for democracies to
penalise hackers for their digital actions. My analysis reveals that of the four challenges, two …

Interrogating the Cybersecurity Development Agenda: A Critical Reflection

LM Hurel - The International Spectator, 2022 - Taylor & Francis
The intertwinement between innovation, the expansion of digital technologies and insecurity
has contributed to the surfacing of concerns related to the development of cyber capacities …

The (Il) legitimacy of cybersecurity. an application of just securitization theory to cybersecurity based on the principle of Subsidiarity

J Thumfart - Applied Cybersecurity & Internet Governance, 2022 - ceeol.com
The application of securitization theory to cybersecurity is useful since it subjects the emotive
rhetoric of threat construction to critical scrutiny. Floyd's just securitization theory (JST) …

Indonesia's Role as A Cyber Protector in the Southeast Asia Region

D Heryadi, R Rizaldi, TP Rahmadhani… - … tentang Kajian dan …, 2024 - jurnal.idu.ac.id
The rapid development of technology has finally opened up a new space that is connected
through the internet. Southeast Asia is one of the regions with the highest percentage of …

War by any other name: a short history of the idea of cyberwarfare in the United States

S Lawson - Research Handbook on Cyberwarfare, 2024 - elgaronline.com
Modern societies rely upon cyberspace for their daily functioning. This includes public and
private organizations in government, commerce, banking, news and information, and critical …

Moral maze: ethics for cyber weapon systems

E Schwarz - Research Handbook on Cyberwarfare, 2024 - elgaronline.com
Three decades after the term cyberwar was first used, the ethical dimensions as they pertain
to offensive and non-offensive cyber operations are far from settled. That should, however …