Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 9 of 9
Full-Text Articles in Entire DC Network
China’S Quantum Quandary, Elsa B. Kania
Strategic Challenges Of Declining International Power For Democracies In A Hostile Cyber World: The Case Of China, Nigel Inkster
Strategic Challenges Of Declining International Power For Democracies In A Hostile Cyber World: The Case Of China, Nigel Inkster
Military Cyber Affairs
No abstract provided.
The Financial Sector’S Vulnerabilities, Villains, And Options For Defense, John T. Harvey
The Financial Sector’S Vulnerabilities, Villains, And Options For Defense, John T. Harvey
Military Cyber Affairs
The consequences of cyber attacks on the financial sector go well beyond those suffered by the individuals and firms directly involved and may even lead to the destabilization of the system itself. The concern is all the greater given that banks and similar institutions play a much more critical role than most people realize and the nature of their operation already invites risk taking at the best of times. Bad actors hoping to sow chaos surely understand the trouble they could cause by targeting the financial underpinning of our economy. This paper will argue that while the cyber defense of …
Dry Rivers, Scary Strangers: Are Financial And Cyber Crises Alike?, Claudia Biancotti, Paolo Ciocca
Dry Rivers, Scary Strangers: Are Financial And Cyber Crises Alike?, Claudia Biancotti, Paolo Ciocca
Military Cyber Affairs
The internet and the financial system show crucial affinities: both are tightly interconnected global networks whose orderly functioning is a prerequisite for economic prosperity. In financial and cyber crises alike, vulnerabilities are a consequence of distorted economic incentives, contagion is fast, and the most serious risk is loss of trust. Lessons learned from financial meltdowns translate to the cybersecurity world: stability cannot be achieved until policies are in place to address all of these issues. Steps have been taken to rectify incentives, as exemplified by recent European Union legislation. Data that helps identify weak nodes are still scarce, notwithstanding recent …
Systemic Cyber Risks And Defense: Valuation, Innovation And Strategic Implications, Pythagoras N. Petratos
Systemic Cyber Risks And Defense: Valuation, Innovation And Strategic Implications, Pythagoras N. Petratos
Military Cyber Affairs
No abstract provided.
Trouble On The High “C’S” – China, Cyber, And The Trading System, Robert Fisher
Trouble On The High “C’S” – China, Cyber, And The Trading System, Robert Fisher
Military Cyber Affairs
No abstract provided.
Strategy Needed To Protect National Sovereignty Of Us Telecommunications Backbone, Thomas Donahue
Strategy Needed To Protect National Sovereignty Of Us Telecommunications Backbone, Thomas Donahue
Military Cyber Affairs
No abstract provided.
Regaining The Technological Edge: Authoritarians, Democracies, It Innovation’S Future, Andrea Little Limbago
Regaining The Technological Edge: Authoritarians, Democracies, It Innovation’S Future, Andrea Little Limbago
Military Cyber Affairs
No abstract provided.
Countering "Made In China 2025": Strategy For Western Powers In A Cybered World, David Mussington
Countering "Made In China 2025": Strategy For Western Powers In A Cybered World, David Mussington
Military Cyber Affairs
No abstract provided.