CINXE.COM

Cyber Security Research Papers - Academia.edu

<!DOCTYPE html> <html lang="en" xmlns:fb="http://www.facebook.com/2008/fbml" class="wf-loading"> <head prefix="og: https://ogp.me/ns# fb: https://ogp.me/ns/fb# academia: https://ogp.me/ns/fb/academia#"> <meta charset="utf-8"> <meta name=viewport content="width=device-width, initial-scale=1"> <meta rel="search" type="application/opensearchdescription+xml" href="/open_search.xml" title="Academia.edu"> <title>Cyber Security Research Papers - Academia.edu</title> <!-- _ _ _ | | (_) | | __ _ ___ __ _ __| | ___ _ __ ___ _ __ _ ___ __| |_ _ / _` |/ __/ _` |/ _` |/ _ \ '_ ` _ \| |/ _` | / _ \/ _` | | | | | (_| | (_| (_| | (_| | __/ | | | | | | (_| || __/ (_| | |_| | \__,_|\___\__,_|\__,_|\___|_| |_| |_|_|\__,_(_)___|\__,_|\__,_| We're hiring! See https://www.academia.edu/hiring --> <link href="//a.academia-assets.com/images/favicons/favicon-production.ico" rel="shortcut icon" type="image/vnd.microsoft.icon"> <link rel="apple-touch-icon" sizes="57x57" href="//a.academia-assets.com/images/favicons/apple-touch-icon-57x57.png"> <link rel="apple-touch-icon" sizes="60x60" href="//a.academia-assets.com/images/favicons/apple-touch-icon-60x60.png"> <link rel="apple-touch-icon" sizes="72x72" href="//a.academia-assets.com/images/favicons/apple-touch-icon-72x72.png"> <link rel="apple-touch-icon" sizes="76x76" href="//a.academia-assets.com/images/favicons/apple-touch-icon-76x76.png"> <link rel="apple-touch-icon" sizes="114x114" href="//a.academia-assets.com/images/favicons/apple-touch-icon-114x114.png"> <link rel="apple-touch-icon" sizes="120x120" href="//a.academia-assets.com/images/favicons/apple-touch-icon-120x120.png"> <link rel="apple-touch-icon" sizes="144x144" href="//a.academia-assets.com/images/favicons/apple-touch-icon-144x144.png"> <link rel="apple-touch-icon" sizes="152x152" href="//a.academia-assets.com/images/favicons/apple-touch-icon-152x152.png"> <link rel="apple-touch-icon" sizes="180x180" href="//a.academia-assets.com/images/favicons/apple-touch-icon-180x180.png"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-32x32.png" sizes="32x32"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-194x194.png" sizes="194x194"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-96x96.png" sizes="96x96"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/android-chrome-192x192.png" sizes="192x192"> <link rel="icon" type="image/png" href="//a.academia-assets.com/images/favicons/favicon-16x16.png" sizes="16x16"> <link rel="manifest" href="//a.academia-assets.com/images/favicons/manifest.json"> <meta name="msapplication-TileColor" content="#2b5797"> <meta name="msapplication-TileImage" content="//a.academia-assets.com/images/favicons/mstile-144x144.png"> <meta name="theme-color" content="#ffffff"> <script> window.performance && window.performance.measure && window.performance.measure("Time To First Byte", "requestStart", "responseStart"); </script> <script> (function() { if (!window.URLSearchParams || !window.history || !window.history.replaceState) { return; } var searchParams = new URLSearchParams(window.location.search); var paramsToDelete = [ 'fs', 'sm', 'swp', 'iid', 'nbs', 'rcc', // related content category 'rcpos', // related content carousel position 'rcpg', // related carousel page 'rchid', // related content hit id 'f_ri', // research interest id, for SEO tracking 'f_fri', // featured research interest, for SEO tracking (param key without value) 'f_rid', // from research interest directory for SEO tracking 'f_loswp', // from research interest pills on LOSWP sidebar for SEO tracking 'rhid', // referrring hit id ]; if (paramsToDelete.every((key) => searchParams.get(key) === null)) { return; } paramsToDelete.forEach((key) => { searchParams.delete(key); }); var cleanUrl = new URL(window.location.href); cleanUrl.search = searchParams.toString(); history.replaceState({}, document.title, cleanUrl); })(); </script> <script async src="https://www.googletagmanager.com/gtag/js?id=G-5VKX33P2DS"></script> <script> window.dataLayer = window.dataLayer || []; function gtag(){dataLayer.push(arguments);} gtag('js', new Date()); gtag('config', 'G-5VKX33P2DS', { cookie_domain: 'academia.edu', send_page_view: false, }); gtag('event', 'page_view', { 'controller': "by_tag", 'action': "show_one", 'controller_action': 'by_tag#show_one', 'logged_in': 'false', 'edge': 'unknown', // Send nil if there is no A/B test bucket, in case some records get logged // with missing data - that way we can distinguish between the two cases. // ab_test_bucket should be of the form <ab_test_name>:<bucket> 'ab_test_bucket': null, }) </script> <script type="text/javascript"> window.sendUserTiming = function(timingName) { if (!(window.performance && window.performance.measure)) return; var entries = window.performance.getEntriesByName(timingName, "measure"); if (entries.length !== 1) return; var timingValue = Math.round(entries[0].duration); gtag('event', 'timing_complete', { name: timingName, value: timingValue, event_category: 'User-centric', }); }; window.sendUserTiming("Time To First Byte"); </script> <meta name="csrf-param" content="authenticity_token" /> <meta name="csrf-token" content="Hcg3hpfTNKjnD8hNe85wJCitywXSUeSUMF5ENb1QbgvN31XYk-DU5vYVCCpYN8jRgUo8gWRcHclTpH6omdHj4Q" /> <link href="/Documents/in/Cyber_Security?after=50%2C42605635" rel="next" /><link crossorigin="" href="https://fonts.gstatic.com/" rel="preconnect" /><link href="https://fonts.googleapis.com/css2?family=DM+Sans:ital,opsz,wght@0,9..40,100..1000;1,9..40,100..1000&amp;family=Gupter:wght@400;500;700&amp;family=IBM+Plex+Mono:wght@300;400&amp;family=Material+Symbols+Outlined:opsz,wght,FILL,GRAD@20,400,0,0&amp;display=swap" rel="stylesheet" /><link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system/common-2b6f90dbd75f5941bc38f4ad716615f3ac449e7398313bb3bc225fba451cd9fa.css" /> <meta name="description" content="View Cyber Security Research Papers on Academia.edu for free." /> <meta name="google-site-verification" content="bKJMBZA7E43xhDOopFZkssMMkBRjvYERV-NaN4R6mrs" /> <script> var $controller_name = 'by_tag'; var $action_name = "show_one"; var $rails_env = 'production'; var $app_rev = '719f2b0d6f888e17967a2ee7f968707e00d57a71'; var $domain = 'academia.edu'; var $app_host = "academia.edu"; var $asset_host = "academia-assets.com"; var $start_time = new Date().getTime(); var $recaptcha_key = "6LdxlRMTAAAAADnu_zyLhLg0YF9uACwz78shpjJB"; var $recaptcha_invisible_key = "6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj"; var $disableClientRecordHit = false; </script> <script> window.Aedu = { hit_data: null }; window.Aedu.SiteStats = {"premium_universities_count":14055,"monthly_visitors":"97 million","monthly_visitor_count":97147387,"monthly_visitor_count_in_millions":97,"user_count":281780357,"paper_count":55203019,"paper_count_in_millions":55,"page_count":432000000,"page_count_in_millions":432,"pdf_count":16500000,"pdf_count_in_millions":16}; window.Aedu.serverRenderTime = new Date(1738441894000); window.Aedu.timeDifference = new Date().getTime() - 1738441894000; window.Aedu.isUsingCssV1 = false; window.Aedu.enableLocalization = true; window.Aedu.activateFullstory = false; window.Aedu.serviceAvailability = { status: {"attention_db":"on","bibliography_db":"on","contacts_db":"on","email_db":"on","indexability_db":"on","mentions_db":"on","news_db":"on","notifications_db":"on","offsite_mentions_db":"on","redshift":"on","redshift_exports_db":"on","related_works_db":"on","ring_db":"on","user_tests_db":"on"}, serviceEnabled: function(service) { return this.status[service] === "on"; }, readEnabled: function(service) { return this.serviceEnabled(service) || this.status[service] === "read_only"; }, }; window.Aedu.viewApmTrace = function() { // Check if x-apm-trace-id meta tag is set, and open the trace in APM // in a new window if it is. var apmTraceId = document.head.querySelector('meta[name="x-apm-trace-id"]'); if (apmTraceId) { var traceId = apmTraceId.content; // Use trace ID to construct URL, an example URL looks like: // https://app.datadoghq.com/apm/traces?query=trace_id%31298410148923562634 var apmUrl = 'https://app.datadoghq.com/apm/traces?query=trace_id%3A' + traceId; window.open(apmUrl, '_blank'); } }; </script> <!--[if lt IE 9]> <script src="//cdnjs.cloudflare.com/ajax/libs/html5shiv/3.7.2/html5shiv.min.js"></script> <![endif]--> <link href="https://fonts.googleapis.com/css?family=Roboto:100,100i,300,300i,400,400i,500,500i,700,700i,900,900i" rel="stylesheet"> <link rel="preload" href="//maxcdn.bootstrapcdn.com/font-awesome/4.3.0/css/font-awesome.min.css" as="style" onload="this.rel='stylesheet'"> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/libraries-a9675dcb01ec4ef6aa807ba772c7a5a00c1820d3ff661c1038a20f80d06bb4e4.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/academia-40698df34f913bd208bb70f09d2feb7c6286046250be17a4db35bba2c08b0e2f.css" /> <link rel="stylesheet" media="all" href="//a.academia-assets.com/assets/design_system_legacy-056a9113b9a0f5343d013b29ee1929d5a18be35fdcdceb616600b4db8bd20054.css" /> <script src="//a.academia-assets.com/assets/webpack_bundles/runtime-bundle-005434038af4252ca37c527588411a3d6a0eabb5f727fac83f8bbe7fd88d93bb.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/webpack_libraries_and_infrequently_changed.wjs-bundle-5c695836213a176c22f0ece84c356c17f7f3af62ecc3baaceb09b7abbedcf68b.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/core_webpack.wjs-bundle-77a23dba011e6986f9d41cb9caab2f629a616ea57ea4c76b161176f7110757be.js"></script> <script src="//a.academia-assets.com/assets/webpack_bundles/sentry.wjs-bundle-5fe03fddca915c8ba0f7edbe64c194308e8ce5abaed7bffe1255ff37549c4808.js"></script> <script> jade = window.jade || {}; jade.helpers = window.$h; jade._ = window._; </script> <!-- Google Tag Manager --> <script id="tag-manager-head-root">(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src= 'https://www.googletagmanager.com/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f); })(window,document,'script','dataLayer_old','GTM-5G9JF7Z');</script> <!-- End Google Tag Manager --> <script> window.gptadslots = []; window.googletag = window.googletag || {}; window.googletag.cmd = window.googletag.cmd || []; </script> <script type="text/javascript"> // TODO(jacob): This should be defined, may be rare load order problem. // Checking if null is just a quick fix, will default to en if unset. // Better fix is to run this immedietely after I18n is set. if (window.I18n != null) { I18n.defaultLocale = "en"; I18n.locale = "en"; I18n.fallbacks = true; } </script> <link rel="canonical" href="https://www.academia.edu/Documents/in/Cyber_Security" /> </head> <!--[if gte IE 9 ]> <body class='ie ie9 c-by_tag a-show_one logged_out u-bgColorWhite'> <![endif]--> <!--[if !(IE) ]><!--> <body class='c-by_tag a-show_one logged_out u-bgColorWhite'> <!--<![endif]--> <div id="fb-root"></div><script>window.fbAsyncInit = function() { FB.init({ appId: "2369844204", version: "v8.0", status: true, cookie: true, xfbml: true }); // Additional initialization code. if (window.InitFacebook) { // facebook.ts already loaded, set it up. window.InitFacebook(); } else { // Set a flag for facebook.ts to find when it loads. window.academiaAuthReadyFacebook = true; } };</script><script>window.fbAsyncLoad = function() { // Protection against double calling of this function if (window.FB) { return; } (function(d, s, id){ var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) {return;} js = d.createElement(s); js.id = id; js.src = "//connect.facebook.net/en_US/sdk.js"; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk')); } if (!window.defer_facebook) { // Autoload if not deferred window.fbAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.fbAsyncLoad(); }, 5000); }</script> <div id="google-root"></div><script>window.loadGoogle = function() { if (window.InitGoogle) { // google.ts already loaded, set it up. window.InitGoogle("331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"); } else { // Set a flag for google.ts to use when it loads. window.GoogleClientID = "331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b"; } };</script><script>window.googleAsyncLoad = function() { // Protection against double calling of this function (function(d) { var js; var id = 'google-jssdk'; var ref = d.getElementsByTagName('script')[0]; if (d.getElementById(id)) { return; } js = d.createElement('script'); js.id = id; js.async = true; js.onload = loadGoogle; js.src = "https://accounts.google.com/gsi/client" ref.parentNode.insertBefore(js, ref); }(document)); } if (!window.defer_google) { // Autoload if not deferred window.googleAsyncLoad(); } else { // Defer loading by 5 seconds setTimeout(function() { window.googleAsyncLoad(); }, 5000); }</script> <div id="tag-manager-body-root"> <!-- Google Tag Manager (noscript) --> <noscript><iframe src="https://www.googletagmanager.com/ns.html?id=GTM-5G9JF7Z" height="0" width="0" style="display:none;visibility:hidden"></iframe></noscript> <!-- End Google Tag Manager (noscript) --> <!-- Event listeners for analytics --> <script> window.addEventListener('load', function() { if (document.querySelector('input[name="commit"]')) { document.querySelector('input[name="commit"]').addEventListener('click', function() { gtag('event', 'click', { event_category: 'button', event_label: 'Log In' }) }) } }); </script> </div> <script>var _comscore = _comscore || []; _comscore.push({ c1: "2", c2: "26766707" }); (function() { var s = document.createElement("script"), el = document.getElementsByTagName("script")[0]; s.async = true; s.src = (document.location.protocol == "https:" ? "https://sb" : "http://b") + ".scorecardresearch.com/beacon.js"; el.parentNode.insertBefore(s, el); })();</script><img src="https://sb.scorecardresearch.com/p?c1=2&amp;c2=26766707&amp;cv=2.0&amp;cj=1" style="position: absolute; visibility: hidden" /> <div id='react-modal'></div> <div class='DesignSystem'> <a class='u-showOnFocus' href='#site'> Skip to main content </a> </div> <div id="upgrade_ie_banner" style="display: none;"><p>Academia.edu no longer supports Internet Explorer.</p><p>To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to&nbsp;<a href="https://www.academia.edu/upgrade-browser">upgrade your browser</a>.</p></div><script>// Show this banner for all versions of IE if (!!window.MSInputMethodContext || /(MSIE)/.test(navigator.userAgent)) { document.getElementById('upgrade_ie_banner').style.display = 'block'; }</script> <div class="DesignSystem bootstrap ShrinkableNav no-sm no-md"><div class="navbar navbar-default main-header"><div class="container-wrapper" id="main-header-container"><div class="container"><div class="navbar-header"><div class="nav-left-wrapper u-mt0x"><div class="nav-logo"><a data-main-header-link-target="logo_home" href="https://www.academia.edu/"><img class="visible-xs-inline-block" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015-A.svg" width="24" height="24" /><img width="145.2" height="18" class="hidden-xs" style="height: 24px;" alt="Academia.edu" src="//a.academia-assets.com/images/academia-logo-redesign-2015.svg" /></a></div><div class="nav-search"><div class="SiteSearch-wrapper select2-no-default-pills"><form class="js-SiteSearch-form DesignSystem" action="https://www.academia.edu/search" accept-charset="UTF-8" method="get"><i class="SiteSearch-icon fa fa-search u-fw700 u-positionAbsolute u-tcGrayDark"></i><input class="js-SiteSearch-form-input SiteSearch-form-input form-control" data-main-header-click-target="search_input" name="q" placeholder="Search" type="text" value="" /></form></div></div></div><div class="nav-right-wrapper pull-right"><ul class="NavLinks js-main-nav list-unstyled"><li class="NavLinks-link"><a class="js-header-login-url Button Button--inverseGray Button--sm u-mb4x" id="nav_log_in" rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="NavLinks-link u-p0x"><a class="Button Button--inverseGray Button--sm u-mb4x" rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li></ul><button class="hidden-lg hidden-md hidden-sm u-ml4x navbar-toggle collapsed" data-target=".js-mobile-header-links" data-toggle="collapse" type="button"><span class="icon-bar"></span><span class="icon-bar"></span><span class="icon-bar"></span></button></div></div><div class="collapse navbar-collapse js-mobile-header-links"><ul class="nav navbar-nav"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/login">Log In</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/signup">Sign Up</a></li><li class="u-borderColorGrayLight u-borderBottom1 js-mobile-nav-expand-trigger"><a href="#">more&nbsp<span class="caret"></span></a></li><li><ul class="js-mobile-nav-expand-section nav navbar-nav u-m0x collapse"><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/about">About</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/press">Press</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="false" href="https://www.academia.edu/documents">Papers</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://www.academia.edu/hiring"><i class="fa fa-briefcase"></i>&nbsp;We're Hiring!</a></li><li class="u-borderColorGrayLight u-borderBottom1"><a rel="nofollow" href="https://support.academia.edu/"><i class="fa fa-question-circle"></i>&nbsp;Help Center</a></li><li class="js-mobile-nav-collapse-trigger u-borderColorGrayLight u-borderBottom1 dropup" style="display:none"><a href="#">less&nbsp<span class="caret"></span></a></li></ul></li></ul></div></div></div><script>(function(){ var $moreLink = $(".js-mobile-nav-expand-trigger"); var $lessLink = $(".js-mobile-nav-collapse-trigger"); var $section = $('.js-mobile-nav-expand-section'); $moreLink.click(function(ev){ ev.preventDefault(); $moreLink.hide(); $lessLink.show(); $section.collapse('show'); }); $lessLink.click(function(ev){ ev.preventDefault(); $moreLink.show(); $lessLink.hide(); $section.collapse('hide'); }); })() if ($a.is_logged_in() || false) { new Aedu.NavigationController({ el: '.js-main-nav', showHighlightedNotification: false }); } else { $(".js-header-login-url").attr("href", $a.loginUrlWithRedirect()); } Aedu.autocompleteSearch = new AutocompleteSearch({el: '.js-SiteSearch-form'});</script></div></div> <div id='site' class='fixed'> <div id="content" class="clearfix"> <script>document.addEventListener('DOMContentLoaded', function(){ var $dismissible = $(".dismissible_banner"); $dismissible.click(function(ev) { $dismissible.hide(); }); });</script> <div class="DesignSystem" style="margin-top:-40px"><div class="PageHeader"><div class="container"><div class="row"><style type="text/css">.sor-abstract { display: -webkit-box; overflow: hidden; text-overflow: ellipsis; -webkit-line-clamp: 3; -webkit-box-orient: vertical; }</style><div class="col-xs-12 clearfix"><div class="u-floatLeft"><h1 class="PageHeader-title u-m0x u-fs30">Cyber Security</h1><div class="u-tcGrayDark">135,452&nbsp;Followers</div><div class="u-tcGrayDark u-mt2x">Recent papers in&nbsp;<b>Cyber Security</b></div></div></div></div></div></div><div class="TabbedNavigation"><div class="container"><div class="row"><div class="col-xs-12 clearfix"><ul class="nav u-m0x u-p0x list-inline u-displayFlex"><li class="active"><a href="https://www.academia.edu/Documents/in/Cyber_Security">Top Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyber_Security/MostCited">Most Cited Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyber_Security/MostDownloaded">Most Downloaded Papers</a></li><li><a href="https://www.academia.edu/Documents/in/Cyber_Security/MostRecent">Newest Papers</a></li><li><a class="" href="https://www.academia.edu/People/Cyber_Security">People</a></li></ul></div><style type="text/css">ul.nav{flex-direction:row}@media(max-width: 567px){ul.nav{flex-direction:column}.TabbedNavigation li{max-width:100%}.TabbedNavigation li.active{background-color:var(--background-grey, #dddde2)}.TabbedNavigation li.active:before,.TabbedNavigation li.active:after{display:none}}</style></div></div></div><div class="container"><div class="row"><div class="col-xs-12"><div class="u-displayFlex"><div class="u-flexGrow1"><div class="works"><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25667022" data-work_id="25667022" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25667022/Early_Warning_Systems_for_Cyber_Defence">Early Warning Systems for Cyber Defence</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually update their typical security measures. Attackers often have a long-term interest in their targets. Due to a number of factors such as scale,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_25667022" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually update their typical security measures. Attackers often have a long-term interest in their targets. Due to a number of factors such as scale, architecture and nonproductive traffic however it makes difficult to detect them using typical intrusion detection techniques. Cyber early warning systems (CEWS) aim at alerting such attempts in their nascent stages using preliminary indicators. Design and implementation of such systems involves numerous research challenges such as generic set of indicators, intelligence gathering, uncertainty reasoning and information fusion. This paper discusses such challenges and presents the reader with compelling motivation. A carefully deployed empirical analysis using a real world attack scenario and a real network traffic capture is also presented.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25667022" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="b6f351dcd78735b823945e9b53769671" rel="nofollow" data-download="{&quot;attachment_id&quot;:46004596,&quot;asset_id&quot;:25667022,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46004596/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="44516825" href="https://independent.academia.edu/HarshaKalutarage">Harsha Kalutarage</a><script data-card-contents-for-user="44516825" type="text/json">{"id":44516825,"first_name":"Harsha","last_name":"Kalutarage","domain_name":"independent","page_name":"HarshaKalutarage","display_name":"Harsha Kalutarage","profile_url":"https://independent.academia.edu/HarshaKalutarage?f_ri=115676","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_25667022 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25667022"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25667022, container: ".js-paper-rank-work_25667022", }); });</script></li><li class="js-percentile-work_25667022 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25667022; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25667022"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25667022 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25667022"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25667022; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25667022]").text(description); $(".js-view-count-work_25667022").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25667022").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25667022"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25667022]'), work: {"id":25667022,"title":"Early Warning Systems for Cyber Defence","created_at":"2016-05-27T15:31:54.002-07:00","url":"https://www.academia.edu/25667022/Early_Warning_Systems_for_Cyber_Defence?f_ri=115676","dom_id":"work_25667022","summary":"Cybercriminals ramp up their efforts with sophisticated techniques while defenders gradually update their typical security measures. Attackers often have a long-term interest in their targets. Due to a number of factors such as scale, architecture and nonproductive traffic however it makes difficult to detect them using typical intrusion detection techniques. Cyber early warning systems (CEWS) aim at alerting such attempts in their nascent stages using preliminary indicators. Design and implementation of such systems involves numerous research challenges such as generic set of indicators, intelligence gathering, uncertainty reasoning and information fusion. This paper discusses such challenges and presents the reader with compelling motivation. A carefully deployed empirical analysis using a real world attack scenario and a real network traffic capture is also presented.","downloadable_attachments":[{"id":46004596,"asset_id":25667022,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":44516825,"first_name":"Harsha","last_name":"Kalutarage","domain_name":"independent","page_name":"HarshaKalutarage","display_name":"Harsha Kalutarage","profile_url":"https://independent.academia.edu/HarshaKalutarage?f_ri=115676","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_42154436" data-work_id="42154436" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/42154436/Securing_Judgement_Rethinking_Security_and_Online_Information_Threats">Securing Judgement: Rethinking Security and Online Information Threats</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The contemporary debate in democracies routinely describes online information threats such as misinformation, disinformation and deception as security-issues in need of urgent attention. Despite this pervasive discourse, policymakers... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_42154436" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The contemporary debate in democracies routinely describes online information threats such as misinformation, disinformation and deception as security-issues in need of urgent attention. Despite this pervasive discourse, policymakers often appear incapable of articulating what security means in this context. Turning to EU policy and previous research on cybersecurity, this dissertation empirically unpacks, critically interrogates and theoretically rethinks the meaning of security in relation to online information threats. In so doing, the articles elucidate a new ‘referent object’ implicitly guiding securitization. Contemporary interventions can be seen as grounded in assumptions about the protection of human judgement. Using Hannah Arendt’s writings on ‘political judgement’ as a point of reference for critically evaluating contemporary policy, the dissertation points to several problems with existing approaches to security in a democratic context where free debate constitutes a legitimizing element of political authority. The rethinking of security departs from this problematic and shows that treating human judgement as a ‘referent object’ – if firmly grounded in the interplay between independent human communicating subjects – can better address some problematic questions about legitimate authority and political community currently haunting security interventions in cyberspace.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/42154436" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="a10e65aabc6b636701572c4bbe67f7e7" rel="nofollow" data-download="{&quot;attachment_id&quot;:62294617,&quot;asset_id&quot;:42154436,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/62294617/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3281324" href="https://siia.academia.edu/Hedvig%C3%96rd%C3%A9n">Hedvig Ördén</a><script data-card-contents-for-user="3281324" type="text/json">{"id":3281324,"first_name":"Hedvig","last_name":"Ördén","domain_name":"siia","page_name":"HedvigÖrdén","display_name":"Hedvig Ördén","profile_url":"https://siia.academia.edu/Hedvig%C3%96rd%C3%A9n?f_ri=115676","photo":"https://0.academia-photos.com/3281324/1088628/5303618/s65_hedvig._rd_n.jpg"}</script></span></span></li><li class="js-paper-rank-work_42154436 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="42154436"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 42154436, container: ".js-paper-rank-work_42154436", }); });</script></li><li class="js-percentile-work_42154436 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 42154436; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_42154436"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_42154436 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="42154436"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 42154436; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=42154436]").text(description); $(".js-view-count-work_42154436").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_42154436").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="42154436"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1696" rel="nofollow" href="https://www.academia.edu/Documents/in/Political_Theory">Political Theory</a>,&nbsp;<script data-card-contents-for-ri="1696" type="text/json">{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" rel="nofollow" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>,&nbsp;<script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5535" rel="nofollow" href="https://www.academia.edu/Documents/in/Critical_Security_Studies">Critical Security Studies</a>,&nbsp;<script data-card-contents-for-ri="5535" type="text/json">{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5954" rel="nofollow" href="https://www.academia.edu/Documents/in/European_Security_and_Defence_Policy">European Security and Defence Policy</a><script data-card-contents-for-ri="5954" type="text/json">{"id":5954,"name":"European Security and Defence Policy","url":"https://www.academia.edu/Documents/in/European_Security_and_Defence_Policy?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=42154436]'), work: {"id":42154436,"title":"Securing Judgement: Rethinking Security and Online Information Threats","created_at":"2020-03-06T07:52:26.849-08:00","url":"https://www.academia.edu/42154436/Securing_Judgement_Rethinking_Security_and_Online_Information_Threats?f_ri=115676","dom_id":"work_42154436","summary":"The contemporary debate in democracies routinely describes online information threats such as misinformation, disinformation and deception as security-issues in need of urgent attention. Despite this pervasive discourse, policymakers often appear incapable of articulating what security means in this context. Turning to EU policy and previous research on cybersecurity, this dissertation empirically unpacks, critically interrogates and theoretically rethinks the meaning of security in relation to online information threats. In so doing, the articles elucidate a new ‘referent object’ implicitly guiding securitization. Contemporary interventions can be seen as grounded in assumptions about the protection of human judgement. Using Hannah Arendt’s writings on ‘political judgement’ as a point of reference for critically evaluating contemporary policy, the dissertation points to several problems with existing approaches to security in a democratic context where free debate constitutes a legitimizing element of political authority. The rethinking of security departs from this problematic and shows that treating human judgement as a ‘referent object’ – if firmly grounded in the interplay between independent human communicating subjects – can better address some problematic questions about legitimate authority and political community currently haunting security interventions in cyberspace.","downloadable_attachments":[{"id":62294617,"asset_id":42154436,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3281324,"first_name":"Hedvig","last_name":"Ördén","domain_name":"siia","page_name":"HedvigÖrdén","display_name":"Hedvig Ördén","profile_url":"https://siia.academia.edu/Hedvig%C3%96rd%C3%A9n?f_ri=115676","photo":"https://0.academia-photos.com/3281324/1088628/5303618/s65_hedvig._rd_n.jpg"}],"research_interests":[{"id":1696,"name":"Political Theory","url":"https://www.academia.edu/Documents/in/Political_Theory?f_ri=115676","nofollow":true},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=115676","nofollow":true},{"id":5535,"name":"Critical Security Studies","url":"https://www.academia.edu/Documents/in/Critical_Security_Studies?f_ri=115676","nofollow":true},{"id":5954,"name":"European Security and Defence Policy","url":"https://www.academia.edu/Documents/in/European_Security_and_Defence_Policy?f_ri=115676","nofollow":true},{"id":27442,"name":"Hannah Arendt","url":"https://www.academia.edu/Documents/in/Hannah_Arendt?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":159919,"name":"Disinformation","url":"https://www.academia.edu/Documents/in/Disinformation?f_ri=115676"},{"id":578562,"name":"Post-foundational Political Theory","url":"https://www.academia.edu/Documents/in/Post-foundational_Political_Theory?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_50824388" data-work_id="50824388" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/50824388/Machine_Learning_for_Cyber_Security">Machine Learning for Cyber Security</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Today, it&#39;s impossible to deploy effective cyber security technology without relying heavily on advanced techniques like machine learning and deep learning. Cyber security is a growing challenge in the era of Internet. Filling an... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_50824388" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Today, it&#39;s impossible to deploy effective cyber security technology without relying heavily on advanced techniques like machine learning and deep learning. Cyber security is a growing challenge in the era of Internet. Filling an important gap between machine learning and cyber security communities, it discusses topics covering a wide range of modern and practical machine learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/50824388" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="74fe6da9f520b981d2f180d9a9e49102" rel="nofollow" data-download="{&quot;attachment_id&quot;:68691214,&quot;asset_id&quot;:50824388,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/68691214/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="8516382" href="https://geu.academia.edu/PreetiShivach">Preeti Shivach</a><script data-card-contents-for-user="8516382" type="text/json">{"id":8516382,"first_name":"Preeti","last_name":"Shivach","domain_name":"geu","page_name":"PreetiShivach","display_name":"Preeti Shivach","profile_url":"https://geu.academia.edu/PreetiShivach?f_ri=115676","photo":"https://0.academia-photos.com/8516382/145380209/134912215/s65_preeti.shivach.jpeg"}</script></span></span></li><li class="js-paper-rank-work_50824388 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="50824388"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 50824388, container: ".js-paper-rank-work_50824388", }); });</script></li><li class="js-percentile-work_50824388 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 50824388; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_50824388"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_50824388 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="50824388"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 50824388; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=50824388]").text(description); $(".js-view-count-work_50824388").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_50824388").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="50824388"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2008" rel="nofollow" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>,&nbsp;<script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=50824388]'), work: {"id":50824388,"title":"Machine Learning for Cyber Security","created_at":"2021-08-10T22:51:04.290-07:00","url":"https://www.academia.edu/50824388/Machine_Learning_for_Cyber_Security?f_ri=115676","dom_id":"work_50824388","summary":"Today, it's impossible to deploy effective cyber security technology without relying heavily on advanced techniques like machine learning and deep learning. Cyber security is a growing challenge in the era of Internet. Filling an important gap between machine learning and cyber security communities, it discusses topics covering a wide range of modern and practical machine learning techniques, frameworks and development tools to enable readers to engage with the cutting-edge research across various aspects of cyber security.","downloadable_attachments":[{"id":68691214,"asset_id":50824388,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":8516382,"first_name":"Preeti","last_name":"Shivach","domain_name":"geu","page_name":"PreetiShivach","display_name":"Preeti Shivach","profile_url":"https://geu.academia.edu/PreetiShivach?f_ri=115676","photo":"https://0.academia-photos.com/8516382/145380209/134912215/s65_preeti.shivach.jpeg"}],"research_interests":[{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_43576089" data-work_id="43576089" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/43576089/%D0%9E%D0%9A%D0%A0%D0%95%D0%9C%D0%86_%D0%97%D0%90%D0%A5%D0%9E%D0%94%D0%98_%D0%A9%D0%9E%D0%94%D0%9E_%D0%92%D0%94%D0%9E%D0%A1%D0%9A%D0%9E%D0%9D%D0%90%D0%9B%D0%95%D0%9D%D0%9D%D0%AF_%D0%9A%D0%86%D0%91%D0%95%D0%A0%D0%91%D0%95%D0%97%D0%9F%D0%95%D0%9A%D0%98_%D0%92%D0%98%D0%91%D0%9E%D0%A0%D0%A7%D0%9E%D0%93%D0%9E_%D0%9F%D0%A0%D0%9E%D0%A6%D0%95%D0%A1%D0%A3_%D0%92_%D0%A3%D0%9A%D0%A0%D0%90%D0%87%D0%9D%D0%86">ОКРЕМІ ЗАХОДИ ЩОДО ВДОСКОНАЛЕННЯ КІБЕРБЕЗПЕКИ ВИБОРЧОГО ПРОЦЕСУ В УКРАЇНІ</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Спроби впливу на виборчі процеси шляхом застосування кібератак набувають все більшого поширення у світі – такі кіберінциденти фокусуються, передусім, на слабких сторонах виборчої інфраструктури . З огляду на зростання кількості... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_43576089" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Спроби впливу на виборчі процеси шляхом застосування кібератак набувають все більшого поширення у світі – такі кіберінциденти фокусуються, передусім, на слабких сторонах виборчої інфраструктури . З огляду на зростання кількості кіберінцидентів ЄС&nbsp; та США&nbsp; почали розробку керівництв щодо практичних кроків, спрямованих на покращення системи кібербезпеки виборів. Заразом все більша кількість держав шукає власні підходи, які б не лише дозволили ефективно реагувати на кібератаки під час виборчого процесу, але й максимально їх попереджувати.<br />Фахівці у галузі кібербезпеки, вважають, що в сучасних умовах кіберскладові виборчого процесу (у тому числі машини для голосування, програмне забезпечення тощо) повинні розглядатися як критична інфраструктура держави.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/43576089" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="2bc131aecbed84b41e06a072540096bb" rel="nofollow" data-download="{&quot;attachment_id&quot;:63881538,&quot;asset_id&quot;:43576089,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/63881538/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="263179" href="https://niss.academia.edu/ViktoriaBoyko">Viktoria Boiko</a><script data-card-contents-for-user="263179" type="text/json">{"id":263179,"first_name":"Viktoria","last_name":"Boiko","domain_name":"niss","page_name":"ViktoriaBoyko","display_name":"Viktoria Boiko","profile_url":"https://niss.academia.edu/ViktoriaBoyko?f_ri=115676","photo":"https://0.academia-photos.com/263179/55288/19554283/s65_viktoria.boyko.jpg"}</script></span></span></li><li class="js-paper-rank-work_43576089 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="43576089"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 43576089, container: ".js-paper-rank-work_43576089", }); });</script></li><li class="js-percentile-work_43576089 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 43576089; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_43576089"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_43576089 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="43576089"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 43576089; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=43576089]").text(description); $(".js-view-count-work_43576089").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_43576089").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="43576089"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="20366" rel="nofollow" href="https://www.academia.edu/Documents/in/Elections">Elections</a>,&nbsp;<script data-card-contents-for-ri="20366" type="text/json">{"id":20366,"name":"Elections","url":"https://www.academia.edu/Documents/in/Elections?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=43576089]'), work: {"id":43576089,"title":"ОКРЕМІ ЗАХОДИ ЩОДО ВДОСКОНАЛЕННЯ КІБЕРБЕЗПЕКИ ВИБОРЧОГО ПРОЦЕСУ В УКРАЇНІ","created_at":"2020-07-10T04:24:10.883-07:00","url":"https://www.academia.edu/43576089/%D0%9E%D0%9A%D0%A0%D0%95%D0%9C%D0%86_%D0%97%D0%90%D0%A5%D0%9E%D0%94%D0%98_%D0%A9%D0%9E%D0%94%D0%9E_%D0%92%D0%94%D0%9E%D0%A1%D0%9A%D0%9E%D0%9D%D0%90%D0%9B%D0%95%D0%9D%D0%9D%D0%AF_%D0%9A%D0%86%D0%91%D0%95%D0%A0%D0%91%D0%95%D0%97%D0%9F%D0%95%D0%9A%D0%98_%D0%92%D0%98%D0%91%D0%9E%D0%A0%D0%A7%D0%9E%D0%93%D0%9E_%D0%9F%D0%A0%D0%9E%D0%A6%D0%95%D0%A1%D0%A3_%D0%92_%D0%A3%D0%9A%D0%A0%D0%90%D0%87%D0%9D%D0%86?f_ri=115676","dom_id":"work_43576089","summary":"Спроби впливу на виборчі процеси шляхом застосування кібератак набувають все більшого поширення у світі – такі кіберінциденти фокусуються, передусім, на слабких сторонах виборчої інфраструктури . З огляду на зростання кількості кіберінцидентів ЄС та США почали розробку керівництв щодо практичних кроків, спрямованих на покращення системи кібербезпеки виборів. Заразом все більша кількість держав шукає власні підходи, які б не лише дозволили ефективно реагувати на кібератаки під час виборчого процесу, але й максимально їх попереджувати.\nФахівці у галузі кібербезпеки, вважають, що в сучасних умовах кіберскладові виборчого процесу (у тому числі машини для голосування, програмне забезпечення тощо) повинні розглядатися як критична інфраструктура держави. ","downloadable_attachments":[{"id":63881538,"asset_id":43576089,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":263179,"first_name":"Viktoria","last_name":"Boiko","domain_name":"niss","page_name":"ViktoriaBoyko","display_name":"Viktoria Boiko","profile_url":"https://niss.academia.edu/ViktoriaBoyko?f_ri=115676","photo":"https://0.academia-photos.com/263179/55288/19554283/s65_viktoria.boyko.jpg"}],"research_interests":[{"id":20366,"name":"Elections","url":"https://www.academia.edu/Documents/in/Elections?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_22528610" data-work_id="22528610" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/22528610/Rethinking_the_Prohibition_on_the_Use_of_Force_in_the_Light_of_Economic_Cyber_Warfare_Towards_a_Broader_Scope_of_Article_2_4_of_the_UN_Charter">Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2(4) of the UN Charter</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Cyber-attacks that cause physical consequences are considered to be in violation of the use of force prohibition should the effects reach a certain severity threshold. That premise does not extend to cyber-attacks that cause economic harm... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_22528610" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Cyber-attacks that cause physical consequences are considered to be in violation of the use of force prohibition should the effects reach a certain severity threshold. That premise does not extend to cyber-attacks that cause economic harm due to a dated distinction between kinetic and other effects.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/22528610" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="53d81b0a355b7972156ca78a75edb047" rel="nofollow" data-download="{&quot;attachment_id&quot;:43143121,&quot;asset_id&quot;:22528610,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/43143121/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="9466474" href="https://yale.academia.edu/IdoKilovaty">Ido Kilovaty</a><script data-card-contents-for-user="9466474" type="text/json">{"id":9466474,"first_name":"Ido","last_name":"Kilovaty","domain_name":"yale","page_name":"IdoKilovaty","display_name":"Ido Kilovaty","profile_url":"https://yale.academia.edu/IdoKilovaty?f_ri=115676","photo":"https://0.academia-photos.com/9466474/4687050/15545503/s65_ido.kilovaty.jpg"}</script></span></span></li><li class="js-paper-rank-work_22528610 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="22528610"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 22528610, container: ".js-paper-rank-work_22528610", }); });</script></li><li class="js-percentile-work_22528610 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 22528610; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_22528610"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_22528610 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="22528610"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 22528610; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=22528610]").text(description); $(".js-view-count-work_22528610").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_22528610").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="22528610"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2575" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Law">International Law</a>,&nbsp;<script data-card-contents-for-ri="2575" type="text/json">{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3872" rel="nofollow" href="https://www.academia.edu/Documents/in/War_Studies">War Studies</a>,&nbsp;<script data-card-contents-for-ri="3872" type="text/json">{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11337" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Warfare">Cyber Warfare</a>,&nbsp;<script data-card-contents-for-ri="11337" type="text/json">{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="36979" rel="nofollow" href="https://www.academia.edu/Documents/in/Use_of_Force">Use of Force</a><script data-card-contents-for-ri="36979" type="text/json">{"id":36979,"name":"Use of Force","url":"https://www.academia.edu/Documents/in/Use_of_Force?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=22528610]'), work: {"id":22528610,"title":"Rethinking the Prohibition on the Use of Force in the Light of Economic Cyber Warfare: Towards a Broader Scope of Article 2(4) of the UN Charter","created_at":"2016-02-27T13:06:18.756-08:00","url":"https://www.academia.edu/22528610/Rethinking_the_Prohibition_on_the_Use_of_Force_in_the_Light_of_Economic_Cyber_Warfare_Towards_a_Broader_Scope_of_Article_2_4_of_the_UN_Charter?f_ri=115676","dom_id":"work_22528610","summary":"Cyber-attacks that cause physical consequences are considered to be in violation of the use of force prohibition should the effects reach a certain severity threshold. That premise does not extend to cyber-attacks that cause economic harm due to a dated distinction between kinetic and other effects.","downloadable_attachments":[{"id":43143121,"asset_id":22528610,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":9466474,"first_name":"Ido","last_name":"Kilovaty","domain_name":"yale","page_name":"IdoKilovaty","display_name":"Ido Kilovaty","profile_url":"https://yale.academia.edu/IdoKilovaty?f_ri=115676","photo":"https://0.academia-photos.com/9466474/4687050/15545503/s65_ido.kilovaty.jpg"}],"research_interests":[{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=115676","nofollow":true},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=115676","nofollow":true},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=115676","nofollow":true},{"id":36979,"name":"Use of Force","url":"https://www.academia.edu/Documents/in/Use_of_Force?f_ri=115676","nofollow":true},{"id":41739,"name":"Law of Armed Conflict","url":"https://www.academia.edu/Documents/in/Law_of_Armed_Conflict?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":151317,"name":"Use of force in international law and international relations","url":"https://www.academia.edu/Documents/in/Use_of_force_in_international_law_and_international_relations?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37157839" data-work_id="37157839" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37157839/Link_16_Cybersecurity_Training_Protecting_Tactical_Data_Links_From_The_Cybercrime_Onslaught">Link 16 Cybersecurity Training: Protecting Tactical Data Links From The Cybercrime Onslaught</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">According to Cybint News, there is now a hacker attack every 39 seconds. As more infrastructure gets connected, the average cost of a data breach will exceed $150 million by 2020. And while 43 percent of cyberattacks target small... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37157839" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">According to Cybint News, there is now a hacker attack every 39 seconds. As more infrastructure gets connected, the average cost of a data breach will exceed $150 million by 2020. And while 43 percent of cyberattacks target small business, the U.S. military is also at risk. Tonex offers Link 16 Cybersecurity Training to help sort it all out.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37157839" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1d43488eba3c006d12e40705c3656594" rel="nofollow" data-download="{&quot;attachment_id&quot;:57108520,&quot;asset_id&quot;:37157839,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57108520/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="12955874" href="https://independent.academia.edu/TonexAcademy">Mike Gholi</a><script data-card-contents-for-user="12955874" type="text/json">{"id":12955874,"first_name":"Mike","last_name":"Gholi","domain_name":"independent","page_name":"TonexAcademy","display_name":"Mike Gholi","profile_url":"https://independent.academia.edu/TonexAcademy?f_ri=115676","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_37157839 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37157839"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37157839, container: ".js-paper-rank-work_37157839", }); });</script></li><li class="js-percentile-work_37157839 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37157839; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37157839"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37157839 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37157839"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37157839; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37157839]").text(description); $(".js-view-count-work_37157839").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37157839").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37157839"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="20594" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_crime">Cyber crime</a>,&nbsp;<script data-card-contents-for-ri="20594" type="text/json">{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2744128" rel="nofollow" href="https://www.academia.edu/Documents/in/Link_16">Link 16</a>,&nbsp;<script data-card-contents-for-ri="2744128" type="text/json">{"id":2744128,"name":"Link 16","url":"https://www.academia.edu/Documents/in/Link_16?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2997811" rel="nofollow" href="https://www.academia.edu/Documents/in/link_16_training">link 16 training</a><script data-card-contents-for-ri="2997811" type="text/json">{"id":2997811,"name":"link 16 training","url":"https://www.academia.edu/Documents/in/link_16_training?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37157839]'), work: {"id":37157839,"title":"Link 16 Cybersecurity Training: Protecting Tactical Data Links From The Cybercrime Onslaught","created_at":"2018-07-31T10:30:29.239-07:00","url":"https://www.academia.edu/37157839/Link_16_Cybersecurity_Training_Protecting_Tactical_Data_Links_From_The_Cybercrime_Onslaught?f_ri=115676","dom_id":"work_37157839","summary":"According to Cybint News, there is now a hacker attack every 39 seconds. As more infrastructure gets connected, the average cost of a data breach will exceed $150 million by 2020. And while 43 percent of cyberattacks target small business, the U.S. military is also at risk. Tonex offers Link 16 Cybersecurity Training to help sort it all out. ","downloadable_attachments":[{"id":57108520,"asset_id":37157839,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":12955874,"first_name":"Mike","last_name":"Gholi","domain_name":"independent","page_name":"TonexAcademy","display_name":"Mike Gholi","profile_url":"https://independent.academia.edu/TonexAcademy?f_ri=115676","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":2744128,"name":"Link 16","url":"https://www.academia.edu/Documents/in/Link_16?f_ri=115676","nofollow":true},{"id":2997811,"name":"link 16 training","url":"https://www.academia.edu/Documents/in/link_16_training?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_11550896" data-work_id="11550896" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/11550896/A_Comprehensive_Approach_to_Operations_in_Complex_Environments">A Comprehensive Approach to Operations in Complex Environments</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The military instrument alone cannot deal with complex crises involving diverse communities. Existing strategies, organizations, and force structures are in many cases poorly suited to future contingencies. Accordingly, national and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_11550896" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The military instrument alone cannot deal with complex crises involving diverse communities.&nbsp; Existing strategies, organizations, and force structures are in many cases poorly suited to future contingencies. Accordingly, national and intergovernmental organizations have sought responses to increasingly complex challenges. Among them is the notion of a comprehensive approach.&nbsp; This paper examines the principles and mechanisms of a comprehensive approach as applied to multinational peacekeeping and maritime, cyber, and energy security.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/11550896" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="d26e176424d8f973e95cd1189c150ce7" rel="nofollow" data-download="{&quot;attachment_id&quot;:37047419,&quot;asset_id&quot;:11550896,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/37047419/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="28052612" href="https://nps.academia.edu/ScottMoreland">Scott Moreland</a><script data-card-contents-for-user="28052612" type="text/json">{"id":28052612,"first_name":"Scott","last_name":"Moreland","domain_name":"nps","page_name":"ScottMoreland","display_name":"Scott Moreland","profile_url":"https://nps.academia.edu/ScottMoreland?f_ri=115676","photo":"https://0.academia-photos.com/28052612/7974282/8932142/s65_scott.moreland.png"}</script></span></span></li><li class="js-paper-rank-work_11550896 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="11550896"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 11550896, container: ".js-paper-rank-work_11550896", }); });</script></li><li class="js-percentile-work_11550896 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 11550896; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_11550896"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_11550896 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="11550896"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 11550896; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=11550896]").text(description); $(".js-view-count-work_11550896").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_11550896").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="11550896"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1198" rel="nofollow" href="https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies">Peace and Conflict Studies</a>,&nbsp;<script data-card-contents-for-ri="1198" type="text/json">{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="13078" rel="nofollow" href="https://www.academia.edu/Documents/in/Peacekeeping">Peacekeeping</a>,&nbsp;<script data-card-contents-for-ri="13078" type="text/json">{"id":13078,"name":"Peacekeeping","url":"https://www.academia.edu/Documents/in/Peacekeeping?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="48532" rel="nofollow" href="https://www.academia.edu/Documents/in/Maritime_Security">Maritime Security</a>,&nbsp;<script data-card-contents-for-ri="48532" type="text/json">{"id":48532,"name":"Maritime Security","url":"https://www.academia.edu/Documents/in/Maritime_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=11550896]'), work: {"id":11550896,"title":"A Comprehensive Approach to Operations in Complex Environments","created_at":"2015-03-20T08:39:17.380-07:00","url":"https://www.academia.edu/11550896/A_Comprehensive_Approach_to_Operations_in_Complex_Environments?f_ri=115676","dom_id":"work_11550896","summary":"The military instrument alone cannot deal with complex crises involving diverse communities. Existing strategies, organizations, and force structures are in many cases poorly suited to future contingencies. Accordingly, national and intergovernmental organizations have sought responses to increasingly complex challenges. Among them is the notion of a comprehensive approach. This paper examines the principles and mechanisms of a comprehensive approach as applied to multinational peacekeeping and maritime, cyber, and energy security.","downloadable_attachments":[{"id":37047419,"asset_id":11550896,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":28052612,"first_name":"Scott","last_name":"Moreland","domain_name":"nps","page_name":"ScottMoreland","display_name":"Scott Moreland","profile_url":"https://nps.academia.edu/ScottMoreland?f_ri=115676","photo":"https://0.academia-photos.com/28052612/7974282/8932142/s65_scott.moreland.png"}],"research_interests":[{"id":1198,"name":"Peace and Conflict Studies","url":"https://www.academia.edu/Documents/in/Peace_and_Conflict_Studies?f_ri=115676","nofollow":true},{"id":13078,"name":"Peacekeeping","url":"https://www.academia.edu/Documents/in/Peacekeeping?f_ri=115676","nofollow":true},{"id":48532,"name":"Maritime Security","url":"https://www.academia.edu/Documents/in/Maritime_Security?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":360086,"name":"Comprehensive Approach","url":"https://www.academia.edu/Documents/in/Comprehensive_Approach?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_30359761" data-work_id="30359761" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/30359761/The_Evolution_of_Iranian_Cyber_Warfare">The Evolution of Iranian Cyber Warfare</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Paper on evolution of Iran&#39;s cyber warfare capabilities, institutions; key attacks on the United States and allies; security implications for the US.<br /><br />Written for Dynamics of Cyber Conflict course at Columbia SIPA</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/30359761" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="69c8060b3464dd0eaf1b590b44d0e901" rel="nofollow" data-download="{&quot;attachment_id&quot;:50812424,&quot;asset_id&quot;:30359761,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/50812424/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="57402027" href="https://independent.academia.edu/JonathanDisegi">Jonathan Disegi</a><script data-card-contents-for-user="57402027" type="text/json">{"id":57402027,"first_name":"Jonathan","last_name":"Disegi","domain_name":"independent","page_name":"JonathanDisegi","display_name":"Jonathan Disegi","profile_url":"https://independent.academia.edu/JonathanDisegi?f_ri=115676","photo":"https://0.academia-photos.com/57402027/15063684/15785353/s65_jonathan.disegi.jpg"}</script></span></span></li><li class="js-paper-rank-work_30359761 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="30359761"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 30359761, container: ".js-paper-rank-work_30359761", }); });</script></li><li class="js-percentile-work_30359761 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 30359761; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_30359761"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_30359761 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="30359761"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 30359761; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=30359761]").text(description); $(".js-view-count-work_30359761").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_30359761").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="30359761"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">13</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1483" rel="nofollow" href="https://www.academia.edu/Documents/in/Foreign_Policy_Analysis">Foreign Policy Analysis</a>,&nbsp;<script data-card-contents-for-ri="1483" type="text/json">{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5218" rel="nofollow" href="https://www.academia.edu/Documents/in/Iranian_Studies">Iranian Studies</a>,&nbsp;<script data-card-contents-for-ri="5218" type="text/json">{"id":5218,"name":"Iranian Studies","url":"https://www.academia.edu/Documents/in/Iranian_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5347" rel="nofollow" href="https://www.academia.edu/Documents/in/The_Persian_Gulf">The Persian Gulf</a><script data-card-contents-for-ri="5347" type="text/json">{"id":5347,"name":"The Persian Gulf","url":"https://www.academia.edu/Documents/in/The_Persian_Gulf?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=30359761]'), work: {"id":30359761,"title":"The Evolution of Iranian Cyber Warfare","created_at":"2016-12-10T00:47:12.177-08:00","url":"https://www.academia.edu/30359761/The_Evolution_of_Iranian_Cyber_Warfare?f_ri=115676","dom_id":"work_30359761","summary":"Paper on evolution of Iran's cyber warfare capabilities, institutions; key attacks on the United States and allies; security implications for the US.\n\nWritten for Dynamics of Cyber Conflict course at Columbia SIPA","downloadable_attachments":[{"id":50812424,"asset_id":30359761,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":57402027,"first_name":"Jonathan","last_name":"Disegi","domain_name":"independent","page_name":"JonathanDisegi","display_name":"Jonathan Disegi","profile_url":"https://independent.academia.edu/JonathanDisegi?f_ri=115676","photo":"https://0.academia-photos.com/57402027/15063684/15785353/s65_jonathan.disegi.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true},{"id":1483,"name":"Foreign Policy Analysis","url":"https://www.academia.edu/Documents/in/Foreign_Policy_Analysis?f_ri=115676","nofollow":true},{"id":5218,"name":"Iranian Studies","url":"https://www.academia.edu/Documents/in/Iranian_Studies?f_ri=115676","nofollow":true},{"id":5347,"name":"The Persian Gulf","url":"https://www.academia.edu/Documents/in/The_Persian_Gulf?f_ri=115676","nofollow":true},{"id":11335,"name":"Cyber Conflict","url":"https://www.academia.edu/Documents/in/Cyber_Conflict?f_ri=115676"},{"id":21023,"name":"Iran (American Foreign Policy)","url":"https://www.academia.edu/Documents/in/Iran_American_Foreign_Policy_?f_ri=115676"},{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=115676"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=115676"},{"id":91972,"name":"SCADA","url":"https://www.academia.edu/Documents/in/SCADA?f_ri=115676"},{"id":98721,"name":"Iranian Foreign Policy","url":"https://www.academia.edu/Documents/in/Iranian_Foreign_Policy?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":1325720,"name":"US-Iranian Relations","url":"https://www.academia.edu/Documents/in/US-Iranian_Relations?f_ri=115676"},{"id":2018893,"name":"Cybersecurity of Industrial Control Systems","url":"https://www.academia.edu/Documents/in/Cybersecurity_of_Industrial_Control_Systems?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37806646" data-work_id="37806646" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37806646/UEBA_User_and_Entity_Behavior_Analytics_for_when_traditional_Cyber_Security_cant_protect_your_network">UEBA (User and Entity Behavior Analytics) for when traditional Cyber Security can&#39;t protect your network</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Starting from the early 2000s it became clear that classic cyber protection wasn’t enough anymore. Traditional strategies are based on a signature approach where the security system is familiar with the behavior (signature) of the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37806646" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Starting from the early 2000s it became clear that classic cyber protection wasn’t enough<br />anymore.<br />Traditional strategies are based on a signature approach where the security system is familiar<br />with the behavior (signature) of the possible threats. The known signatures are stored in a<br />database that is used by security systems for constant monitoring of the organizational<br />behavior—network, storage, devices, users, etc. Therefore, the traditional approach could be<br />described by the Latin motto praemonītus praemūnītus, i.e., “forewarned, forearmed.”<br />The number of threats is growing rapidly, making it very difficult to be “forewarned.” In the<br />modern cyber battlefield, security operations centers (SOCs) face daily, new threats where<br />signatures are not known. It’s unacceptable to sit back and wait until someone investigates the<br />new threats and creates new signatures.<br />But that doesn’t mean that a signature-based approach isn’t valid anymore. After all, cyber<br />protection is usually designed like an onion with several layers of defense. In this onion<br />architecture, there is one missing layer—the layer that deals with new, unknown threats.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37806646" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6ac048148c0fa184b9f54d44421f8c10" rel="nofollow" data-download="{&quot;attachment_id&quot;:57805128,&quot;asset_id&quot;:37806646,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57805128/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="26327363" href="https://ruppin.academia.edu/OlegPoly">Oleg Polyakov</a><script data-card-contents-for-user="26327363" type="text/json">{"id":26327363,"first_name":"Oleg","last_name":"Polyakov","domain_name":"ruppin","page_name":"OlegPoly","display_name":"Oleg Polyakov","profile_url":"https://ruppin.academia.edu/OlegPoly?f_ri=115676","photo":"https://0.academia-photos.com/26327363/21065620/20550952/s65_oleg.polyakov.jpg"}</script></span></span></li><li class="js-paper-rank-work_37806646 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37806646"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37806646, container: ".js-paper-rank-work_37806646", }); });</script></li><li class="js-percentile-work_37806646 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37806646; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37806646"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37806646 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37806646"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37806646; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37806646]").text(description); $(".js-view-count-work_37806646").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37806646").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37806646"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="46738" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a>,&nbsp;<script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="53361" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Networking_and_Telecommunication">Computer Networking and Telecommunication</a>,&nbsp;<script data-card-contents-for-ri="53361" type="text/json">{"id":53361,"name":"Computer Networking and Telecommunication","url":"https://www.academia.edu/Documents/in/Computer_Networking_and_Telecommunication?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="128409" rel="nofollow" href="https://www.academia.edu/Documents/in/User_Behavior_Modeling">User Behavior Modeling</a><script data-card-contents-for-ri="128409" type="text/json">{"id":128409,"name":"User Behavior Modeling","url":"https://www.academia.edu/Documents/in/User_Behavior_Modeling?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37806646]'), work: {"id":37806646,"title":"UEBA (User and Entity Behavior Analytics) for when traditional Cyber Security can't protect your network","created_at":"2018-11-19T07:54:49.650-08:00","url":"https://www.academia.edu/37806646/UEBA_User_and_Entity_Behavior_Analytics_for_when_traditional_Cyber_Security_cant_protect_your_network?f_ri=115676","dom_id":"work_37806646","summary":"Starting from the early 2000s it became clear that classic cyber protection wasn’t enough\nanymore.\nTraditional strategies are based on a signature approach where the security system is familiar\nwith the behavior (signature) of the possible threats. The known signatures are stored in a\ndatabase that is used by security systems for constant monitoring of the organizational\nbehavior—network, storage, devices, users, etc. Therefore, the traditional approach could be\ndescribed by the Latin motto praemonītus praemūnītus, i.e., “forewarned, forearmed.”\nThe number of threats is growing rapidly, making it very difficult to be “forewarned.” In the\nmodern cyber battlefield, security operations centers (SOCs) face daily, new threats where\nsignatures are not known. It’s unacceptable to sit back and wait until someone investigates the\nnew threats and creates new signatures.\nBut that doesn’t mean that a signature-based approach isn’t valid anymore. After all, cyber\nprotection is usually designed like an onion with several layers of defense. In this onion\narchitecture, there is one missing layer—the layer that deals with new, unknown threats.","downloadable_attachments":[{"id":57805128,"asset_id":37806646,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":26327363,"first_name":"Oleg","last_name":"Polyakov","domain_name":"ruppin","page_name":"OlegPoly","display_name":"Oleg Polyakov","profile_url":"https://ruppin.academia.edu/OlegPoly?f_ri=115676","photo":"https://0.academia-photos.com/26327363/21065620/20550952/s65_oleg.polyakov.jpg"}],"research_interests":[{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676","nofollow":true},{"id":53361,"name":"Computer Networking and Telecommunication","url":"https://www.academia.edu/Documents/in/Computer_Networking_and_Telecommunication?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":128409,"name":"User Behavior Modeling","url":"https://www.academia.edu/Documents/in/User_Behavior_Modeling?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_45074988 coauthored" data-work_id="45074988" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/45074988/Cyber_Attacks_Mitigation_Detecting_Malicious_Activities_in_Network_Traffic_A_Review_of_Literature">Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic -A Review of Literature</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Cyber-attacks are becoming more common and over the last decade, many attacks have made top news, targeting manufacturing firms and governmental organisations. Such attacks have triggered substantial financial damage and they&#39;ve been... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_45074988" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Cyber-attacks are becoming more common and over the last decade, many attacks have made<br />top news, targeting manufacturing firms and governmental organisations. Such attacks have<br />triggered substantial financial damage and they&#39;ve been trying to obstruct key public sector<br />operations. Furthermore, as the Internet of Things (IoT) has arisen, the number of Internetconnected devices is increasingly growing and being an easy target of cyber-attacks. To<br />counter cyber-attacks, information security researchers rely extensively on intrusion detection<br />systems (IDSs) that can identify suspicious activities by comparing patterns of documented<br />attacks or detecting anomaly-based activities. This survey aims to tackle Trust, Protection,<br />identification and activity on wide scale networks and Internet of Things. The proposed<br />research aims at developing a practically deployable cyber security solution to one or more of<br />the cyber-attacks. Multi-Stage Attacks (MSAs), APT, DoS attacks, wireless injection attacks,<br />botnets or other malicious activities will be investigated. In this literature survey, we are<br />highlighting the work Performed throughout the area of cyber security by various researchers,<br />various types of cyber-attacks and its stages, various approaches to prevent cyber-attacks,<br />different challenges faced by a preventer, and some gaps in the research. This literature review<br />is carried out by using the secondary data obtained from peer-reviewed journals and other<br />sources on the web. This review aims to explain Detecting Malicious Activities in Network Traffic.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/45074988" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="538de43676dd5c78d4fca4e4617e3637" rel="nofollow" data-download="{&quot;attachment_id&quot;:65631986,&quot;asset_id&quot;:45074988,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/65631986/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="64969069" href="https://independent.academia.edu/SrinivasPublication">Srinivas Publication</a><script data-card-contents-for-user="64969069" type="text/json">{"id":64969069,"first_name":"Srinivas","last_name":"Publication","domain_name":"independent","page_name":"SrinivasPublication","display_name":"Srinivas Publication","profile_url":"https://independent.academia.edu/SrinivasPublication?f_ri=115676","photo":"https://0.academia-photos.com/64969069/16899658/18340226/s65_srinivas.publication.png"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-45074988">+1</span><div class="hidden js-additional-users-45074988"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://independent.academia.edu/prabhusangeetha">sangeetha prabhu</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-45074988'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-45074988').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_45074988 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="45074988"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 45074988, container: ".js-paper-rank-work_45074988", }); });</script></li><li class="js-percentile-work_45074988 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 45074988; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_45074988"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_45074988 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="45074988"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 45074988; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=45074988]").text(description); $(".js-view-count-work_45074988").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_45074988").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="45074988"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2008" rel="nofollow" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>,&nbsp;<script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="247799" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_of_Things_IoT_">Internet of Things (IoT)</a><script data-card-contents-for-ri="247799" type="text/json">{"id":247799,"name":"Internet of Things (IoT)","url":"https://www.academia.edu/Documents/in/Internet_of_Things_IoT_?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=45074988]'), work: {"id":45074988,"title":"Cyber Attacks Mitigation: Detecting Malicious Activities in Network Traffic -A Review of Literature","created_at":"2021-02-07T22:17:27.990-08:00","url":"https://www.academia.edu/45074988/Cyber_Attacks_Mitigation_Detecting_Malicious_Activities_in_Network_Traffic_A_Review_of_Literature?f_ri=115676","dom_id":"work_45074988","summary":"Cyber-attacks are becoming more common and over the last decade, many attacks have made\ntop news, targeting manufacturing firms and governmental organisations. Such attacks have\ntriggered substantial financial damage and they've been trying to obstruct key public sector\noperations. Furthermore, as the Internet of Things (IoT) has arisen, the number of Internetconnected devices is increasingly growing and being an easy target of cyber-attacks. To\ncounter cyber-attacks, information security researchers rely extensively on intrusion detection\nsystems (IDSs) that can identify suspicious activities by comparing patterns of documented\nattacks or detecting anomaly-based activities. This survey aims to tackle Trust, Protection,\nidentification and activity on wide scale networks and Internet of Things. The proposed\nresearch aims at developing a practically deployable cyber security solution to one or more of\nthe cyber-attacks. Multi-Stage Attacks (MSAs), APT, DoS attacks, wireless injection attacks,\nbotnets or other malicious activities will be investigated. In this literature survey, we are\nhighlighting the work Performed throughout the area of cyber security by various researchers,\nvarious types of cyber-attacks and its stages, various approaches to prevent cyber-attacks,\ndifferent challenges faced by a preventer, and some gaps in the research. This literature review\nis carried out by using the secondary data obtained from peer-reviewed journals and other\nsources on the web. This review aims to explain Detecting Malicious Activities in Network Traffic. ","downloadable_attachments":[{"id":65631986,"asset_id":45074988,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":64969069,"first_name":"Srinivas","last_name":"Publication","domain_name":"independent","page_name":"SrinivasPublication","display_name":"Srinivas Publication","profile_url":"https://independent.academia.edu/SrinivasPublication?f_ri=115676","photo":"https://0.academia-photos.com/64969069/16899658/18340226/s65_srinivas.publication.png"},{"id":88257290,"first_name":"sangeetha","last_name":"prabhu","domain_name":"independent","page_name":"prabhusangeetha","display_name":"sangeetha prabhu","profile_url":"https://independent.academia.edu/prabhusangeetha?f_ri=115676","photo":"https://0.academia-photos.com/88257290/79828034/68398540/s65_sangeetha.prabhu.png"}],"research_interests":[{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":247799,"name":"Internet of Things (IoT)","url":"https://www.academia.edu/Documents/in/Internet_of_Things_IoT_?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_51551287" data-work_id="51551287" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/51551287/Call_for_Papers_3_rd_International_Conference_on_Data_Mining_and_Machine_Learning_DMML_2022_">Call for Papers - 3 rd International Conference on Data Mining &amp; Machine Learning (DMML 2022)</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">3 rd International Conference on Data Mining &amp; Machine Learning (DMML 2022) will act as a major forum for the presentation of innovative ideas, approaches, developments, and research projects in the areas of Data Mining and Machine... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_51551287" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">3<br />rd International Conference on Data Mining &amp; Machine Learning (DMML 2022) will act as<br />a major forum for the presentation of innovative ideas, approaches, developments, and research<br />projects in the areas of Data Mining and Machine Learning. It will also serve to facilitate the<br />exchange of information between researchers and industry professionals to discuss the latest issues<br />and advancement in the area of Big Data and Machine Learning.<br />Authors are solicited to contribute to the conference by submitting articles that illustrate research<br />results, projects, surveying works and industrial experiences that describe significant advances in<br />Data Mining and Machine Learning.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/51551287" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="37aa35221c23064731f4fdf022b6c0fc" rel="nofollow" data-download="{&quot;attachment_id&quot;:83189779,&quot;asset_id&quot;:51551287,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/83189779/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="26196263" rel="nofollow" href="https://independent.academia.edu/journalijwest">International Journal of Web &amp; Semantic Technology (IJWesT)</a><script data-card-contents-for-user="26196263" type="text/json">{"id":26196263,"first_name":"International Journal of Web \u0026 Semantic Technology","last_name":"(IJWesT)","domain_name":"independent","page_name":"journalijwest","display_name":"International Journal of Web \u0026 Semantic Technology (IJWesT)","profile_url":"https://independent.academia.edu/journalijwest?f_ri=115676","photo":"https://0.academia-photos.com/26196263/7208853/161117496/s65_international_journal_of_web_semantic_technology._ijwest_.jpg"}</script></span></span></li><li class="js-paper-rank-work_51551287 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="51551287"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 51551287, container: ".js-paper-rank-work_51551287", }); });</script></li><li class="js-percentile-work_51551287 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 51551287; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_51551287"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_51551287 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="51551287"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 51551287; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=51551287]").text(description); $(".js-view-count-work_51551287").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_51551287").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="51551287"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">18</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="146" rel="nofollow" href="https://www.academia.edu/Documents/in/Bioinformatics">Bioinformatics</a>,&nbsp;<script data-card-contents-for-ri="146" type="text/json">{"id":146,"name":"Bioinformatics","url":"https://www.academia.edu/Documents/in/Bioinformatics?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="442" rel="nofollow" href="https://www.academia.edu/Documents/in/Parallel_Computing">Parallel Computing</a>,&nbsp;<script data-card-contents-for-ri="442" type="text/json">{"id":442,"name":"Parallel Computing","url":"https://www.academia.edu/Documents/in/Parallel_Computing?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="447" rel="nofollow" href="https://www.academia.edu/Documents/in/Scientific_Visualization">Scientific Visualization</a>,&nbsp;<script data-card-contents-for-ri="447" type="text/json">{"id":447,"name":"Scientific Visualization","url":"https://www.academia.edu/Documents/in/Scientific_Visualization?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2009" rel="nofollow" href="https://www.academia.edu/Documents/in/Data_Mining">Data Mining</a><script data-card-contents-for-ri="2009" type="text/json">{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=51551287]'), work: {"id":51551287,"title":"Call for Papers - 3 rd International Conference on Data Mining \u0026 Machine Learning (DMML 2022)","created_at":"2021-09-08T22:11:24.975-07:00","url":"https://www.academia.edu/51551287/Call_for_Papers_3_rd_International_Conference_on_Data_Mining_and_Machine_Learning_DMML_2022_?f_ri=115676","dom_id":"work_51551287","summary":"3\nrd International Conference on Data Mining \u0026 Machine Learning (DMML 2022) will act as\na major forum for the presentation of innovative ideas, approaches, developments, and research\nprojects in the areas of Data Mining and Machine Learning. It will also serve to facilitate the\nexchange of information between researchers and industry professionals to discuss the latest issues\nand advancement in the area of Big Data and Machine Learning.\nAuthors are solicited to contribute to the conference by submitting articles that illustrate research\nresults, projects, surveying works and industrial experiences that describe significant advances in\nData Mining and Machine Learning.","downloadable_attachments":[{"id":83189779,"asset_id":51551287,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":26196263,"first_name":"International Journal of Web \u0026 Semantic Technology","last_name":"(IJWesT)","domain_name":"independent","page_name":"journalijwest","display_name":"International Journal of Web \u0026 Semantic Technology (IJWesT)","profile_url":"https://independent.academia.edu/journalijwest?f_ri=115676","photo":"https://0.academia-photos.com/26196263/7208853/161117496/s65_international_journal_of_web_semantic_technology._ijwest_.jpg"}],"research_interests":[{"id":146,"name":"Bioinformatics","url":"https://www.academia.edu/Documents/in/Bioinformatics?f_ri=115676","nofollow":true},{"id":442,"name":"Parallel Computing","url":"https://www.academia.edu/Documents/in/Parallel_Computing?f_ri=115676","nofollow":true},{"id":447,"name":"Scientific Visualization","url":"https://www.academia.edu/Documents/in/Scientific_Visualization?f_ri=115676","nofollow":true},{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=115676","nofollow":true},{"id":4278,"name":"Web Mining","url":"https://www.academia.edu/Documents/in/Web_Mining?f_ri=115676"},{"id":8270,"name":"Forecasting","url":"https://www.academia.edu/Documents/in/Forecasting?f_ri=115676"},{"id":9351,"name":"Image Analysis","url":"https://www.academia.edu/Documents/in/Image_Analysis?f_ri=115676"},{"id":12417,"name":"Multimedia Learning","url":"https://www.academia.edu/Documents/in/Multimedia_Learning?f_ri=115676"},{"id":15426,"name":"Spatial Data Mining (Data Mining)","url":"https://www.academia.edu/Documents/in/Spatial_Data_Mining_Data_Mining_?f_ri=115676"},{"id":17613,"name":"Forest biometrics","url":"https://www.academia.edu/Documents/in/Forest_biometrics?f_ri=115676"},{"id":23995,"name":"Educational Data Mining","url":"https://www.academia.edu/Documents/in/Educational_Data_Mining?f_ri=115676"},{"id":27360,"name":"Databases","url":"https://www.academia.edu/Documents/in/Databases?f_ri=115676"},{"id":39682,"name":"Graph Data Mining","url":"https://www.academia.edu/Documents/in/Graph_Data_Mining?f_ri=115676"},{"id":80870,"name":"Parallel \u0026 Distributed Computing","url":"https://www.academia.edu/Documents/in/Parallel_and_Distributed_Computing?f_ri=115676"},{"id":81182,"name":"Deep Learning","url":"https://www.academia.edu/Documents/in/Deep_Learning?f_ri=115676"},{"id":84990,"name":"Clustering","url":"https://www.academia.edu/Documents/in/Clustering?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":565185,"name":"Video to Text","url":"https://www.academia.edu/Documents/in/Video_to_Text?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_10259297" data-work_id="10259297" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/10259297/NATO_Cyber_Defence_Policy_An_adaptation_to_the_emerging_threats_of_the_21st_century_or_the_resurgence_of_Cold_War_logic_in_the_fifth_battlefield_">NATO Cyber Defence Policy: An adaptation to the emerging threats of the 21st century, or the resurgence of Cold War logic in the “fifth battlefield”?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The current development of a cyber defence policy by the North Atlantic Treaty Organization (NATO) is usually seen as exemplifying the alliance’s changing scope of intervention; as well as its broadened perception of security. From an... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_10259297" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The current development of a cyber defence policy by the North Atlantic Treaty Organization (NATO) is usually seen as exemplifying the alliance’s changing scope of intervention; as well as its broadened perception of security. From an institutional-liberalist perspective, it is said to illustrate the transformation of NATO from a defensive alliance into a security management institution. However, others have pointed out that NATO cyber defence policy has been developed with regard to seminal events, such as the cyber-attacks on Estonia in 2007 and on Georgia in 2008, and mirrors the persisting cold war logic in NATO current policy.<br /><br />This dissertation aims to investigate if NATO’s cyber agenda exemplifies the alliance’s transformation into a security management institution; or rather if it displays the continuity of NATO’s self-perception as a defensive alliance. In order to address these questions properly, this dissertation is based on an interpretative approach, using discourse analysis as a method, and a theoretical framework drawing on constructivist accounts, as well as on various liberal institutionalist concepts.<br /><br />The results of this analysis displayed mixed elements. However, it ultimately seems that NATO cyber defence policy exemplifies the continuous prevalence of NATO’s self-perception as an alliance, designed to defend its members against an external threat. Indeed, the analysis highlights that developments in NATO cyber defence policy are generally conceived as new facets of NATO’s original role – demanding adjusting NATO’s strategy and operational capacities. Yet, NATO cyber defence policy does not seem to represent a fundamental shift in NATO’s perception of its own purpose. <br /><br />This analysis also highlights the need for further research including additional variables, such as the differentiation between different types of cyber security threats that NATO faces.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/10259297" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f6ca3a560b82548cd78762dc9ec78ebb" rel="nofollow" data-download="{&quot;attachment_id&quot;:36345851,&quot;asset_id&quot;:10259297,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36345851/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="6271621" href="https://aber.academia.edu/JustineCh">Justine Chauvin</a><script data-card-contents-for-user="6271621" type="text/json">{"id":6271621,"first_name":"Justine","last_name":"Chauvin","domain_name":"aber","page_name":"JustineCh","display_name":"Justine Chauvin","profile_url":"https://aber.academia.edu/JustineCh?f_ri=115676","photo":"https://0.academia-photos.com/6271621/2731950/7177608/s65_justine.chauvin.jpg"}</script></span></span></li><li class="js-paper-rank-work_10259297 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="10259297"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 10259297, container: ".js-paper-rank-work_10259297", }); });</script></li><li class="js-percentile-work_10259297 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 10259297; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_10259297"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_10259297 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="10259297"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 10259297; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=10259297]").text(description); $(".js-view-count-work_10259297").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_10259297").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="10259297"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">10</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="982" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyberlaw">Cyberlaw</a>,&nbsp;<script data-card-contents-for-ri="982" type="text/json">{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3826" rel="nofollow" href="https://www.academia.edu/Documents/in/NATO">NATO</a>,&nbsp;<script data-card-contents-for-ri="3826" type="text/json">{"id":3826,"name":"NATO","url":"https://www.academia.edu/Documents/in/NATO?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11337" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Warfare">Cyber Warfare</a>,&nbsp;<script data-card-contents-for-ri="11337" type="text/json">{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a><script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=10259297]'), work: {"id":10259297,"title":"NATO Cyber Defence Policy: An adaptation to the emerging threats of the 21st century, or the resurgence of Cold War logic in the “fifth battlefield”?","created_at":"2015-01-21T02:04:18.241-08:00","url":"https://www.academia.edu/10259297/NATO_Cyber_Defence_Policy_An_adaptation_to_the_emerging_threats_of_the_21st_century_or_the_resurgence_of_Cold_War_logic_in_the_fifth_battlefield_?f_ri=115676","dom_id":"work_10259297","summary":"The current development of a cyber defence policy by the North Atlantic Treaty Organization (NATO) is usually seen as exemplifying the alliance’s changing scope of intervention; as well as its broadened perception of security. From an institutional-liberalist perspective, it is said to illustrate the transformation of NATO from a defensive alliance into a security management institution. However, others have pointed out that NATO cyber defence policy has been developed with regard to seminal events, such as the cyber-attacks on Estonia in 2007 and on Georgia in 2008, and mirrors the persisting cold war logic in NATO current policy.\n\nThis dissertation aims to investigate if NATO’s cyber agenda exemplifies the alliance’s transformation into a security management institution; or rather if it displays the continuity of NATO’s self-perception as a defensive alliance. In order to address these questions properly, this dissertation is based on an interpretative approach, using discourse analysis as a method, and a theoretical framework drawing on constructivist accounts, as well as on various liberal institutionalist concepts.\n\nThe results of this analysis displayed mixed elements. However, it ultimately seems that NATO cyber defence policy exemplifies the continuous prevalence of NATO’s self-perception as an alliance, designed to defend its members against an external threat. Indeed, the analysis highlights that developments in NATO cyber defence policy are generally conceived as new facets of NATO’s original role – demanding adjusting NATO’s strategy and operational capacities. Yet, NATO cyber defence policy does not seem to represent a fundamental shift in NATO’s perception of its own purpose. \n\nThis analysis also highlights the need for further research including additional variables, such as the differentiation between different types of cyber security threats that NATO faces. ","downloadable_attachments":[{"id":36345851,"asset_id":10259297,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":6271621,"first_name":"Justine","last_name":"Chauvin","domain_name":"aber","page_name":"JustineCh","display_name":"Justine Chauvin","profile_url":"https://aber.academia.edu/JustineCh?f_ri=115676","photo":"https://0.academia-photos.com/6271621/2731950/7177608/s65_justine.chauvin.jpg"}],"research_interests":[{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=115676","nofollow":true},{"id":3826,"name":"NATO","url":"https://www.academia.edu/Documents/in/NATO?f_ri=115676","nofollow":true},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=115676","nofollow":true},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":128275,"name":"NATO-Russian Relations","url":"https://www.academia.edu/Documents/in/NATO-Russian_Relations?f_ri=115676"},{"id":161725,"name":"Cyber Defense","url":"https://www.academia.edu/Documents/in/Cyber_Defense?f_ri=115676"},{"id":187415,"name":"NATO's New Strategic Concept","url":"https://www.academia.edu/Documents/in/NATOs_New_Strategic_Concept?f_ri=115676"},{"id":382651,"name":"Cyber Defence","url":"https://www.academia.edu/Documents/in/Cyber_Defence?f_ri=115676"},{"id":1137420,"name":"NATO crisis management","url":"https://www.academia.edu/Documents/in/NATO_crisis_management?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_26611381 coauthored" data-work_id="26611381" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/26611381/Toward_U_S_Russia_Bilateral_Cooperation_in_the_Sphere_of_Cybersecurity">Toward U.S.-Russia Bilateral Cooperation in the Sphere of Cybersecurity</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In recent years, the dynamics of international cooperation and conflict in the cyber domain have become the focus of intense interest on the part of national governments and expert communities around the world. Russia and the United... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_26611381" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In recent years, the dynamics of international cooperation and conflict in the cyber domain have become the focus of intense interest on the part of national governments and expert communities around the world.&nbsp; Russia and the United States have often been at odds even in defining the nature of the problem: Russia emphasizes “international information security,” whereas the United States believes that cybercrime, cyberespionage, and cyberterrorism are the main threats in this domain and so prefers the term “cybersecurity” and a focus on the protection of computer networks and resources. It is encouraging, therefore, that the two countries reached agreement in June 2013 on the need for cooperation over “threats to or in the use of ICTs [Information Communications Technologies] in the context of international security.” Subsequent events have inhibited further progress toward cooperation. <br /><br />In this working paper, we seek to outline some of the challenges as well as the opportunities for bilateral U.S.-Russia cooperation in the sphere of cybersecurity. Cybersecurity poses certain unique difficulties where cooperation is&nbsp; concerned. Theories of strategic conflict and security drawn from the nuclear arms race do not carry over readily into the cyber domain. Some experts, for example, question whether doctrines of deterrence and verification of compliance with agreements are applicable to the cyber domain. The problem of attributing an attack to its source is far greater. An attack can be nearly instantaneous and without warning. <br /><br />Moreover, the Russian and U.S. sides tend to approach the problem of cybersecurity from different perspectives. The Russian government generally emphasizes the principle of sovereign control over the entire information and communications domain. Russia regards cyberweapons as inherently first-strike weapons, useless if they are not used in the early stages of a conflict. The United States, in contrast, rejects “information security” as a foundational principle and champions the idea that the Internet should be “open, secure, interoperable, and reliable.” The United States distinguishes between legitimate and illegitimate operations in the cyber domain; forms it considers illegitimate include espionage by governments and corporations to obtain commercial secrets and efforts by criminal (including terrorist) organizations to damage ICT infrastructure. It accepts that governments will conduct espionage in the interest of national security as well as operations to influence public opinion in target countries, even to the point of attempting to overthrow those countries’ regimes. The United States, which favors international cooperation to prevent and defend against criminal attacks on critical ICT infrastructure and to ban commercially motivated espionage, has found common ground with Russia and other states in reaching agreements in these areas. <br /><br />Both countries recognize the potential danger posed by cyberattacks to national infrastructure, such as electric power grids, dams, water supply, sanitation, oil and gas extraction equipment, and telecommunications networks. The dangers of a large-scale and effective attack on critical infrastructure are thus extremely severe. For this reason, the cyber domain is not entirely virtual; it includes the physical and human infrastructure linked to it. <br /><br />The Russian government is also concerned about the possibility that the U.S. government could interfere with the management of the core infrastructure of the Internet, even to the point of disrupting Russia’s access to it. Although the reform of the ICANN (Internet Corporation for Assigned Names and Numbers) to take effect in mid-2016 will move ICANN’s technical functions away from the U.S. government’s stewardship and to a selfregulating, independent international body, Russia’s concerns about the governance of the Internet may not be entirely allayed. <br /><br />We believe that these characteristics of the cyber domain should be addressed both bilaterally and multilaterally. We offer six recommendations for bilateral U.S.-Russia cooperation in the sphere of cybersecurity:<br /><br />a. agreement on an explicit definition of the thresholds for attacks on critical infrastructure such that an attack would trigger a counterattack using either cyber or other types of weapons;<br />b. agreement on the types of information that would be shared in the event of a cyberattack, for example along the lines of a response to a bio-weapons attack;<br />c. prohibition of automatic retaliation in cases of cyberattacks;<br />d. prohibition of attacks on elements of another nation’s core Internet<br />infrastructure;<br />e. joint evaluation of the Internet Core Governance (UIS, IANA, DNS RZM)<br />infrastructure to assess whether stakeholders feel that their interests and contributions are being given adequate consideration following the reform of ICANN’s governance; and<br />f. broader international discussion of cybersecurity beyond the bilateral U.S.- Russia framework, for example under the auspices of the UN Group of Government Experts on Developments in the Field of Information and<br />Telecommunications in the Context of International Security (UNGGE).<br /><br />For the longer-term future, we believe a formal, binding international treaty is needed to ensure full compliance with these norms. The bilateral norms we propose can serve as a model for such a multilateral agreement.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/26611381" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="960075f0da403cf3e69ca8190b7a53dc" rel="nofollow" data-download="{&quot;attachment_id&quot;:46897596,&quot;asset_id&quot;:26611381,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46897596/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1335120" href="https://mgimo.academia.edu/OlegDemidov">Oleg Demidov</a><script data-card-contents-for-user="1335120" type="text/json">{"id":1335120,"first_name":"Oleg","last_name":"Demidov","domain_name":"mgimo","page_name":"OlegDemidov","display_name":"Oleg Demidov","profile_url":"https://mgimo.academia.edu/OlegDemidov?f_ri=115676","photo":"https://0.academia-photos.com/1335120/491356/11987666/s65_oleg.demidov.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-26611381">+1</span><div class="hidden js-additional-users-26611381"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://ut-ee.academia.edu/ChrisSpirito">Chris Spirito</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-26611381'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-26611381').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_26611381 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="26611381"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 26611381, container: ".js-paper-rank-work_26611381", }); });</script></li><li class="js-percentile-work_26611381 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 26611381; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_26611381"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_26611381 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="26611381"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 26611381; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=26611381]").text(description); $(".js-view-count-work_26611381").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_26611381").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="26611381"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>,&nbsp;<script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7822" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_Governance">Internet Governance</a>,&nbsp;<script data-card-contents-for-ri="7822" type="text/json">{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="81556" rel="nofollow" href="https://www.academia.edu/Documents/in/Critical_infrastructure_protection">Critical infrastructure protection</a><script data-card-contents-for-ri="81556" type="text/json">{"id":81556,"name":"Critical infrastructure protection","url":"https://www.academia.edu/Documents/in/Critical_infrastructure_protection?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=26611381]'), work: {"id":26611381,"title":"Toward U.S.-Russia Bilateral Cooperation in the Sphere of Cybersecurity","created_at":"2016-06-29T15:15:29.516-07:00","url":"https://www.academia.edu/26611381/Toward_U_S_Russia_Bilateral_Cooperation_in_the_Sphere_of_Cybersecurity?f_ri=115676","dom_id":"work_26611381","summary":"In recent years, the dynamics of international cooperation and conflict in the cyber domain have become the focus of intense interest on the part of national governments and expert communities around the world. Russia and the United States have often been at odds even in defining the nature of the problem: Russia emphasizes “international information security,” whereas the United States believes that cybercrime, cyberespionage, and cyberterrorism are the main threats in this domain and so prefers the term “cybersecurity” and a focus on the protection of computer networks and resources. It is encouraging, therefore, that the two countries reached agreement in June 2013 on the need for cooperation over “threats to or in the use of ICTs [Information Communications Technologies] in the context of international security.” Subsequent events have inhibited further progress toward cooperation. \n\nIn this working paper, we seek to outline some of the challenges as well as the opportunities for bilateral U.S.-Russia cooperation in the sphere of cybersecurity. Cybersecurity poses certain unique difficulties where cooperation is concerned. Theories of strategic conflict and security drawn from the nuclear arms race do not carry over readily into the cyber domain. Some experts, for example, question whether doctrines of deterrence and verification of compliance with agreements are applicable to the cyber domain. The problem of attributing an attack to its source is far greater. An attack can be nearly instantaneous and without warning. \n\nMoreover, the Russian and U.S. sides tend to approach the problem of cybersecurity from different perspectives. The Russian government generally emphasizes the principle of sovereign control over the entire information and communications domain. Russia regards cyberweapons as inherently first-strike weapons, useless if they are not used in the early stages of a conflict. The United States, in contrast, rejects “information security” as a foundational principle and champions the idea that the Internet should be “open, secure, interoperable, and reliable.” The United States distinguishes between legitimate and illegitimate operations in the cyber domain; forms it considers illegitimate include espionage by governments and corporations to obtain commercial secrets and efforts by criminal (including terrorist) organizations to damage ICT infrastructure. It accepts that governments will conduct espionage in the interest of national security as well as operations to influence public opinion in target countries, even to the point of attempting to overthrow those countries’ regimes. The United States, which favors international cooperation to prevent and defend against criminal attacks on critical ICT infrastructure and to ban commercially motivated espionage, has found common ground with Russia and other states in reaching agreements in these areas. \n\nBoth countries recognize the potential danger posed by cyberattacks to national infrastructure, such as electric power grids, dams, water supply, sanitation, oil and gas extraction equipment, and telecommunications networks. The dangers of a large-scale and effective attack on critical infrastructure are thus extremely severe. For this reason, the cyber domain is not entirely virtual; it includes the physical and human infrastructure linked to it. \n\nThe Russian government is also concerned about the possibility that the U.S. government could interfere with the management of the core infrastructure of the Internet, even to the point of disrupting Russia’s access to it. Although the reform of the ICANN (Internet Corporation for Assigned Names and Numbers) to take effect in mid-2016 will move ICANN’s technical functions away from the U.S. government’s stewardship and to a selfregulating, independent international body, Russia’s concerns about the governance of the Internet may not be entirely allayed. \n\nWe believe that these characteristics of the cyber domain should be addressed both bilaterally and multilaterally. We offer six recommendations for bilateral U.S.-Russia cooperation in the sphere of cybersecurity:\n\na. agreement on an explicit definition of the thresholds for attacks on critical infrastructure such that an attack would trigger a counterattack using either cyber or other types of weapons;\nb. agreement on the types of information that would be shared in the event of a cyberattack, for example along the lines of a response to a bio-weapons attack;\nc. prohibition of automatic retaliation in cases of cyberattacks;\nd. prohibition of attacks on elements of another nation’s core Internet\ninfrastructure;\ne. joint evaluation of the Internet Core Governance (UIS, IANA, DNS RZM)\ninfrastructure to assess whether stakeholders feel that their interests and contributions are being given adequate consideration following the reform of ICANN’s governance; and\nf. broader international discussion of cybersecurity beyond the bilateral U.S.- Russia framework, for example under the auspices of the UN Group of Government Experts on Developments in the Field of Information and\nTelecommunications in the Context of International Security (UNGGE).\n\nFor the longer-term future, we believe a formal, binding international treaty is needed to ensure full compliance with these norms. The bilateral norms we propose can serve as a model for such a multilateral agreement. ","downloadable_attachments":[{"id":46897596,"asset_id":26611381,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1335120,"first_name":"Oleg","last_name":"Demidov","domain_name":"mgimo","page_name":"OlegDemidov","display_name":"Oleg Demidov","profile_url":"https://mgimo.academia.edu/OlegDemidov?f_ri=115676","photo":"https://0.academia-photos.com/1335120/491356/11987666/s65_oleg.demidov.jpg"},{"id":50602995,"first_name":"Chris","last_name":"Spirito","domain_name":"ut-ee","page_name":"ChrisSpirito","display_name":"Chris Spirito","profile_url":"https://ut-ee.academia.edu/ChrisSpirito?f_ri=115676","photo":"https://0.academia-photos.com/50602995/13357336/14593087/s65_chris.spirito.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true},{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=115676","nofollow":true},{"id":81556,"name":"Critical infrastructure protection","url":"https://www.academia.edu/Documents/in/Critical_infrastructure_protection?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":262123,"name":"US-Russian relations","url":"https://www.academia.edu/Documents/in/US-Russian_relations?f_ri=115676"},{"id":413616,"name":"Bilateral Relations","url":"https://www.academia.edu/Documents/in/Bilateral_Relations?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_13755842" data-work_id="13755842" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/13755842/Quantitative_Analysis_of_Information_Security_Risk">Quantitative Analysis of Information Security Risk</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_13755842" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States.&nbsp; This paper took into account collected business related data from 36 industry types.&nbsp; Pattern recognition, bivariate linear regression analysis, and a one-sample t-test were performed to test the industry type and information security risk-level relationship of the selected business.&nbsp; Test results indicated that there is a significant predictive relationship between industry type and risk-level rates among United States businesses.&nbsp; Moreover, the one-sample t-test results indicated that United States businesses classified as a particular industry type are more likely to have a higher information security risk-level than the midpoint level of United States businesses.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/13755842" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e7d6558f70b85290d5f56445db624089" rel="nofollow" data-download="{&quot;attachment_id&quot;:38121161,&quot;asset_id&quot;:13755842,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38121161/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="1540422" href="https://waldenu.academia.edu/RobertEDavis">Dr. Robert E Davis</a><script data-card-contents-for-user="1540422" type="text/json">{"id":1540422,"first_name":"Dr. Robert","last_name":"Davis","domain_name":"waldenu","page_name":"RobertEDavis","display_name":"Dr. Robert E Davis","profile_url":"https://waldenu.academia.edu/RobertEDavis?f_ri=115676","photo":"https://0.academia-photos.com/1540422/544542/12889384/s65_robert_e..davis.jpg"}</script></span></span></li><li class="js-paper-rank-work_13755842 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="13755842"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 13755842, container: ".js-paper-rank-work_13755842", }); });</script></li><li class="js-percentile-work_13755842 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 13755842; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_13755842"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_13755842 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="13755842"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 13755842; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=13755842]").text(description); $(".js-view-count-work_13755842").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_13755842").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="13755842"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">9</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="37" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Systems">Information Systems</a>,&nbsp;<script data-card-contents-for-ri="37" type="text/json">{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="491" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>,&nbsp;<script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>,&nbsp;<script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3703" rel="nofollow" href="https://www.academia.edu/Documents/in/Network_Security">Network Security</a><script data-card-contents-for-ri="3703" type="text/json">{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=13755842]'), work: {"id":13755842,"title":"Quantitative Analysis of Information Security Risk","created_at":"2015-07-07T10:24:13.857-07:00","url":"https://www.academia.edu/13755842/Quantitative_Analysis_of_Information_Security_Risk?f_ri=115676","dom_id":"work_13755842","summary":"The purpose of this quantitative data analysis was to examine the relationship between industry type and information security risk-level among businesses in the United States. This paper took into account collected business related data from 36 industry types. Pattern recognition, bivariate linear regression analysis, and a one-sample t-test were performed to test the industry type and information security risk-level relationship of the selected business. Test results indicated that there is a significant predictive relationship between industry type and risk-level rates among United States businesses. Moreover, the one-sample t-test results indicated that United States businesses classified as a particular industry type are more likely to have a higher information security risk-level than the midpoint level of United States businesses.","downloadable_attachments":[{"id":38121161,"asset_id":13755842,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":1540422,"first_name":"Dr. Robert","last_name":"Davis","domain_name":"waldenu","page_name":"RobertEDavis","display_name":"Dr. Robert E Davis","profile_url":"https://waldenu.academia.edu/RobertEDavis?f_ri=115676","photo":"https://0.academia-photos.com/1540422/544542/12889384/s65_robert_e..davis.jpg"}],"research_interests":[{"id":37,"name":"Information Systems","url":"https://www.academia.edu/Documents/in/Information_Systems?f_ri=115676","nofollow":true},{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=115676","nofollow":true},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true},{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=115676","nofollow":true},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=115676"},{"id":11847,"name":"Quantitative Research","url":"https://www.academia.edu/Documents/in/Quantitative_Research?f_ri=115676"},{"id":12061,"name":"Risk Management","url":"https://www.academia.edu/Documents/in/Risk_Management?f_ri=115676"},{"id":12620,"name":"Quantitative Methods","url":"https://www.academia.edu/Documents/in/Quantitative_Methods?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_33471291" data-work_id="33471291" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/33471291/Chapter_5_Cyber_counterintelligence_concept_actors_and_implications_for_security_pdf">Chapter 5 - Cyber counterintelligence; concept actors and implications for security.pdf</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Contemporary security is increasingly concerned with and affected by actions undertaken via cyberspace. The use and exploitation of the cyber domain is of particular interest and use to practitioners and scholars of intelligence and... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_33471291" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Contemporary security is increasingly concerned with and affected by actions undertaken via cyberspace. The use and exploitation of the cyber domain is of particular interest and use to practitioners and scholars of intelligence and counterintelligence. The stability and security of cyberspace now affects individual, organizational, national, and international security. However, the rapid proliferation of actors in this relatively new domain has resulted in an operational field wherein the capacity to act has thus far surpassed academic or institutional understanding. Further, while intelligence collection methods in cyberspace have developed rapidly, both practice and understanding of cyber counterintelligence appear to have fallen behind. The first aim of this paper is to define and examine the concept of counterintelligence. Having defined the term and located the discipline within the structure of the overarching intelligence/security field, the second aim of this paper is to provide a contextualized understanding of the actors in cyberspace who are employing cyber counterintelligence. Finally, this paper will examine the possible implications of the practice of cyber counterintelligence, and consider future avenues of research in the field.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/33471291" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="28bb9cf5d0f34bcd096ddb04b131d1cc" rel="nofollow" data-download="{&quot;attachment_id&quot;:53515658,&quot;asset_id&quot;:33471291,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/53515658/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="56288265" href="https://anu-au.academia.edu/CourteneyOConnor">Courteney J O&#39;Connor</a><script data-card-contents-for-user="56288265" type="text/json">{"id":56288265,"first_name":"Courteney","last_name":"O'Connor","domain_name":"anu-au","page_name":"CourteneyOConnor","display_name":"Courteney J O'Connor","profile_url":"https://anu-au.academia.edu/CourteneyOConnor?f_ri=115676","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_33471291 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="33471291"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 33471291, container: ".js-paper-rank-work_33471291", }); });</script></li><li class="js-percentile-work_33471291 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 33471291; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_33471291"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_33471291 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="33471291"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 33471291; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=33471291]").text(description); $(".js-view-count-work_33471291").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_33471291").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="33471291"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="218635" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_intelligence">Cyber intelligence</a><script data-card-contents-for-ri="218635" type="text/json">{"id":218635,"name":"Cyber intelligence","url":"https://www.academia.edu/Documents/in/Cyber_intelligence?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=33471291]'), work: {"id":33471291,"title":"Chapter 5 - Cyber counterintelligence; concept actors and implications for security.pdf","created_at":"2017-06-14T20:33:20.805-07:00","url":"https://www.academia.edu/33471291/Chapter_5_Cyber_counterintelligence_concept_actors_and_implications_for_security_pdf?f_ri=115676","dom_id":"work_33471291","summary":"Contemporary security is increasingly concerned with and affected by actions undertaken via cyberspace. The use and exploitation of the cyber domain is of particular interest and use to practitioners and scholars of intelligence and counterintelligence. The stability and security of cyberspace now affects individual, organizational, national, and international security. However, the rapid proliferation of actors in this relatively new domain has resulted in an operational field wherein the capacity to act has thus far surpassed academic or institutional understanding. Further, while intelligence collection methods in cyberspace have developed rapidly, both practice and understanding of cyber counterintelligence appear to have fallen behind. The first aim of this paper is to define and examine the concept of counterintelligence. Having defined the term and located the discipline within the structure of the overarching intelligence/security field, the second aim of this paper is to provide a contextualized understanding of the actors in cyberspace who are employing cyber counterintelligence. Finally, this paper will examine the possible implications of the practice of cyber counterintelligence, and consider future avenues of research in the field. ","downloadable_attachments":[{"id":53515658,"asset_id":33471291,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":56288265,"first_name":"Courteney","last_name":"O'Connor","domain_name":"anu-au","page_name":"CourteneyOConnor","display_name":"Courteney J O'Connor","profile_url":"https://anu-au.academia.edu/CourteneyOConnor?f_ri=115676","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":218635,"name":"Cyber intelligence","url":"https://www.academia.edu/Documents/in/Cyber_intelligence?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_13439294" data-work_id="13439294" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/13439294/A_Study_on_Cyber_Crime_and_Security_Prevention">A Study on Cyber Crime and Security Prevention</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. The Internet carries a vast range of information resources and services, such... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_13439294" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. Cybercrime is evolving at an astounding pace, following the same dynamic as the inevitable penetration of computer technology and communication into all walks of life. Whilst society is inventing and evolving, at the same time, criminals are deploying a remarkable adaptability in order to derive the greatest benefit from it. To avoid giving cybercriminals the initiative, it is important for those involved in the fight against cybercrime to try to anticipate qualitative and quantitative changes in its underlying elements so that they can adjust their methods appropriately.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/13439294" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="0970ed010404ef13d5dc33b3dc2650e2" rel="nofollow" data-download="{&quot;attachment_id&quot;:38045996,&quot;asset_id&quot;:13439294,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38045996/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="32662123" href="https://mu.academia.edu/MamataJoshi">Mamata Joshi</a><script data-card-contents-for-user="32662123" type="text/json">{"id":32662123,"first_name":"Mamata","last_name":"Joshi","domain_name":"mu","page_name":"MamataJoshi","display_name":"Mamata Joshi","profile_url":"https://mu.academia.edu/MamataJoshi?f_ri=115676","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_13439294 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="13439294"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 13439294, container: ".js-paper-rank-work_13439294", }); });</script></li><li class="js-percentile-work_13439294 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 13439294; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_13439294"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_13439294 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="13439294"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 13439294; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=13439294]").text(description); $(".js-view-count-work_13439294").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_13439294").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="13439294"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=13439294]'), work: {"id":13439294,"title":"A Study on Cyber Crime and Security Prevention","created_at":"2015-06-30T02:15:45.572-07:00","url":"https://www.academia.edu/13439294/A_Study_on_Cyber_Crime_and_Security_Prevention?f_ri=115676","dom_id":"work_13439294","summary":"The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. Cybercrime is evolving at an astounding pace, following the same dynamic as the inevitable penetration of computer technology and communication into all walks of life. Whilst society is inventing and evolving, at the same time, criminals are deploying a remarkable adaptability in order to derive the greatest benefit from it. To avoid giving cybercriminals the initiative, it is important for those involved in the fight against cybercrime to try to anticipate qualitative and quantitative changes in its underlying elements so that they can adjust their methods appropriately.","downloadable_attachments":[{"id":38045996,"asset_id":13439294,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":32662123,"first_name":"Mamata","last_name":"Joshi","domain_name":"mu","page_name":"MamataJoshi","display_name":"Mamata Joshi","profile_url":"https://mu.academia.edu/MamataJoshi?f_ri=115676","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_8772891" data-work_id="8772891" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/8772891/US_Armys_Win_in_a_Complex_World_2020_2040_Published_10_2014">US Army&#39;s Win in a Complex World 2020-2040. Published 10-2014</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Spanning the globe to protect US interests.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/8772891" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="02b16b50d1a15337b99c7cc9ebbc387e" rel="nofollow" data-download="{&quot;attachment_id&quot;:35125142,&quot;asset_id&quot;:8772891,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/35125142/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="524045" href="https://independent.academia.edu/JohnStanton">John Stanton</a><script data-card-contents-for-user="524045" type="text/json">{"id":524045,"first_name":"John","last_name":"Stanton","domain_name":"independent","page_name":"JohnStanton","display_name":"John Stanton","profile_url":"https://independent.academia.edu/JohnStanton?f_ri=115676","photo":"https://0.academia-photos.com/524045/403779/493672/s65_john.stanton.jpg"}</script></span></span></li><li class="js-paper-rank-work_8772891 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="8772891"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 8772891, container: ".js-paper-rank-work_8772891", }); });</script></li><li class="js-percentile-work_8772891 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 8772891; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_8772891"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_8772891 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="8772891"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 8772891; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=8772891]").text(description); $(".js-view-count-work_8772891").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_8772891").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="8772891"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="237" rel="nofollow" href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a>,&nbsp;<script data-card-contents-for-ri="237" type="text/json">{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="389" rel="nofollow" href="https://www.academia.edu/Documents/in/Russian_Studies">Russian Studies</a>,&nbsp;<script data-card-contents-for-ri="389" type="text/json">{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3872" rel="nofollow" href="https://www.academia.edu/Documents/in/War_Studies">War Studies</a>,&nbsp;<script data-card-contents-for-ri="3872" type="text/json">{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="13725" rel="nofollow" href="https://www.academia.edu/Documents/in/China_Going_Global">China Going Global</a><script data-card-contents-for-ri="13725" type="text/json">{"id":13725,"name":"China Going Global","url":"https://www.academia.edu/Documents/in/China_Going_Global?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=8772891]'), work: {"id":8772891,"title":"US Army's Win in a Complex World 2020-2040. Published 10-2014","created_at":"2014-10-14T04:46:48.099-07:00","url":"https://www.academia.edu/8772891/US_Armys_Win_in_a_Complex_World_2020_2040_Published_10_2014?f_ri=115676","dom_id":"work_8772891","summary":"Spanning the globe to protect US interests.","downloadable_attachments":[{"id":35125142,"asset_id":8772891,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":524045,"first_name":"John","last_name":"Stanton","domain_name":"independent","page_name":"JohnStanton","display_name":"John Stanton","profile_url":"https://independent.academia.edu/JohnStanton?f_ri=115676","photo":"https://0.academia-photos.com/524045/403779/493672/s65_john.stanton.jpg"}],"research_interests":[{"id":237,"name":"Cognitive Science","url":"https://www.academia.edu/Documents/in/Cognitive_Science?f_ri=115676","nofollow":true},{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=115676","nofollow":true},{"id":3872,"name":"War Studies","url":"https://www.academia.edu/Documents/in/War_Studies?f_ri=115676","nofollow":true},{"id":13725,"name":"China Going Global","url":"https://www.academia.edu/Documents/in/China_Going_Global?f_ri=115676","nofollow":true},{"id":17412,"name":"Asymmetrical Warfare","url":"https://www.academia.edu/Documents/in/Asymmetrical_Warfare?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":403712,"name":"Islamic State","url":"https://www.academia.edu/Documents/in/Islamic_State?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37620231" data-work_id="37620231" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37620231/Chapter_13_Cybersecurity_and_Jus_contra_Bellum">Chapter 13: Cybersecurity and Jus contra Bellum</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This draft chapter on the application of jus contra bellum to issues of cybersecurity is divided in three main parts. The first part is devoted to the political context and institutional framework relevant to the emergence of debates on... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37620231" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This draft chapter on the application of jus contra bellum to issues of cybersecurity is divided in three main parts. The first part is devoted to the political context and institutional framework relevant to the emergence of debates on the issue of the hostile use of information and communication technologies (ICTs). The opposing approaches of some Western States and a group of States comprising, among others, China and Russia are exposed. This divide concerns not only the interpretation of international law as it stands (lex lata), but also the preferred policies designed to cope with the risks posed by computer network attacks (CNAs). In this regard, whereas Russia, despite huge challenges, champions the disarmament approach, the United States and other like-minded States express satisfaction with the law as it stands, even though important uncertainties subsist surrounding the precise modalities of application of jus contra bellum in the context of ICTs.<br /><br />The second part deals with the notion of ‘force’ under Article 2(4) of the UN Charter and its applicability to CNAs. While the text of the Charter leaves open the possibility to interpret the concept as encompassing coercive measures beyond purely military means, subsequent practice tends to support the view that this is not the case. Thus, measures of economic coercion—although prohibited by other rules and principles of international law—do not fall in the material scope of application of Article 2(4) of the UN Charter. As far as cyberattacks are concerned, the applicability of said provision is supported by a substantive body of verbal State practice and remains virtually unopposed. It seems therefore, that subsequent practice buttresses the idea that the prohibition of the use of force applies to cyber-attacks that have equivalent effects to that of more classic military operations. Caution is nevertheless called for in this regard, as no precedent has given raise to explicit invocations of Article 2(4) of the UN Charter up to this day. CNAs directed against critical infrastructure, however, do not amount per se as uses of force if they do not cause damages comparable to conventional military operations.<br /><br />In the orthodox understanding as it notably ensues from the case law of the International Court of Justice as well as State practice, the application of the right of self-defence—being the focus of attention of the third part of this draft chapter—, requires an ‘armed attack’ reaching a certain threshold of gravity. Although the United States of America reject this requirement, their view remains fairly isolated. It is certainly possible to conceive of CNAs that would reach such a threshold of gravity and some States have expressly affirmed this view. But here again, there is no decisive precedent to this date. The problems of the use of proxies and the technical difficulties in collecting evidence of attribution of CNAs to third States pose huge challenges. The conditions of necessity and proportionality of the reaction pose also some problems that are specific to the field of ICTs. It is submitted, in conclusion of this chapter that the abovementioned paralysis of the debate in the UN is caused by attempts, on behalf of the United States of America, to mention the right of self-defence without, at the same time, agreeing on the conditions and modalities of applications of such right. Major disagreements seem indeed to subsist concerning CNAs committed by non-State actors, the evidentiary thresholds as well as the temporal application of the right of self-defence—some States forcefully arguing for the permissibility of preventive self-defence.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37620231" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="31b9090f47f09b7558f1eefef19d6942" rel="nofollow" data-download="{&quot;attachment_id&quot;:57603709,&quot;asset_id&quot;:37620231,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57603709/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2565003" href="https://icj-cij.academia.edu/EtienneHenry">Etienne Henry</a><script data-card-contents-for-user="2565003" type="text/json">{"id":2565003,"first_name":"Etienne","last_name":"Henry","domain_name":"icj-cij","page_name":"EtienneHenry","display_name":"Etienne Henry","profile_url":"https://icj-cij.academia.edu/EtienneHenry?f_ri=115676","photo":"https://0.academia-photos.com/2565003/801873/18711782/s65_etienne.henry.jpg"}</script></span></span></li><li class="js-paper-rank-work_37620231 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37620231"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37620231, container: ".js-paper-rank-work_37620231", }); });</script></li><li class="js-percentile-work_37620231 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37620231; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37620231"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37620231 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37620231"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37620231; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37620231]").text(description); $(".js-view-count-work_37620231").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37620231").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37620231"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2575" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Law">International Law</a>,&nbsp;<script data-card-contents-for-ri="2575" type="text/json">{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="29195" rel="nofollow" href="https://www.academia.edu/Documents/in/Use_of_Force_and_Counter-terrorism">Use of Force &amp; Counter-terrorism</a>,&nbsp;<script data-card-contents-for-ri="29195" type="text/json">{"id":29195,"name":"Use of Force \u0026 Counter-terrorism","url":"https://www.academia.edu/Documents/in/Use_of_Force_and_Counter-terrorism?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="68788" rel="nofollow" href="https://www.academia.edu/Documents/in/Jus_Ad_Bellum">Jus Ad Bellum</a>,&nbsp;<script data-card-contents-for-ri="68788" type="text/json">{"id":68788,"name":"Jus Ad Bellum","url":"https://www.academia.edu/Documents/in/Jus_Ad_Bellum?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="97450" rel="nofollow" href="https://www.academia.edu/Documents/in/Intervention">Intervention</a><script data-card-contents-for-ri="97450" type="text/json">{"id":97450,"name":"Intervention","url":"https://www.academia.edu/Documents/in/Intervention?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37620231]'), work: {"id":37620231,"title":"Chapter 13: Cybersecurity and Jus contra Bellum","created_at":"2018-10-21T04:29:50.103-07:00","url":"https://www.academia.edu/37620231/Chapter_13_Cybersecurity_and_Jus_contra_Bellum?f_ri=115676","dom_id":"work_37620231","summary":"This draft chapter on the application of jus contra bellum to issues of cybersecurity is divided in three main parts. The first part is devoted to the political context and institutional framework relevant to the emergence of debates on the issue of the hostile use of information and communication technologies (ICTs). The opposing approaches of some Western States and a group of States comprising, among others, China and Russia are exposed. This divide concerns not only the interpretation of international law as it stands (lex lata), but also the preferred policies designed to cope with the risks posed by computer network attacks (CNAs). In this regard, whereas Russia, despite huge challenges, champions the disarmament approach, the United States and other like-minded States express satisfaction with the law as it stands, even though important uncertainties subsist surrounding the precise modalities of application of jus contra bellum in the context of ICTs.\n\nThe second part deals with the notion of ‘force’ under Article 2(4) of the UN Charter and its applicability to CNAs. While the text of the Charter leaves open the possibility to interpret the concept as encompassing coercive measures beyond purely military means, subsequent practice tends to support the view that this is not the case. Thus, measures of economic coercion—although prohibited by other rules and principles of international law—do not fall in the material scope of application of Article 2(4) of the UN Charter. As far as cyberattacks are concerned, the applicability of said provision is supported by a substantive body of verbal State practice and remains virtually unopposed. It seems therefore, that subsequent practice buttresses the idea that the prohibition of the use of force applies to cyber-attacks that have equivalent effects to that of more classic military operations. Caution is nevertheless called for in this regard, as no precedent has given raise to explicit invocations of Article 2(4) of the UN Charter up to this day. CNAs directed against critical infrastructure, however, do not amount per se as uses of force if they do not cause damages comparable to conventional military operations.\n\nIn the orthodox understanding as it notably ensues from the case law of the International Court of Justice as well as State practice, the application of the right of self-defence—being the focus of attention of the third part of this draft chapter—, requires an ‘armed attack’ reaching a certain threshold of gravity. Although the United States of America reject this requirement, their view remains fairly isolated. It is certainly possible to conceive of CNAs that would reach such a threshold of gravity and some States have expressly affirmed this view. But here again, there is no decisive precedent to this date. The problems of the use of proxies and the technical difficulties in collecting evidence of attribution of CNAs to third States pose huge challenges. The conditions of necessity and proportionality of the reaction pose also some problems that are specific to the field of ICTs. It is submitted, in conclusion of this chapter that the abovementioned paralysis of the debate in the UN is caused by attempts, on behalf of the United States of America, to mention the right of self-defence without, at the same time, agreeing on the conditions and modalities of applications of such right. Major disagreements seem indeed to subsist concerning CNAs committed by non-State actors, the evidentiary thresholds as well as the temporal application of the right of self-defence—some States forcefully arguing for the permissibility of preventive self-defence.","downloadable_attachments":[{"id":57603709,"asset_id":37620231,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2565003,"first_name":"Etienne","last_name":"Henry","domain_name":"icj-cij","page_name":"EtienneHenry","display_name":"Etienne Henry","profile_url":"https://icj-cij.academia.edu/EtienneHenry?f_ri=115676","photo":"https://0.academia-photos.com/2565003/801873/18711782/s65_etienne.henry.jpg"}],"research_interests":[{"id":2575,"name":"International Law","url":"https://www.academia.edu/Documents/in/International_Law?f_ri=115676","nofollow":true},{"id":29195,"name":"Use of Force \u0026 Counter-terrorism","url":"https://www.academia.edu/Documents/in/Use_of_Force_and_Counter-terrorism?f_ri=115676","nofollow":true},{"id":68788,"name":"Jus Ad Bellum","url":"https://www.academia.edu/Documents/in/Jus_Ad_Bellum?f_ri=115676","nofollow":true},{"id":97450,"name":"Intervention","url":"https://www.academia.edu/Documents/in/Intervention?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":151317,"name":"Use of force in international law and international relations","url":"https://www.academia.edu/Documents/in/Use_of_force_in_international_law_and_international_relations?f_ri=115676"},{"id":312732,"name":"The International Law of Self-Defence","url":"https://www.academia.edu/Documents/in/The_International_Law_of_Self-Defence?f_ri=115676"},{"id":837787,"name":"Due Diligence","url":"https://www.academia.edu/Documents/in/Due_Diligence?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_5169898" data-work_id="5169898" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/5169898/China_Hacking_for_the_State_and_a_Large_Target_for_Hacking">China Hacking for the State and a Large Target for Hacking</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/5169898" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="c2464ca6f52b7d6de89711e972cff575" rel="nofollow" data-download="{&quot;attachment_id&quot;:32363651,&quot;asset_id&quot;:5169898,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32363651/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5731889" href="https://umgc.academia.edu/jamesmartin">james martin</a><script data-card-contents-for-user="5731889" type="text/json">{"id":5731889,"first_name":"james","last_name":"martin","domain_name":"umgc","page_name":"jamesmartin","display_name":"james martin","profile_url":"https://umgc.academia.edu/jamesmartin?f_ri=115676","photo":"https://0.academia-photos.com/5731889/2549251/2959411/s65_james.martin.jpg"}</script></span></span></li><li class="js-paper-rank-work_5169898 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="5169898"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 5169898, container: ".js-paper-rank-work_5169898", }); });</script></li><li class="js-percentile-work_5169898 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 5169898; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_5169898"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_5169898 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="5169898"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 5169898; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=5169898]").text(description); $(".js-view-count-work_5169898").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_5169898").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="5169898"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=5169898]'), work: {"id":5169898,"title":"China Hacking for the State and a Large Target for Hacking","created_at":"2013-11-20T20:51:10.749-08:00","url":"https://www.academia.edu/5169898/China_Hacking_for_the_State_and_a_Large_Target_for_Hacking?f_ri=115676","dom_id":"work_5169898","summary":null,"downloadable_attachments":[{"id":32363651,"asset_id":5169898,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5731889,"first_name":"james","last_name":"martin","domain_name":"umgc","page_name":"jamesmartin","display_name":"james martin","profile_url":"https://umgc.academia.edu/jamesmartin?f_ri=115676","photo":"https://0.academia-photos.com/5731889/2549251/2959411/s65_james.martin.jpg"}],"research_interests":[{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37970384" data-work_id="37970384" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37970384/Perceptions_Intelligence_and_Strategies_of_South_Korean_Cybersecurity">Perceptions, Intelligence, and Strategies of South Korean Cybersecurity</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Since the Korean War, stability in North and South Korean relations has been elusive. Over the past decade, hostilities have entered a digital phase as an increasingly tech-savvy North Korea has compromised public and commercial systems... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37970384" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Since the Korean War, stability in North and South Korean relations has been elusive. Over the past decade, hostilities have entered a digital phase as an increasingly tech-savvy North Korea has compromised public and commercial systems in South Korea with relative impunity. Perceiving North Korea as its greatest threat to cybersecurity, South Korea has focused virtually all of its cybersecurity efforts and resources towards defending against future cyber attacks from its northern neighbor. This paper examines the accuracy of South Korea’s threat assessment of North Korea and investigates the validity of South Korean cyber forensic techniques and intelligence. Furthermore, this research uses analyses of data from past cyber incursions in South Korea to determine the effectiveness of cybersecurity policies and attempts to determine if defensive and offensive strategies are appropriate, in both size and scope, for the danger that North Korea appears to represent. The author concludes that while South Korean assessments of North Korean cyber capabilities and involvement in cyber incursions are relatively accurate, there are ambiguities in the findings of cyber forensic analyses that may be incorrectly attributed to North Korea. As a result, current cyber strategies may be inadequate to defend against other possible state and non-state actors. In addition, this research finds that past cyber policies have weakened South Korean cybersecurity, and suggests that South Korea should shift towards broader more defensive strategies.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37970384" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f2fa81e30efe15805ed9f107cb15cc8d" rel="nofollow" data-download="{&quot;attachment_id&quot;:57986321,&quot;asset_id&quot;:37970384,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57986321/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3783196" href="https://independentresearcher.academia.edu/GusSwanda">Gus Swanda</a><script data-card-contents-for-user="3783196" type="text/json">{"id":3783196,"first_name":"Gus","last_name":"Swanda","domain_name":"independentresearcher","page_name":"GusSwanda","display_name":"Gus Swanda","profile_url":"https://independentresearcher.academia.edu/GusSwanda?f_ri=115676","photo":"https://0.academia-photos.com/3783196/3827781/16102745/s65_gus.swanda.png"}</script></span></span></li><li class="js-paper-rank-work_37970384 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37970384"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37970384, container: ".js-paper-rank-work_37970384", }); });</script></li><li class="js-percentile-work_37970384 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37970384; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37970384"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37970384 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37970384"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37970384; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37970384]").text(description); $(".js-view-count-work_37970384").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37970384").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37970384"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="18880" rel="nofollow" href="https://www.academia.edu/Documents/in/Narrative_Analysis">Narrative Analysis</a>,&nbsp;<script data-card-contents-for-ri="18880" type="text/json">{"id":18880,"name":"Narrative Analysis","url":"https://www.academia.edu/Documents/in/Narrative_Analysis?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="119358" rel="nofollow" href="https://www.academia.edu/Documents/in/Defense_and_National_Security">Defense and National Security</a><script data-card-contents-for-ri="119358" type="text/json">{"id":119358,"name":"Defense and National Security","url":"https://www.academia.edu/Documents/in/Defense_and_National_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37970384]'), work: {"id":37970384,"title":"Perceptions, Intelligence, and Strategies of South Korean Cybersecurity","created_at":"2018-12-13T03:42:31.893-08:00","url":"https://www.academia.edu/37970384/Perceptions_Intelligence_and_Strategies_of_South_Korean_Cybersecurity?f_ri=115676","dom_id":"work_37970384","summary":"Since the Korean War, stability in North and South Korean relations has been elusive. Over the past decade, hostilities have entered a digital phase as an increasingly tech-savvy North Korea has compromised public and commercial systems in South Korea with relative impunity. Perceiving North Korea as its greatest threat to cybersecurity, South Korea has focused virtually all of its cybersecurity efforts and resources towards defending against future cyber attacks from its northern neighbor. This paper examines the accuracy of South Korea’s threat assessment of North Korea and investigates the validity of South Korean cyber forensic techniques and intelligence. Furthermore, this research uses analyses of data from past cyber incursions in South Korea to determine the effectiveness of cybersecurity policies and attempts to determine if defensive and offensive strategies are appropriate, in both size and scope, for the danger that North Korea appears to represent. The author concludes that while South Korean assessments of North Korean cyber capabilities and involvement in cyber incursions are relatively accurate, there are ambiguities in the findings of cyber forensic analyses that may be incorrectly attributed to North Korea. As a result, current cyber strategies may be inadequate to defend against other possible state and non-state actors. In addition, this research finds that past cyber policies have weakened South Korean cybersecurity, and suggests that South Korea should shift towards broader more defensive strategies. ","downloadable_attachments":[{"id":57986321,"asset_id":37970384,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3783196,"first_name":"Gus","last_name":"Swanda","domain_name":"independentresearcher","page_name":"GusSwanda","display_name":"Gus Swanda","profile_url":"https://independentresearcher.academia.edu/GusSwanda?f_ri=115676","photo":"https://0.academia-photos.com/3783196/3827781/16102745/s65_gus.swanda.png"}],"research_interests":[{"id":18880,"name":"Narrative Analysis","url":"https://www.academia.edu/Documents/in/Narrative_Analysis?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":119358,"name":"Defense and National Security","url":"https://www.academia.edu/Documents/in/Defense_and_National_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35346001 coauthored" data-work_id="35346001" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35346001/The_Future_of_Digital_Forensics_Challenges_and_the_Road_Ahead">The Future of Digital Forensics: Challenges and the Road Ahead</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Today&#39;s huge volumes of data, heterogeneous information and communication technologies, and borderless cyberinfrastructures create new challenges for security experts and law enforcement agencies investigating cybercrimes. The future of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35346001" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Today&#39;s huge volumes of data, heterogeneous information and communication technologies, and borderless cyberinfrastructures create new challenges for security experts and law enforcement agencies investigating cybercrimes. The future of digital forensics is explored, with an emphasis on these challenges and the advancements needed to effectively protect modern societies and pursue cybercriminals.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35346001" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="19489bc72b7a8f00530f7ddc7f59ccc7" rel="nofollow" data-download="{&quot;attachment_id&quot;:55206919,&quot;asset_id&quot;:35346001,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55206919/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5425175" href="https://cnr-it.academia.edu/LucaCaviglione">Luca Caviglione</a><script data-card-contents-for-user="5425175" type="text/json">{"id":5425175,"first_name":"Luca","last_name":"Caviglione","domain_name":"cnr-it","page_name":"LucaCaviglione","display_name":"Luca Caviglione","profile_url":"https://cnr-it.academia.edu/LucaCaviglione?f_ri=115676","photo":"https://0.academia-photos.com/5425175/12959777/19565342/s65_luca.caviglione.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-35346001">+1</span><div class="hidden js-additional-users-35346001"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://uni-ulm.academia.edu/SteffenWendzel">Steffen Wendzel</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-35346001'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-35346001').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_35346001 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35346001"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35346001, container: ".js-paper-rank-work_35346001", }); });</script></li><li class="js-percentile-work_35346001 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35346001; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35346001"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35346001 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35346001"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35346001; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35346001]").text(description); $(".js-view-count-work_35346001").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35346001").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35346001"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1284" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Forensics">Computer Forensics</a>,&nbsp;<script data-card-contents-for-ri="1284" type="text/json">{"id":1284,"name":"Computer Forensics","url":"https://www.academia.edu/Documents/in/Computer_Forensics?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="32055" rel="nofollow" href="https://www.academia.edu/Documents/in/Steganography">Steganography</a>,&nbsp;<script data-card-contents-for-ri="32055" type="text/json">{"id":32055,"name":"Steganography","url":"https://www.academia.edu/Documents/in/Steganography?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="50160" rel="nofollow" href="https://www.academia.edu/Documents/in/Digital_Forensics">Digital Forensics</a>,&nbsp;<script data-card-contents-for-ri="50160" type="text/json">{"id":50160,"name":"Digital Forensics","url":"https://www.academia.edu/Documents/in/Digital_Forensics?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35346001]'), work: {"id":35346001,"title":"The Future of Digital Forensics: Challenges and the Road Ahead","created_at":"2017-12-05T07:54:49.974-08:00","url":"https://www.academia.edu/35346001/The_Future_of_Digital_Forensics_Challenges_and_the_Road_Ahead?f_ri=115676","dom_id":"work_35346001","summary":"Today's huge volumes of data, heterogeneous information and communication technologies, and borderless cyberinfrastructures create new challenges for security experts and law enforcement agencies investigating cybercrimes. The future of digital forensics is explored, with an emphasis on these challenges and the advancements needed to effectively protect modern societies and pursue cybercriminals.","downloadable_attachments":[{"id":55206919,"asset_id":35346001,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5425175,"first_name":"Luca","last_name":"Caviglione","domain_name":"cnr-it","page_name":"LucaCaviglione","display_name":"Luca Caviglione","profile_url":"https://cnr-it.academia.edu/LucaCaviglione?f_ri=115676","photo":"https://0.academia-photos.com/5425175/12959777/19565342/s65_luca.caviglione.jpg"},{"id":33936471,"first_name":"Steffen","last_name":"Wendzel","domain_name":"uni-ulm","page_name":"SteffenWendzel","display_name":"Steffen Wendzel","profile_url":"https://uni-ulm.academia.edu/SteffenWendzel?f_ri=115676","photo":"https://0.academia-photos.com/33936471/9979244/106839981/s65_steffen.wendzel.jpg"}],"research_interests":[{"id":1284,"name":"Computer Forensics","url":"https://www.academia.edu/Documents/in/Computer_Forensics?f_ri=115676","nofollow":true},{"id":32055,"name":"Steganography","url":"https://www.academia.edu/Documents/in/Steganography?f_ri=115676","nofollow":true},{"id":50160,"name":"Digital Forensics","url":"https://www.academia.edu/Documents/in/Digital_Forensics?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_34952092 coauthored" data-work_id="34952092" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/34952092/From_Cyber_Threats_to_Cyber_Risks">From Cyber Threats to Cyber Risks</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Chapter 2 in Friis and Ringsmose eds.: Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, London: Routledge, 2016.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/34952092" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="31f848f917c3aa8116a986b56099917f" rel="nofollow" data-download="{&quot;attachment_id&quot;:54814207,&quot;asset_id&quot;:34952092,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/54814207/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="14008429" href="https://nupi.academia.edu/KarstenFriis">Karsten Friis</a><script data-card-contents-for-user="14008429" type="text/json">{"id":14008429,"first_name":"Karsten","last_name":"Friis","domain_name":"nupi","page_name":"KarstenFriis","display_name":"Karsten Friis","profile_url":"https://nupi.academia.edu/KarstenFriis?f_ri=115676","photo":"https://0.academia-photos.com/14008429/21638314/20974868/s65_karsten.friis.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-34952092">+1</span><div class="hidden js-additional-users-34952092"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://nupi.academia.edu/ErikReichborn">Erik Reichborn</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-34952092'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-34952092').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_34952092 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="34952092"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 34952092, container: ".js-paper-rank-work_34952092", }); });</script></li><li class="js-percentile-work_34952092 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 34952092; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_34952092"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_34952092 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="34952092"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 34952092; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=34952092]").text(description); $(".js-view-count-work_34952092").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_34952092").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="34952092"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5523" rel="nofollow" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>,&nbsp;<script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=34952092]'), work: {"id":34952092,"title":"From Cyber Threats to Cyber Risks","created_at":"2017-10-25T00:45:57.405-07:00","url":"https://www.academia.edu/34952092/From_Cyber_Threats_to_Cyber_Risks?f_ri=115676","dom_id":"work_34952092","summary":"Chapter 2 in Friis and Ringsmose eds.: Conflict in Cyber Space: Theoretical, Strategic and Legal Perspectives, London: Routledge, 2016.","downloadable_attachments":[{"id":54814207,"asset_id":34952092,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":14008429,"first_name":"Karsten","last_name":"Friis","domain_name":"nupi","page_name":"KarstenFriis","display_name":"Karsten Friis","profile_url":"https://nupi.academia.edu/KarstenFriis?f_ri=115676","photo":"https://0.academia-photos.com/14008429/21638314/20974868/s65_karsten.friis.jpg"},{"id":3275669,"first_name":"Erik","last_name":"Reichborn","domain_name":"nupi","page_name":"ErikReichborn","display_name":"Erik Reichborn","profile_url":"https://nupi.academia.edu/ErikReichborn?f_ri=115676","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_77167947" data-work_id="77167947" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/77167947/Is_the_UK_making_itself_a_target_for_Russian_retaliation">Is the UK making itself a target for Russian retaliation</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Moscow will be irritated by the stridency of UK&#39;s support for Ukraine and might contemplate singling it out for specific action. How prepared are Whitehall and the public for retaliation, and how would allies react?</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/77167947" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="7005614b808820e6e1556956bcb83018" rel="nofollow" data-download="{&quot;attachment_id&quot;:84610342,&quot;asset_id&quot;:77167947,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/84610342/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3248717" href="https://kcl.academia.edu/TimWilsey">Tim Willasey-Wilsey</a><script data-card-contents-for-user="3248717" type="text/json">{"id":3248717,"first_name":"Tim","last_name":"Willasey-Wilsey","domain_name":"kcl","page_name":"TimWilsey","display_name":"Tim Willasey-Wilsey","profile_url":"https://kcl.academia.edu/TimWilsey?f_ri=115676","photo":"https://0.academia-photos.com/3248717/35046565/30554121/s65_tim.willasey-wilsey.jpg"}</script></span></span></li><li class="js-paper-rank-work_77167947 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="77167947"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 77167947, container: ".js-paper-rank-work_77167947", }); });</script></li><li class="js-percentile-work_77167947 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 77167947; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_77167947"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_77167947 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="77167947"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 77167947; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=77167947]").text(description); $(".js-view-count-work_77167947").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_77167947").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="77167947"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">20</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="389" rel="nofollow" href="https://www.academia.edu/Documents/in/Russian_Studies">Russian Studies</a>,&nbsp;<script data-card-contents-for-ri="389" type="text/json">{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="579" rel="nofollow" href="https://www.academia.edu/Documents/in/Strategy_Military_Science_">Strategy (Military Science)</a>,&nbsp;<script data-card-contents-for-ri="579" type="text/json">{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5821" rel="nofollow" href="https://www.academia.edu/Documents/in/Ukrainian_Studies">Ukrainian Studies</a>,&nbsp;<script data-card-contents-for-ri="5821" type="text/json">{"id":5821,"name":"Ukrainian Studies","url":"https://www.academia.edu/Documents/in/Ukrainian_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="6707" rel="nofollow" href="https://www.academia.edu/Documents/in/Foreign_Policy">Foreign Policy</a><script data-card-contents-for-ri="6707" type="text/json">{"id":6707,"name":"Foreign Policy","url":"https://www.academia.edu/Documents/in/Foreign_Policy?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=77167947]'), work: {"id":77167947,"title":"Is the UK making itself a target for Russian retaliation","created_at":"2022-04-21T04:02:27.593-07:00","url":"https://www.academia.edu/77167947/Is_the_UK_making_itself_a_target_for_Russian_retaliation?f_ri=115676","dom_id":"work_77167947","summary":"Moscow will be irritated by the stridency of UK's support for Ukraine and might contemplate singling it out for specific action. How prepared are Whitehall and the public for retaliation, and how would allies react? ","downloadable_attachments":[{"id":84610342,"asset_id":77167947,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3248717,"first_name":"Tim","last_name":"Willasey-Wilsey","domain_name":"kcl","page_name":"TimWilsey","display_name":"Tim Willasey-Wilsey","profile_url":"https://kcl.academia.edu/TimWilsey?f_ri=115676","photo":"https://0.academia-photos.com/3248717/35046565/30554121/s65_tim.willasey-wilsey.jpg"}],"research_interests":[{"id":389,"name":"Russian Studies","url":"https://www.academia.edu/Documents/in/Russian_Studies?f_ri=115676","nofollow":true},{"id":579,"name":"Strategy (Military Science)","url":"https://www.academia.edu/Documents/in/Strategy_Military_Science_?f_ri=115676","nofollow":true},{"id":5821,"name":"Ukrainian Studies","url":"https://www.academia.edu/Documents/in/Ukrainian_Studies?f_ri=115676","nofollow":true},{"id":6707,"name":"Foreign Policy","url":"https://www.academia.edu/Documents/in/Foreign_Policy?f_ri=115676","nofollow":true},{"id":7669,"name":"Russian Foreign Policy","url":"https://www.academia.edu/Documents/in/Russian_Foreign_Policy?f_ri=115676"},{"id":8697,"name":"European Foreign Policy","url":"https://www.academia.edu/Documents/in/European_Foreign_Policy?f_ri=115676"},{"id":10318,"name":"British Foreign Policy","url":"https://www.academia.edu/Documents/in/British_Foreign_Policy?f_ri=115676"},{"id":14275,"name":"Ukrainian Nationalism","url":"https://www.academia.edu/Documents/in/Ukrainian_Nationalism?f_ri=115676"},{"id":19087,"name":"Military and Politics","url":"https://www.academia.edu/Documents/in/Military_and_Politics?f_ri=115676"},{"id":35215,"name":"British foreign policy (Political Science)","url":"https://www.academia.edu/Documents/in/British_foreign_policy_Political_Science_?f_ri=115676"},{"id":41863,"name":"Russia","url":"https://www.academia.edu/Documents/in/Russia?f_ri=115676"},{"id":46962,"name":"Ukrainian Foreign Policy","url":"https://www.academia.edu/Documents/in/Ukrainian_Foreign_Policy?f_ri=115676"},{"id":46989,"name":"Ukraine","url":"https://www.academia.edu/Documents/in/Ukraine?f_ri=115676"},{"id":50550,"name":"United States Foreign Policy","url":"https://www.academia.edu/Documents/in/United_States_Foreign_Policy?f_ri=115676"},{"id":58201,"name":"Ukrainian History","url":"https://www.academia.edu/Documents/in/Ukrainian_History?f_ri=115676"},{"id":63322,"name":"Russian-Ukrainian Relations","url":"https://www.academia.edu/Documents/in/Russian-Ukrainian_Relations?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":138247,"name":"Asymmetric Warfare","url":"https://www.academia.edu/Documents/in/Asymmetric_Warfare?f_ri=115676"},{"id":138619,"name":"British Military History","url":"https://www.academia.edu/Documents/in/British_Military_History?f_ri=115676"},{"id":174704,"name":"Defence and Strategic Studies","url":"https://www.academia.edu/Documents/in/Defence_and_Strategic_Studies?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25702198" data-work_id="25702198" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25702198/Cyberspace_and_National_Security_Selected_Articles_III">Cyberspace and National Security, Selected Articles III</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Selected Articles</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25702198" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="32ab01c76ca849daf8716484d83b397f" rel="nofollow" data-download="{&quot;attachment_id&quot;:46046374,&quot;asset_id&quot;:25702198,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46046374/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="33726367" href="https://independent.academia.edu/GabiSiboni">Gabi Siboni</a><script data-card-contents-for-user="33726367" type="text/json">{"id":33726367,"first_name":"Gabi","last_name":"Siboni","domain_name":"independent","page_name":"GabiSiboni","display_name":"Gabi Siboni","profile_url":"https://independent.academia.edu/GabiSiboni?f_ri=115676","photo":"https://0.academia-photos.com/33726367/13182606/14478345/s65_gabi.siboni.jpg"}</script></span></span></li><li class="js-paper-rank-work_25702198 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25702198"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25702198, container: ".js-paper-rank-work_25702198", }); });</script></li><li class="js-percentile-work_25702198 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25702198; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25702198"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25702198 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25702198"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25702198; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25702198]").text(description); $(".js-view-count-work_25702198").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25702198").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25702198"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25702198]'), work: {"id":25702198,"title":"Cyberspace and National Security, Selected Articles III","created_at":"2016-05-29T10:58:00.867-07:00","url":"https://www.academia.edu/25702198/Cyberspace_and_National_Security_Selected_Articles_III?f_ri=115676","dom_id":"work_25702198","summary":"Selected Articles","downloadable_attachments":[{"id":46046374,"asset_id":25702198,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":33726367,"first_name":"Gabi","last_name":"Siboni","domain_name":"independent","page_name":"GabiSiboni","display_name":"Gabi Siboni","profile_url":"https://independent.academia.edu/GabiSiboni?f_ri=115676","photo":"https://0.academia-photos.com/33726367/13182606/14478345/s65_gabi.siboni.jpg"}],"research_interests":[{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_3471542" data-work_id="3471542" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/3471542/THE_INTRODUCTION_TO_CYBERCRIME_SECURITY_PREVENTION_AND_DETECTION_OF_CYBERCRIME_IN_TANZANIA">THE INTRODUCTION TO CYBERCRIME: SECURITY, PREVENTION AND DETECTION OF CYBERCRIME IN TANZANIA</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">&quot;&quot; In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_3471542" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">&quot;&quot; <br />In our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government with various services. <br />However it is through the same cyber networks which intrude and attack our privacy, economy, social life in a way which is harmful. Some scholars have interestingly argued that, “in the Internet nobody knows you are a dog”.&nbsp; This raises some legal issues and concerns. <br />This paper presents important issues on the Security, Prevention, and Detection of Cyber Crime. The paper consists of four parts in Romanic Numbers. <br />In Part I, the attempt here is simply to familiarize the reader with a careful understanding of the Cyber Crimes. The author will trace back the meaning, history, and types of Cyber Crimes <br />In Part II, one has to know the concept of Cyber Security; this will include meaning, background, types if any and important of Cyber Security. <br />Part III will explain on Cyber Prevention and Detection the same will include meaning and history, Cyber Prevention and Detection Methodologies and Legal Instruments. <br />And Part IV, Personal Assessment basically in Tanzanian Laws. <br />&quot;&quot;</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/3471542" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="71d6f84d019f225d802a3d87e99b3360" rel="nofollow" data-download="{&quot;attachment_id&quot;:31223024,&quot;asset_id&quot;:3471542,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31223024/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3585116" href="https://tumainiuniversity.academia.edu/AsherryMagalla">Asherry B P Magalla</a><script data-card-contents-for-user="3585116" type="text/json">{"id":3585116,"first_name":"Asherry","last_name":"Magalla","domain_name":"tumainiuniversity","page_name":"AsherryMagalla","display_name":"Asherry B P Magalla","profile_url":"https://tumainiuniversity.academia.edu/AsherryMagalla?f_ri=115676","photo":"https://0.academia-photos.com/3585116/1246482/49266753/s65_asherry.magalla.jpg"}</script></span></span></li><li class="js-paper-rank-work_3471542 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="3471542"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 3471542, container: ".js-paper-rank-work_3471542", }); });</script></li><li class="js-percentile-work_3471542 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 3471542; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_3471542"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_3471542 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="3471542"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 3471542; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=3471542]").text(description); $(".js-view-count-work_3471542").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_3471542").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="3471542"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">18</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="2008" rel="nofollow" href="https://www.academia.edu/Documents/in/Machine_Learning">Machine Learning</a>,&nbsp;<script data-card-contents-for-ri="2008" type="text/json">{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2009" rel="nofollow" href="https://www.academia.edu/Documents/in/Data_Mining">Data Mining</a>,&nbsp;<script data-card-contents-for-ri="2009" type="text/json">{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2511" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>,&nbsp;<script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7798" rel="nofollow" href="https://www.academia.edu/Documents/in/Access_Control">Access Control</a><script data-card-contents-for-ri="7798" type="text/json">{"id":7798,"name":"Access Control","url":"https://www.academia.edu/Documents/in/Access_Control?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=3471542]'), work: {"id":3471542,"title":"THE INTRODUCTION TO CYBERCRIME: SECURITY, PREVENTION AND DETECTION OF CYBERCRIME IN TANZANIA","created_at":"2013-05-05T22:38:52.470-07:00","url":"https://www.academia.edu/3471542/THE_INTRODUCTION_TO_CYBERCRIME_SECURITY_PREVENTION_AND_DETECTION_OF_CYBERCRIME_IN_TANZANIA?f_ri=115676","dom_id":"work_3471542","summary":"\"\"\r\nIn our daily life, economic activities, and national security highly depend on stability, safely, and resilient cyberspace. A network brings communications and transports, power to our homes, run our economy, and provide government with various services. \r\nHowever it is through the same cyber networks which intrude and attack our privacy, economy, social life in a way which is harmful. Some scholars have interestingly argued that, “in the Internet nobody knows you are a dog”. This raises some legal issues and concerns. \r\nThis paper presents important issues on the Security, Prevention, and Detection of Cyber Crime. The paper consists of four parts in Romanic Numbers.\r\nIn Part I, the attempt here is simply to familiarize the reader with a careful understanding of the Cyber Crimes. The author will trace back the meaning, history, and types of Cyber Crimes\r\nIn Part II, one has to know the concept of Cyber Security; this will include meaning, background, types if any and important of Cyber Security.\r\nPart III will explain on Cyber Prevention and Detection the same will include meaning and history, Cyber Prevention and Detection Methodologies and Legal Instruments. \r\nAnd Part IV, Personal Assessment basically in Tanzanian Laws.\r\n\"\"","downloadable_attachments":[{"id":31223024,"asset_id":3471542,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3585116,"first_name":"Asherry","last_name":"Magalla","domain_name":"tumainiuniversity","page_name":"AsherryMagalla","display_name":"Asherry B P Magalla","profile_url":"https://tumainiuniversity.academia.edu/AsherryMagalla?f_ri=115676","photo":"https://0.academia-photos.com/3585116/1246482/49266753/s65_asherry.magalla.jpg"}],"research_interests":[{"id":2008,"name":"Machine Learning","url":"https://www.academia.edu/Documents/in/Machine_Learning?f_ri=115676","nofollow":true},{"id":2009,"name":"Data Mining","url":"https://www.academia.edu/Documents/in/Data_Mining?f_ri=115676","nofollow":true},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=115676","nofollow":true},{"id":7798,"name":"Access Control","url":"https://www.academia.edu/Documents/in/Access_Control?f_ri=115676","nofollow":true},{"id":14106,"name":"Tanzanian Studies","url":"https://www.academia.edu/Documents/in/Tanzanian_Studies?f_ri=115676"},{"id":23241,"name":"Tanzania","url":"https://www.academia.edu/Documents/in/Tanzania?f_ri=115676"},{"id":26860,"name":"Cloud Computing","url":"https://www.academia.edu/Documents/in/Cloud_Computing?f_ri=115676"},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=115676"},{"id":54788,"name":"Smart spaces","url":"https://www.academia.edu/Documents/in/Smart_spaces?f_ri=115676"},{"id":65430,"name":"Cyber Physical Systems","url":"https://www.academia.edu/Documents/in/Cyber_Physical_Systems?f_ri=115676"},{"id":66634,"name":"Complex Event Processing","url":"https://www.academia.edu/Documents/in/Complex_Event_Processing?f_ri=115676"},{"id":98010,"name":"Internet and computer crimes","url":"https://www.academia.edu/Documents/in/Internet_and_computer_crimes?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":121361,"name":"Semantic Computing","url":"https://www.academia.edu/Documents/in/Semantic_Computing?f_ri=115676"},{"id":162629,"name":"Cyber Laws and Cyber Crime","url":"https://www.academia.edu/Documents/in/Cyber_Laws_and_Cyber_Crime?f_ri=115676"},{"id":898202,"name":"P2P/Overlay Networks","url":"https://www.academia.edu/Documents/in/P2P_Overlay_Networks?f_ri=115676"},{"id":931931,"name":"VoIP/SIP/IMS","url":"https://www.academia.edu/Documents/in/VoIP_SIP_IMS?f_ri=115676"},{"id":931932,"name":"Distributed Information Systems","url":"https://www.academia.edu/Documents/in/Distributed_Information_Systems?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_30480496" data-work_id="30480496" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/30480496/Essay_Countering_a_new_threat_protecting_critical_infrastructure_through_cyber_counterintelligence_">Essay &quot;Countering a new threat: protecting critical infrastructure through cyber counterintelligence&quot;</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/30480496" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="62f4375620bf8349af6dcf25b03700b0" rel="nofollow" data-download="{&quot;attachment_id&quot;:50919439,&quot;asset_id&quot;:30480496,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/50919439/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7160550" href="https://nlda.academia.edu/MariekeLomans">Marieke Lomans</a><script data-card-contents-for-user="7160550" type="text/json">{"id":7160550,"first_name":"Marieke","last_name":"Lomans","domain_name":"nlda","page_name":"MariekeLomans","display_name":"Marieke Lomans","profile_url":"https://nlda.academia.edu/MariekeLomans?f_ri=115676","photo":"https://0.academia-photos.com/7160550/2876189/60408045/s65_marieke.lomans.jpeg"}</script></span></span></li><li class="js-paper-rank-work_30480496 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="30480496"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 30480496, container: ".js-paper-rank-work_30480496", }); });</script></li><li class="js-percentile-work_30480496 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 30480496; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_30480496"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_30480496 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="30480496"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 30480496; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=30480496]").text(description); $(".js-view-count-work_30480496").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_30480496").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="30480496"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">2</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2052" rel="nofollow" href="https://www.academia.edu/Documents/in/Intelligence_Studies">Intelligence Studies</a>,&nbsp;<script data-card-contents-for-ri="2052" type="text/json">{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=30480496]'), work: {"id":30480496,"title":"Essay \"Countering a new threat: protecting critical infrastructure through cyber counterintelligence\"","created_at":"2016-12-16T05:57:30.928-08:00","url":"https://www.academia.edu/30480496/Essay_Countering_a_new_threat_protecting_critical_infrastructure_through_cyber_counterintelligence_?f_ri=115676","dom_id":"work_30480496","summary":null,"downloadable_attachments":[{"id":50919439,"asset_id":30480496,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7160550,"first_name":"Marieke","last_name":"Lomans","domain_name":"nlda","page_name":"MariekeLomans","display_name":"Marieke Lomans","profile_url":"https://nlda.academia.edu/MariekeLomans?f_ri=115676","photo":"https://0.academia-photos.com/7160550/2876189/60408045/s65_marieke.lomans.jpeg"}],"research_interests":[{"id":2052,"name":"Intelligence Studies","url":"https://www.academia.edu/Documents/in/Intelligence_Studies?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35947655" data-work_id="35947655" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35947655/ciberseguridad_asunto_de_todos_y_para_todos_pdf">ciberseguridad asunto de todos y para todos.pdf</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Los recientes ciberataques perpetrados con el programa malicioso Wannacry (Wannacrypt0r 2.0) en contra de las redes digitales de instalaciones de salud, comunicaciones, mando y control de trenes, empresas de paquetería, servicio de gas,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35947655" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Los recientes ciberataques perpetrados con el programa malicioso Wannacry (Wannacrypt0r 2.0) en contra de las redes digitales de instalaciones de salud, comunicaciones, mando y control de trenes, empresas de paquetería, servicio de gas, industria automotriz e instituciones gubernamentales de 150 países; y con el virus Firewall que, de acuerdo con la empresa de ciberseguridad Checkpoint, infectó a 250 mil máquinas alrededor del mundo, dejan de manifiesto que en cuestiones de ciberseguridad todos los actores de la sociedad son potenciales objetivos de ataques cibernéticos.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35947655" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ca7ad7cc37a2ae0f6ae8bd7b2b8e8045" rel="nofollow" data-download="{&quot;attachment_id&quot;:55830166,&quot;asset_id&quot;:35947655,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55830166/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="52337153" href="https://independent.academia.edu/AdolfoArreola">Adolfo Arreola</a><script data-card-contents-for-user="52337153" type="text/json">{"id":52337153,"first_name":"Adolfo","last_name":"Arreola","domain_name":"independent","page_name":"AdolfoArreola","display_name":"Adolfo Arreola","profile_url":"https://independent.academia.edu/AdolfoArreola?f_ri=115676","photo":"https://0.academia-photos.com/52337153/19059318/19009832/s65_adolfo.arreola.jpg"}</script></span></span></li><li class="js-paper-rank-work_35947655 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35947655"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35947655, container: ".js-paper-rank-work_35947655", }); });</script></li><li class="js-percentile-work_35947655 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35947655; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35947655"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35947655 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35947655"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35947655; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35947655]").text(description); $(".js-view-count-work_35947655").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35947655").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35947655"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="89751" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybercrime">Cybercrime</a>,&nbsp;<script data-card-contents-for-ri="89751" type="text/json">{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="831496" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybersecurity_policy">Cybersecurity policy</a>,&nbsp;<script data-card-contents-for-ri="831496" type="text/json">{"id":831496,"name":"Cybersecurity policy","url":"https://www.academia.edu/Documents/in/Cybersecurity_policy?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2894345" rel="nofollow" href="https://www.academia.edu/Documents/in/cybersecurity_and_international_relations">cybersecurity and international relations</a><script data-card-contents-for-ri="2894345" type="text/json">{"id":2894345,"name":"cybersecurity and international relations","url":"https://www.academia.edu/Documents/in/cybersecurity_and_international_relations?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35947655]'), work: {"id":35947655,"title":"ciberseguridad asunto de todos y para todos.pdf","created_at":"2018-02-17T19:56:52.175-08:00","url":"https://www.academia.edu/35947655/ciberseguridad_asunto_de_todos_y_para_todos_pdf?f_ri=115676","dom_id":"work_35947655","summary":"Los recientes ciberataques perpetrados con el programa malicioso Wannacry (Wannacrypt0r 2.0) en contra de las redes digitales de instalaciones de salud, comunicaciones, mando y control de trenes, empresas de paquetería, servicio de gas, industria automotriz e instituciones gubernamentales de 150 países; y con el virus Firewall que, de acuerdo con la empresa de ciberseguridad Checkpoint, infectó a 250 mil máquinas alrededor del mundo, dejan de manifiesto que en cuestiones de ciberseguridad todos los actores de la sociedad son potenciales objetivos de ataques cibernéticos.","downloadable_attachments":[{"id":55830166,"asset_id":35947655,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":52337153,"first_name":"Adolfo","last_name":"Arreola","domain_name":"independent","page_name":"AdolfoArreola","display_name":"Adolfo Arreola","profile_url":"https://independent.academia.edu/AdolfoArreola?f_ri=115676","photo":"https://0.academia-photos.com/52337153/19059318/19009832/s65_adolfo.arreola.jpg"}],"research_interests":[{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":831496,"name":"Cybersecurity policy","url":"https://www.academia.edu/Documents/in/Cybersecurity_policy?f_ri=115676","nofollow":true},{"id":2894345,"name":"cybersecurity and international relations","url":"https://www.academia.edu/Documents/in/cybersecurity_and_international_relations?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37672756" data-work_id="37672756" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37672756/Hacks_leaks_and_disruptions_Russian_cyber_strategies">Hacks, leaks and disruptions Russian cyber strategies</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">What is the relationship between cyber activities conducted by Russia at home and abroad? What role do cyber operations play as an instrument of Russia’s coercive diplomacy? How different is Russia from other cyber powers, and how do we... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37672756" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">What is the relationship between cyber activities conducted by Russia at home and abroad? What role do cyber operations play as an instrument of Russia’s coercive diplomacy? How different is Russia from other cyber powers, and how do we know for sure if the Kremlin is behind certain cyberattacks that have been attributed to it?<br /><br />This Chaillot Paper examines these and other key questions as it explores how Russia’s increasingly assertive behaviour in cyberspace has lent new urgency to the debate about cybersecurity in the West. It focuses on what lessons EU member states have learned from recent events, and on how the EU and NATO have responded to these cyber challenges on the diplomatic, political and security fronts. The paper argues that Russia’s aggressive use of cyber tools has led the US and many Europeans states to adopt more defensive cyber strategies, and that as a result Russia may have lost the strategic advantage it has hitherto enjoyed in what is becoming an ever-more contested domain.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37672756" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ea16fc093cd38bb252ea6f2563c8137a" rel="nofollow" data-download="{&quot;attachment_id&quot;:57661748,&quot;asset_id&quot;:37672756,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57661748/download_file?st=MTczODQ0MTg5Myw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2811016" href="https://independent.academia.edu/StanislavSecrieru">Stanislav Secrieru</a><script data-card-contents-for-user="2811016" type="text/json">{"id":2811016,"first_name":"Stanislav","last_name":"Secrieru","domain_name":"independent","page_name":"StanislavSecrieru","display_name":"Stanislav Secrieru","profile_url":"https://independent.academia.edu/StanislavSecrieru?f_ri=115676","photo":"https://0.academia-photos.com/2811016/954620/1195390/s65_stanislav.secrieru.jpg"}</script></span></span></li><li class="js-paper-rank-work_37672756 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37672756"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37672756, container: ".js-paper-rank-work_37672756", }); });</script></li><li class="js-percentile-work_37672756 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37672756; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37672756"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37672756 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37672756"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37672756; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37672756]").text(description); $(".js-view-count-work_37672756").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37672756").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37672756"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">10</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="3826" rel="nofollow" href="https://www.academia.edu/Documents/in/NATO">NATO</a>,&nbsp;<script data-card-contents-for-ri="3826" type="text/json">{"id":3826,"name":"NATO","url":"https://www.academia.edu/Documents/in/NATO?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="10347" rel="nofollow" href="https://www.academia.edu/Documents/in/European_Union">European Union</a>,&nbsp;<script data-card-contents-for-ri="10347" type="text/json">{"id":10347,"name":"European Union","url":"https://www.academia.edu/Documents/in/European_Union?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="27336" rel="nofollow" href="https://www.academia.edu/Documents/in/France">France</a>,&nbsp;<script data-card-contents-for-ri="27336" type="text/json">{"id":27336,"name":"France","url":"https://www.academia.edu/Documents/in/France?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="30945" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyberspace">Cyberspace</a><script data-card-contents-for-ri="30945" type="text/json">{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37672756]'), work: {"id":37672756,"title":"Hacks, leaks and disruptions Russian cyber strategies","created_at":"2018-10-30T01:54:18.348-07:00","url":"https://www.academia.edu/37672756/Hacks_leaks_and_disruptions_Russian_cyber_strategies?f_ri=115676","dom_id":"work_37672756","summary":"What is the relationship between cyber activities conducted by Russia at home and abroad? What role do cyber operations play as an instrument of Russia’s coercive diplomacy? How different is Russia from other cyber powers, and how do we know for sure if the Kremlin is behind certain cyberattacks that have been attributed to it?\n\nThis Chaillot Paper examines these and other key questions as it explores how Russia’s increasingly assertive behaviour in cyberspace has lent new urgency to the debate about cybersecurity in the West. It focuses on what lessons EU member states have learned from recent events, and on how the EU and NATO have responded to these cyber challenges on the diplomatic, political and security fronts. The paper argues that Russia’s aggressive use of cyber tools has led the US and many Europeans states to adopt more defensive cyber strategies, and that as a result Russia may have lost the strategic advantage it has hitherto enjoyed in what is becoming an ever-more contested domain. ","downloadable_attachments":[{"id":57661748,"asset_id":37672756,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2811016,"first_name":"Stanislav","last_name":"Secrieru","domain_name":"independent","page_name":"StanislavSecrieru","display_name":"Stanislav Secrieru","profile_url":"https://independent.academia.edu/StanislavSecrieru?f_ri=115676","photo":"https://0.academia-photos.com/2811016/954620/1195390/s65_stanislav.secrieru.jpg"}],"research_interests":[{"id":3826,"name":"NATO","url":"https://www.academia.edu/Documents/in/NATO?f_ri=115676","nofollow":true},{"id":10347,"name":"European Union","url":"https://www.academia.edu/Documents/in/European_Union?f_ri=115676","nofollow":true},{"id":27336,"name":"France","url":"https://www.academia.edu/Documents/in/France?f_ri=115676","nofollow":true},{"id":30945,"name":"Cyberspace","url":"https://www.academia.edu/Documents/in/Cyberspace?f_ri=115676","nofollow":true},{"id":41863,"name":"Russia","url":"https://www.academia.edu/Documents/in/Russia?f_ri=115676"},{"id":46989,"name":"Ukraine","url":"https://www.academia.edu/Documents/in/Ukraine?f_ri=115676"},{"id":81556,"name":"Critical infrastructure protection","url":"https://www.academia.edu/Documents/in/Critical_infrastructure_protection?f_ri=115676"},{"id":85743,"name":"Estonia","url":"https://www.academia.edu/Documents/in/Estonia?f_ri=115676"},{"id":89536,"name":"Western Balkans","url":"https://www.academia.edu/Documents/in/Western_Balkans?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_40557308" data-work_id="40557308" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/40557308/iPredator_Dark_Side_of_Cyberspace_Concept">iPredator - Dark Side of Cyberspace Concept</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">&quot;iPredator - Dark Side of Cyberspace Concept&quot; (Edited &amp; Revised 2019) is the updated version to Dr. Nuccitelli&#39;s original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/40557308" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="138b9ad34bf86e1b6f55ba345cb1638f" rel="nofollow" data-download="{&quot;attachment_id&quot;:68508329,&quot;asset_id&quot;:40557308,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/68508329/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="970893" href="https://independent.academia.edu/MichaelNuccitelliPsyD">Michael Nuccitelli, Psy.D.</a><script data-card-contents-for-user="970893" type="text/json">{"id":970893,"first_name":"Michael","last_name":"Nuccitelli, Psy.D.","domain_name":"independent","page_name":"MichaelNuccitelliPsyD","display_name":"Michael Nuccitelli, Psy.D.","profile_url":"https://independent.academia.edu/MichaelNuccitelliPsyD?f_ri=115676","photo":"https://0.academia-photos.com/970893/366884/15961793/s65_michael.nuccitelli_psy.d..png"}</script></span></span></li><li class="js-paper-rank-work_40557308 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="40557308"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 40557308, container: ".js-paper-rank-work_40557308", }); });</script></li><li class="js-percentile-work_40557308 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 40557308; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_40557308"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_40557308 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="40557308"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 40557308; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=40557308]").text(description); $(".js-view-count-work_40557308").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_40557308").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="40557308"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">20</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="189" rel="nofollow" href="https://www.academia.edu/Documents/in/Criminology">Criminology</a>,&nbsp;<script data-card-contents-for-ri="189" type="text/json">{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="221" rel="nofollow" href="https://www.academia.edu/Documents/in/Psychology">Psychology</a>,&nbsp;<script data-card-contents-for-ri="221" type="text/json">{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="539" rel="nofollow" href="https://www.academia.edu/Documents/in/Forensics">Forensics</a>,&nbsp;<script data-card-contents-for-ri="539" type="text/json">{"id":539,"name":"Forensics","url":"https://www.academia.edu/Documents/in/Forensics?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a><script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=40557308]'), work: {"id":40557308,"title":"iPredator - Dark Side of Cyberspace Concept","created_at":"2019-10-08T06:08:03.816-07:00","url":"https://www.academia.edu/40557308/iPredator_Dark_Side_of_Cyberspace_Concept?f_ri=115676","dom_id":"work_40557308","summary":"\"iPredator - Dark Side of Cyberspace Concept\" (Edited \u0026 Revised 2019) is the updated version to Dr. Nuccitelli's original 2010 concept. iPredator remains an online assailant concept and explores why some online users become targets. ","downloadable_attachments":[{"id":68508329,"asset_id":40557308,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":970893,"first_name":"Michael","last_name":"Nuccitelli, Psy.D.","domain_name":"independent","page_name":"MichaelNuccitelliPsyD","display_name":"Michael Nuccitelli, Psy.D.","profile_url":"https://independent.academia.edu/MichaelNuccitelliPsyD?f_ri=115676","photo":"https://0.academia-photos.com/970893/366884/15961793/s65_michael.nuccitelli_psy.d..png"}],"research_interests":[{"id":189,"name":"Criminology","url":"https://www.academia.edu/Documents/in/Criminology?f_ri=115676","nofollow":true},{"id":221,"name":"Psychology","url":"https://www.academia.edu/Documents/in/Psychology?f_ri=115676","nofollow":true},{"id":539,"name":"Forensics","url":"https://www.academia.edu/Documents/in/Forensics?f_ri=115676","nofollow":true},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true},{"id":1284,"name":"Computer Forensics","url":"https://www.academia.edu/Documents/in/Computer_Forensics?f_ri=115676"},{"id":1580,"name":"Cyberpsychology","url":"https://www.academia.edu/Documents/in/Cyberpsychology?f_ri=115676"},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=115676"},{"id":4545,"name":"Parenting","url":"https://www.academia.edu/Documents/in/Parenting?f_ri=115676"},{"id":9135,"name":"The Internet of Things","url":"https://www.academia.edu/Documents/in/The_Internet_of_Things?f_ri=115676"},{"id":11470,"name":"Cyberculture","url":"https://www.academia.edu/Documents/in/Cyberculture?f_ri=115676"},{"id":12756,"name":"Cyberbullying","url":"https://www.academia.edu/Documents/in/Cyberbullying?f_ri=115676"},{"id":16416,"name":"Internet \u0026 Society","url":"https://www.academia.edu/Documents/in/Internet_and_Society?f_ri=115676"},{"id":50160,"name":"Digital Forensics","url":"https://www.academia.edu/Documents/in/Digital_Forensics?f_ri=115676"},{"id":59533,"name":"Internet Addiction","url":"https://www.academia.edu/Documents/in/Internet_Addiction?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":247799,"name":"Internet of Things (IoT)","url":"https://www.academia.edu/Documents/in/Internet_of_Things_IoT_?f_ri=115676"},{"id":423158,"name":"Cyberstalking","url":"https://www.academia.edu/Documents/in/Cyberstalking?f_ri=115676"},{"id":440813,"name":"Infosec","url":"https://www.academia.edu/Documents/in/Infosec?f_ri=115676"},{"id":467668,"name":"Cyberterrorism","url":"https://www.academia.edu/Documents/in/Cyberterrorism?f_ri=115676"},{"id":966926,"name":"Ipredator","url":"https://www.academia.edu/Documents/in/Ipredator?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_35533317" data-work_id="35533317" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/35533317/Towards_the_Internet_of_Smart_Trains_A_Review_on_Industrial_IoT_Connected_Railways">Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Nowadays, the railway industry is in a position where it is able to exploit the opportunities created by the IIoT (Industrial Internet of Things) and enabling communication technologies under the paradigm of Internet of Trains. This... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_35533317" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Nowadays, the railway industry is in a position where it is able to exploit the opportunities created by the IIoT (Industrial Internet of Things) and enabling communication technologies under the paradigm of Internet of Trains. This review details the evolution of communication technologies since the deployment of GSM-R, describing the main alternatives and how railway requirements, specifications and recommendations have evolved over time. The advantages of the latest generation of broadband communication systems (e.g., LTE, 5G, IEEE 802.11ad) and the emergence of Wireless Sensor Networks (WSNs) for the railway environment are also explained together with the strategic roadmap to ensure a smooth migration from GSM-R. Furthermore, this survey focuses on providing a holistic approach, identifying scenarios and architectures where railways could leverage better commercial IIoT capabilities. After reviewing the main industrial developments, short and medium-term IIoT-enabled services for smart railways are evaluated. Then, it is analyzed the latest research on predictive maintenance, smart infrastructure, advanced monitoring of assets, video surveillance systems, railway operations, Passenger and Freight Information Systems (PIS/FIS), train control systems, safety assurance, signaling systems, cyber security and energy efficiency. Overall, it can be stated that the aim of this article is to provide a detailed examination of the state-of-the-art of different technologies and services that will revolutionize the railway industry and will allow for confronting today challenges.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/35533317" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ea72b3fd92f4f582dcfa91a7608452d0" rel="nofollow" data-download="{&quot;attachment_id&quot;:55398644,&quot;asset_id&quot;:35533317,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/55398644/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="58004185" href="https://independent.academia.edu/PaulaFraga2">Paula Fraga-Lamas</a><script data-card-contents-for-user="58004185" type="text/json">{"id":58004185,"first_name":"Paula","last_name":"Fraga-Lamas","domain_name":"independent","page_name":"PaulaFraga2","display_name":"Paula Fraga-Lamas","profile_url":"https://independent.academia.edu/PaulaFraga2?f_ri=115676","photo":"https://0.academia-photos.com/58004185/18693155/18650448/s65_paula.fraga.jpg"}</script></span></span></li><li class="js-paper-rank-work_35533317 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="35533317"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 35533317, container: ".js-paper-rank-work_35533317", }); });</script></li><li class="js-percentile-work_35533317 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 35533317; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_35533317"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_35533317 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="35533317"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 35533317; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=35533317]").text(description); $(".js-view-count-work_35533317").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_35533317").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="35533317"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">7</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2345" rel="nofollow" href="https://www.academia.edu/Documents/in/Wireless_Communications">Wireless Communications</a>,&nbsp;<script data-card-contents-for-ri="2345" type="text/json">{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="121284" href="https://www.academia.edu/Documents/in/Wsn">Wsn</a>,&nbsp;<script data-card-contents-for-ri="121284" type="text/json">{"id":121284,"name":"Wsn","url":"https://www.academia.edu/Documents/in/Wsn?f_ri=115676","nofollow":false}</script><a class="InlineList-item-text" data-has-card-for-ri="472546" rel="nofollow" href="https://www.academia.edu/Documents/in/IOT">IOT</a><script data-card-contents-for-ri="472546" type="text/json">{"id":472546,"name":"IOT","url":"https://www.academia.edu/Documents/in/IOT?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=35533317]'), work: {"id":35533317,"title":"Towards the Internet of Smart Trains: A Review on Industrial IoT-Connected Railways","created_at":"2017-12-29T00:38:44.712-08:00","url":"https://www.academia.edu/35533317/Towards_the_Internet_of_Smart_Trains_A_Review_on_Industrial_IoT_Connected_Railways?f_ri=115676","dom_id":"work_35533317","summary":"Nowadays, the railway industry is in a position where it is able to exploit the opportunities created by the IIoT (Industrial Internet of Things) and enabling communication technologies under the paradigm of Internet of Trains. This review details the evolution of communication technologies since the deployment of GSM-R, describing the main alternatives and how railway requirements, specifications and recommendations have evolved over time. The advantages of the latest generation of broadband communication systems (e.g., LTE, 5G, IEEE 802.11ad) and the emergence of Wireless Sensor Networks (WSNs) for the railway environment are also explained together with the strategic roadmap to ensure a smooth migration from GSM-R. Furthermore, this survey focuses on providing a holistic approach, identifying scenarios and architectures where railways could leverage better commercial IIoT capabilities. After reviewing the main industrial developments, short and medium-term IIoT-enabled services for smart railways are evaluated. Then, it is analyzed the latest research on predictive maintenance, smart infrastructure, advanced monitoring of assets, video surveillance systems, railway operations, Passenger and Freight Information Systems (PIS/FIS), train control systems, safety assurance, signaling systems, cyber security and energy efficiency. Overall, it can be stated that the aim of this article is to provide a detailed examination of the state-of-the-art of different technologies and services that will revolutionize the railway industry and will allow for confronting today challenges.","downloadable_attachments":[{"id":55398644,"asset_id":35533317,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":58004185,"first_name":"Paula","last_name":"Fraga-Lamas","domain_name":"independent","page_name":"PaulaFraga2","display_name":"Paula Fraga-Lamas","profile_url":"https://independent.academia.edu/PaulaFraga2?f_ri=115676","photo":"https://0.academia-photos.com/58004185/18693155/18650448/s65_paula.fraga.jpg"}],"research_interests":[{"id":2345,"name":"Wireless Communications","url":"https://www.academia.edu/Documents/in/Wireless_Communications?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":121284,"name":"Wsn","url":"https://www.academia.edu/Documents/in/Wsn?f_ri=115676","nofollow":false},{"id":472546,"name":"IOT","url":"https://www.academia.edu/Documents/in/IOT?f_ri=115676","nofollow":true},{"id":511079,"name":"Predictive Maintenance","url":"https://www.academia.edu/Documents/in/Predictive_Maintenance?f_ri=115676"},{"id":732065,"name":"Railway Safety","url":"https://www.academia.edu/Documents/in/Railway_Safety?f_ri=115676"},{"id":2194696,"name":"IIOT","url":"https://www.academia.edu/Documents/in/IIOT?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_7277407" data-work_id="7277407" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/7277407/Physical_Security_Historical_perspectives_and_operations">Physical Security: Historical perspectives and operations</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_7277407" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers for security protection because the evolution of human beings has not changed since the beginning of time. Applicable lessons are applied to all aspects of security to include physical, technical, personnel, information and operational security. The article provides examples of the original concept of access controls, vaulted areas, chemical warfare, and the origins of physical security.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/7277407" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="1f315437b2a7b49985bd1455a196aa19" rel="nofollow" data-download="{&quot;attachment_id&quot;:33887710,&quot;asset_id&quot;:7277407,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/33887710/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="2813554" href="https://csus.academia.edu/DrCraigJohnson">Dr. Craig T . Johnson</a><script data-card-contents-for-user="2813554" type="text/json">{"id":2813554,"first_name":"Dr. Craig","last_name":"Johnson","domain_name":"csus","page_name":"DrCraigJohnson","display_name":"Dr. Craig T . Johnson","profile_url":"https://csus.academia.edu/DrCraigJohnson?f_ri=115676","photo":"https://0.academia-photos.com/2813554/918236/1150182/s65_dr._craig_t..johnson.jpg"}</script></span></span></li><li class="js-paper-rank-work_7277407 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="7277407"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 7277407, container: ".js-paper-rank-work_7277407", }); });</script></li><li class="js-percentile-work_7277407 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 7277407; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_7277407"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_7277407 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="7277407"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 7277407; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=7277407]").text(description); $(".js-view-count-work_7277407").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_7277407").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="7277407"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">22</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="491" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Technology">Information Technology</a>,&nbsp;<script data-card-contents-for-ri="491" type="text/json">{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>,&nbsp;<script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="4370" rel="nofollow" href="https://www.academia.edu/Documents/in/Security">Security</a>,&nbsp;<script data-card-contents-for-ri="4370" type="text/json">{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="5282" rel="nofollow" href="https://www.academia.edu/Documents/in/Design_Research">Design Research</a><script data-card-contents-for-ri="5282" type="text/json">{"id":5282,"name":"Design Research","url":"https://www.academia.edu/Documents/in/Design_Research?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=7277407]'), work: {"id":7277407,"title":"Physical Security: Historical perspectives and operations","created_at":"2014-06-06T09:54:53.811-07:00","url":"https://www.academia.edu/7277407/Physical_Security_Historical_perspectives_and_operations?f_ri=115676","dom_id":"work_7277407","summary":"This presentation captures the historical adaptation of medieval warriors’ methods for security and thwarts toward adversarial attacks on fortifications for protective areas. History can often be a good teacher for modern day designers for security protection because the evolution of human beings has not changed since the beginning of time. Applicable lessons are applied to all aspects of security to include physical, technical, personnel, information and operational security. The article provides examples of the original concept of access controls, vaulted areas, chemical warfare, and the origins of physical security. ","downloadable_attachments":[{"id":33887710,"asset_id":7277407,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":2813554,"first_name":"Dr. Craig","last_name":"Johnson","domain_name":"csus","page_name":"DrCraigJohnson","display_name":"Dr. Craig T . Johnson","profile_url":"https://csus.academia.edu/DrCraigJohnson?f_ri=115676","photo":"https://0.academia-photos.com/2813554/918236/1150182/s65_dr._craig_t..johnson.jpg"}],"research_interests":[{"id":491,"name":"Information Technology","url":"https://www.academia.edu/Documents/in/Information_Technology?f_ri=115676","nofollow":true},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true},{"id":4370,"name":"Security","url":"https://www.academia.edu/Documents/in/Security?f_ri=115676","nofollow":true},{"id":5282,"name":"Design Research","url":"https://www.academia.edu/Documents/in/Design_Research?f_ri=115676","nofollow":true},{"id":5380,"name":"Homeland Security","url":"https://www.academia.edu/Documents/in/Homeland_Security?f_ri=115676"},{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=115676"},{"id":10678,"name":"Human Security","url":"https://www.academia.edu/Documents/in/Human_Security?f_ri=115676"},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=115676"},{"id":21939,"name":"Environmental Security","url":"https://www.academia.edu/Documents/in/Environmental_Security?f_ri=115676"},{"id":38360,"name":"Food Security","url":"https://www.academia.edu/Documents/in/Food_Security?f_ri=115676"},{"id":44778,"name":"Common Security and Defense Policy","url":"https://www.academia.edu/Documents/in/Common_Security_and_Defense_Policy?f_ri=115676"},{"id":57256,"name":"Common Security and Defence Policy","url":"https://www.academia.edu/Documents/in/Common_Security_and_Defence_Policy?f_ri=115676"},{"id":61620,"name":"National Security","url":"https://www.academia.edu/Documents/in/National_Security?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":127895,"name":"Non-Traditional Security","url":"https://www.academia.edu/Documents/in/Non-Traditional_Security?f_ri=115676"},{"id":188414,"name":"Information Security Management","url":"https://www.academia.edu/Documents/in/Information_Security_Management?f_ri=115676"},{"id":214586,"name":"Physical security","url":"https://www.academia.edu/Documents/in/Physical_security?f_ri=115676"},{"id":215782,"name":"Security and Defence Studies","url":"https://www.academia.edu/Documents/in/Security_and_Defence_Studies?f_ri=115676"},{"id":221987,"name":"Physical layer security","url":"https://www.academia.edu/Documents/in/Physical_layer_security?f_ri=115676"},{"id":556750,"name":"Physical security, risk management, security management","url":"https://www.academia.edu/Documents/in/Physical_security_risk_management_security_management?f_ri=115676"},{"id":876053,"name":"Physical Security Systems","url":"https://www.academia.edu/Documents/in/Physical_Security_Systems?f_ri=115676"},{"id":913309,"name":"Physical Security Technology","url":"https://www.academia.edu/Documents/in/Physical_Security_Technology?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_25702181" data-work_id="25702181" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/25702181/Cyberspace_and_National_Security_Selected_Articles_II">Cyberspace and National Security, Selected Articles II</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">elected Articles</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/25702181" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8f8a16967d190422c5d97b37ab491d71" rel="nofollow" data-download="{&quot;attachment_id&quot;:46046355,&quot;asset_id&quot;:25702181,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/46046355/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="33726367" href="https://independent.academia.edu/GabiSiboni">Gabi Siboni</a><script data-card-contents-for-user="33726367" type="text/json">{"id":33726367,"first_name":"Gabi","last_name":"Siboni","domain_name":"independent","page_name":"GabiSiboni","display_name":"Gabi Siboni","profile_url":"https://independent.academia.edu/GabiSiboni?f_ri=115676","photo":"https://0.academia-photos.com/33726367/13182606/14478345/s65_gabi.siboni.jpg"}</script></span></span></li><li class="js-paper-rank-work_25702181 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="25702181"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 25702181, container: ".js-paper-rank-work_25702181", }); });</script></li><li class="js-percentile-work_25702181 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 25702181; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_25702181"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_25702181 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="25702181"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 25702181; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=25702181]").text(description); $(".js-view-count-work_25702181").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_25702181").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="25702181"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=25702181]'), work: {"id":25702181,"title":"Cyberspace and National Security, Selected Articles II","created_at":"2016-05-29T10:56:31.945-07:00","url":"https://www.academia.edu/25702181/Cyberspace_and_National_Security_Selected_Articles_II?f_ri=115676","dom_id":"work_25702181","summary":"elected Articles","downloadable_attachments":[{"id":46046355,"asset_id":25702181,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":33726367,"first_name":"Gabi","last_name":"Siboni","domain_name":"independent","page_name":"GabiSiboni","display_name":"Gabi Siboni","profile_url":"https://independent.academia.edu/GabiSiboni?f_ri=115676","photo":"https://0.academia-photos.com/33726367/13182606/14478345/s65_gabi.siboni.jpg"}],"research_interests":[{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_39255106" data-work_id="39255106" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/39255106/Cybersecurity_and_artificial_intelligence">Cybersecurity and artificial intelligence</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_39255106" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the demand for better security has increased. As a result, today&#39;s decision makers demand better protection.<br />In the face of new daily cyber threats, IT experts fear violations and the destruction or manipulation of data. This leads to significantly increased expenditure. According to Gartner&#39;s research, the data security market will exceed $ 1, 000, 000, 000.00 by 2019.<br /><br />In this environment, a new technology based on artificial intelligence and machine training emerges that is redefining device protection - and thus, security. <br /><br />With the use of predictive and predictive techniques to detect attacks before they are executed and outside the system architecture, artificial intelligence is much more than just a technical innovation, it is a paradigm shift of philosophy and understanding.<br /><br />Artificial Intelligence (AI) as a subfield of computer science performs cognitive skills such as learning, planning, or problem-solving in computer systems.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/39255106" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="9766640b2c9bb87c64020072d438bd58" rel="nofollow" data-download="{&quot;attachment_id&quot;:59387851,&quot;asset_id&quot;:39255106,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59387851/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="13276633" href="https://ual-pt.academia.edu/ArturVictoria">Artur Victoria</a><script data-card-contents-for-user="13276633" type="text/json">{"id":13276633,"first_name":"Artur","last_name":"Victoria","domain_name":"ual-pt","page_name":"ArturVictoria","display_name":"Artur Victoria","profile_url":"https://ual-pt.academia.edu/ArturVictoria?f_ri=115676","photo":"https://0.academia-photos.com/13276633/6698221/31872235/s65_artur.victoria.jpg"}</script></span></span></li><li class="js-paper-rank-work_39255106 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="39255106"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 39255106, container: ".js-paper-rank-work_39255106", }); });</script></li><li class="js-percentile-work_39255106 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 39255106; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_39255106"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_39255106 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="39255106"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 39255106; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=39255106]").text(description); $(".js-view-count-work_39255106").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_39255106").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="39255106"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="465" rel="nofollow" href="https://www.academia.edu/Documents/in/Artificial_Intelligence">Artificial Intelligence</a>,&nbsp;<script data-card-contents-for-ri="465" type="text/json">{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1283" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>,&nbsp;<script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2511" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a>,&nbsp;<script data-card-contents-for-ri="2511" type="text/json">{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=39255106]'), work: {"id":39255106,"title":"Cybersecurity and artificial intelligence","created_at":"2019-05-25T01:20:10.110-07:00","url":"https://www.academia.edu/39255106/Cybersecurity_and_artificial_intelligence?f_ri=115676","dom_id":"work_39255106","summary":"The increasing threats of increasingly complex and frequent attacks make awkward a strong defensive position. Recent serious data breaches, such as those of the US Government Human Resources (OPM) department, have made headlines and the demand for better security has increased. As a result, today's decision makers demand better protection.\nIn the face of new daily cyber threats, IT experts fear violations and the destruction or manipulation of data. This leads to significantly increased expenditure. According to Gartner's research, the data security market will exceed $ 1, 000, 000, 000.00 by 2019.\n\nIn this environment, a new technology based on artificial intelligence and machine training emerges that is redefining device protection - and thus, security. \n\nWith the use of predictive and predictive techniques to detect attacks before they are executed and outside the system architecture, artificial intelligence is much more than just a technical innovation, it is a paradigm shift of philosophy and understanding.\n\nArtificial Intelligence (AI) as a subfield of computer science performs cognitive skills such as learning, planning, or problem-solving in computer systems.\n","downloadable_attachments":[{"id":59387851,"asset_id":39255106,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":13276633,"first_name":"Artur","last_name":"Victoria","domain_name":"ual-pt","page_name":"ArturVictoria","display_name":"Artur Victoria","profile_url":"https://ual-pt.academia.edu/ArturVictoria?f_ri=115676","photo":"https://0.academia-photos.com/13276633/6698221/31872235/s65_artur.victoria.jpg"}],"research_interests":[{"id":465,"name":"Artificial Intelligence","url":"https://www.academia.edu/Documents/in/Artificial_Intelligence?f_ri=115676","nofollow":true},{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true},{"id":2511,"name":"Cybercrimes","url":"https://www.academia.edu/Documents/in/Cybercrimes?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_4483123" data-work_id="4483123" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" rel="nofollow" href="https://www.academia.edu/4483123/Cyber_Security_Plan_Template">Cyber Security Plan Template</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/4483123" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ad00b3c566cda9297bf062cb94ff8203" rel="nofollow" data-download="{&quot;attachment_id&quot;:31886038,&quot;asset_id&quot;:4483123,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/31886038/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="5545920" href="https://iba.academia.edu/ZainAhmed">Zain Ahmed</a><script data-card-contents-for-user="5545920" type="text/json">{"id":5545920,"first_name":"Zain","last_name":"Ahmed","domain_name":"iba","page_name":"ZainAhmed","display_name":"Zain Ahmed","profile_url":"https://iba.academia.edu/ZainAhmed?f_ri=115676","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_4483123 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="4483123"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 4483123, container: ".js-paper-rank-work_4483123", }); });</script></li><li class="js-percentile-work_4483123 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4483123; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_4483123"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_4483123 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="4483123"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4483123; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4483123]").text(description); $(".js-view-count-work_4483123").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_4483123").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="4483123"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i></div><span class="InlineList-item-text u-textTruncate u-pl6x"><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (false) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=4483123]'), work: {"id":4483123,"title":"Cyber Security Plan Template","created_at":"2013-09-13T23:44:13.507-07:00","url":"https://www.academia.edu/4483123/Cyber_Security_Plan_Template?f_ri=115676","dom_id":"work_4483123","summary":null,"downloadable_attachments":[{"id":31886038,"asset_id":4483123,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":5545920,"first_name":"Zain","last_name":"Ahmed","domain_name":"iba","page_name":"ZainAhmed","display_name":"Zain Ahmed","profile_url":"https://iba.academia.edu/ZainAhmed?f_ri=115676","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_44170120" data-work_id="44170120" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/44170120/Security_Operations_Center_SOC_Strategic_Operating_Procedure">Security Operations Center (SOC) Strategic Operating Procedure</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">This rough draft SOP will provide a substantial road map on how to build and manage a SOC and or a Cyber Intelligence Operations Center.</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/44170120" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="514ce561b9850d4b84e5021b10b81beb" rel="nofollow" data-download="{&quot;attachment_id&quot;:64725512,&quot;asset_id&quot;:44170120,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/64725512/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="22141503" href="https://cua.academia.edu/BillRoss">Bill Ross</a><script data-card-contents-for-user="22141503" type="text/json">{"id":22141503,"first_name":"Bill","last_name":"Ross","domain_name":"cua","page_name":"BillRoss","display_name":"Bill Ross","profile_url":"https://cua.academia.edu/BillRoss?f_ri=115676","photo":"https://0.academia-photos.com/22141503/6058439/135204919/s65_bill.ross.png"}</script></span></span></li><li class="js-paper-rank-work_44170120 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="44170120"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 44170120, container: ".js-paper-rank-work_44170120", }); });</script></li><li class="js-percentile-work_44170120 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 44170120; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_44170120"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_44170120 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="44170120"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 44170120; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=44170120]").text(description); $(".js-view-count-work_44170120").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_44170120").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="44170120"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">13</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="38132" rel="nofollow" href="https://www.academia.edu/Documents/in/Soc">Soc</a>,&nbsp;<script data-card-contents-for-ri="38132" type="text/json">{"id":38132,"name":"Soc","url":"https://www.academia.edu/Documents/in/Soc?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="119655" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Forensics">Cyber Forensics</a>,&nbsp;<script data-card-contents-for-ri="119655" type="text/json">{"id":119655,"name":"Cyber Forensics","url":"https://www.academia.edu/Documents/in/Cyber_Forensics?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="181156" rel="nofollow" href="https://www.academia.edu/Documents/in/Identify">Identify</a><script data-card-contents-for-ri="181156" type="text/json">{"id":181156,"name":"Identify","url":"https://www.academia.edu/Documents/in/Identify?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=44170120]'), work: {"id":44170120,"title":"Security Operations Center (SOC) Strategic Operating Procedure","created_at":"2020-09-26T07:47:00.524-07:00","url":"https://www.academia.edu/44170120/Security_Operations_Center_SOC_Strategic_Operating_Procedure?f_ri=115676","dom_id":"work_44170120","summary":"This rough draft SOP will provide a substantial road map on how to build and manage a SOC and or a Cyber Intelligence Operations Center.","downloadable_attachments":[{"id":64725512,"asset_id":44170120,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":22141503,"first_name":"Bill","last_name":"Ross","domain_name":"cua","page_name":"BillRoss","display_name":"Bill Ross","profile_url":"https://cua.academia.edu/BillRoss?f_ri=115676","photo":"https://0.academia-photos.com/22141503/6058439/135204919/s65_bill.ross.png"}],"research_interests":[{"id":38132,"name":"Soc","url":"https://www.academia.edu/Documents/in/Soc?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":119655,"name":"Cyber Forensics","url":"https://www.academia.edu/Documents/in/Cyber_Forensics?f_ri=115676","nofollow":true},{"id":181156,"name":"Identify","url":"https://www.academia.edu/Documents/in/Identify?f_ri=115676","nofollow":true},{"id":199376,"name":"Cyber Security Incident Response","url":"https://www.academia.edu/Documents/in/Cyber_Security_Incident_Response?f_ri=115676"},{"id":212133,"name":"Prevent","url":"https://www.academia.edu/Documents/in/Prevent?f_ri=115676"},{"id":469224,"name":"CSF","url":"https://www.academia.edu/Documents/in/CSF?f_ri=115676"},{"id":1154161,"name":"Threat Intelligence","url":"https://www.academia.edu/Documents/in/Threat_Intelligence?f_ri=115676"},{"id":1371430,"name":"Cyber Threat Intelligence","url":"https://www.academia.edu/Documents/in/Cyber_Threat_Intelligence?f_ri=115676"},{"id":2588200,"name":"cybersecurity framework","url":"https://www.academia.edu/Documents/in/cybersecurity_framework?f_ri=115676"},{"id":3585625,"name":"Predict","url":"https://www.academia.edu/Documents/in/Predict?f_ri=115676"},{"id":3772258,"name":"Mitre ATT\u0026CK","url":"https://www.academia.edu/Documents/in/Mitre_ATT_and_CK?f_ri=115676"},{"id":3772263,"name":"Respond","url":"https://www.academia.edu/Documents/in/Respond?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_4746607" data-work_id="4746607" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/4746607/Cyber_Security_in_India_The_National_Critical_Information_Infrastructure_Protection_Centre_NCIIPC_Roadmap">Cyber Security in India The National Critical Information Infrastructure Protection Centre (NCIIPC)- Roadmap</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">D eclaring America&#39;s digital infrastructure to be a &quot;strategic national asset&quot; President Barack Obama called cyberspace the &quot;fifth domain&quot;, the &quot;new frontier&quot; and as vital and valuable as land, sea, air and space -and as threatened by the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_4746607" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">D eclaring America&#39;s digital infrastructure to be a &quot;strategic national asset&quot; President Barack Obama called cyberspace the &quot;fifth domain&quot;, the &quot;new frontier&quot; and as vital and valuable as land, sea, air and space -and as threatened by the enemies of peace and amity, progress and prosperity. Britain also has set up a cyber-security policy outfit and an &quot;operations centre&quot; based in GCHQ, the British equivalent of the American NSA.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/4746607" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6789ff0a2468eefda329ac0dfc881cca" rel="nofollow" data-download="{&quot;attachment_id&quot;:32060106,&quot;asset_id&quot;:4746607,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/32060106/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3494551" href="https://iitd.academia.edu/MukteshChander">Muktesh Chander</a><script data-card-contents-for-user="3494551" type="text/json">{"id":3494551,"first_name":"Muktesh","last_name":"Chander","domain_name":"iitd","page_name":"MukteshChander","display_name":"Muktesh Chander","profile_url":"https://iitd.academia.edu/MukteshChander?f_ri=115676","photo":"https://0.academia-photos.com/3494551/1191272/8106219/s65_muktesh.chander.jpg"}</script></span></span></li><li class="js-paper-rank-work_4746607 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="4746607"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 4746607, container: ".js-paper-rank-work_4746607", }); });</script></li><li class="js-percentile-work_4746607 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 4746607; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_4746607"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_4746607 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="4746607"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 4746607; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=4746607]").text(description); $(".js-view-count-work_4746607").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_4746607").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="4746607"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">11</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="1283" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>,&nbsp;<script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1439" rel="nofollow" href="https://www.academia.edu/Documents/in/Globalization">Globalization</a>,&nbsp;<script data-card-contents-for-ri="1439" type="text/json">{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11336" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Terrorism">Cyber Terrorism</a>,&nbsp;<script data-card-contents-for-ri="11336" type="text/json">{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="11337" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Warfare">Cyber Warfare</a><script data-card-contents-for-ri="11337" type="text/json">{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=4746607]'), work: {"id":4746607,"title":"Cyber Security in India The National Critical Information Infrastructure Protection Centre (NCIIPC)- Roadmap","created_at":"2013-10-11T03:03:39.028-07:00","url":"https://www.academia.edu/4746607/Cyber_Security_in_India_The_National_Critical_Information_Infrastructure_Protection_Centre_NCIIPC_Roadmap?f_ri=115676","dom_id":"work_4746607","summary":"D eclaring America's digital infrastructure to be a \"strategic national asset\" President Barack Obama called cyberspace the \"fifth domain\", the \"new frontier\" and as vital and valuable as land, sea, air and space -and as threatened by the enemies of peace and amity, progress and prosperity. Britain also has set up a cyber-security policy outfit and an \"operations centre\" based in GCHQ, the British equivalent of the American NSA.","downloadable_attachments":[{"id":32060106,"asset_id":4746607,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3494551,"first_name":"Muktesh","last_name":"Chander","domain_name":"iitd","page_name":"MukteshChander","display_name":"Muktesh Chander","profile_url":"https://iitd.academia.edu/MukteshChander?f_ri=115676","photo":"https://0.academia-photos.com/3494551/1191272/8106219/s65_muktesh.chander.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true},{"id":1439,"name":"Globalization","url":"https://www.academia.edu/Documents/in/Globalization?f_ri=115676","nofollow":true},{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=115676","nofollow":true},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=115676","nofollow":true},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":265411,"name":"Information Technology and Security","url":"https://www.academia.edu/Documents/in/Information_Technology_and_Security?f_ri=115676"},{"id":1222788,"name":"Research in Technology","url":"https://www.academia.edu/Documents/in/Research_in_Technology?f_ri=115676"},{"id":1222789,"name":"Technology and it's Advancements","url":"https://www.academia.edu/Documents/in/Technology_and_its_Advancements?f_ri=115676"},{"id":1222790,"name":"Cyber Crime and Technological Advancements","url":"https://www.academia.edu/Documents/in/Cyber_Crime_and_Technological_Advancements?f_ri=115676"},{"id":1222791,"name":"Improvements to Globalization with IT Security and Reformation","url":"https://www.academia.edu/Documents/in/Improvements_to_Globalization_with_IT_Security_and_Reformation?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36672078" data-work_id="36672078" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36672078/India_and_the_Budapest_Convention_To_Sign_or_Not_Considerations_for_Indian_Stakeholders">India and the Budapest Convention: To Sign or Not? Considerations for Indian Stakeholders</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36672078" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international cooperation to battle cybercrime in signatory States. Whether or not India should join the Convention has, since then, been a topic of intense debate. In this paper, the author considers the Convention’s major strengths and weaknesses in five areas of crucial importance to Indian stakeholders. To sign or not? There might not be an easy answer, as this paper will show.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36672078" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e85b26537724e52f2b2e82fff4f03823" rel="nofollow" data-download="{&quot;attachment_id&quot;:56606765,&quot;asset_id&quot;:36672078,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56606765/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="27783231" href="https://independent.academia.edu/AnjaKovacs">Anja Kovacs</a><script data-card-contents-for-user="27783231" type="text/json">{"id":27783231,"first_name":"Anja","last_name":"Kovacs","domain_name":"independent","page_name":"AnjaKovacs","display_name":"Anja Kovacs","profile_url":"https://independent.academia.edu/AnjaKovacs?f_ri=115676","photo":"https://0.academia-photos.com/27783231/19768124/19611212/s65_anja.kovacs.jpg"}</script></span></span></li><li class="js-paper-rank-work_36672078 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36672078"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36672078, container: ".js-paper-rank-work_36672078", }); });</script></li><li class="js-percentile-work_36672078 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36672078; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36672078"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36672078 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36672078"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36672078; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36672078]").text(description); $(".js-view-count-work_36672078").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36672078").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36672078"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">11</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl10x"><a class="InlineList-item-text" data-has-card-for-ri="11336" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Terrorism">Cyber Terrorism</a>,&nbsp;<script data-card-contents-for-ri="11336" type="text/json">{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="20594" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_crime">Cyber crime</a>,&nbsp;<script data-card-contents-for-ri="20594" type="text/json">{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="43838" rel="nofollow" href="https://www.academia.edu/Documents/in/India">India</a>,&nbsp;<script data-card-contents-for-ri="43838" type="text/json">{"id":43838,"name":"India","url":"https://www.academia.edu/Documents/in/India?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a><script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36672078]'), work: {"id":36672078,"title":"India and the Budapest Convention: To Sign or Not? Considerations for Indian Stakeholders","created_at":"2018-05-19T20:50:49.397-07:00","url":"https://www.academia.edu/36672078/India_and_the_Budapest_Convention_To_Sign_or_Not_Considerations_for_Indian_Stakeholders?f_ri=115676","dom_id":"work_36672078","summary":"In 2001, the Convention on Cybercrime of the Council of Europe, also known as the Cybercrime Convention or the Budapest Convention, became the first binding international instrument to foster a common criminal policy and international cooperation to battle cybercrime in signatory States. Whether or not India should join the Convention has, since then, been a topic of intense debate. In this paper, the author considers the Convention’s major strengths and weaknesses in five areas of crucial importance to Indian stakeholders. To sign or not? There might not be an easy answer, as this paper will show.","downloadable_attachments":[{"id":56606765,"asset_id":36672078,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":27783231,"first_name":"Anja","last_name":"Kovacs","domain_name":"independent","page_name":"AnjaKovacs","display_name":"Anja Kovacs","profile_url":"https://independent.academia.edu/AnjaKovacs?f_ri=115676","photo":"https://0.academia-photos.com/27783231/19768124/19611212/s65_anja.kovacs.jpg"}],"research_interests":[{"id":11336,"name":"Cyber Terrorism","url":"https://www.academia.edu/Documents/in/Cyber_Terrorism?f_ri=115676","nofollow":true},{"id":20594,"name":"Cyber crime","url":"https://www.academia.edu/Documents/in/Cyber_crime?f_ri=115676","nofollow":true},{"id":43838,"name":"India","url":"https://www.academia.edu/Documents/in/India?f_ri=115676","nofollow":true},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676","nofollow":true},{"id":89751,"name":"Cybercrime","url":"https://www.academia.edu/Documents/in/Cybercrime?f_ri=115676"},{"id":96546,"name":"Cyber Law","url":"https://www.academia.edu/Documents/in/Cyber_Law?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":278686,"name":"Cybersecurity Law","url":"https://www.academia.edu/Documents/in/Cybersecurity_Law?f_ri=115676"},{"id":831496,"name":"Cybersecurity policy","url":"https://www.academia.edu/Documents/in/Cybersecurity_policy?f_ri=115676"},{"id":918932,"name":"Budapest Convention on Cyber Crimes","url":"https://www.academia.edu/Documents/in/Budapest_Convention_on_Cyber_Crimes?f_ri=115676"},{"id":1311214,"name":"Convention on Cybercrime","url":"https://www.academia.edu/Documents/in/Convention_on_Cybercrime?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36834993" data-work_id="36834993" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36834993/Reinterpreting_Document_98_Indias_Proposals_at_the_ITU_Plenipot_2014_and_the_Evolution_of_Internet_Governance">Reinterpreting Document 98: India&#39;s Proposals at the ITU Plenipot 2014 and the Evolution of Internet Governance</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">At the recently concluded ITU Plenipotentiary Conference in Busan, India proposed a controversial new resolution that sought to contribute to realising a more secure information society. But while some criticisms of the draft resolution... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36834993" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">At the recently concluded ITU Plenipotentiary Conference in Busan, India proposed a controversial new resolution that sought to contribute to realising a more secure information society. But while some criticisms of the draft resolution were justified, much of the discussion at the ITU Plenipot overlooked the considerable merit that India’s proposed new resolution has when considered against the backdrop of the larger politics of global Internet governance. For its attempt to find solutions to long-standing concerns of developing countries while at the same time recognising the value of existing internet governance institutions, India’s proposal deserves a second reading, argues Anja Kovacs.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36834993" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="91b87f87980c8784db9527232a0c190e" rel="nofollow" data-download="{&quot;attachment_id&quot;:56787495,&quot;asset_id&quot;:36834993,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56787495/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="27783231" href="https://independent.academia.edu/AnjaKovacs">Anja Kovacs</a><script data-card-contents-for-user="27783231" type="text/json">{"id":27783231,"first_name":"Anja","last_name":"Kovacs","domain_name":"independent","page_name":"AnjaKovacs","display_name":"Anja Kovacs","profile_url":"https://independent.academia.edu/AnjaKovacs?f_ri=115676","photo":"https://0.academia-photos.com/27783231/19768124/19611212/s65_anja.kovacs.jpg"}</script></span></span></li><li class="js-paper-rank-work_36834993 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36834993"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36834993, container: ".js-paper-rank-work_36834993", }); });</script></li><li class="js-percentile-work_36834993 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36834993; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36834993"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36834993 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36834993"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36834993; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36834993]").text(description); $(".js-view-count-work_36834993").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36834993").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36834993"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2592" rel="nofollow" href="https://www.academia.edu/Documents/in/Human_Rights">Human Rights</a>,&nbsp;<script data-card-contents-for-ri="2592" type="text/json">{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7822" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_Governance">Internet Governance</a>,&nbsp;<script data-card-contents-for-ri="7822" type="text/json">{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="46738" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a>,&nbsp;<script data-card-contents-for-ri="46738" type="text/json">{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36834993]'), work: {"id":36834993,"title":"Reinterpreting Document 98: India's Proposals at the ITU Plenipot 2014 and the Evolution of Internet Governance","created_at":"2018-06-13T02:41:55.754-07:00","url":"https://www.academia.edu/36834993/Reinterpreting_Document_98_Indias_Proposals_at_the_ITU_Plenipot_2014_and_the_Evolution_of_Internet_Governance?f_ri=115676","dom_id":"work_36834993","summary":"At the recently concluded ITU Plenipotentiary Conference in Busan, India proposed a controversial new resolution that sought to contribute to realising a more secure information society. But while some criticisms of the draft resolution were justified, much of the discussion at the ITU Plenipot overlooked the considerable merit that India’s proposed new resolution has when considered against the backdrop of the larger politics of global Internet governance. For its attempt to find solutions to long-standing concerns of developing countries while at the same time recognising the value of existing internet governance institutions, India’s proposal deserves a second reading, argues Anja Kovacs.","downloadable_attachments":[{"id":56787495,"asset_id":36834993,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":27783231,"first_name":"Anja","last_name":"Kovacs","domain_name":"independent","page_name":"AnjaKovacs","display_name":"Anja Kovacs","profile_url":"https://independent.academia.edu/AnjaKovacs?f_ri=115676","photo":"https://0.academia-photos.com/27783231/19768124/19611212/s65_anja.kovacs.jpg"}],"research_interests":[{"id":2592,"name":"Human Rights","url":"https://www.academia.edu/Documents/in/Human_Rights?f_ri=115676","nofollow":true},{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=115676","nofollow":true},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_69149016" data-work_id="69149016" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/69149016/The_Cyber_Security_Strategy_of_Israel">The Cyber Security Strategy of Israel</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">This article explores the main targets of the Israel’s cyber security strategy and bureaucratic, commercial and academic structures which take part in this strategy, by examining the public-private sector and academy cooperation model in... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_69149016" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">This article explores the main targets of the Israel’s cyber security strategy and bureaucratic, commercial and academic structures which take part in this strategy, by examining the public-private sector and academy cooperation model in the Israel’s cyber security strategy. The security-oriented cooperation model that Israel has established to develop the strategy in question have been analysed by considering all the details.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/69149016" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="e1d89e1c6b5b6127790af1e4c2de0743" rel="nofollow" data-download="{&quot;attachment_id&quot;:79366312,&quot;asset_id&quot;:69149016,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/79366312/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="42267542" href="https://btuedu.academia.edu/AliBurakDARICILI">Doç. Dr. Ali Burak DARICILI</a><script data-card-contents-for-user="42267542" type="text/json">{"id":42267542,"first_name":"Doç. Dr. Ali Burak","last_name":"DARICILI","domain_name":"btuedu","page_name":"AliBurakDARICILI","display_name":"Doç. Dr. Ali Burak DARICILI","profile_url":"https://btuedu.academia.edu/AliBurakDARICILI?f_ri=115676","photo":"https://0.academia-photos.com/42267542/17583028/74321531/s65_do_._dr._ali_burak.daricili.jpg"}</script></span></span></li><li class="js-paper-rank-work_69149016 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="69149016"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 69149016, container: ".js-paper-rank-work_69149016", }); });</script></li><li class="js-percentile-work_69149016 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 69149016; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_69149016"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_69149016 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="69149016"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 69149016; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=69149016]").text(description); $(".js-view-count-work_69149016").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_69149016").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="69149016"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="34642" rel="nofollow" href="https://www.academia.edu/Documents/in/Israel">Israel</a>,&nbsp;<script data-card-contents-for-ri="34642" type="text/json">{"id":34642,"name":"Israel","url":"https://www.academia.edu/Documents/in/Israel?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="2974065" rel="nofollow" href="https://www.academia.edu/Documents/in/national_cybersecurity_strategy">national cybersecurity strategy</a><script data-card-contents-for-ri="2974065" type="text/json">{"id":2974065,"name":"national cybersecurity strategy","url":"https://www.academia.edu/Documents/in/national_cybersecurity_strategy?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=69149016]'), work: {"id":69149016,"title":"The Cyber Security Strategy of Israel","created_at":"2022-01-22T05:39:50.245-08:00","url":"https://www.academia.edu/69149016/The_Cyber_Security_Strategy_of_Israel?f_ri=115676","dom_id":"work_69149016","summary":"This article explores the main targets of the Israel’s cyber security strategy and bureaucratic, commercial and academic structures which take part in this strategy, by examining the public-private sector and academy cooperation model in the Israel’s cyber security strategy. The security-oriented cooperation model that Israel has established to develop the strategy in question have been analysed by considering all the details.","downloadable_attachments":[{"id":79366312,"asset_id":69149016,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":42267542,"first_name":"Doç. Dr. Ali Burak","last_name":"DARICILI","domain_name":"btuedu","page_name":"AliBurakDARICILI","display_name":"Doç. Dr. Ali Burak DARICILI","profile_url":"https://btuedu.academia.edu/AliBurakDARICILI?f_ri=115676","photo":"https://0.academia-photos.com/42267542/17583028/74321531/s65_do_._dr._ali_burak.daricili.jpg"}],"research_interests":[{"id":34642,"name":"Israel","url":"https://www.academia.edu/Documents/in/Israel?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":2974065,"name":"national cybersecurity strategy","url":"https://www.academia.edu/Documents/in/national_cybersecurity_strategy?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38045308" data-work_id="38045308" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38045308/Trends_in_cyberspace_can_governments_keep_up">Trends in cyberspace: can governments keep up?</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Whether carried out by individuals or states, cyberattacks are both growing in number and becoming more sophisticated. Since the attack on Estonian cyber infrastructure in 2007, many other examples of massive attacks have been reported.... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_38045308" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Whether carried out by individuals or states,<br />cyberattacks are both growing in number and becoming<br />more sophisticated. Since the attack on Estonian cyber<br />infrastructure in 2007, many other examples of massive<br />attacks have been reported. The use of spyware and malware—such as with Stuxnet, DuQu or Flames—to disrupt<br />critical infrastructure has made headlines, questioning the<br />ability of governments and private actors to respond to<br />cyber threats. A broad array of potential threats poses a<br />substantial challenge to existing governance structures,<br />which are often behind the curve in comparison with the<br />dynamically evolving cyberspace. Using existing literature<br />and recent foresight studies, the article analyses the trends<br />in the governance of cyberspace and their implications for<br />governments and global regulatory regimes.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38045308" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ba9e6205ea8127e424cd716650234d7a" rel="nofollow" data-download="{&quot;attachment_id&quot;:58069715,&quot;asset_id&quot;:38045308,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58069715/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="99604701" href="https://sciences-po.academia.edu/C%C3%A9cileWENDLING">Cécile WENDLING</a><script data-card-contents-for-user="99604701" type="text/json">{"id":99604701,"first_name":"Cécile","last_name":"WENDLING","domain_name":"sciences-po","page_name":"CécileWENDLING","display_name":"Cécile WENDLING","profile_url":"https://sciences-po.academia.edu/C%C3%A9cileWENDLING?f_ri=115676","photo":"https://0.academia-photos.com/99604701/21714274/21033065/s65_c_cile.wendling.jpg"}</script></span></span></li><li class="js-paper-rank-work_38045308 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38045308"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38045308, container: ".js-paper-rank-work_38045308", }); });</script></li><li class="js-percentile-work_38045308 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38045308; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38045308"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38045308 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38045308"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38045308; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38045308]").text(description); $(".js-view-count-work_38045308").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38045308").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38045308"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2489" rel="nofollow" href="https://www.academia.edu/Documents/in/Policy_Analysis_and_Decision_Making">Policy Analysis and Decision Making</a>,&nbsp;<script data-card-contents-for-ri="2489" type="text/json">{"id":2489,"name":"Policy Analysis and Decision Making","url":"https://www.academia.edu/Documents/in/Policy_Analysis_and_Decision_Making?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1301903" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Risk">Cyber Risk</a><script data-card-contents-for-ri="1301903" type="text/json">{"id":1301903,"name":"Cyber Risk","url":"https://www.academia.edu/Documents/in/Cyber_Risk?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38045308]'), work: {"id":38045308,"title":"Trends in cyberspace: can governments keep up?","created_at":"2018-12-27T01:50:27.092-08:00","url":"https://www.academia.edu/38045308/Trends_in_cyberspace_can_governments_keep_up?f_ri=115676","dom_id":"work_38045308","summary":"Whether carried out by individuals or states,\ncyberattacks are both growing in number and becoming\nmore sophisticated. Since the attack on Estonian cyber\ninfrastructure in 2007, many other examples of massive\nattacks have been reported. The use of spyware and malware—such as with Stuxnet, DuQu or Flames—to disrupt\ncritical infrastructure has made headlines, questioning the\nability of governments and private actors to respond to\ncyber threats. A broad array of potential threats poses a\nsubstantial challenge to existing governance structures,\nwhich are often behind the curve in comparison with the\ndynamically evolving cyberspace. Using existing literature\nand recent foresight studies, the article analyses the trends\nin the governance of cyberspace and their implications for\ngovernments and global regulatory regimes.","downloadable_attachments":[{"id":58069715,"asset_id":38045308,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":99604701,"first_name":"Cécile","last_name":"WENDLING","domain_name":"sciences-po","page_name":"CécileWENDLING","display_name":"Cécile WENDLING","profile_url":"https://sciences-po.academia.edu/C%C3%A9cileWENDLING?f_ri=115676","photo":"https://0.academia-photos.com/99604701/21714274/21033065/s65_c_cile.wendling.jpg"}],"research_interests":[{"id":2489,"name":"Policy Analysis and Decision Making","url":"https://www.academia.edu/Documents/in/Policy_Analysis_and_Decision_Making?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":1301903,"name":"Cyber Risk","url":"https://www.academia.edu/Documents/in/Cyber_Risk?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_24839120" data-work_id="24839120" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/24839120/Siber_G%C3%BCvenlik_Kritik_Enerji_Altyap%C4%B1lar%C4%B1_Z%C3%BChre_Ayd%C4%B1n">Siber Güvenlik, Kritik Enerji Altyapıları,Zühre Aydın</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest">Siber Güvenlik, Kritik Enerji Altyapıları</div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/24839120" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="fc31d37723a59015ddb1cdcd80f5ff40" rel="nofollow" data-download="{&quot;attachment_id&quot;:45163030,&quot;asset_id&quot;:24839120,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/45163030/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="47839073" href="https://independentscholar.academia.edu/Z%C3%BChreAYDIN">Zühre AYDIN</a><script data-card-contents-for-user="47839073" type="text/json">{"id":47839073,"first_name":"Zühre","last_name":"AYDIN","domain_name":"independentscholar","page_name":"ZühreAYDIN","display_name":"Zühre AYDIN","profile_url":"https://independentscholar.academia.edu/Z%C3%BChreAYDIN?f_ri=115676","photo":"https://0.academia-photos.com/47839073/14338493/59447228/s65_z_hre.aydin_yeni_o_lu.jpg"}</script></span></span></li><li class="js-paper-rank-work_24839120 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="24839120"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 24839120, container: ".js-paper-rank-work_24839120", }); });</script></li><li class="js-percentile-work_24839120 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 24839120; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_24839120"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_24839120 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="24839120"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 24839120; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=24839120]").text(description); $(".js-view-count-work_24839120").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_24839120").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="24839120"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="492" rel="nofollow" href="https://www.academia.edu/Documents/in/Management_Information_Systems">Management Information Systems</a>,&nbsp;<script data-card-contents-for-ri="492" type="text/json">{"id":492,"name":"Management Information Systems","url":"https://www.academia.edu/Documents/in/Management_Information_Systems?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1144590" rel="nofollow" href="https://www.academia.edu/Documents/in/Siber_Guvenlik">Siber Güvenlik</a><script data-card-contents-for-ri="1144590" type="text/json">{"id":1144590,"name":"Siber Güvenlik","url":"https://www.academia.edu/Documents/in/Siber_Guvenlik?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=24839120]'), work: {"id":24839120,"title":"Siber Güvenlik, Kritik Enerji Altyapıları,Zühre Aydın","created_at":"2016-04-28T03:25:32.706-07:00","url":"https://www.academia.edu/24839120/Siber_G%C3%BCvenlik_Kritik_Enerji_Altyap%C4%B1lar%C4%B1_Z%C3%BChre_Ayd%C4%B1n?f_ri=115676","dom_id":"work_24839120","summary":"Siber Güvenlik, Kritik Enerji Altyapıları","downloadable_attachments":[{"id":45163030,"asset_id":24839120,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":47839073,"first_name":"Zühre","last_name":"AYDIN","domain_name":"independentscholar","page_name":"ZühreAYDIN","display_name":"Zühre AYDIN","profile_url":"https://independentscholar.academia.edu/Z%C3%BChreAYDIN?f_ri=115676","photo":"https://0.academia-photos.com/47839073/14338493/59447228/s65_z_hre.aydin_yeni_o_lu.jpg"}],"research_interests":[{"id":492,"name":"Management Information Systems","url":"https://www.academia.edu/Documents/in/Management_Information_Systems?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":1144590,"name":"Siber Güvenlik","url":"https://www.academia.edu/Documents/in/Siber_Guvenlik?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_38181155" data-work_id="38181155" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/38181155/Disiplinleraras%C4%B1_Bir_Yakla%C5%9F%C4%B1mla_Siber_Politika_and_Siber_G%C3%BCvenlik">Disiplinlerarası Bir Yaklaşımla: Siber Politika &amp; Siber Güvenlik</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/38181155" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="f4cefd25fe0026a8afdff14f8482513a" rel="nofollow" data-download="{&quot;attachment_id&quot;:58217623,&quot;asset_id&quot;:38181155,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/58217623/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="984463" href="https://selcuk.academia.edu/%C3%87a%C4%9FlarS%C3%B6ker">Çağlar Söker</a><script data-card-contents-for-user="984463" type="text/json">{"id":984463,"first_name":"Çağlar","last_name":"Söker","domain_name":"selcuk","page_name":"ÇağlarSöker","display_name":"Çağlar Söker","profile_url":"https://selcuk.academia.edu/%C3%87a%C4%9FlarS%C3%B6ker?f_ri=115676","photo":"https://0.academia-photos.com/984463/7275283/29387727/s65__a_lar.s_ker.jpg"}</script></span></span></li><li class="js-paper-rank-work_38181155 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="38181155"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 38181155, container: ".js-paper-rank-work_38181155", }); });</script></li><li class="js-percentile-work_38181155 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 38181155; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_38181155"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_38181155 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="38181155"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 38181155; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=38181155]").text(description); $(".js-view-count-work_38181155").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_38181155").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="38181155"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="63861" rel="nofollow" href="https://www.academia.edu/Documents/in/Uluslararas%C4%B1_%C4%B0li%C5%9Fkiler">Uluslararası İlişkiler</a>,&nbsp;<script data-card-contents-for-ri="63861" type="text/json">{"id":63861,"name":"Uluslararası İlişkiler","url":"https://www.academia.edu/Documents/in/Uluslararas%C4%B1_%C4%B0li%C5%9Fkiler?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="176558" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Politics">Cyber Politics</a><script data-card-contents-for-ri="176558" type="text/json">{"id":176558,"name":"Cyber Politics","url":"https://www.academia.edu/Documents/in/Cyber_Politics?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=38181155]'), work: {"id":38181155,"title":"Disiplinlerarası Bir Yaklaşımla: Siber Politika \u0026 Siber Güvenlik","created_at":"2019-01-19T11:38:36.649-08:00","url":"https://www.academia.edu/38181155/Disiplinleraras%C4%B1_Bir_Yakla%C5%9F%C4%B1mla_Siber_Politika_and_Siber_G%C3%BCvenlik?f_ri=115676","dom_id":"work_38181155","summary":null,"downloadable_attachments":[{"id":58217623,"asset_id":38181155,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":984463,"first_name":"Çağlar","last_name":"Söker","domain_name":"selcuk","page_name":"ÇağlarSöker","display_name":"Çağlar Söker","profile_url":"https://selcuk.academia.edu/%C3%87a%C4%9FlarS%C3%B6ker?f_ri=115676","photo":"https://0.academia-photos.com/984463/7275283/29387727/s65__a_lar.s_ker.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true},{"id":63861,"name":"Uluslararası İlişkiler","url":"https://www.academia.edu/Documents/in/Uluslararas%C4%B1_%C4%B0li%C5%9Fkiler?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":176558,"name":"Cyber Politics","url":"https://www.academia.edu/Documents/in/Cyber_Politics?f_ri=115676","nofollow":true},{"id":1144590,"name":"Siber Güvenlik","url":"https://www.academia.edu/Documents/in/Siber_Guvenlik?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36765420" data-work_id="36765420" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36765420/Guide_To_Kali_Linux_pdf">Guide To Kali Linux.pdf</a></div></div><div class="u-pb4x u-mt3x"></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36765420" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="68f9fe3dfefab6d684056a04f9d8a45e" rel="nofollow" data-download="{&quot;attachment_id&quot;:56712382,&quot;asset_id&quot;:36765420,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/56712382/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="8104449" href="https://staiali.academia.edu/MuhammadAndykMaulana">Muhammad Andyk Maulana</a><script data-card-contents-for-user="8104449" type="text/json">{"id":8104449,"first_name":"Muhammad","last_name":"Andyk Maulana","domain_name":"staiali","page_name":"MuhammadAndykMaulana","display_name":"Muhammad Andyk Maulana","profile_url":"https://staiali.academia.edu/MuhammadAndykMaulana?f_ri=115676","photo":"https://0.academia-photos.com/8104449/10875064/12136483/s65_muhammad.maulana.jpg_oh_26956965bf14ce8d0ca6d493b5e3b44d_oe_56f6dac4"}</script></span></span></li><li class="js-paper-rank-work_36765420 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36765420"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36765420, container: ".js-paper-rank-work_36765420", }); });</script></li><li class="js-percentile-work_36765420 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36765420; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36765420"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36765420 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36765420"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36765420; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36765420]").text(description); $(".js-view-count-work_36765420").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36765420").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36765420"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3703" rel="nofollow" href="https://www.academia.edu/Documents/in/Network_Security">Network Security</a>,&nbsp;<script data-card-contents-for-ri="3703" type="text/json">{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="1252004" rel="nofollow" href="https://www.academia.edu/Documents/in/Kali_Linux">Kali Linux</a><script data-card-contents-for-ri="1252004" type="text/json">{"id":1252004,"name":"Kali Linux","url":"https://www.academia.edu/Documents/in/Kali_Linux?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36765420]'), work: {"id":36765420,"title":"Guide To Kali Linux.pdf","created_at":"2018-06-02T10:49:24.310-07:00","url":"https://www.academia.edu/36765420/Guide_To_Kali_Linux_pdf?f_ri=115676","dom_id":"work_36765420","summary":null,"downloadable_attachments":[{"id":56712382,"asset_id":36765420,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":8104449,"first_name":"Muhammad","last_name":"Andyk Maulana","domain_name":"staiali","page_name":"MuhammadAndykMaulana","display_name":"Muhammad Andyk Maulana","profile_url":"https://staiali.academia.edu/MuhammadAndykMaulana?f_ri=115676","photo":"https://0.academia-photos.com/8104449/10875064/12136483/s65_muhammad.maulana.jpg_oh_26956965bf14ce8d0ca6d493b5e3b44d_oe_56f6dac4"}],"research_interests":[{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":1252004,"name":"Kali Linux","url":"https://www.academia.edu/Documents/in/Kali_Linux?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_10511600 coauthored" data-work_id="10511600" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/10511600/Three_Controversies_on_Cyberwar_a_Critical_Perspective">Three Controversies on Cyberwar: a Critical Perspective</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">CANABARRO, D. R. ; BORNE, T. ; CEPIK, M. A. C. . Three Controversies on Cyberwar: a Critical Perspective. In: MPSA Annual Conference, 2013, Chicago - IL - Estados Unidos. MPSA Conference Paper Archive, 2013, on line. The spread of... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_10511600" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">CANABARRO, D. R. ; BORNE, T. ; CEPIK, M. A. C. . Three Controversies on Cyberwar: a Critical Perspective. In: MPSA Annual Conference, 2013, Chicago - IL - Estados Unidos. MPSA Conference Paper Archive, 2013, on line. <br /> <br />The spread of contemporary information and communication technologies among state and non-state actors adds new dimensions to the study of diffusion in global politics. The Digital Era brings about different challenges for national and international security policymaking, heating up academic and political debate surrounding the scope and the implications of the term cyberwar. This paper surveys the evolution of academic and technical production on cyberwar with the intention of providing background for the critical evaluation of the Brazilian case. Finally, it details the prospective research agenda that follows from the evaluation of the Brazilian case.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/10511600" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="dc0bed1cf8021840d11958ba35fab7f2" rel="nofollow" data-download="{&quot;attachment_id&quot;:36515523,&quot;asset_id&quot;:10511600,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/36515523/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7057100" href="https://independent.academia.edu/DiegoCanabarro">Diego Canabarro</a><script data-card-contents-for-user="7057100" type="text/json">{"id":7057100,"first_name":"Diego","last_name":"Canabarro","domain_name":"independent","page_name":"DiegoCanabarro","display_name":"Diego Canabarro","profile_url":"https://independent.academia.edu/DiegoCanabarro?f_ri=115676","photo":"https://0.academia-photos.com/7057100/2662669/3099510/s65_diego.canabarro.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-10511600">+1</span><div class="hidden js-additional-users-10511600"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://ufrgs.academia.edu/ThiagoBorne">Thiago Borne</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-10511600'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-10511600').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_10511600 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="10511600"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 10511600, container: ".js-paper-rank-work_10511600", }); });</script></li><li class="js-percentile-work_10511600 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 10511600; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_10511600"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_10511600 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="10511600"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 10511600; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=10511600]").text(description); $(".js-view-count-work_10511600").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_10511600").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="10511600"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="5523" rel="nofollow" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a>,&nbsp;<script data-card-contents-for-ri="5523" type="text/json">{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7822" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_Governance">Internet Governance</a>,&nbsp;<script data-card-contents-for-ri="7822" type="text/json">{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=10511600]'), work: {"id":10511600,"title":"Three Controversies on Cyberwar: a Critical Perspective","created_at":"2015-02-04T08:23:37.583-08:00","url":"https://www.academia.edu/10511600/Three_Controversies_on_Cyberwar_a_Critical_Perspective?f_ri=115676","dom_id":"work_10511600","summary":"CANABARRO, D. R. ; BORNE, T. ; CEPIK, M. A. C. . Three Controversies on Cyberwar: a Critical Perspective. In: MPSA Annual Conference, 2013, Chicago - IL - Estados Unidos. MPSA Conference Paper Archive, 2013, on line.\r\n\r\nThe spread of contemporary information and communication technologies among state and non-state actors adds new dimensions to the study of diffusion in global politics. The Digital Era brings about different challenges for national and international security policymaking, heating up academic and political debate surrounding the scope and the implications of the term cyberwar. This paper surveys the evolution of academic and technical production on cyberwar with the intention of providing background for the critical evaluation of the Brazilian case. Finally, it details the prospective research agenda that follows from the evaluation of the Brazilian case.","downloadable_attachments":[{"id":36515523,"asset_id":10511600,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7057100,"first_name":"Diego","last_name":"Canabarro","domain_name":"independent","page_name":"DiegoCanabarro","display_name":"Diego Canabarro","profile_url":"https://independent.academia.edu/DiegoCanabarro?f_ri=115676","photo":"https://0.academia-photos.com/7057100/2662669/3099510/s65_diego.canabarro.jpg"},{"id":4513567,"first_name":"Thiago","last_name":"Borne","domain_name":"ufrgs","page_name":"ThiagoBorne","display_name":"Thiago Borne","profile_url":"https://ufrgs.academia.edu/ThiagoBorne?f_ri=115676","photo":"https://0.academia-photos.com/4513567/1860726/14931858/s65_thiago.borne.jpg"}],"research_interests":[{"id":5523,"name":"Security Studies","url":"https://www.academia.edu/Documents/in/Security_Studies?f_ri=115676","nofollow":true},{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_37873621" data-work_id="37873621" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/37873621/SD_WAN_Threat_Landscape">SD-WAN Threat Landscape</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">Software Defined Wide Area Network (SD-WAN or SDWAN) is a modern conception and an attractive trend in network technologies. SD-WAN is defined as a specific application of software-defined networking (SDN) to WAN connections. There is... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_37873621" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">Software Defined Wide Area Network (SD-WAN or SDWAN) is a modern conception and an attractive trend in network technologies. SD-WAN is defined as a specific application of software-defined networking (SDN) to WAN connections. There is growing recognition that SDN and SD-WAN technologies not only expand features, but also expose new vulnerabilities. Unfortunately, at the present time, most vendors say that SD-WAN are perfectly safe, hardened, and fully protected. The goal of this paper is to understand SD-WAN threats using practical approach. We describe basic SD-WAN features and components, investigate an attack surface, explore various vendor features and their security, explain threats and vulnerabilities found in SD-WAN products. We also extend existing SDN threat models by describing new potential threats and attack vectors, provide examples, and consider high-level approaches for their mitigations. The provided results may be used by SD-WAN developers as a part of Secure Software Development Life Cycle (SSDLC), security researchers for penetration testing and vulnerability assessment, system integrators for secure design of SD-WAN solutions, and finally customers for secure deployment operations and configurations of SD-WAN enabled network. The main idea of this work is that SD-WAN threat model involves all traditional network and SDN threats, as well as new product-specific threats, appended by vendors which reinvent or introduce proprietary technologies immature from a security perspective.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/37873621" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="8f044152fe48403bce2f32283958dbec" rel="nofollow" data-download="{&quot;attachment_id&quot;:57880107,&quot;asset_id&quot;:37873621,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/57880107/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="24757337" href="https://miit.academia.edu/SergeyGordeychik">Sergey Gordeychik</a><script data-card-contents-for-user="24757337" type="text/json">{"id":24757337,"first_name":"Sergey","last_name":"Gordeychik","domain_name":"miit","page_name":"SergeyGordeychik","display_name":"Sergey Gordeychik","profile_url":"https://miit.academia.edu/SergeyGordeychik?f_ri=115676","photo":"https://0.academia-photos.com/24757337/13676370/31398319/s65_sergey.gordeychik.jpeg"}</script></span></span></li><li class="js-paper-rank-work_37873621 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="37873621"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 37873621, container: ".js-paper-rank-work_37873621", }); });</script></li><li class="js-percentile-work_37873621 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 37873621; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_37873621"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_37873621 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="37873621"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 37873621; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=37873621]").text(description); $(".js-view-count-work_37873621").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_37873621").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="37873621"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">8</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3703" rel="nofollow" href="https://www.academia.edu/Documents/in/Network_Security">Network Security</a>,&nbsp;<script data-card-contents-for-ri="3703" type="text/json">{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7439" rel="nofollow" href="https://www.academia.edu/Documents/in/Risk_and_Vulnerability">Risk and Vulnerability</a>,&nbsp;<script data-card-contents-for-ri="7439" type="text/json">{"id":7439,"name":"Risk and Vulnerability","url":"https://www.academia.edu/Documents/in/Risk_and_Vulnerability?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="13923" rel="nofollow" href="https://www.academia.edu/Documents/in/Computer_Security">Computer Security</a>,&nbsp;<script data-card-contents-for-ri="13923" type="text/json">{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="16823" rel="nofollow" href="https://www.academia.edu/Documents/in/Vulnerability">Vulnerability</a><script data-card-contents-for-ri="16823" type="text/json">{"id":16823,"name":"Vulnerability","url":"https://www.academia.edu/Documents/in/Vulnerability?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=37873621]'), work: {"id":37873621,"title":"SD-WAN Threat Landscape","created_at":"2018-11-28T22:45:31.592-08:00","url":"https://www.academia.edu/37873621/SD_WAN_Threat_Landscape?f_ri=115676","dom_id":"work_37873621","summary":"Software Defined Wide Area Network (SD-WAN or SDWAN) is a modern conception and an attractive trend in network technologies. SD-WAN is defined as a specific application of software-defined networking (SDN) to WAN connections. There is growing recognition that SDN and SD-WAN technologies not only expand features, but also expose new vulnerabilities. Unfortunately, at the present time, most vendors say that SD-WAN are perfectly safe, hardened, and fully protected. The goal of this paper is to understand SD-WAN threats using practical approach. We describe basic SD-WAN features and components, investigate an attack surface, explore various vendor features and their security, explain threats and vulnerabilities found in SD-WAN products. We also extend existing SDN threat models by describing new potential threats and attack vectors, provide examples, and consider high-level approaches for their mitigations. The provided results may be used by SD-WAN developers as a part of Secure Software Development Life Cycle (SSDLC), security researchers for penetration testing and vulnerability assessment, system integrators for secure design of SD-WAN solutions, and finally customers for secure deployment operations and configurations of SD-WAN enabled network. The main idea of this work is that SD-WAN threat model involves all traditional network and SDN threats, as well as new product-specific threats, appended by vendors which reinvent or introduce proprietary technologies immature from a security perspective.","downloadable_attachments":[{"id":57880107,"asset_id":37873621,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":24757337,"first_name":"Sergey","last_name":"Gordeychik","domain_name":"miit","page_name":"SergeyGordeychik","display_name":"Sergey Gordeychik","profile_url":"https://miit.academia.edu/SergeyGordeychik?f_ri=115676","photo":"https://0.academia-photos.com/24757337/13676370/31398319/s65_sergey.gordeychik.jpeg"}],"research_interests":[{"id":3703,"name":"Network Security","url":"https://www.academia.edu/Documents/in/Network_Security?f_ri=115676","nofollow":true},{"id":7439,"name":"Risk and Vulnerability","url":"https://www.academia.edu/Documents/in/Risk_and_Vulnerability?f_ri=115676","nofollow":true},{"id":13923,"name":"Computer Security","url":"https://www.academia.edu/Documents/in/Computer_Security?f_ri=115676","nofollow":true},{"id":16823,"name":"Vulnerability","url":"https://www.academia.edu/Documents/in/Vulnerability?f_ri=115676","nofollow":true},{"id":46738,"name":"Cybersecurity","url":"https://www.academia.edu/Documents/in/Cybersecurity?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"},{"id":387956,"name":"Threat Modeling","url":"https://www.academia.edu/Documents/in/Threat_Modeling?f_ri=115676"},{"id":1241236,"name":"Software Defined Networks (SDN)","url":"https://www.academia.edu/Documents/in/Software_Defined_Networks_SDN_?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_36374105" data-work_id="36374105" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/36374105/The_new_Requirement_for_a_Fifth_Dimension_of_war_Cyber_Intelligence_ICCWS2014_9th_International_Conference_on_Cyber_Warfare_and_Security_ICCWS_2014_9_2014">The new Requirement for a Fifth Dimension of war: Cyber Intelligence ICCWS2014-9th International Conference on Cyber Warfare &amp; Security: ICCWS 2014, 9, 2014.</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The new Requirement for a Fifth Dimension of war: Cyber Intelligence Gokhan Bayraktar ICCWS2014-9th International Conference on Cyber Warfare &amp; Security: ICCWS 2014, 9, 2014 The structure and operational domain of intelligence... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_36374105" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The new Requirement for a Fifth Dimension of war: Cyber Intelligence <br />Gokhan Bayraktar <br />ICCWS2014-9th International Conference on Cyber Warfare &amp; Security: ICCWS 2014, 9, 2014 <br />The structure and operational domain of intelligence concept has been evolving continuously in parallel to the change in threat perceptions since it became a discipline more than half a century back. The difficulties encountered in defining the Intelligence concept and its operational domain is a significant barrier to the construct of intelligence theory despite the steady transformation. It is observed that effective utilization of outer space and intelligence surveillance reconnaissance (ISR) functions, such as electronic‐war capabilities and remote detection, are as important as command control systems and warfare weapons in present day military expeditions, with respect to comparing military operational excellence and power. Moreover, it is also noticed that nations make use of invisible attacks and cyber space as a defense system during pre‐war, crisis and low intensity collisions period without employing conventional arms in addition to countries efforts to obtain new capabilities. All these developments brought a new approach to the war area. Indeed, specific intelligence started to dominate the field in comparison to conventional intelligence due to the quick progress in cyber space. Cyber‐attacks, which can be classified as an asymmetric warfare, are not only used as a support tool to conventional wars but also considered as an independent war type on its own so that it brings a new dimension to the military operations. It is predicted that attacks in cyber space will be more dangerous than conventional assaults because the usage of information technology spreads out quickly as well. Cyber‐attacks that usually target the information systems of the governments’ critical departments, are a great threat, especially for the nations that are heavily dependent on the cyber space domain. The importance of cyber‐attacks rise daily because the challenge to detect the source of the attack might be initiated through a wide spectrum of profiles ranging from simple individuals to complex organizations. Moreover, these attacks make a great impact despite their low cost. Furthermore, they are initiated through invisible methods where conventional weapons are not even utilized. Hence, the concept of cyber intelligence looms large against this threat. This paper strives to explain that cyber‐attacks can be classified as a new type of warfare, because it threatens national securities and happens in cyber space, a domain that does not have any defined borders in international relations. In addition to the above, this study defines cyber intelligence concept and its operational domain as well as puts forth the methodology for consideration in order to gain the advantage in cyber‐attacks and to make analysis on the threat.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/36374105" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="6f5eb235d2735de6a3d286143c52f50e" rel="nofollow" data-download="{&quot;attachment_id&quot;:59227609,&quot;asset_id&quot;:36374105,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/59227609/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="77652044" href="https://ankara.academia.edu/GokhanBayraktar">Gökhan Bayraktar</a><script data-card-contents-for-user="77652044" type="text/json">{"id":77652044,"first_name":"Gökhan","last_name":"Bayraktar","domain_name":"ankara","page_name":"GokhanBayraktar","display_name":"Gökhan Bayraktar","profile_url":"https://ankara.academia.edu/GokhanBayraktar?f_ri=115676","photo":"/images/s65_no_pic.png"}</script></span></span></li><li class="js-paper-rank-work_36374105 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="36374105"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 36374105, container: ".js-paper-rank-work_36374105", }); });</script></li><li class="js-percentile-work_36374105 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 36374105; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_36374105"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_36374105 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="36374105"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 36374105; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=36374105]").text(description); $(".js-view-count-work_36374105").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_36374105").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="36374105"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">5</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="2674" rel="nofollow" href="https://www.academia.edu/Documents/in/Intelligence">Intelligence</a>,&nbsp;<script data-card-contents-for-ri="2674" type="text/json">{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="272158" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Threats">Cyber Threats</a>,&nbsp;<script data-card-contents-for-ri="272158" type="text/json">{"id":272158,"name":"Cyber Threats","url":"https://www.academia.edu/Documents/in/Cyber_Threats?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="511848" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Space">Cyber Space</a><script data-card-contents-for-ri="511848" type="text/json">{"id":511848,"name":"Cyber Space","url":"https://www.academia.edu/Documents/in/Cyber_Space?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=36374105]'), work: {"id":36374105,"title":"The new Requirement for a Fifth Dimension of war: Cyber Intelligence ICCWS2014-9th International Conference on Cyber Warfare \u0026 Security: ICCWS 2014, 9, 2014.","created_at":"2018-04-10T03:10:58.397-07:00","url":"https://www.academia.edu/36374105/The_new_Requirement_for_a_Fifth_Dimension_of_war_Cyber_Intelligence_ICCWS2014_9th_International_Conference_on_Cyber_Warfare_and_Security_ICCWS_2014_9_2014?f_ri=115676","dom_id":"work_36374105","summary":"\r\nThe new Requirement for a Fifth Dimension of war: Cyber Intelligence\r\nGokhan Bayraktar\r\nICCWS2014-9th International Conference on Cyber Warfare \u0026 Security: ICCWS 2014, 9, 2014\r\nThe structure and operational domain of intelligence concept has been evolving continuously in parallel to the change in threat perceptions since it became a discipline more than half a century back. The difficulties encountered in defining the Intelligence concept and its operational domain is a significant barrier to the construct of intelligence theory despite the steady transformation. It is observed that effective utilization of outer space and intelligence surveillance reconnaissance (ISR) functions, such as electronic‐war capabilities and remote detection, are as important as command control systems and warfare weapons in present day military expeditions, with respect to comparing military operational excellence and power. Moreover, it is also noticed that nations make use of invisible attacks and cyber space as a defense system during pre‐war, crisis and low intensity collisions period without employing conventional arms in addition to countries efforts to obtain new capabilities. All these developments brought a new approach to the war area. Indeed, specific intelligence started to dominate the field in comparison to conventional intelligence due to the quick progress in cyber space. Cyber‐attacks, which can be classified as an asymmetric warfare, are not only used as a support tool to conventional wars but also considered as an independent war type on its own so that it brings a new dimension to the military operations. It is predicted that attacks in cyber space will be more dangerous than conventional assaults because the usage of information technology spreads out quickly as well. Cyber‐attacks that usually target the information systems of the governments’ critical departments, are a great threat, especially for the nations that are heavily dependent on the cyber space domain. The importance of cyber‐attacks rise daily because the challenge to detect the source of the attack might be initiated through a wide spectrum of profiles ranging from simple individuals to complex organizations. Moreover, these attacks make a great impact despite their low cost. Furthermore, they are initiated through invisible methods where conventional weapons are not even utilized. Hence, the concept of cyber intelligence looms large against this threat. This paper strives to explain that cyber‐attacks can be classified as a new type of warfare, because it threatens national securities and happens in cyber space, a domain that does not have any defined borders in international relations. In addition to the above, this study defines cyber intelligence concept and its operational domain as well as puts forth the methodology for consideration in order to gain the advantage in cyber‐attacks and to make analysis on the threat.","downloadable_attachments":[{"id":59227609,"asset_id":36374105,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":77652044,"first_name":"Gökhan","last_name":"Bayraktar","domain_name":"ankara","page_name":"GokhanBayraktar","display_name":"Gökhan Bayraktar","profile_url":"https://ankara.academia.edu/GokhanBayraktar?f_ri=115676","photo":"/images/s65_no_pic.png"}],"research_interests":[{"id":2674,"name":"Intelligence","url":"https://www.academia.edu/Documents/in/Intelligence?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":272158,"name":"Cyber Threats","url":"https://www.academia.edu/Documents/in/Cyber_Threats?f_ri=115676","nofollow":true},{"id":511848,"name":"Cyber Space","url":"https://www.academia.edu/Documents/in/Cyber_Space?f_ri=115676","nofollow":true},{"id":526068,"name":"Cyber War","url":"https://www.academia.edu/Documents/in/Cyber_War?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_14300325 coauthored" data-work_id="14300325" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/14300325/Cyberwar_Clausewitzian_Encounters">Cyberwar: Clausewitzian Encounters</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">As Clausewitz’s masterpiece suggests, language matters for how states conceptualize and plan for war. ‘Cyberwar’, now on the lips of nearly every national security policymaker, may turn out to be a misnomer. CEPIK, Marco; CANABARRO,... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_14300325" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">As Clausewitz’s masterpiece suggests, language matters for how states conceptualize and plan for war. ‘Cyberwar’, now on the lips of nearly every national security policymaker, may turn out to be a misnomer. <br /> <br />CEPIK, Marco; CANABARRO, Diego; BORNE, Thiago. Cyberwar: Clausewitzian Encounters. Space &amp; Defense, v. 8, n. 1, 2015, p. 19-34.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/14300325" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="98fb69df370e19ea9446791866d55cdc" rel="nofollow" data-download="{&quot;attachment_id&quot;:38261932,&quot;asset_id&quot;:14300325,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/38261932/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="7057100" href="https://independent.academia.edu/DiegoCanabarro">Diego Canabarro</a><script data-card-contents-for-user="7057100" type="text/json">{"id":7057100,"first_name":"Diego","last_name":"Canabarro","domain_name":"independent","page_name":"DiegoCanabarro","display_name":"Diego Canabarro","profile_url":"https://independent.academia.edu/DiegoCanabarro?f_ri=115676","photo":"https://0.academia-photos.com/7057100/2662669/3099510/s65_diego.canabarro.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-14300325">+1</span><div class="hidden js-additional-users-14300325"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://ufrgs.academia.edu/ThiagoBorne">Thiago Borne</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-14300325'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-14300325').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_14300325 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="14300325"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 14300325, container: ".js-paper-rank-work_14300325", }); });</script></li><li class="js-percentile-work_14300325 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 14300325; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_14300325"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_14300325 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="14300325"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 14300325; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=14300325]").text(description); $(".js-view-count-work_14300325").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_14300325").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="14300325"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">3</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="3705" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Security">International Security</a>,&nbsp;<script data-card-contents-for-ri="3705" type="text/json">{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="41862" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyberwarfare">Cyberwarfare</a>,&nbsp;<script data-card-contents-for-ri="41862" type="text/json">{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a><script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=14300325]'), work: {"id":14300325,"title":"Cyberwar: Clausewitzian Encounters","created_at":"2015-07-22T09:52:09.953-07:00","url":"https://www.academia.edu/14300325/Cyberwar_Clausewitzian_Encounters?f_ri=115676","dom_id":"work_14300325","summary":"As Clausewitz’s masterpiece suggests, language matters for how states conceptualize and plan for war. ‘Cyberwar’, now on the lips of nearly every national security policymaker, may turn out to be a misnomer. \r\n\r\nCEPIK, Marco; CANABARRO, Diego; BORNE, Thiago. Cyberwar: Clausewitzian Encounters. Space \u0026 Defense, v. 8, n. 1, 2015, p. 19-34.","downloadable_attachments":[{"id":38261932,"asset_id":14300325,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":7057100,"first_name":"Diego","last_name":"Canabarro","domain_name":"independent","page_name":"DiegoCanabarro","display_name":"Diego Canabarro","profile_url":"https://independent.academia.edu/DiegoCanabarro?f_ri=115676","photo":"https://0.academia-photos.com/7057100/2662669/3099510/s65_diego.canabarro.jpg"},{"id":4513567,"first_name":"Thiago","last_name":"Borne","domain_name":"ufrgs","page_name":"ThiagoBorne","display_name":"Thiago Borne","profile_url":"https://ufrgs.academia.edu/ThiagoBorne?f_ri=115676","photo":"https://0.academia-photos.com/4513567/1860726/14931858/s65_thiago.borne.jpg"}],"research_interests":[{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=115676","nofollow":true},{"id":41862,"name":"Cyberwarfare","url":"https://www.academia.edu/Documents/in/Cyberwarfare?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_18751246 coauthored" data-work_id="18751246" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/18751246/Report_Global_Internet_Governance_and_International_Security_in_the_Field_of_the_ICT_Use_">Report &quot;Global Internet Governance and International Security in the Field of the ICT Use&quot;</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The Report “Global Internet Governance and International Security in the Field of ICT Use” was prepared by the PIR Center’s Consultant Oleg Demidov with contribution from the Working Group on International Information Security and Global... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_18751246" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The Report “Global Internet Governance and International Security in the Field of ICT Use” was prepared by the PIR Center’s Consultant Oleg Demidov with contribution from the Working Group on International Information Security and Global Internet Governance under the PIR Center’s Advisory Board. The PIR Center is a leading nongovernmental think tank conducting research in the field of global security, and a partner organization of PIR Press.<br /><br />The Report aims to identify the key challenges to international security in the field of the use of ICTs at global and national level, and to highlight the interests and goals of the international community including nation states and other relevant stakeholders in the field of Internet governance.<br /><br />Target audience of the Report includes representatives of organizations engaged in iscussions and policy making on the issues of information society, cybersecurity, Internet governance, critical infrastructure protection and cyber governance. <br /><br />The Report was also designed for and oriented to serve academic institutions, including universities and think tanks with a focus on international law, foreign policy and global security. The Report’s materials could be of interest for graduate and postgraduate students with relevant specialization, as well as for experts from technical organizations.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/18751246" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="ee9b67fcb5e0118226948aaefcc63679" rel="nofollow" data-download="{&quot;attachment_id&quot;:40235432,&quot;asset_id&quot;:18751246,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/40235432/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="3402783" href="https://lse.academia.edu/AlexandraKulikova">Alexandra Kulikova</a><script data-card-contents-for-user="3402783" type="text/json">{"id":3402783,"first_name":"Alexandra","last_name":"Kulikova","domain_name":"lse","page_name":"AlexandraKulikova","display_name":"Alexandra Kulikova","profile_url":"https://lse.academia.edu/AlexandraKulikova?f_ri=115676","photo":"https://0.academia-photos.com/3402783/1151924/166129713/s65_alexandra.kulikova.jpg"}</script></span></span><span class="u-displayInlineBlock InlineList-item-text">&nbsp;and&nbsp;<span class="u-textDecorationUnderline u-clickable InlineList-item-text js-work-more-authors-18751246">+1</span><div class="hidden js-additional-users-18751246"><div><span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a href="https://mgimo.academia.edu/OlegDemidov">Oleg Demidov</a></span></div></div></span><script>(function(){ var popoverSettings = { el: $('.js-work-more-authors-18751246'), placement: 'bottom', hide_delay: 200, html: true, content: function(){ return $('.js-additional-users-18751246').html(); } } new HoverPopover(popoverSettings); })();</script></li><li class="js-paper-rank-work_18751246 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="18751246"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 18751246, container: ".js-paper-rank-work_18751246", }); });</script></li><li class="js-percentile-work_18751246 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 18751246; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_18751246"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_18751246 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="18751246"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 18751246; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=18751246]").text(description); $(".js-view-count-work_18751246").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_18751246").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="18751246"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">6</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="797" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Relations">International Relations</a>,&nbsp;<script data-card-contents-for-ri="797" type="text/json">{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="982" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyberlaw">Cyberlaw</a>,&nbsp;<script data-card-contents-for-ri="982" type="text/json">{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="3705" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Security">International Security</a>,&nbsp;<script data-card-contents-for-ri="3705" type="text/json">{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="7822" rel="nofollow" href="https://www.academia.edu/Documents/in/Internet_Governance">Internet Governance</a><script data-card-contents-for-ri="7822" type="text/json">{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=18751246]'), work: {"id":18751246,"title":"Report \"Global Internet Governance and International Security in the Field of the ICT Use\"","created_at":"2015-11-21T06:23:29.796-08:00","url":"https://www.academia.edu/18751246/Report_Global_Internet_Governance_and_International_Security_in_the_Field_of_the_ICT_Use_?f_ri=115676","dom_id":"work_18751246","summary":"The Report “Global Internet Governance and International Security in the Field of ICT Use” was prepared by the PIR Center’s Consultant Oleg Demidov with contribution from the Working Group on International Information Security and Global Internet Governance under the PIR Center’s Advisory Board. The PIR Center is a leading nongovernmental think tank conducting research in the field of global security, and a partner organization of PIR Press.\n\nThe Report aims to identify the key challenges to international security in the field of the use of ICTs at global and national level, and to highlight the interests and goals of the international community including nation states and other relevant stakeholders in the field of Internet governance.\n\nTarget audience of the Report includes representatives of organizations engaged in iscussions and policy making on the issues of information society, cybersecurity, Internet governance, critical infrastructure protection and cyber governance. \n\nThe Report was also designed for and oriented to serve academic institutions, including universities and think tanks with a focus on international law, foreign policy and global security. The Report’s materials could be of interest for graduate and postgraduate students with relevant specialization, as well as for experts from technical organizations. ","downloadable_attachments":[{"id":40235432,"asset_id":18751246,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":3402783,"first_name":"Alexandra","last_name":"Kulikova","domain_name":"lse","page_name":"AlexandraKulikova","display_name":"Alexandra Kulikova","profile_url":"https://lse.academia.edu/AlexandraKulikova?f_ri=115676","photo":"https://0.academia-photos.com/3402783/1151924/166129713/s65_alexandra.kulikova.jpg"},{"id":1335120,"first_name":"Oleg","last_name":"Demidov","domain_name":"mgimo","page_name":"OlegDemidov","display_name":"Oleg Demidov","profile_url":"https://mgimo.academia.edu/OlegDemidov?f_ri=115676","photo":"https://0.academia-photos.com/1335120/491356/11987666/s65_oleg.demidov.jpg"}],"research_interests":[{"id":797,"name":"International Relations","url":"https://www.academia.edu/Documents/in/International_Relations?f_ri=115676","nofollow":true},{"id":982,"name":"Cyberlaw","url":"https://www.academia.edu/Documents/in/Cyberlaw?f_ri=115676","nofollow":true},{"id":3705,"name":"International Security","url":"https://www.academia.edu/Documents/in/International_Security?f_ri=115676","nofollow":true},{"id":7822,"name":"Internet Governance","url":"https://www.academia.edu/Documents/in/Internet_Governance?f_ri=115676","nofollow":true},{"id":11337,"name":"Cyber Warfare","url":"https://www.academia.edu/Documents/in/Cyber_Warfare?f_ri=115676"},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676"}]}, }) } })();</script></ul></li></ul></div></div><div class="u-borderBottom1 u-borderColorGrayLighter"><div class="clearfix u-pv7x u-mb0x js-work-card work_42605635" data-work_id="42605635" itemscope="itemscope" itemtype="https://schema.org/ScholarlyArticle"><div class="header"><div class="title u-fontSerif u-fs22 u-lineHeight1_3"><a class="u-tcGrayDarkest js-work-link" href="https://www.academia.edu/42605635/Hybrid_nature_of_modern_threats_for_cybersecurity_and_information_security">Hybrid nature of modern threats for cybersecurity and information security</a></div></div><div class="u-pb4x u-mt3x"><div class="summary u-fs14 u-fw300 u-lineHeight1_5 u-tcGrayDarkest"><div class="summarized">The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the... <a class="more_link u-tcGrayDark u-linkUnstyled" data-container=".work_42605635" data-show=".complete" data-hide=".summarized" data-more-link-behavior="true" href="#">more</a></div><div class="complete hidden">The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the emerging paradigm. The notions of cyber security, information security in relation to the cyber-physical systems security, and information security in broader sense which describes safeguarding the information flows to cyberspace and media were considered. Authors explore modern manifestations of these threats, and then dive into the hybrid nature of the threats to cyber-and information security, describing cyber threats and cyber attacks as merged with existing &#39;conventional&#39; techniques. The examination of hybrids threats-the cyber leverages to diplomacy, the practice of cyber retaliation, cyber sabotage and espionage, cyber weapons and the cyber arms race-was given.</div></div></div><ul class="InlineList u-ph0x u-fs13"><li class="InlineList-item logged_in_only"><div class="share_on_academia_work_button"><a class="academia_share Button Button--inverseBlue Button--sm js-bookmark-button" data-academia-share="Work/42605635" data-share-source="work_strip" data-spinner="small_white_hide_contents"><i class="fa fa-plus"></i><span class="work-strip-link-text u-ml1x" data-content="button_text">Bookmark</span></a></div></li><li class="InlineList-item"><div class="download"><a id="43aad9fa283a652c89da07c130409e9b" rel="nofollow" data-download="{&quot;attachment_id&quot;:62809238,&quot;asset_id&quot;:42605635,&quot;asset_type&quot;:&quot;Work&quot;,&quot;always_allow_download&quot;:false,&quot;track&quot;:null,&quot;button_location&quot;:&quot;work_strip&quot;,&quot;source&quot;:null,&quot;hide_modal&quot;:null}" class="Button Button--sm Button--inverseGreen js-download-button prompt_button doc_download" href="https://www.academia.edu/attachments/62809238/download_file?st=MTczODQ0MTg5NCw4LjIyMi4yMDguMTQ2&s=work_strip"><i class="fa fa-arrow-circle-o-down fa-lg"></i><span class="u-textUppercase u-ml1x" data-content="button_text">Download</span></a></div></li><li class="InlineList-item"><ul class="InlineList InlineList--bordered u-ph0x"><li class="InlineList-item InlineList-item--bordered"><span class="InlineList-item-text">by&nbsp;<span itemscope="itemscope" itemprop="author" itemtype="https://schema.org/Person"><a class="u-tcGrayDark u-fw700" data-has-card-for-user="28124614" href="https://pontsbschool.academia.edu/Tsaruk">Oleksandr Tsaruk</a><script data-card-contents-for-user="28124614" type="text/json">{"id":28124614,"first_name":"Oleksandr","last_name":"Tsaruk","domain_name":"pontsbschool","page_name":"Tsaruk","display_name":"Oleksandr Tsaruk","profile_url":"https://pontsbschool.academia.edu/Tsaruk?f_ri=115676","photo":"https://0.academia-photos.com/28124614/10585090/29261901/s65_oleksandr.tsaruk.jpg"}</script></span></span></li><li class="js-paper-rank-work_42605635 InlineList-item InlineList-item--bordered hidden"><span class="js-paper-rank-view hidden u-tcGrayDark" data-paper-rank-work-id="42605635"><i class="u-m1x fa fa-bar-chart"></i><strong class="js-paper-rank"></strong></span><script>$(function() { new Works.PaperRankView({ workId: 42605635, container: ".js-paper-rank-work_42605635", }); });</script></li><li class="js-percentile-work_42605635 InlineList-item InlineList-item--bordered hidden u-tcGrayDark"><span class="percentile-widget hidden"><span class="u-mr2x percentile-widget" style="display: none">•</span><span class="u-mr2x work-percentile"></span></span><script>$(function () { var workId = 42605635; window.Academia.workPercentilesFetcher.queue(workId, function (percentileText) { var container = $(".js-percentile-work_42605635"); container.find('.work-percentile').text(percentileText.charAt(0).toUpperCase() + percentileText.slice(1)); container.find('.percentile-widget').show(); container.find('.percentile-widget').removeClass('hidden'); }); });</script></li><li class="js-view-count-work_42605635 InlineList-item InlineList-item--bordered hidden"><div><span><span class="js-view-count view-count u-mr2x" data-work-id="42605635"><i class="fa fa-spinner fa-spin"></i></span><script>$(function () { var workId = 42605635; window.Academia.workViewCountsFetcher.queue(workId, function (count) { var description = window.$h.commaizeInt(count) + " " + window.$h.pluralize(count, 'View'); $(".js-view-count[data-work-id=42605635]").text(description); $(".js-view-count-work_42605635").attr('title', description).tooltip(); }); });</script></span><script>$(function() { $(".js-view-count-work_42605635").removeClass('hidden') })</script></div></li><li class="InlineList-item u-positionRelative" style="max-width: 250px"><div class="u-positionAbsolute" data-has-card-for-ri-list="42605635"><i class="fa fa-tag InlineList-item-icon u-positionRelative"></i>&nbsp;&nbsp;<a class="InlineList-item-text u-positionRelative">4</a>&nbsp;&nbsp;</div><span class="InlineList-item-text u-textTruncate u-pl9x"><a class="InlineList-item-text" data-has-card-for-ri="1283" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a>,&nbsp;<script data-card-contents-for-ri="1283" type="text/json">{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="18573" rel="nofollow" href="https://www.academia.edu/Documents/in/Categorization">Categorization</a>,&nbsp;<script data-card-contents-for-ri="18573" type="text/json">{"id":18573,"name":"Categorization","url":"https://www.academia.edu/Documents/in/Categorization?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="115676" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Security">Cyber Security</a>,&nbsp;<script data-card-contents-for-ri="115676" type="text/json">{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true}</script><a class="InlineList-item-text" data-has-card-for-ri="397947" rel="nofollow" href="https://www.academia.edu/Documents/in/Threats">Threats</a><script data-card-contents-for-ri="397947" type="text/json">{"id":397947,"name":"Threats","url":"https://www.academia.edu/Documents/in/Threats?f_ri=115676","nofollow":true}</script></span></li><script>(function(){ if (true) { new Aedu.ResearchInterestListCard({ el: $('*[data-has-card-for-ri-list=42605635]'), work: {"id":42605635,"title":"Hybrid nature of modern threats for cybersecurity and information security","created_at":"2020-04-03T13:24:39.036-07:00","url":"https://www.academia.edu/42605635/Hybrid_nature_of_modern_threats_for_cybersecurity_and_information_security?f_ri=115676","dom_id":"work_42605635","summary":"The paper deals with phenomena arising from radical disruptions in numerous spheres of human activity that challenge the conventional understanding of security. Authors endeavour to contribute to understanding of these changes and the emerging paradigm. The notions of cyber security, information security in relation to the cyber-physical systems security, and information security in broader sense which describes safeguarding the information flows to cyberspace and media were considered. Authors explore modern manifestations of these threats, and then dive into the hybrid nature of the threats to cyber-and information security, describing cyber threats and cyber attacks as merged with existing 'conventional' techniques. The examination of hybrids threats-the cyber leverages to diplomacy, the practice of cyber retaliation, cyber sabotage and espionage, cyber weapons and the cyber arms race-was given.","downloadable_attachments":[{"id":62809238,"asset_id":42605635,"asset_type":"Work","always_allow_download":false}],"ordered_authors":[{"id":28124614,"first_name":"Oleksandr","last_name":"Tsaruk","domain_name":"pontsbschool","page_name":"Tsaruk","display_name":"Oleksandr Tsaruk","profile_url":"https://pontsbschool.academia.edu/Tsaruk?f_ri=115676","photo":"https://0.academia-photos.com/28124614/10585090/29261901/s65_oleksandr.tsaruk.jpg"}],"research_interests":[{"id":1283,"name":"Information Security","url":"https://www.academia.edu/Documents/in/Information_Security?f_ri=115676","nofollow":true},{"id":18573,"name":"Categorization","url":"https://www.academia.edu/Documents/in/Categorization?f_ri=115676","nofollow":true},{"id":115676,"name":"Cyber Security","url":"https://www.academia.edu/Documents/in/Cyber_Security?f_ri=115676","nofollow":true},{"id":397947,"name":"Threats","url":"https://www.academia.edu/Documents/in/Threats?f_ri=115676","nofollow":true}]}, }) } })();</script></ul></li></ul></div></div></div><div class="u-taCenter Pagination"><ul class="pagination"><li class="next_page"><a href="/Documents/in/Cyber_Security?after=50%2C42605635" rel="next">Next</a></li><li class="last next"><a href="/Documents/in/Cyber_Security?page=last">Last &raquo;</a></li></ul></div></div><div class="hidden-xs hidden-sm"><div class="u-pl6x"><div style="width: 300px;"><div class="panel panel-flat u-mt7x"><div class="panel-heading u-p5x"><div class="u-tcGrayDark u-taCenter u-fw700 u-textUppercase">Related Topics</div></div><ul class="list-group"><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Warfare">Cyber Warfare</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="11337">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="11337">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Terrorism">Cyber Terrorism</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="11336">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="11336">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybersecurity">Cybersecurity</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="46738">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="46738">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/International_Security">International Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="3705">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="3705">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Security_Studies">Security Studies</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="5523">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="5523">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyberwarfare">Cyberwarfare</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="41862">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="41862">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_crime">Cyber crime</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="20594">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="20594">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Cybercrimes">Cybercrimes</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="2511">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="2511">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Information_Security">Information Security</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="1283">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="1283">Following</a></div></li><li class="list-group-item media_v2 u-mt0x u-p3x"><div class="media-body"><div class="u-tcGrayDarker u-fw700"><a class="u-tcGrayDarker" rel="nofollow" href="https://www.academia.edu/Documents/in/Cyber_Physical_Systems">Cyber Physical Systems</a></div></div><div class="media-right media-middle"><a class="u-tcGreen u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-follow-ri-id="65430">Follow</a><a class="u-tcGray u-textDecorationNone u-linkUnstyled u-fw500 hidden" data-unfollow-ri-id="65430">Following</a></div></li></ul></div></div></div></div></div></div><script>// MIT License // Copyright © 2011 Sebastian Tschan, https://blueimp.net // Permission is hereby granted, free of charge, to any person obtaining a copy of // this software and associated documentation files (the "Software"), to deal in // the Software without restriction, including without limitation the rights to // use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of // the Software, and to permit persons to whom the Software is furnished to do so, // subject to the following conditions: // The above copyright notice and this permission notice shall be included in all // copies or substantial portions of the Software. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS // FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR // COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER // IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN // CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. !function(n){"use strict";function d(n,t){var r=(65535&n)+(65535&t);return(n>>16)+(t>>16)+(r>>16)<<16|65535&r}function f(n,t,r,e,o,u){return d((c=d(d(t,n),d(e,u)))<<(f=o)|c>>>32-f,r);var c,f}function l(n,t,r,e,o,u,c){return f(t&r|~t&e,n,t,o,u,c)}function v(n,t,r,e,o,u,c){return f(t&e|r&~e,n,t,o,u,c)}function g(n,t,r,e,o,u,c){return f(t^r^e,n,t,o,u,c)}function m(n,t,r,e,o,u,c){return f(r^(t|~e),n,t,o,u,c)}function i(n,t){var r,e,o,u;n[t>>5]|=128<<t%32,n[14+(t+64>>>9<<4)]=t;for(var c=1732584193,f=-271733879,i=-1732584194,a=271733878,h=0;h<n.length;h+=16)c=l(r=c,e=f,o=i,u=a,n[h],7,-680876936),a=l(a,c,f,i,n[h+1],12,-389564586),i=l(i,a,c,f,n[h+2],17,606105819),f=l(f,i,a,c,n[h+3],22,-1044525330),c=l(c,f,i,a,n[h+4],7,-176418897),a=l(a,c,f,i,n[h+5],12,1200080426),i=l(i,a,c,f,n[h+6],17,-1473231341),f=l(f,i,a,c,n[h+7],22,-45705983),c=l(c,f,i,a,n[h+8],7,1770035416),a=l(a,c,f,i,n[h+9],12,-1958414417),i=l(i,a,c,f,n[h+10],17,-42063),f=l(f,i,a,c,n[h+11],22,-1990404162),c=l(c,f,i,a,n[h+12],7,1804603682),a=l(a,c,f,i,n[h+13],12,-40341101),i=l(i,a,c,f,n[h+14],17,-1502002290),c=v(c,f=l(f,i,a,c,n[h+15],22,1236535329),i,a,n[h+1],5,-165796510),a=v(a,c,f,i,n[h+6],9,-1069501632),i=v(i,a,c,f,n[h+11],14,643717713),f=v(f,i,a,c,n[h],20,-373897302),c=v(c,f,i,a,n[h+5],5,-701558691),a=v(a,c,f,i,n[h+10],9,38016083),i=v(i,a,c,f,n[h+15],14,-660478335),f=v(f,i,a,c,n[h+4],20,-405537848),c=v(c,f,i,a,n[h+9],5,568446438),a=v(a,c,f,i,n[h+14],9,-1019803690),i=v(i,a,c,f,n[h+3],14,-187363961),f=v(f,i,a,c,n[h+8],20,1163531501),c=v(c,f,i,a,n[h+13],5,-1444681467),a=v(a,c,f,i,n[h+2],9,-51403784),i=v(i,a,c,f,n[h+7],14,1735328473),c=g(c,f=v(f,i,a,c,n[h+12],20,-1926607734),i,a,n[h+5],4,-378558),a=g(a,c,f,i,n[h+8],11,-2022574463),i=g(i,a,c,f,n[h+11],16,1839030562),f=g(f,i,a,c,n[h+14],23,-35309556),c=g(c,f,i,a,n[h+1],4,-1530992060),a=g(a,c,f,i,n[h+4],11,1272893353),i=g(i,a,c,f,n[h+7],16,-155497632),f=g(f,i,a,c,n[h+10],23,-1094730640),c=g(c,f,i,a,n[h+13],4,681279174),a=g(a,c,f,i,n[h],11,-358537222),i=g(i,a,c,f,n[h+3],16,-722521979),f=g(f,i,a,c,n[h+6],23,76029189),c=g(c,f,i,a,n[h+9],4,-640364487),a=g(a,c,f,i,n[h+12],11,-421815835),i=g(i,a,c,f,n[h+15],16,530742520),c=m(c,f=g(f,i,a,c,n[h+2],23,-995338651),i,a,n[h],6,-198630844),a=m(a,c,f,i,n[h+7],10,1126891415),i=m(i,a,c,f,n[h+14],15,-1416354905),f=m(f,i,a,c,n[h+5],21,-57434055),c=m(c,f,i,a,n[h+12],6,1700485571),a=m(a,c,f,i,n[h+3],10,-1894986606),i=m(i,a,c,f,n[h+10],15,-1051523),f=m(f,i,a,c,n[h+1],21,-2054922799),c=m(c,f,i,a,n[h+8],6,1873313359),a=m(a,c,f,i,n[h+15],10,-30611744),i=m(i,a,c,f,n[h+6],15,-1560198380),f=m(f,i,a,c,n[h+13],21,1309151649),c=m(c,f,i,a,n[h+4],6,-145523070),a=m(a,c,f,i,n[h+11],10,-1120210379),i=m(i,a,c,f,n[h+2],15,718787259),f=m(f,i,a,c,n[h+9],21,-343485551),c=d(c,r),f=d(f,e),i=d(i,o),a=d(a,u);return[c,f,i,a]}function a(n){for(var t="",r=32*n.length,e=0;e<r;e+=8)t+=String.fromCharCode(n[e>>5]>>>e%32&255);return t}function h(n){var t=[];for(t[(n.length>>2)-1]=void 0,e=0;e<t.length;e+=1)t[e]=0;for(var r=8*n.length,e=0;e<r;e+=8)t[e>>5]|=(255&n.charCodeAt(e/8))<<e%32;return t}function e(n){for(var t,r="0123456789abcdef",e="",o=0;o<n.length;o+=1)t=n.charCodeAt(o),e+=r.charAt(t>>>4&15)+r.charAt(15&t);return e}function r(n){return unescape(encodeURIComponent(n))}function o(n){return a(i(h(t=r(n)),8*t.length));var t}function u(n,t){return function(n,t){var r,e,o=h(n),u=[],c=[];for(u[15]=c[15]=void 0,16<o.length&&(o=i(o,8*n.length)),r=0;r<16;r+=1)u[r]=909522486^o[r],c[r]=1549556828^o[r];return e=i(u.concat(h(t)),512+8*t.length),a(i(c.concat(e),640))}(r(n),r(t))}function t(n,t,r){return t?r?u(t,n):e(u(t,n)):r?o(n):e(o(n))}"function"==typeof define&&define.amd?define(function(){return t}):"object"==typeof module&&module.exports?module.exports=t:n.md5=t}(this);</script><script>window.AbTest = (function() { return { 'ab_test': (uniqueId, test_name, buckets) => { let override = new URLSearchParams(window.location.search).get(`ab_test[${test_name}]`); if ( override ) { return override; } const bucketNames = buckets.map((bucket) => { return typeof bucket === 'string' ? bucket : Object.keys(bucket)[0]; }); const weights = buckets.map((bucket) => { return typeof bucket === 'string' ? 1 : Object.values(bucket)[0]; }); const total = weights.reduce((sum, weight) => sum + weight); const hash = md5(`${uniqueId}${test_name}`); const hashNum = parseInt(hash.slice(-12), 16); let bucketPoint = total * (hashNum % 100000) / 100000; const bucket = bucketNames.find((_, i) => { if (weights[i] > bucketPoint) { return true; } bucketPoint -= weights[i]; return false; }); return bucket; } }; })();</script><div data-auto_select="false" data-client_id="331998490334-rsn3chp12mbkiqhl6e7lu2q0mlbu0f1b" data-landing_url="https://www.academia.edu/Documents/in/Cyber_Security" data-login_uri="https://www.academia.edu/registrations/google_one_tap" data-moment_callback="onGoogleOneTapEvent" id="g_id_onload"></div><script>function onGoogleOneTapEvent(event) { var momentType = event.getMomentType(); var momentReason = null; if (event.isNotDisplayed()) { momentReason = event.getNotDisplayedReason(); } else if (event.isSkippedMoment()) { momentReason = event.getSkippedReason(); } else if (event.isDismissedMoment()) { momentReason = event.getDismissedReason(); } Aedu.arbitraryEvents.write('GoogleOneTapEvent', { moment_type: momentType, moment_reason: momentReason, }); }</script><script>(function() { var auvid = unescape( document.cookie .split(/; ?/) .find((s) => s.startsWith('auvid')) .substring(6)); var bucket = AbTest.ab_test(auvid, 'lo_ri_one_tap_google_sign_on', ['control', 'one_tap_google_sign_on']); if (bucket === 'control') return; var oneTapTag = document.createElement('script') oneTapTag.async = true oneTapTag.defer = true oneTapTag.src = 'https://accounts.google.com/gsi/client' document.body.appendChild(oneTapTag) })();</script></div></div></div> </div> <div class="bootstrap login"><div class="modal fade login-modal" id="login-modal"><div class="login-modal-dialog modal-dialog"><div class="modal-content"><div class="modal-header"><button class="close close" data-dismiss="modal" type="button"><span aria-hidden="true">&times;</span><span class="sr-only">Close</span></button><h4 class="modal-title text-center"><strong>Log In</strong></h4></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><button class="btn btn-fb btn-lg btn-block btn-v-center-content" id="login-facebook-oauth-button"><svg style="float: left; width: 19px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="facebook-square" class="svg-inline--fa fa-facebook-square fa-w-14" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 448 512"><path fill="currentColor" d="M400 32H48A48 48 0 0 0 0 80v352a48 48 0 0 0 48 48h137.25V327.69h-63V256h63v-54.64c0-62.15 37-96.48 93.67-96.48 27.14 0 55.52 4.84 55.52 4.84v61h-31.27c-30.81 0-40.42 19.12-40.42 38.73V256h68.78l-11 71.69h-57.78V480H400a48 48 0 0 0 48-48V80a48 48 0 0 0-48-48z"></path></svg><small><strong>Log in</strong> with <strong>Facebook</strong></small></button><br /><button class="btn btn-google btn-lg btn-block btn-v-center-content" id="login-google-oauth-button"><svg style="float: left; width: 22px; line-height: 1em; margin-right: .3em;" aria-hidden="true" focusable="false" data-prefix="fab" data-icon="google-plus" class="svg-inline--fa fa-google-plus fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M256,8C119.1,8,8,119.1,8,256S119.1,504,256,504,504,392.9,504,256,392.9,8,256,8ZM185.3,380a124,124,0,0,1,0-248c31.3,0,60.1,11,83,32.3l-33.6,32.6c-13.2-12.9-31.3-19.1-49.4-19.1-42.9,0-77.2,35.5-77.2,78.1S142.3,334,185.3,334c32.6,0,64.9-19.1,70.1-53.3H185.3V238.1H302.2a109.2,109.2,0,0,1,1.9,20.7c0,70.8-47.5,121.2-118.8,121.2ZM415.5,273.8v35.5H380V273.8H344.5V238.3H380V202.8h35.5v35.5h35.2v35.5Z"></path></svg><small><strong>Log in</strong> with <strong>Google</strong></small></button><br /><style type="text/css">.sign-in-with-apple-button { width: 100%; height: 52px; border-radius: 3px; border: 1px solid black; cursor: pointer; }</style><script src="https://appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/appleid.auth.js" type="text/javascript"></script><div class="sign-in-with-apple-button" data-border="false" data-color="white" id="appleid-signin"><span &nbsp;&nbsp;="Sign Up with Apple" class="u-fs11"></span></div><script>AppleID.auth.init({ clientId: 'edu.academia.applesignon', scope: 'name email', redirectURI: 'https://www.academia.edu/sessions', state: "039ea357ae37bda0ef6840ed8b1592893a8c5f7f2bf3067842e04b8f43d3a6db", });</script><script>// Hacky way of checking if on fast loswp if (window.loswp == null) { (function() { const Google = window?.Aedu?.Auth?.OauthButton?.Login?.Google; const Facebook = window?.Aedu?.Auth?.OauthButton?.Login?.Facebook; if (Google) { new Google({ el: '#login-google-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } if (Facebook) { new Facebook({ el: '#login-facebook-oauth-button', rememberMeCheckboxId: 'remember_me', track: null }); } })(); }</script></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><div class="hr-heading login-hr-heading"><span class="hr-heading-text">or</span></div></div></div></div><div class="modal-body"><div class="row"><div class="col-xs-10 col-xs-offset-1"><form class="js-login-form" action="https://www.academia.edu/sessions" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="UaeRyAM9bNamo6qmm02ot7XJnaGDzYQvqE8ZvDQQCq-BsPOWBw6MmLe5asG4tBBCHC5qJTXAfXLLtSMhEJGHRQ" autocomplete="off" /><div class="form-group"><label class="control-label" for="login-modal-email-input" style="font-size: 14px;">Email</label><input class="form-control" id="login-modal-email-input" name="login" type="email" /></div><div class="form-group"><label class="control-label" for="login-modal-password-input" style="font-size: 14px;">Password</label><input class="form-control" id="login-modal-password-input" name="password" type="password" /></div><input type="hidden" name="post_login_redirect_url" id="post_login_redirect_url" value="https://www.academia.edu/Documents/in/Cyber_Security" autocomplete="off" /><div class="checkbox"><label><input type="checkbox" name="remember_me" id="remember_me" value="1" checked="checked" /><small style="font-size: 12px; margin-top: 2px; display: inline-block;">Remember me on this computer</small></label></div><br><input type="submit" name="commit" value="Log In" class="btn btn-primary btn-block btn-lg js-login-submit" data-disable-with="Log In" /></br></form><script>typeof window?.Aedu?.recaptchaManagedForm === 'function' && window.Aedu.recaptchaManagedForm( document.querySelector('.js-login-form'), document.querySelector('.js-login-submit') );</script><small style="font-size: 12px;"><br />or <a data-target="#login-modal-reset-password-container" data-toggle="collapse" href="javascript:void(0)">reset password</a></small><div class="collapse" id="login-modal-reset-password-container"><br /><div class="well margin-0x"><form class="js-password-reset-form" action="https://www.academia.edu/reset_password" accept-charset="UTF-8" method="post"><input type="hidden" name="authenticity_token" value="dqx9g6X0odDYrSdDMHOYWIjI-0yCyb5papelLWXYg5imux_docdBnsm35yQTiiCtIS8MyDTERzQJbZ-wQVkOcg" autocomplete="off" /><p>Enter the email address you signed up with and we&#39;ll email you a reset link.</p><div class="form-group"><input class="form-control" name="email" type="email" /></div><script src="https://recaptcha.net/recaptcha/api.js" async defer></script> <script> var invisibleRecaptchaSubmit = function () { var closestForm = function (ele) { var curEle = ele.parentNode; while (curEle.nodeName !== 'FORM' && curEle.nodeName !== 'BODY'){ curEle = curEle.parentNode; } return curEle.nodeName === 'FORM' ? curEle : null }; var eles = document.getElementsByClassName('g-recaptcha'); if (eles.length > 0) { var form = closestForm(eles[0]); if (form) { form.submit(); } } }; </script> <input type="submit" data-sitekey="6Lf3KHUUAAAAACggoMpmGJdQDtiyrjVlvGJ6BbAj" data-callback="invisibleRecaptchaSubmit" class="g-recaptcha btn btn-primary btn-block" value="Email me a link" value=""/> </form></div></div><script> require.config({ waitSeconds: 90 })(["https://a.academia-assets.com/assets/collapse-45805421cf446ca5adf7aaa1935b08a3a8d1d9a6cc5d91a62a2a3a00b20b3e6a.js"], function() { // from javascript_helper.rb $("#login-modal-reset-password-container").on("shown.bs.collapse", function() { $(this).find("input[type=email]").focus(); }); }); </script> </div></div></div><div class="modal-footer"><div class="text-center"><small style="font-size: 12px;">Need an account?&nbsp;<a rel="nofollow" href="https://www.academia.edu/signup">Click here to sign up</a></small></div></div></div></div></div></div><script>// If we are on subdomain or non-bootstrapped page, redirect to login page instead of showing modal (function(){ if (typeof $ === 'undefined') return; var host = window.location.hostname; if ((host === $domain || host === "www."+$domain) && (typeof $().modal === 'function')) { $("#nav_log_in").click(function(e) { // Don't follow the link and open the modal e.preventDefault(); $("#login-modal").on('shown.bs.modal', function() { $(this).find("#login-modal-email-input").focus() }).modal('show'); }); } })()</script> <div class="bootstrap" id="footer"><div class="footer-content clearfix text-center padding-top-7x" style="width:100%;"><ul class="footer-links-secondary footer-links-wide list-inline margin-bottom-1x"><li><a href="https://www.academia.edu/about">About</a></li><li><a href="https://www.academia.edu/press">Press</a></li><li><a href="https://www.academia.edu/documents">Papers</a></li><li><a href="https://www.academia.edu/topics">Topics</a></li><li><a href="https://www.academia.edu/journals">Academia.edu Journals</a></li><li><a rel="nofollow" href="https://www.academia.edu/hiring"><svg style="width: 13px; height: 13px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="briefcase" class="svg-inline--fa fa-briefcase fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M320 336c0 8.84-7.16 16-16 16h-96c-8.84 0-16-7.16-16-16v-48H0v144c0 25.6 22.4 48 48 48h416c25.6 0 48-22.4 48-48V288H320v48zm144-208h-80V80c0-25.6-22.4-48-48-48H176c-25.6 0-48 22.4-48 48v48H48c-25.6 0-48 22.4-48 48v80h512v-80c0-25.6-22.4-48-48-48zm-144 0H192V96h128v32z"></path></svg>&nbsp;<strong>We're Hiring!</strong></a></li><li><a rel="nofollow" href="https://support.academia.edu/"><svg style="width: 12px; height: 12px;" aria-hidden="true" focusable="false" data-prefix="fas" data-icon="question-circle" class="svg-inline--fa fa-question-circle fa-w-16" role="img" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 512 512"><path fill="currentColor" d="M504 256c0 136.997-111.043 248-248 248S8 392.997 8 256C8 119.083 119.043 8 256 8s248 111.083 248 248zM262.655 90c-54.497 0-89.255 22.957-116.549 63.758-3.536 5.286-2.353 12.415 2.715 16.258l34.699 26.31c5.205 3.947 12.621 3.008 16.665-2.122 17.864-22.658 30.113-35.797 57.303-35.797 20.429 0 45.698 13.148 45.698 32.958 0 14.976-12.363 22.667-32.534 33.976C247.128 238.528 216 254.941 216 296v4c0 6.627 5.373 12 12 12h56c6.627 0 12-5.373 12-12v-1.333c0-28.462 83.186-29.647 83.186-106.667 0-58.002-60.165-102-116.531-102zM256 338c-25.365 0-46 20.635-46 46 0 25.364 20.635 46 46 46s46-20.636 46-46c0-25.365-20.635-46-46-46z"></path></svg>&nbsp;<strong>Help Center</strong></a></li></ul><ul class="footer-links-tertiary list-inline margin-bottom-1x"><li class="small">Find new research papers in:</li><li class="small"><a href="https://www.academia.edu/Documents/in/Physics">Physics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Chemistry">Chemistry</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Biology">Biology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Health_Sciences">Health Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Ecology">Ecology</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Earth_Sciences">Earth Sciences</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Cognitive_Science">Cognitive Science</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Mathematics">Mathematics</a></li><li class="small"><a href="https://www.academia.edu/Documents/in/Computer_Science">Computer Science</a></li></ul></div></div><div class="DesignSystem" id="credit" style="width:100%;"><ul class="u-pl0x footer-links-legal list-inline"><li><a rel="nofollow" href="https://www.academia.edu/terms">Terms</a></li><li><a rel="nofollow" href="https://www.academia.edu/privacy">Privacy</a></li><li><a rel="nofollow" href="https://www.academia.edu/copyright">Copyright</a></li><li>Academia &copy;2025</li></ul></div><script> //<![CDATA[ window.detect_gmtoffset = true; window.Academia && window.Academia.set_gmtoffset && Academia.set_gmtoffset('/gmtoffset'); //]]> </script> <div id='overlay_background'></div> <div id='bootstrap-modal-container' class='bootstrap'></div> <div id='ds-modal-container' class='bootstrap DesignSystem'></div> <div id='full-screen-modal'></div> </div> </body> </html>

Pages: 1 2 3 4 5 6 7 8 9 10