Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 15 of 15
Full-Text Articles in Entire DC Network
Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone
Acknowledging The Impact Of Climate Change On National Security: A Long And Winding Road, Linda A. Malone
Linda A. Malone
No abstract provided.
Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg
Strategic Cyberwar Theory - A Foundation For Designing Decisive Strategic Cyber Operations, Jan Kallberg
Jan Kallberg
Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek
Integration Of And The Potential For Islamic Radicalization Among Ethnic Turks In Germany, Alev Dudek
Alev Dudek
In spite of ongoing improvements, integration of ethnic Turks in Germany remains a challenge from the dominant culture perspective, whereas a deeply ingrained institutional and everyday racism and the lack of legal protection against discrimination pose a challenge to full participation of ethnic Turks from another perspective. In an increasingly xenophobic Europe, particularly Germany, an increase in potential for religious and nationalist radicalization in different groups including ethnic Turks is becoming more and more evident. This increase in radical attitudes is not necessarily caused by a lack of integration, as evidenced among well-integrated individuals.
In view of recent developments toward …
Cyber Resilience Is A National Problem, Jan Kallberg
Cyber Resilience Is A National Problem, Jan Kallberg
Jan Kallberg
The biggest challenge for American cyber resilience right now is to disseminate knowledge within the nation. The federal sector, the financial institutions, and the defense complex are on top of the game to a high degree. The asymmetric way cyber conflicts are and will be fought exposes the whole government structure of a country. The sheer numbers entities that form local government are staggering – just as examples I mention that in the US there are 6,000 counties, 15,000 police departments, and 50,000 public utilities. My take is that to be able to strengthen American cyber resiliency local government needs …
Why The Cyber Bill Matters, Jan Kallberg
Why The Cyber Bill Matters, Jan Kallberg
Jan Kallberg
The separation between private sphere and the federal government matters more than we might think. The bill will create a funnel for industries, enterprises, local government, and state agencies to share information with the federal government. The bill separates the federal government and these other entities – by a traditional but validated approach – by the surrender to federal government for protection by bargaining away the “right” to self-protection. It is important because the federal government will maintain its legitimacy and authority over defending the nation – and by doing so we avoid a chaotic cyber environment where everyone is …
Cyber Beyond Computers - The Environmental Aspect, Jan Kallberg
Cyber Beyond Computers - The Environmental Aspect, Jan Kallberg
Jan Kallberg
A forgotten aspect on cyber and cyber conflicts impact on our society is the fact that tampering with our control systems can lead to industrial processes running amok - and lead to environmental damages. Threats to our environment is taken very serious by the population and pollution and contamination of our living space trigger drastic reactions.
Societal Cyberwar Theory Applied The Disruptive Power Of State Actor Aggression For Public Sector Information Security, Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa
Societal Cyberwar Theory Applied The Disruptive Power Of State Actor Aggression For Public Sector Information Security, Jan Kallberg, Bhavani Thuraisingham, Erik Lakomaa
Jan Kallberg
Abstract – The modern welfare state faces significant challenges to be able to sustain a systematic cyber conflict that pursues the institutional destabilization of the targeted state.
Cyber defense in these advanced democracies are limited, unstructured, and focused on anecdotal cyber interchanges of marginal geopolitical value.
The factual reach of government activities once a conflict is initiated is likely to be miniscule. Therefore the information security activities, and assessments leading to cyberdefense efforts, have to be strategically pre-event coordinated within the state. This coordination should be following a framework that ensures institutional stability, public trust, and limit challenges to the …
Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern
Chapter 13: Operation Neptune Spear: Was Killing Bin Laden A Legitimate Military Objective?, Kevin H. Govern
Kevin H. Govern
In this chapter I take the killing of Osama bin Laden as a test case for considering the moral and legal status of intentionally killing individuals deemed a threat to national security, under conditions in which the object of the targeted attack is offered little or no opportunity to surrender to attacking forces. The target in such operations, in short, is treated as though he were a belligerent: a person placed on a kill list may be targeted in a way that would be legitimate if he were an enemy combatant. In such cases, we think of him as having …
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Towards A Conceptual Model Of User Acceptance Of Location-Based Emergency Services, Anas Aloudat, Katina Michael
Professor Katina Michael
This paper investigates the introduction of location-based services by government as part of an all-hazards approach to modern emergency management solutions. Its main contribution is in exploring the determinants of an individual’s acceptance or rejection of location services. The authors put forward a conceptual model to better predict why an individual would accept or reject such services, especially with respect to emergencies. While it may be posited by government agencies that individuals would unanimously wish to accept life-saving and life-sustaining location services for their well-being, this view remains untested. The theorised determinants include: visibility of the service solution, perceived service …
Book Review: Handbook On Securing Cyber-Physical Critical Infrastructure: Foundations And Challenges (Written By Sajal K. Das, Krishna Kant, Nan Zhang), Katina Michael
Professor Katina Michael
This 800+ page handbook is divided into eight parts and contains thirty chapters, ideal for either an advanced undergraduate or graduate course in security. At the heart of this handbook is how we might go about managing both physical and cyber infrastructures, as they continue to become embedded and enmeshed, through advanced control systems, and new computing and communications paradigms.
Employees' Peers Can Fill Gap When Vetting Clearances, Jan Kallberg
Employees' Peers Can Fill Gap When Vetting Clearances, Jan Kallberg
Jan Kallberg
Federal Times' Jan. 8 editorial ["Time to overhaul security clearance system"] proposed changes in the security clearance system. Many of these proposed changes are straightforward: one unified government body that handles clearances, reciprocity among agencies to honor the clearance, and increased automation. I would like to add another recommendation: peer reporting during the period the security clearance is held. The process of clearing personnel would be faster if we could rely on automated vetting with limited additional manual research, and then add active peer reporting. A structured clearance process at the entrance point can be trespassed, but peers watch and …
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Human Rights, Regulation, And National Security, Katina Michael, Simon Bronitt
Professor Katina Michael
Law disciplines technology, though it does so in a partial and incomplete way as reflected in the old adage that technology outstrips the capacity of law to regulate it. The rise of new technologies poses a significant threat to human rights – the pervasive use of CCTV (and now mobile CCTV), telecommunications interception, and low-cost audio-visual recording and tracking devices (some of these discreetly wearable), extend the power of the state and corporations significantly to intrude into the lives of citizens.
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Recommendations For Australia’S Implementation Of The National Emergency Warning System Using Location-Based Services, Anas Aloudat, Katina Michael, Roba Abbas
Professor Katina Michael
Mobile alerts, notifications and location-based emergency warning systems are now an established part of mobile government strategies in an increasing number of countries worldwide. In Australia the national emergency warning system (NEWS) was instituted after the tragic Black Saturday Victorian Bushfires of February 2009. In the first phase, NEWS has enabled the provision of public information from the government to the citizen during emergencies anywhere and any time. Moving on from traditional short message service (SMS) notifications and cell broadcasting to more advanced location-based services, this paper provides executive-level recommendations about the viability of location-based mobile phone services in NEWS …
Military Commissions Act Of 2006, Arsalan M. Suleman
Military Commissions Act Of 2006, Arsalan M. Suleman
Arsalan Suleman
On October 17, 2006, President Bush signed into law the Military Commissions Act of 2006 (MCA). Congress passed the MCA to authorize the trial by military commissions of detained terrorism suspects after the Supreme Court's decision in Hamdan v. Rumsfeld invalidated the military commissions previously established pursuant to a 2001 military order from President Bush. The MCA adds chapter 47A to title 10 of the U.S. Code to give statutory authorization for the military commissions. This Recent Development explores some of the more controversial aspects of the MCA, especially those sections that respond to the Court's Hamdan decision. The note …
Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael
Soap Box: If Katina Michael Could Send A Message To Government, It Would Be This..., K. Michael
Professor Katina Michael
No abstract provided.