S Iftikhar - PeerJ Computer Science, 2024 - peerj.com
An act of cyberterrorism involves using the internet and other forms of information and communication technology to threaten or cause bodily harm to gain political or ideological …
Russia's February 2022 invasion of Ukraine was shocking, but few could claim to have been truly surprised. Leading NATO powers had been publicly and privately warning of such an …
L Kello - Journal of Cybersecurity, 2021 - academic.oup.com
Western nations face a glaring punishment problem in the cyber domain. Repeatedly, other nations assail their political and economic interests. Repeatedly, Western leaders warn …
Cybersecurity is a complex and contested issue in international politics. By focusing on the'great powers'--the US, the EU, Russia and China--studies in the field often fail to capture …
O Riemer, D Sobelman - Contemporary Security Policy, 2023 - Taylor & Francis
Can intelligence serve as a coercive instrument in international relations? While coercion literature mostly addresses military and economic means, this article argues that coercion …
FJ Egloff, J Shires - Journal of Global Security Studies, 2022 - academic.oup.com
Offensive cyber capabilities (OCCs) are the combination of people, technologies, and organizational attributes that jointly enable offensive cyber operations: the adversarial …
O Riemer - Contemporary Security Policy, 2021 - Taylor & Francis
Why do states deliberately disclose hard-earned intelligence? For political and operational reasons, Official Public Intelligence Disclosure (OPID) is often considered counterintuitive …
Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security incident in which personal and …
Data breaches result in data loss, including personal, health, and financial information that are crucial, sensitive, and private. The breach is a security incident in which personal and …