Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Great Power Cyberpolitics: Re-Interpreting Offensive Realism And Power Transition Theory For Cyber Deterrence, Yavuz Akdaǧ Nov 2023

Great Power Cyberpolitics: Re-Interpreting Offensive Realism And Power Transition Theory For Cyber Deterrence, Yavuz Akdaǧ

USF Tampa Graduate Theses and Dissertations

This dissertation assesses the empirical relevancy of realist International Relations (IR) theory in cyberspace and shows how a richer IR-based theory of cyber conflict can enhance the understanding of interstate cyber deterrence, especially in the context of US-Sino hegemonic cyber conflict or cyberwar. As states increasingly engage in cyber conflict by exploiting security vulnerabilities due to global interconnectivity (i.e., the Internet), cyber threat has become relevant for national security. Scholars constructed cyber deterrence to counter the threat using the fundamentals of the Cold War nuclear deterrence. Yet this approach is highly contested; cyberspace defies traditional deterrence concepts. Further theoretical analysis …


Why China Cares About Canada’S Indigenous Residential Schools: From Whataboutism To Internal Denial, Xiyuan (Marvin) Xia Jul 2023

Why China Cares About Canada’S Indigenous Residential Schools: From Whataboutism To Internal Denial, Xiyuan (Marvin) Xia

Genocide Studies and Prevention: An International Journal

This article examines how the Chinese government and its propaganda departments use genocide-related discourses to fulfil different political purposes at home and abroad. By criticizing Western colonialist regimes’ assimilation policies, especially Canada’s Indigenous residential schools, the Chinese diplomats apply the rhetoric of whataboutism to dodge the international community’s questions about China’s systematic persecution of Uyghur Muslims. Domestically, China’s state media intensively cover Canada’s residential school system and the colonial genocide against Indigenous people, trying to distract the audience from the state atrocities in Xinjiang and mislead the public to distrust Canada and other countries’ motives for accusing China of committing …


Institutional Legacies And The Decision To Commit Genocide, Stacey M. Mitchell Jun 2023

Institutional Legacies And The Decision To Commit Genocide, Stacey M. Mitchell

Genocide Studies and Prevention: An International Journal

Despite their striking similarities, which include population demographics, size, and a legacy of inter-group conflict, the collapse of democratization in Rwanda and Burundi in the early 1990s led to genocide in Rwanda and a different type of violence in Burundi. This study suggests that to better comprehend why risk factors lead to genocide in some cases and not others, focus must be placed on how these factors are perceived by those in power of the state experiencing them. This study introduces a model that uses Comparative Historical Analysis (CHA), process tracing, and the inclusion of a decision model built on …


Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum May 2023

Security-Enhanced Serial Communications, John White, Alexander Beall, Joseph Maurio, Dane Fichter, Dr. Matthew Davis, Dr. Zachary Birnbaum

Military Cyber Affairs

Industrial Control Systems (ICS) are widely used by critical infrastructure and are ubiquitous in numerous industries including telecommunications, petrochemical, and manufacturing. ICS are at a high risk of cyber attack given their internet accessibility, inherent lack of security, deployment timelines, and criticality. A unique challenge in ICS security is the prevalence of serial communication buses and other non-TCP/IP communications protocols. The communication protocols used within serial buses often lack authentication and integrity protections, leaving them vulnerable to spoofing and replay attacks. The bandwidth constraints and prevalence of legacy hardware in these systems prevent the use of modern message authentication and …


What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer May 2023

What Senior U.S. Leaders Say We Should Know About Cyber, Dr. Joseph H. Schafer

Military Cyber Affairs

On April 6, 2023, the Atlantic Council’s Cyber Statecraft Initiative hosted a panel discussion on the new National Cybersecurity Strategy. The panel featured four senior officials from the Office of the National Cyber Director (ONCD), the Department of State (DoS), the Department of Justice (DoJ), and the Department of Homeland Security (DHS). The author attended and asked each official to identify the most important elements that policymakers and strategists must understand about cyber. This article highlights historical and recent struggles to express cyber policy, the responses from these officials, and the author’s ongoing research to improve national security cyber policy.


Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane May 2023

Operationalizing Deterrence By Denial In The Cyber Domain, Gentry Lane

Military Cyber Affairs

No abstract provided.


Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman May 2023

Enhancing The Battleverse: The People’S Liberation Army’S Digital Twin Strategy, Joshua Baughman

Military Cyber Affairs

No abstract provided.


Violence, Rents, And Elites: Institutional Determinants Of Political Order In Ethiopia, Rwanda, And South Sudan, Kaleb Demerew Mar 2023

Violence, Rents, And Elites: Institutional Determinants Of Political Order In Ethiopia, Rwanda, And South Sudan, Kaleb Demerew

USF Tampa Graduate Theses and Dissertations

This dissertation aims to investigate why some African states make progress in political development while others remain stagnant or regress. The study adopts a political economy approach within the new institutionalism tradition, focusing on the agency of domestic elites and the impact of violence constraints on institutional outcomes. Specifically, the study employs the violence trap framework, which identifies developing countries as fragile states, basic natural states, and mature natural states. The research applies this framework to case studies of Ethiopia, Rwanda, and South Sudan using an analytic narratives methodology that combines elite interviews with primary and secondary source analysis. The …