Until consensus: Introducing the international cyber expression dataset

JK Canfil - Journal of Peace Research, 2024 - journals.sagepub.com
Extant scholarship has until now relied on informal-theoretic, case study, and interpretative
methods to assess patterns of norm development in cyberspace. Ideally, these accounts …

Toward a Cyber Weapons Assessment Model—Assessment of the Technical Features of Malicious Software

T Reinhold, C Reuter - IEEE transactions on technology and …, 2021 - ieeexplore.ieee.org
The revelation of the Stuxnet malware in 2010 shed light on the presence of state actors that
are willing and capable of developing and using highly sophisticated, specialized malicious …

Influence operations-the concept

PBMJ Pijpers - Influence Operations in Cyberspace and the …, 2023 - elgaronline.com
In the previous chapter the baselines on influence, cyberspace and its attributes were
outlined, and it was deduced that influence operations inherently fall below the threshold of …

The role of information and communication technologies in civil law relations: Analysis of the civil code of the republic of Kazakhstan

ZK Zhetibayev, SK Idrysheva - 2021 - repository.kazguu.kz
[Purpose] The purpose of the study is to establish using the methods of legal linguistics,
synthesis and analysis of information the mechanism of formation of the conceptual sphere …

Introduction to Influence Operations in Cyberspace

PBMJ Pijpers - Influence Operations in Cyberspace and the …, 2023 - elgaronline.com
Ever since the presidential election of the United States of America (US) of 2016 a recurrent
question dominating the news has been whether these elections had been tampered with. 1 …

Regulating States Cyber-Behaviour: obstacles for a consensus

M Malagutti - Nação e Defesa, 2022 - revistas.rcaap.pt
What are the leading obstacles to reaching a consensus on international norms that regulate
state-sponsored cyber-offences? This type of operation increases swiftly, whilst issues …

[PDF][PDF] Industry 4.0 Introduction in Critical Infrastructure: Information Security Reasoning in Practice

A Holmström, J Lugnet, Å Ericson - The International Journal of …, 2024 - diva-portal.org
The article presents an empirical study of critical infrastructure service providers in
consulting, energy, and mining. The study aims to investigate how such service providers …

Towards a Peaceful Development of Cyberspace-Challenges and Technical Measures for the De-escalation of State-led Cyberconflicts and Arms Control of …

T Reinhold - 2023 - tuprints.ulb.tu-darmstadt.de
Cyberspace, already a few decades old, has become a matter of course for most of us, part
of our everyday life. At the same time, this space and the global infrastructure behind it are …

Peter Pijpers and Paul Ducheine

HTR Work - Hybridity, Conflict, and the Global Politics of …, 2023 - books.google.com
How OW DO INFLUENCE OPERATIONS in cyberspace work? And what is the added value
of cyberspace in that context? COVID-19 has been the latest, but will not be the last, pretext …

Tecnologia, cibernética e defesa

C Telles, GV Lopes, FH Casalunga, MAG Oliveira… - Nação e …, 2022 - comum.rcaap.pt
Os sistemas e serviços baseados no espaço exterior têm ganhado destaque ao
revolucionarem diferentes áreas e representarem fator multiplicador do poder militar. Não à …