Publicly attributing cyber attacks: a framework

FJ Egloff, M Smeets - Journal of Strategic Studies, 2023 - Taylor & Francis
When should states publicly attribute cyber intrusions? Whilst this is a question governments
increasingly grapple with, academia has hardly helped in providing answers. This article …

Cyberterrorism as a global threat: a review on repercussions and countermeasures

S Iftikhar - PeerJ Computer Science, 2024 - peerj.com
An act of cyberterrorism involves using the internet and other forms of information and
communication technology to threaten or cause bodily harm to gain political or ideological …

Secret intelligence and public diplomacy in the Ukraine war

H Dylan, TJ Maguire - Survival: August-September 2022, 2023 - taylorfrancis.com
Russia's February 2022 invasion of Ukraine was shocking, but few could claim to have been
truly surprised. Leading NATO powers had been publicly and privately warning of such an …

[PDF][PDF] Cyber legalism: why it fails and what to do about it

L Kello - Journal of Cybersecurity, 2021 - academic.oup.com
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other
nations assail their political and economic interests. Repeatedly, Western leaders warn …

[图书][B] The politics of cybersecurity in the Middle East

J Shires - 2022 - books.google.com
Cybersecurity is a complex and contested issue in international politics. By focusing on
the'great powers'--the US, the EU, Russia and China--studies in the field often fail to capture …

Coercive disclosure: The weaponization of public intelligence revelation in international relations

O Riemer, D Sobelman - Contemporary Security Policy, 2023 - Taylor & Francis
Can intelligence serve as a coercive instrument in international relations? While coercion
literature mostly addresses military and economic means, this article argues that coercion …

[PDF][PDF] Offensive cyber capabilities and state violence: Three logics of integration

FJ Egloff, J Shires - Journal of Global Security Studies, 2022 - academic.oup.com
Offensive cyber capabilities (OCCs) are the combination of people, technologies, and
organizational attributes that jointly enable offensive cyber operations: the adversarial …

Politics is not everything: New perspectives on the public disclosure of intelligence by states

O Riemer - Contemporary Security Policy, 2021 - Taylor & Francis
Why do states deliberately disclose hard-earned intelligence? For political and operational
reasons, Official Public Intelligence Disclosure (OPID) is often considered counterintuitive …

Understanding Data Breach from a Global Perspective: Incident Visualization and Data Protection Law Review

GA Pimenta Rodrigues, AL Marques Serrano… - Data, 2024 - mdpi.com
Data breaches result in data loss, including personal, health, and financial information that
are crucial, sensitive, and private. The breach is a security incident in which personal and …

Understanding data breach from a global perspective: Incident visualization and data protection law review

GAP Rodrigues, ALM Serrano, ANLE Lemos… - Data, 2024 - search.proquest.com
Data breaches result in data loss, including personal, health, and financial information that
are crucial, sensitive, and private. The breach is a security incident in which personal and …