Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Chinese Communist Party (1)
- Cyber (1)
- Cyber attack (1)
- Cyber auxiliary (1)
- Cyber militia (1)
-
- Cybersecurity (1)
- Electromagnetic (1)
- Espionage (1)
- Information Domain (1)
- Information Operations (1)
- Intelligence (1)
- Lexical link analysis; text mining; unstructured data; open source; social media; authenticity; persona archetype; cyber professionals; collaborative learning agents; big data; deep learning (1)
- Network (1)
- People's Liberation Army (1)
- Propaganda (1)
- Psychological (1)
Articles 1 - 2 of 2
Full-Text Articles in Entire DC Network
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
People's War In Cyberspace: Using China's Civilian Economy In The Information Domain, Kieran Richard Green
Military Cyber Affairs
China is identified as posing a key challenge to US national security interests in cyberspace. These threats are incurred across the spectrum of conflict, ranging from low-level crime, to network penetration, to cyberattacks that have the potential to cause major physical destruction. Thus far, the majority of strategic assessments of China’s cyber capabilities have focused on the role of the People’s Liberation Army (PLA), which is officially tasked with undertaking offensive operations in cyberspace.[1] However, China does not employ its cyber capabilities in isolation. Rather, it considers cyber to be part of the “Information Domain.” In Chinese doctrine, controlling …
Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley
Leveraging Lexical Link Analysis (Lla) To Discover New Knowledge, Ying Zhao, Douglas J. Mackinnon, Shelley P. Gallup, Joseph L. Billingsley
Military Cyber Affairs
Lexical Link Analysis (LLA) is a form of text mining in which word meanings represented in lexical terms (e.g., word pairs) are treated as if they are in a community of a word network. LLA can provide automated awareness for analyzing text data and reveal previously unknown, data-driven themed connections. We applied LLA to develop authentic archetypes and conversely determine potential imposters of that same archetype. We use publically available social media data to develop a cyber professional as an example. This paper reports the development of the algorithm, the collection and labeling of data, as well as the results …